Bi-Layer Shortest-Path Network Interdiction Game for Internet of Things

Network security is a crucial challenge facing Internet-of-Things (IoT) systems worldwide, which leads to serious safety alarms and great economic loss. This paper studies the problem of malicious interdicting network exploitation of IoT systems that are modeled as a bi-layer logical–physical network. In this problem, a virtual attack takes place at the logical layer (the layer of Things), while the physical layer (the layer of Internet) provides concrete support for the attack. In the interdiction problem, the attacker attempts to access a target node on the logical layer with minimal communication cost, but the defender can strategically interdict some key edges on the physical layer given a certain budget of interdiction resources. This setting generalizes the classic single-layer shortest-path network interdiction problem, but brings in nonlinear objective functions, which are notoriously challenging to optimize. We reformulate the model and apply Benders decomposition process to solve this problem. A layer-mapping module is introduced to improve the decomposition algorithm and a random-search process is proposed to accelerate the convergence. Extensive numerical experiments demonstrate the computational efficiency of our methods.


Introduction
With the development of information and communication technologies, more and more functional systems have begun to be built based on information networks. Thanks to the high-speed and massive data transmission of the information network, the scale and efficiency of the functional system has been greatly increased. It makes the multi-layer network system represented by Internet of Things (IoT) widely used in various fields such as energy, health care, communication, transportation and manufacturing [1]. The combination of networks of different layers makes the whole system have far more powerful and intelligent functions than ever before. However, the high integration and connectivity of IoT make them more vulnerable to malicious attacks [2][3][4]. An error or failure of a certain layer may have serious effects on the entire system, and the malicious attacks on the system may be carried out from multiple layers, e.g., the cascading failures of the Italian smart grid on 28 September 2003 [5] and the Stuxnet worm against Iranian nuclear facilities [6]. The great significance and vulnerability of IoT has inspired researchers to pay attention to the security protection of them. Recent literature has carried out relevant research on the security of IoT and other layered network systems from different perspectives [7][8][9][10][11][12][13][14]. links in the network and the effect of interdiction. The separation of these two layers brings about the non-linearity of the objective function (In Section 2, we present the non-linearity in LPNSPI. The two-layer structure leads to the product term of decision variables in the objective function (Equation (7))), and also make the traditional single-layer NIP solving methods unable to be directly applied to LPNSPI. Recently the layered network interdiction problem has attracted more attention. Kennedy [30] studied the maximum flow interdiction problem in a kind of multi-layer network where different layers are connected by sharing some common elements (nodes or edges). Wei et al. [31] studied the shortest-path interdiction problem in a kind of bi-layer network where the interdiction effects on one layer can be determined by the interdiction on the other layer through logical operations. Baycik et al. [32] studied the interdiction problem in layered physical and information flow networks. In this problem, a physical node can only be used when the flow passing through its corresponding information-layer node is more than a particular demand. Compared to this research, LPNSPI has a completely different setting on the inter-layer relationships of logical-physical networks, which pays more attention to the relationships between logical functions and physical communication paths. Table 1 briefly compares some of the characteristics of LPNSPI and layered network interdiction problems mentioned above. The logical layer contains a sensor, an effector and three different processors. The physical layer is the communication network, where the time delay of each link is given by the number beside it. Each dotted line between the two layers connects the functional part and the communicating part of the same entity. The sensor collects information and sends it to either of the processors. The processor analyzes the information and then sends order to the effector. As the figure shows, the shortest logical flow Sensor → Processor3 → Effector corresponds to a physical path A(Sensor) → E → G(Processor 3) → K → L(Effector), which weighs 9. Although the shortest A-L path on the physical layer is A(Sensor) → E → H → L(Effector) with total weight 8, it is not functionally feasible because no processor is on this path and thus no effective order can be sent to Effector.
In this paper, we propose the LPNSPI game and model it as a bi-level integer program. We reformulate the problem and develop a Benders decomposition algorithm framework to solve LPNSPI. There are two major approaches to solve SPNI problems: the decomposition method and the dual method. The advantages of the decomposition approach have been mentioned in [33], and as shown in Table 1, the dual method is not suitable for LPNSPI. Then we propose a Layer-Mapping module to reduce unnecessary calculations of the decomposition algorithm. Also, a Random-Search module is developed to accelerate the convergence of the algorithm with a given approximate ratio. Simulation experiments are designed, and the computational results prove the significant efficiency of Layer-Mapping and Random-Search. Finally, we test our algorithms in a real bi-layer IoT network, and our improving methods perform well in both solving time and interdiction effects. The paper is organized as follows. In Section 2, the LPNSPI model is defined and formulated. In Section 3, a basic decomposition algorithm is developed after reformulation. Layer-Mapping is introduced in Section 4, and Random-Search is proposed in Section 5. Section 6 provides the experimental results. Conclusions are in Section 7.

Shortest Path Interdiction Problem in Logical-Physical Networks
The LPNSPI problem involves two different networks: the logical-layer network which represents the flow of information between logical entities, and the physical-layer network which represents the actual transmission path of information in a physical environment. Throughout the present work, we use normal symbols to represent scalars, and bold symbols for vectors/matrices. The logical-layer network is defined as a directed graph G l = (N l , A l ), where N l represents the set of logical nodes and A l represents the set of logical arcs. Each logical node corresponds to a logical entity such as a person, a unit, an organization, etc. Each logical arc e l = (i l , j l ) represents an allowed information transfer direction between logical nodes. The direction of a logical link is generally defined by artificial rules (such as process rules, hierarchy rules, etc.) rather than natural ones. For instance, in the logical network, two nodes are adjacent because they may have a direct functional dependency (the proper functioning of node i depends on the processed information provided by node j) rather than because they have a direct physical connection. Unlike a logical-layer network, a physical-layer network is defined as a bidirected graph G p = (N p , A p ), where N p represents the set of physical nodes and A p represents the set of physical arcs. Physical arcs are bidirected because they correspond to connections in the actual physical environment, such as road connections, routing connection, and so on. These connections are not directional in themselves and the flow of information on them can be two-way. Each logical node i l has a corresponding physical node i p , but not necessarily the other way around (many nodes in the physical network serve only as information transfer nodes and are not necessary to perform system functions). Each physical arc e p = (i p , j p ) ∈ A p has a cost of communication c e p for the attacker, which will be increased to c e p + d e p if the arc is interdicted by the defender. In addition, for the defender, the corresponding resource consumption of interdicting e p is denoted as r e p . The total interdiction resource for the defender is R. The communication cost of a logical arc w e l is the total communication cost of a path that the attacker choose to travel in the physical-layer network, the corresponding node of endpoints of the logical arc being the start node and end node of the physical path.
In this problem, we assume both the attacker and the defender have complete information about the network. The defender pre-deploys the defense strategy according to the attacker's source node s l and target node t l , and blocks some edges in the network. Subsequently, the attacker develops an optimal attack plan to minimize the communication cost from the starting node to the target node. Let x e p (the vector form is denoted by bold x) denote the defender's interdiction strategy on e p , and let y e l (the vector form is denoted by bold y) denote the attacker's pathfinding variable on the logical layer. Then the attacker's problem can be formulated as follows: where w e l is the weight of the logical link e l = (i l , j l ), i.e., the minimum total cost of its corresponding paths on the physical layer: where k e l e p (Let K denotes the matrix form) is the pathfinding variable which indicates whether e p is chosen in the corresponding physical path of e l . x e p = 1 when the physical arc e p is interdicted and x e p = 0 otherwise. k e l e p = 1 indicates that e p is in the physical shortest path corresponding to e l . FS(v p ) and RS(v p ) represent respectively the arc set directed out of and into node v p . i p and j p are respectively the corresponding physical nodes of i l and j l . Constraint (2) and (5) are the flow-balance constraints. In practice, w e l can be calculated by using common shortest-path algorithms such as the Dijkstra algorithm. We define V s l t l as the total communication cost from s l to t l . Then the defender's problem of maximizing V s l t l , which is exactly the LPNSPI problem, can be formulated as follows ∑ ep∈Ap x ep r ep ≤ 2R (11) x ep , y e l , k e l ep ∈ {0, 1}, ∀e p ∈ A p , ∀e l ∈ A l (12) where ← − e p is the reverse arc of e p and constraint (10) indicates that the interdiction of an arc is effective for both directions. Constraint (11) is the resource constraint for the defender, where we use 2R as the resource limit because of the counting for both directions. It is noted that the objective function (7) is nonlinear, which results from the mapping relationship between the physical-layer network and the logical-layer network. A Benders decomposition algorithm framework and related improvement methods are proposed in this paper.

Basic Decomposition Algorithm for LPNSPI
The problem of shortest-path network interdiction can be naturally divided into two processes: blocking resource deployment process and pathfinding process. These two processes respectively correspond to the max operation and min operation in (7), and correspond to the master problem and subproblem of the Benders decomposition algorithm. Let d denote the vector of d e p and D = diag(d). z denotes an s p -t p path on the physical layer andẐ denotes a collection of s p -t p paths. The master problem and the subproblem of LPNSPI are defined as follows: Constraint (10) and Constraint (11) s.t. Constraint (8) and Constraint (9) z e p = ∑ e l ∈A l y e l k e l e p , ∀e l ∈ A l (17) In contrast to the case in a single-layer network,ẑ does not necessarily represent a simple path. For the attacker, searching a path with minimum communication cost will lead to the shortest path in the logical layer, which is definitely a simple path. Although the corresponding path in physical and may have repeated arcs, the attacker cannot avoid going through them because the topology of logical layer specifies the process that the attacker must follow to achieve his goal.
Let Z denote the set of shortest physical layer paths that all simple s l -t l paths in logical layer correspond. Notice thatẑ ∈ Z is always established, then [Master(Ẑ)] is an equivalent formulation of [LPNSPI] whenẐ = Z. Benders decomposition algorithm fixesẐ andx in turn, and iteratively solves the master problem and subproblem in turn. [Master(Ẑ)] fixes the set of feasible pathsẐ and solves an optimal interdiction strategy from the aspect of the defender, while [Sub(x)] gives an optimal path selection with fixed logical-layer network status, standing at the angle of the attacker.
Israeli and Wood [33] proposed two types of "supervalid inequalities" (SVI) constraints to strengthen the LP relation of the master problem of Benders decomposition for the shortest-path interdiction problem of single-layer networks. These inequalities are constructed after the subproblem gives a currently optimal path and added to the master problem as constraints. SVIs are based on the following idea: they may make some solutions infeasible but are guaranteed not to eliminate any optimal solutions unless the incumbent is itself optimal; by reducing the size of the feasible region, SVIs accelerate the master problem. These inequalities can be extended to the logical-physical networks, and the proofs are basically the same with the single-layer case. The master problem containing SVIs is as follows: Constraint (10) and Constraint (11) where (21) is the Type-I SVI and Constraint (22) is the Type-II SVI. For detailed introduction and related proofs of SVI, please refer to [33].
Because of the logical-physical structure, [Sub(x)] contains nonlinear terms and cannot be solved directly. However, we can divide the solution process into two steps: first, calculate the current communication costŵ of the logical layer links with the current interdiction strategyx, and then calculate the shortest path of the logical layer. Here we rewrite the subproblem as follows: s.t. Constraint (2) and Constraint (3) We denote the matrix K obtained when calculatingŵ asK, and denote the current logical path given by [Sub(ŵ)-LM] asŷ, then we haveẑ =K Tŷ . [Sub(ŵ)-LM] is also a necessary reformulation of the subproblem in order to use Layer-Mapping, which we will introduce in the next section. Now we give the basic decomposition algorithm for LPNSPI:

Algorithm 1 Basic Benders decomposition algorithm for LPNSPI
Input : An instance of LPNSPI Output: An optimal interdiction plan x * Calculateŵ andK according tox using (4)- (6) 4: Solve [Sub(ŵ)-LM] forŷ and the objective value Vŵ 5:ẑ =K Tŷ ;Ẑ ←Ẑ ∪ẑ; 6: if V < Vŵ then 7: x ←x; V ← Vŵ; 8: end if 9: if V − V ≤ 0 then 10: break; 11: end if 12: Solve [Master(Ẑ)-SVI] forx and the objective value VẐ; 13: V ← VẐ; 14: end while 15: x * ← x 16: return x * The correctness of Algorithm 1 is based on the following facts: Vŵ gives a lower bound on the attacker's optimal objective value and VẐ gives a upper bound on the defender's optimal objective value. Although the actual path in the physical layer z may no longer be a simple path in the case of layered network, the corresponding path in logical layer y is certainly simple, whose number is finite. The number of possible interdiction plans x is also finite. In addition, once y and x are fixed, z is fixed, which means that the algorithm converges in a finite number of iterations.

Layer-Mapping Module
As shown in Algorithm 1, during the iteration of the decomposition algorithm, the current interdiction strategyx changes when the master problem finds a better solution. In addition, the change of the interdiction strategy results in the change of the network status which can be represented bŷ w andK:ŵ indicates the weights of logical links andK indicates the corresponding relationships between logical links and physical paths. Once the current network status (ŵ andK) is determined, we can solve a relatively simple subproblem [Sub(ŵ)-LM] ([Sub(ŵ)-LM] shares the same representation form with the subproblem of the single-layer case ) and give the currently optimal logical pathŷ. However, this process (line 3 in Algorithm 1) contains a lot of double counting during the iteration because we recalculateŵ e l andk e l e p for every logical link and physical arc in each iteration. It inspires us to add a Layer-Mapping module between the master problem and the subproblem to find the specific changes of the network status whenx changes.
Since the interdiction impact d e p is positive, interdicting a physical arc will not shorten any physical shortest path. So, the change ofx has no effect on a physical shortest path (that means this path is still shortest) if no arc of it is interdicted. Let x 0 denote an initial interdiction strategy. Let w 0 denote the corresponding weights (communication costs) of logical links and let K 0 denote the corresponding path-mapping matrix K. When the interdiction strategy changes tox which satisfies {e p |x 0 e p = 1} ⊆ {e p |x e p = 1}, we need only to recalculateŵ e l andk e l e p for logical link e l if there exists a physical arc e p ∈ e p ∈ A p |x 0 e p =x e p which makes K 0 e l e p = 1. In practice, we set x 0 to 0, and thus K 0 indicates the initial network status when there is no interdiction. When the resource limit makes the number of physical arcs that can be interdicted simultaneously much smaller than the edge number of the physical network, layer-mapping will significantly reduce the weight calculations for logical links.

Algorithm 2 Layer-Mapping
Input: Initial interdiction strategy x 0 ; initial network status w 0 and K 0 ; the new interdiction strategyx Output: The new network statusŵ andK; 1: Initializeŵ andK 2:Di f f = e p ∈ A p |x 0 e p =x e p 3: for e l ∈ A l do 4: flag ← 0; 5: for e p ∈Di f f do 6: if K 0 e l e p = 1 then 7: Calculateŵ e l andK e l using (4)-(6); 8: flag ← 1; 9: break; 10: end if 11: end for 12: if flag = 0 then 13:ŵ e l ← w0 e l ,K e l ← K 0 e l 14: end if 15: end for 16: returnŵ andK K e l in Layer-Mapping is the vector ofk e l e p when e l is fixed (it can also be explained as the e l th row vector of matrixK), and K 0 e l shares the same representation. Layer-Mapping intuitively shows the change of the mapping status of the logical-physical network when interdiction happens, which not only avoids the non-linearity of the objective function from explicitly appearing in the decomposition algorithm, but also speeds up the solution of the subproblem. For simplicity, we call this module Layer-Mapping(x 0 ,x), where x 0 is the initial interdiction strategy andx is the new one. Applying Layer-Mapping to the basic decomposition algorithm, we get Algorithm 3.

A Random-Search Method for Accelerating Convergence
To accelerate the convergence speed of the decomposition algorithm, we try to use the information ofẑ obtained by the subproblem as much as possible in each iteration to limit the feasible domain of the master problem. We propose a Random-Search procedure to increase the number of paths added toẐ for each iteration, which shares the basic idea of Local-Search proposed by Wood [33] in the NIP of a single-layer network. We hope to find more near-optimal paths in one iteration. However, the existence of inter-layer relationships in multi-layer networks makes the search for near-optimal paths complicated, and the time cost of finding all near-optimal paths in each iteration, which is what Local-Search does, is not small in the face of the large-scale layered network. The process of Random-Search is described as follows. The total communication consumption of these paths is limited by a set constant λ and the current lower bound V. Letẑ λ denote an near-optimal path found by Random-Search and letV λ denote the communication cost of this path with an interdiction planx λ , of which the initial value is set tox. For a pathẑ found by the subproblem, Random-Search first selects one of its edges (denoted as e p a1 ) at random and interdict it, i.e., setx λ ep a1 = 1 and provisionally set d e p a1 = ∞. Then, for each edge e l in logical layer, recalculate the weightŵ e l of it ifk e l e p a1 =K e l ,e p a1 = 1.
As for the edges of the logical layer that satisfyK e l ,e p a1 = 0, their weights will not change. e p a1 does not appear in the physical paths they correspond, so the blocking of e p a1 will not change the mapping relationship between them and these paths. Please note that the process of recalculatingŵ e l can be represented by Layer-Mapping(x,x λ ). The shortest path calculated based on the updated edge weights is a near-optimal path. If the total weight of the path newly found is no more than λV , the path will be added intoẐ asẑ λ . After that, Random-Search will choose a new edge e p a2 of the pathẑ λ to interdict and repeat the searching process. The process ends when the blocking of edge e p an leadsV λ > λV. Figure 2 shows the execution of Random-Search. Asẑ λ ∈ Z is naturally established, adding constraint V ≤ c Tẑ λ + x T Dẑ λ to the master problem will not eliminate any optimal solution. We can still use [Master(Ẑ)-SVI] with theẐ extended by Random-Search even if (22) and (23) are not supervalid (for convenience, we name these inequalities "λ-SVIs"). Since we keepV λ > λV in every iteration, adding corresponding λ-SVIs to [Master(Ẑ)-SVI] will finally lead to an approximate objective value V * λ which satisfies V * λ ≥ 1 λ V * . We give the properties of λ-SVIs and prove it as follows.

Theorem 1. For an interdiction planx given by [Master(Ẑ)] during an iteration of Algorithm 2, letẑ λ denote a feasible solution of [Sub(x)
] that may be non-optimal. LetV λ = ∑ e p ∈A p (c e p +x e p d e p )ẑ λ ep and let V * denote the global optimal objective value of [Master(Z)]. Then Type-I inequalityẑ T λ x ≥ 1 does not eliminate all optimal solutions of [Master(Z)] unless the incumbent solutionx leads to a lower bound V ≥ 1 λ V * , providing that V λ ≤ λV.
Proof of Theorem 1. Let x * denote the global optimal solution of the defender's interdiction plan. Assuming that V < 1 λ V * during an iteration, if Type-I inequalityẑ T λ x ≥ 1 eliminates all optimal solutions, which meansẑ T λ x * = 0, then In fact, the two types of SVIs and their corollaries can be modified to apply to a non-optimal pathfinding resultẑ ifẑ is an approximate optimal solution of the current subproblem [Sub(x)]. The modified inequalities are not supervalid, which means that the inequalities may eliminate all optimal solutions. However, when this happens, we will already have an approximate global optimal interdiction solution.

Proof of Corollary 2. Assuming that
Based on Algorithm 3, we add the Random-Search module and get Algorithm 4 as follows:

Computational Experiments
We tested our algorithms in a set of generated layered networks with directed random networks as their logical layers. Random networks, small-world networks, scale-free networks and grid networks are used as physical layer in these instances. The network in the logical layer are smaller than the physical-layer network in each instance, and each node of the logical layer correspond a randomly selected node of the physical layer, which means that these two nodes share the same entity. We generated random networks by connecting newly added nodes to previous nodes with a certain probability p. p is adjusted for each instance to ensure that all the random networks have the same expected average degree. The small-world networks are generated by first constructing a nearest-neighbor coupling network and then reconnecting the edges with different probabilities. For the scale-free case, we first generate a small random network, and then assign the connection probabilities according to the degrees of nodes, and finally preferentially connect the newly added nodes to the nodes with better connectivity in the light of the probabilities. As for the grid networks, conventional square lattice networks are used. The communication costs of edges c e p s and the interdiction increments d e p s in physical layer are integers that are randomly distributed on [1,20] and [200, 1000], respectively. The resource consumption of interdiction r is set to 1 in practice. A time limit of 3600 s is set for each experiment. Table 2 shows the parameters of the test problems we used. The blank cells repeat values from cells above. The numbers in the brackets of the column "N l " and column "N p " represent the average degree of the generated networks. For each problem we generated ten instances. We programmed the algorithms presented above using the MATLAB toolbox YALMIP and CPLEX 12.8 callable library. Computation is performed on a Windows 10 64-bit laptop with an Intel Core i7-9700K CPU (3.60 GHZ) and 16 GB of RAM. The value of λ in Algorithm 4 is set as 1.05, 1.10 and 1.15, respectively, and the error range of the corresponding optimal objective value is 95.2%, 90.9% and 87.0%. The basic results for LPNSPI are shown in Table 3. The column "instance" represents the number of instances we used for comparison in the problem of a certain scale. T, average solution time in seconds; Std.T, the standard deviation of the solution time; N, average iteration times; Std.N, the standard deviation of the iteration times. The numbers in brackets of the column "T" indicate the number of the instances which were solved within 3600 s. The "-"s of the same rows indicates "not applicable" because there was at least one instance which was not successfully solved within the allotted time. It can be intuitively seen from Table 3 that the Layer-Mapping module make Algorithm 3 much faster than the basic decomposition algorithm with almost the same number of iterations, especially when the scale of the physical layer is large. However, despite this, Algorithm 3 cannot solve all the instances within the stipulated time. Combining Random-Search with Layer-Mapping, Algorithm 3 takes significantly less time and fewer iterations, and successfully solved all the instances. It should be noted that among the ten instances of 'gn1000', there are two extreme instances, which increase the average solving time of 'gn1000' problem (even more than the average solving time of 'gn2000'). However, it does not affect the comparison between the performance of different algorithms. To analyze the specific running time of each part (i.e., the master problem, the subproblem and the Random-Search part) of the three algorithms, we selected some "easy" instances of the hardest problems of each network type in Table 3 (that is, rd20000, sf20000, sw20000 , gn1000 and gn2000), where "easy" means that all three algorithms can solve the problem within 3600 s. The results are shown in Table 4. T.M is the running time of the master problem; T.S is the running time of the subproblem; T.RS is the time spent on Random-Search. Initialization, formatting, and other parts of the program only account for a small portion of the time and are not listed. Err is the average error rate of the results obtained by Algorithm 4, and the numbers in parentheses indicate the number of instances where Algorithm 3 find a near-optimal solution rather than an exact optimal solution. Std.Err is the standard deviation of Err. As Table 4 shows, Algorithm 3 takes almost the same time in solving the master problem as Algorithm 1, but takes much less time to solve the subproblem. With Random-Search, Algorithm 3 greatly reduces the time of the master problem and the subproblem, but it also takes a considerable amount of time in Random-Search to find near-optimal paths. A suitable value of λ allows Random-Search to find a large number of near-optimal paths, but at the same time, the final result may have some errors from the actual optimal solution. In our test instances, Algorithm 3 solved many instances accurately, with an overall average accuracy of more than 99.7%. Of course, we can set the value of λ to 0, which will make the final result the global optimal solution, but also make it difficult for Random-Search to find near-optimal paths. We tested Algorithm 3 on the case when λ = 0, and found that the running time results are not so satisfying because much fewer near-optimal paths were found.
To study the effect of the value of λ on the solution speed of Algorithm 3, we set three cases of λ = 1.05, λ = 1.1, and λ = 1.15, and tested the algorithm on all the instances of the problems in Table 4. Table 5 compares the algorithm time, number of iterations, and errors of the near-optimal solution in the three cases. We used all ten instances of each problem when comparing the running time and the number of iterations of the algorithm. However, for "rd20000", "sf20000" and "sw20000", there were instances where Algorithm 1 and Algorithm 2 could not give the exact optimal results. The numbers in parentheses in the column "Err" indicate the number of instances used in calculating the average error rate and the number of non-optimal solutions given by Algorithm 3. For example, "0.25%(2 in 8)" means that in 8 verifiable instances, Algorithm 3 gives 2 approximate solutions (and 6 exact solutions), with an average error of 0.25%.  Due to the randomness of the pathfinding results of Random-Search, the number of near-optimal paths found in a specific iteration will fluctuate, and the contribution of these paths and the corresponding SVIs to the master problem is also uncertain. In some instances, the algorithm took more time with a larger λ than with a smaller one. However, in general, as Table 5 shows, a slightly larger λ makes the algorithm converge faster.
Furthermore, we examine our improving methods in commercial data of a bi-layer network which is obtained from scanning over the Internet. This bi-layer network includes a physical layer of 36,409 nodes and 49,084 edges, and a logical layer of 32,490 nodes and 51,340 edges. The physical nodes contain switching equipment, terminal equipment, storage equipment, control equipment, etc., and they are connected by physical links which consist of optical fibers, twisted-pair lines, coaxial cables, wireless media links, etc. On the logical layer, nodes represent operating systems and other software, and links represent information transfers, remote logins, network sessions, etc. The network structure is shown in Figure 3.  After data cleaning of the original network (remove isolated nodes and connected components which do not include the source-destination pair), we designed experiments to test the changes of the algorithm running time and blocking effect with the increase of interdiction resources. The time limit is set to 3600 s.
As shown in Table 6, the processing time of the algorithms increases rapidly when the number of interdicted edges (R) grows larger. Both Algorithm 3 and Algorithm 4 solve the problem with much less time than Algorithm 1 (benchmark) when interdicted edges are no more than 8, which confirms the effectiveness of Layer-Mapping. As a large number of near-optimal paths are found by Random-Search, when R is small, the solution of Algorithm 3 is faster than that of Algorithm 4. However, when R grows up to 9, neither Algorithm 1 nor Algorithm 3 can solve the problem within 3600 s. Algorithm 3 with both Layer-Mapping and Random-Search successfully solves the problem when R is no more than 12. The interdiction effects of the three algorithms are compared in Figure 4. The objective function, which is the length of the shortest s l -t l path, increases when R grows. We find that even if the λ in Algorithm 4 is set to 1.15, which leads to a potential error range of 87%, accurate optimal solutions are found in comparable cases (i.e., when R is no more than 8).

Conclusions
This paper focuses on blocking malicious network behaviors in IoT systems which can be modeled as logical-physical networks. The problem is represented as the shortest-path interdiction problem in layered networks, where the target paths and the interdiction behaviors are on different layers of the network. The attacker seeks to minimize the total communication cost of the attacking path from the source node to the target node on the logical layer, and the defender aims to maximize this path by interdicting edges on the physical layer. The interdiction of edges on the physical layer affects edges on the logical layer through the inter-layer relationship. In this problem, every node in the logical-layer network has a corresponding node on the physical layer, and the weight of each logical-layer edge is decided by a shortest path on the physical layer, with the endpoints of the logical-layer edge being the start node and the end node.
By referring to the experience of interdiction problems in monolayer networks, we model LPNSPI as a solvable form of Benders decomposition algorithm and apply "supervalid inequalities" (SVIs) on it. A Layer-Mapping module is proposed to deal with the explicit non-linearity of the objective function and reduce double counting of the subproblem. Layer-Mapping recalculates the status of the physical layer, basing on the current solution of the master problem and the initial network status. To accelerate the convergence of the decomposition algorithm, we raise Random-Search. By specifying an acceptable approximation range, Random-Search can randomly find multiple near-optimal paths in an iteration; as a result these paths and the corresponding SVIs can be added as constraints to the master problem. Computational results show the effectiveness of Layer-Mapping and Random-Search.

Conflicts of Interest:
The authors declare no conflict of interest.