2016
DOI: 10.1103/physrevx.6.041022
|View full text |Cite
|
Sign up to set email alerts
|

Hidden Connectivity in Networks with Vulnerable Classes of Nodes

Abstract: In many complex systems representable as networks, nodes can be separated into different classes. Often these classes can be linked to a mutually shared vulnerability. Shared vulnerabilities may be due to a shared eavesdropper or correlated failures. In this paper, we show the impact of shared vulnerabilities on robust connectivity and how the heterogeneity of node classes can be exploited to maintain functionality by utilizing multiple paths. Percolation is the field of statistical physics that is generally u… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

5
46
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 12 publications
(56 citation statements)
references
References 63 publications
5
46
1
Order By: Relevance
“…where the probabilities u i, j satisfy the system of self-consistent equations . For k E =0 we recover the equations obtained by Krause et al in [3,5].…”
mentioning
confidence: 87%
See 4 more Smart Citations
“…where the probabilities u i, j satisfy the system of self-consistent equations . For k E =0 we recover the equations obtained by Krause et al in [3,5].…”
mentioning
confidence: 87%
“…We note that any node in the GSC can securely communicate with any other node in the GSC. To find the GSC we generalize the framework of 'color-avoiding percolation' (CAP) [3,5] to study a more realistic case of secure message-passing in a communication network with a given community structure and different classes of adversaries (vulnerabilities).…”
mentioning
confidence: 99%
See 3 more Smart Citations