2017
DOI: 10.1109/tcomm.2017.2698480
|View full text |Cite
|
Sign up to set email alerts
|

Error Correction Coding Meets Cyber-Physical Systems: Message-Passing Analysis of Self-Healing Interdependent Networks

Abstract: Abstract-Coupling cyber and physical systems gives rise to numerous engineering challenges and opportunities. An important challenge is the contagion of failure from one system to another, which can lead to large-scale cascading failures. However, the self-healing ability emerges as a valuable opportunity where the overlaying cyber network can cure failures in the underlying physical network. To capture both self-healing and contagion, this paper considers a graphical model representation of an interdependent … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(16 citation statements)
references
References 44 publications
0
16
0
Order By: Relevance
“…In the experiment, we adopt real network data sets to comprehensively evaluate the performance of the proposed algorithm. To compare the advantages and disadvantages of RRMNC, this study compares and analyses with three algorithms: the Agent Unsigned Network [28], SAC [29]and BAGC [30]. In the experiment, the tool used for execution is NS-3.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the experiment, we adopt real network data sets to comprehensively evaluate the performance of the proposed algorithm. To compare the advantages and disadvantages of RRMNC, this study compares and analyses with three algorithms: the Agent Unsigned Network [28], SAC [29]and BAGC [30]. In the experiment, the tool used for execution is NS-3.…”
Section: Methodsmentioning
confidence: 99%
“…The node stores the information to be transmitted in its own cache area, carries the information for movement, and does not send the information to the node until it meets the appropriate node. In the urban social scene, people with portable communication equipment represent nodes in the social opportunistic network, so the social attributes of these people will have a great impact on the data transmission strategy [25][26][27][28][29][30][31][32]. Data generated by human behaviors are of great significance for the selection and improvement of information transmission strategies, so they have become the research hotspot of social opportunistic networks.…”
Section: Introductionmentioning
confidence: 99%
“…For this purpose, a graphical representation of functions and exchanged messages helps to visualize the general model of the network and to implement the MP algorithm [35]. Among graphical models, FGs work efficiently for decomposition of complex problems [24], [36]. An FG is basically a bipartite graph composed of variable nodes and factor nodes.…”
Section: Factor-graph Based Solutionmentioning
confidence: 99%
“…The works in [12], [13], [14] analyze the behaviors of failure propagations in such interdependent networks when each node performs local recovery (healing), where a functioning node substitutes for the failed node by establishing new connections with its neighbors.…”
Section: Related Workmentioning
confidence: 99%