You are currently viewing a new version of our website. To view the old version click .
Machines
  • Article
  • Open Access

1 August 2017

Survivability Analysis on a Cyber-Physical System

,
and
School of Science, East China University of Science and Technology, Shanghai 200237, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Cyber-Physical System Cybersecurity

Abstract

A cyber-physical system (CPS) is composed of interdependent physical-resource and cyber-resource networks that are tightly coupled. The malfunction of nodes in a network may trigger failures to the other network and further cause cascading failures, which would potentially lead to the complete collapse of the entire system. The number and communication of operating nodes at stable state are closely related to the initial failure nodes and the topology of the network system. To address this issue, this paper studies the survivability of CPS in the presence of initial failure nodes, proposes (m, k)survivability, which is defined as the probability that at least k nodes are still working in CPS after m nodes are attacked, and discusses the problem of cascading failure based on reliability (CFR). Further, we propose an algorithm to calculate (m, k)survivability and find that the minimum survivability of system with regular allocation strategy decreases with k for a fixed m, and the proportion of initial failure node groups that cause the system to completely fragment increases with m. The simulation shows the properties and the result of CFR of the system with 12 nodes.

1. Introduction

A CPS consists of a physical network and a cyber network that are tightly coupled together and has been widely applied in many fields. Smart grid is a typical application of CPS. A power grid is covered on the computer network to realize the automation of the power grid and improve efficiency. The most striking feature of CPS is interdependency. Although interdependent networks make the system more intelligent and complex, Vespignani [1] showed that the system has greater vulnerability than a single network when facing attacks, failures, and natural disasters. A random removal of a small fraction of nodes from one network can cause an iterative cascade of failures in interdependent network and further lead to a disastrous impact on the overall cyber-physical system, such as 2003 blackout in the Northeastern United States and Southeastern Canada [2], and the electrical blackout that cause many losses in Italy on 28 September 2003 [3]. The cascading effect is one of the important characteristics of CPS. In the case of initial random node failures, cascading failures sometimes may not trigger complete collapse of CPS, resulting in several surviving nodes at steady state, such as micro grids. The network performance of surviving nodes is also an important issue to be addressed. In engineering, survivability is the quantified ability of a system, subsystem, equipment, process, or procedure to continue to function during and after a natural or man-made disturbance [4]. For CPS, the steady state is absolutely a subsystem of CPS and obtained after disturbance, i.e., random node failures. Survivability is consistent with the issue we address. Further, we focus on the communication ability of surviving nodes at steady state. Fortunately, reliability is an effective parameter to evaluate network performance and has been utilized in CPS [5]. In this article, we study the survivability of CPS based on reliability. For convenience, some definitions are listed as follows:
Definition 1 [6].
Suppose the edges of graph G never fail and the nodes fail independently with probability 1 − p, then the reliability of graph G is
R ( G ) = r = 1 n S r ( G ) P r ( 1 p ) n - r
where Sr(G) is the number of connected induced subgraphs of graph G that contain exactly r nodes.
All-terminal reliability with node failures describes the connectivity of all nodes in one network. Based on all-terminal reliability theory, Zhang et al. [5] gave k-reliability (denoted by Rk) which was defined as the probability that at least k surviving nodes of set V span an operating subgraph and defined cascading failures on reliability (CFR).
Definition 2 [5].
CFR, given constants k and R0, if the number of surviving nodes at steady state in the case of random node failures is smaller than k or the k-reliability of steady state Rk < R0, then random node failures have caused CFR of the CPS.
The definition is based on all-terminal reliability with node failures. For interdependence, cascading failures may occur after some nodes are attacked. All-terminal reliability with node failures can describe the connectivity of two networks. Therefore, it can represent the ability that the system can meet the required level of service when a certain number of nodes fail.
Based on these definitions, we propose (m, k)—survivability, which is defined as the probability that at least k nodes are still working in CPS after m nodes are attacked, and discuss the problem of cascading failure based on reliability. The proposed (m, k)—survivability reflects the connectivity of nodes in networks and illustrates the probability that the system meets the service requirements. Further, we propose an algorithm to calculate (m, k)—survivability and find that the minimum survivability of the system with a regular allocation strategy decreases with k for a fixed m, and the proportion of initial failure node groups that cause a system to fragment increases with m.
The rest of this paper is organized as follows. Section 2 shows background and related work. In Section 3, we introduce the definition of (m, k)—survivability and analyze cascading failures. Section 4 gives simulation and experiment to survivability of a CPS. The analysis and conclusion appear in Section 5 and Section 6, respectively.

3. Survivability of Cyber-Physical Systems

A cyber-physical system is made up of two interacting networks, say, Networks A and B, both with N nodes, so the total number of nodes is n = 2N. We denote the node sets of A and B by 1, 2, , N and N + 1, N + 2, , n respectively. We call edges that connect different networks as interedges and those in the same network as intraedges. A node is functioning only if there is at least one interedge and one intraedge. We are concerned with whetheer the system exists functioning giant component [10] or completely separated when cascading failures occur.
Definition 3.
If m nodes are attacked, the probability that at least k nodes still operate is called (m, k)—survivability, denoted by S (m, k).
Discussion: Definition 3 does not indicate where the m nodes are located and thus imply the best-case and worst-case survivability. The parameter m is the number of failed nodes in the system, and the parameter k indexes the communication quality of surviving nodes with node failures. Actually, S (m, k) with all possible m and k is a matrix.
For any 1 ≤ kn, 1 ≤ mn,
S ( m , k ) : = [ S 11 S 12 S 13 S 1 , n 1 S 1 n S 21 S 22 S 23 S 2 , n 1 S 2 n S 31 S 32 S 33 S 3 , n 1 S 3 n S n 1 , 1 S n 1 , 2 S n 1 , 3 S n 1 , n 1 S n 1 , n S n 1 S n 2 S n 3 S n , n 1 S n n ]
where Sij denotes the probability that there has at least j nodes are still working after i nodes are attacked. Obviously, the locations of node failures may cause different steady state. Thus, Sij is a vector where the elements denote the survivability after i nodes in different positions are invalidated. That is, Sij = {Sx (i, j) | 1 ≤ xCni}. The survivability Sx (i, j) is stated mathematically as follows:
S x ( i , j ) = r = j | V x | S r ( G ) P r ( 1 p ) | V x | r
where 1 ≤ xCni, Sx (i, j) is the survivability of system after the xth combination of i nodes are invalidated. |Vx| is the number of nodes in the steady state.
We propose an Algorithm 1 based on network reliability method in the presence of initial node failures.
Algorithm 1: (m, k)—survivability in G = (V, E)
Input: A connected graph G = (V, E) with the node set V, edge set E, and node probability p require the number of normal work k and failure nodes m.
Output: (m, k)—survivability S (m, k) of G = (V, E).
Step 0. Let M = ∅.
Step 1. Choose all the endpoint groups with m numbers, and store them into the collection M.
Step 2. For each group v M, obtain the adjacency matrix A of steady state.
Step 3. Let s = 0, r = k, S = ∅, Sr = 0.
Step 4. calculate the node number of steady state n1 for each terminal nodes groups, find all the connected endpoint sets of r, and stored in the collection S.
Step 5. Sr = |S|.
Step 6. R = R + Sr * pr * (1 − p )n1-r.
Step 7. r = r + 1, S = ∅, go to Step 4.
The complexity of computation: First step, choosing all groups is based on permutation and combination theory and belongs to the NP-hard problem. That is, for a given m, we need to choose ( n m ) = n ! ( n m ) ! m ! groups of nodes. For example, in Figure 1, i = 1 and j = 2.
Figure 1. A CPS with 8 nodes.
Then, S (1,2) = {Sx (1,2) | 1 ≤ x≤ 8}. According to Equation (2), we can obtain
S (1,2) = {0.9898, 0.9950, 0.9979, 0.9973, 0.9877, 0.9877, 0.9869, 0.9885}.
Especially, if the indices i and j satisfy i + j > n, then the corresponding elements of the matrix are zero, and the actual situation means no surviving nodes. Therefore, the matrix can be written as
S ( m , k ) = [ S 11 S 12 S 13 S 1 , n 1 0 S 21 S 22 S 23 0 0 S 31 S 32 S 33 0 0 S n 1 , 1 0 0 0 0 0 0 0 0 0 ] .
In order to explore the survivability of CPS, we analyze the nonzero elements in the matrix.
For any i and j, Sij is a vector of length Cni. We use S ij to denote the average of Sij. The corresponding matrix is
S m k = [ S 11 S 12 S 13 S 1 , n 1 0 S 21 S 22 S 23 0 0 S 31 S 32 S 33 0 0 S n 1 , 1 0 0 0 0 0 0 0 0 0 ]
An average is a measure of the trend in a set of data sets. Through the above matrix, we can get the average survival level of the system for different m- and k-values. If the average value is large, it shows that the system has strong survivability when m nodes are attacked. Otherwise, it has weak survivability.
For the interdependent network, whether the system is still to provide a certain service after some nodes are attacked is concerned problem. Thus, we give the following definition.
Definition 4.
Given a constant R0, S (m, k) is associated with a pair of (m, k), 1 ≤ i ≤ Cnm,
(1)
If max Si (m, k) < R0, we say the cyber-physical system is not (m, k)—survivable and has occurred cascading failures, denoted by (m, k)—CF.
(2)
If min Si (m, k) > R0, the cyber-physical system is robust (m, k)—survivable, denoted by (m, k)—RS.
(3)
If min Si (m, k) < R0 < max Si (m, k), let Ω1(m, k) denotes the set of the node groups that let Si (m, k) < R0 hold. The node groups in Ω2(m, k) satisfy Si (m, k) > R0. | Ω1(m, k) | and | Ω2(m, k) | denote the number of node groups, respectively. If | Ω1(m, k) | ≥ | Ω2(m, k) |, we say the system is (m, k)—frail, denoted by (m, k)—FR. If | Ω1(m, k) | < | Ω2(m, k) |, the system is weak (m, k)—survivable, denoted by (m, k)—WS.
We consider a critical value to determine whether node-attacks cause cascading failures. Different from [5], we require the maximum, minimum survivability, and the number of node groups that are less or more than R0. The situations where k = 0 or R0 = 1 are specifically discussed in [2], and situation k = |V| indicates the all-terminal reliability of the system. |V| denotes the number of nodes at steady state. The value of R0 is related to m and k.
For example, in Figure 1, R0 = 0.98, and min S (1,2) > R0, then the system is (1,2)—RS, max S (1,5) = 0.9743 < R0 = 0.98, so the system is (1,5)—CF. | Ω1(2,3) | = 9 < | Ω2(2,3) | = 21, so the system is (2,3)—WS. Given an R0 = 0.95, | Ω1(2,4) | = 18 > | Ω2(2,4) | = 10, so the system is (2,4)—FR.
The regular allocation strategy is to allocate the same number of bidirectional inter-links to each node of the system. We study the systems with regular allocation strategy and have the following results.
Proposition 1.
For a fixed m, the survivability of CPS decreases monotonously with k for the same locations.
Proof. 
Assume that the xth combination of m nodes are attacked, the number of nodes in steady state is |Vx|. For any 1 ≤ k ≤ |Vx|, 1 ≤ x ≤ Cnm.
S x ( m , k ) = r = k | V x | S r ( G ) p r ( 1 p ) | V x | r = r = k + 1 | V x | S r ( G ) p r ( 1 p ) | V x | r + S k ( G ) p k ( 1 p ) | V x | k S x ( m , k + 1 ) .
For example, in Figure 1a, m = 1 and 1 ≤ k ≤ 7, so
S4(1, k) = {0.9973,0.9973,0.9972,0.9953,0.9743,0.8503,0.4783}.
Therefore, the survivability of CPS decreases monotonously with k at the same position.
Proposition 2.
The survivability of a graph G = (V, E) is not less than that of its subgraphs if same locations are attacked.
Proof. 
Assume that G* = (V*, E*) is a subgraph of G = (V, E), where V* V, E* E. |V*x| and |Vx| denote the number of nodes in steady state after the xth combination of m nodes are attacked and |V*x|<|Vx|.
First, if |V*| ≤ m, then the inequality is satisfied.
If |V*| > m and k < |V*x|, Ek denotes the events that k nodes work after m nodes are attacked. Hence, the survivability of G can be calculated by
Sx(m, k) = P(EkEk+1 ∪ ⋯ ∪ E|Vx|).
The survivability of subgraph G* can be calculated by
S*x(m, k) = P(E*kE*k+1 ∪ ⋯ ∪ E*|V*x|)
where G* = (V*, E*) is a subgraph of G = (V, E), hence {Ek , …, E|Vx|} {E*k , …, E*|V*x|}.
Let {Ek , …, E|Vx|} = {Ek , …, E|V*x|, E|V*x|+1,…, E|Vx|}, where Ek E*k,…, E|V*x| E*|V*x|.
According to the probability theory, we obtain
Si(m, k) = P(EkEk+1 ∪ ⋯ ∪ E|Vx|) = P(EkEk+1 ∪ ⋯ ∪ E|V*x|E|V*x|+1 ∪ ⋯ E|Vx|)
P(E*kE*k+1 ∪ ⋯ ∪E*|V*x|)
= S*x(m, k).
For example, Figure 2b is subgraph of (a), when same nodes are attacked, steady state of (b) is subgraph of (a). Accordingly, the survivability of (a) is better than (b).
Figure 2. (a) is a CPS with 10 nodes and (b) is its subgraph.
From Propositions 1 and 2, the survivability of the system is closely related to m and k. Therefore, it is meaningful to evaluate CPS by checking m and k of the survivability.
Proposition 3.
For a fixed m, the number of initial failed node groups that provide the system with minimal survivability increases monotonically as k increases.
Proof.
According to Proposition 1, the survivability of CPS decreases monotonously with k at the same position. nk and nk+1 denote the number of initial failure node groups that provide the system with minimal survivability respectively. Nk and Nk+1 denote the set of initial failure node groups that provide the system with minimal survivability respectively. Then NkNk+1, so nknk+1.
We also study the robustness of system with regular allocation strategy. Let ns denote the number of remain nodes of system at steady state. Then, for a fixed m, ns is a vector of length Cnm. We use average number of remain nodes of ns (denoted by ANRN) to describe the robustness of entire system macroscopically. And we have follow result on robustness.
Proposition 4.
The proportion of node groups that cause the system to completely fragment increases with m.
Proof. 
Vm denote the set of node groups that cause the system to completely separate for a fixed m. Therefore, VmVm+1. According to | Vm+1|≥Cn-m1 | Vm | and Cnm+1 = m + 1 n m Cnm, we can obtain | V m | C n m | V m + 1 | C n m + 1 .

4. Simulation and Examples

In this part, we choose a CPS with a regular allocation strategy to simulate and experiment. Each network has six nodes, and each node has the same interedges that are assumed to be bidirectional. Let the reliability of each node be p = 0.9. Network topology is shown in Figure 3.
Figure 3. Instance with n = 12 nodes for survivability where Networks A and B have both six nodes.
According to the definition, we obtain the following (m, k)—survivability matrix:
S ( m , k ) : = [ S 11 S 12 S 13 S 1 , 11 S 1 , 12 S 21 S 22 S 23 S 2 , 11 S 2 , 12 S 31 S 32 S 33 S 3 , 11 S 3 , 12 S 11 , 1 S 11 , 2 S 11 , 3 S 11 , 11 S 11 , 12 S 12 , 1 S 12 , 2 S 12 , 3 S 11 , 12 S 12 , 12 ]
Then, in order to analyze the survivability of this system, we need to calculate each element. First, according to the above results, if i + j > 12, Sij = 0. Therefore, we get the following simplified matrix. The corresponding average matrix is
S ( m , k ) = : [ S 11 S 12 S 13 S 1 , 11 0 S 21 S 22 S 23 0 0 S 31 S 32 S 33 0 0 S 11 , 1 0 0 0 0 0 0 0 0 0 ]     S m k = : [ S 11 S 12 S 13 S 1 , 11 0 S 21 S 22 S 23 0 0 S 31 S 32 S 33 0 0 S 11 , 1 0 0 0 0 0 0 0 0 0 ]
Next, we analyze the remain elements of the matrix. The mean and minimum value of survivability for different m- and k-values are given, and we also obtain the number of initial failure node groups that provide the system with minimal survivability. The results are as follows (Table 1):
Table 1. The mean and minimum value of survivability for different m- and k-values and the number of initial failure node groups that provide the system with minimal survivability. (The first parameter indicates the mean survivability. The second parameter indicates minimum survivability. The third parameter indicates the number of node groups).
In Table 2, we give a constant R0 for different m- and k-values to estimate the survivability of the system.
Table 2. Cascading failure evaluation for Figure 3.
In Table 3, we give the number and proportion of node groups that cause the system to fragment and average remain nodes for any m. When m > 9, the system always collapses. Therefore, we just analyze m < 9.
Table 3. The number and proportion of node groups that cause the system to completely fragment and ANRN with 12 nodes.

5. Discussion

The average survivability can represent a variation trend of survivability of a system for different m- and k-values macroscopically. From Table 1, the mean survivability of the system decreases with the parameters k and m. When both m and k are small, the system has a strong survivability; i.e., when m nodes are attacked, the system has a great probability that k nodes are still working. It represents that the ability which the system satisfies the specified level of service is great. Otherwise, the system has weak survivability; i.e., the system has a small probability that k nodes are still working and the ability which the system satisfies the specified level of service is not good. Moreover, when m > 9, the mean survivability is always equal zero. It shows that the system always collapses as m > 9. For other values, some node groups cause the system to collapse, and the system has the best survivability after it is attacked by other node groups. The second parameter indicates that the minimum survivability decreases with k for a fixed m. That is, the minimum probability that k nodes are still functioning decreases with k when m nodes are attacked. We also find the number of initial failure node groups that provide the system with minimal survivability increase with k for a fixed m. Let p = n k / C n m if an intelligent adversary chooses some nodes to attack, we can know what the probability of getting the worst impact is. From Table 2, the survivability of the system changes as R0, m and k vary. R0 is a critical threshold to determine the impact that random attacks cause. Moreover, the system experiences cascading failure as m > 9 and R0 = 0. From Table 3, we can see that the average of the remain node decreases with m. The nodes groups that cause the system to fragment increases with m. The other two sets of data illustrate this point. The more nodes of failure there are, the less ability to reach the specified service the system will have.
For a clearer explanation of Propositions 1 and 3, see Figure 4, wherein the image of S1(1, k), S8(1, k) changes with k. The image of num changes with k for a fixed m in Figure 5.
Figure 4. The image of (a) S1(1, k); (b) S8(1, k) with different k-values.
Figure 5. The image of num with different k-values.

6. Conclusions

We investigate the survivability problem of a cyber-physical system and define survivability of the cyber-physical system, namely (m, k)—survivability. By analyzing (m, k)—survivability, we find that the survivability of a system with a regular allocation strategy is not less than that of its subsystem for given node failures and for a fixed m, the number of initial failed node groups that provide the system with minimal survivability increases monotonically as k increases. We also find that the proportion of node groups that cause the system to completely fragment increases with m. Therefore, the survivability of a system is closely related to m and k. Our results are beneficial for network design. For example, the evaluation of survivability can be used to predict whether a designed network can meet given requirements and a certain level of communication quality. As for future work, we will research the survivability of a system with a random allocation strategy and a unidirectional interedge allocation strategy. Furthermore, we will investigate the relationship between threshold R0 and the network.

Acknowledgments

The authors are very grateful for the constructive comments by anonymous reviewers that made the article significantly improving.

Author Contributions

Ti Wang proposed the concepts of survivability, carried out the experiments, and finished writing; Zuyuan Zhang made some suggestions about revision of the paper; Fangming Shao provided the research topic, gave the experiment proposal, and confirmed the final revised version of the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Vespignani, A. Complex networks: The fragility of interdependency. Nature 2010, 464, 984–985. [Google Scholar] [CrossRef] [PubMed]
  2. Parshani, R.; Buldyrev, S.V.; Havlin, S. Interdependent networks: Reducing the coupling strength leads to a change from a first to second order percolation transition. Phys. Rev. Lett. 2010, 105, 048701. [Google Scholar] [CrossRef] [PubMed]
  3. Buldyrev, S.V.; Parshani, R.; Paul, G.; Stanley, H.E.; Havlin, S. Catastrophic cascade of failures in interdependent networks. Nature 2010, 464, 1025–1028. [Google Scholar] [CrossRef] [PubMed]
  4. Wikipedia. Available online: https://en.wikipedia.org/wiki/Survivability (accessed on 31 July 2017).
  5. Zhang, Z.Y.; An, W.; Shao, F.M. Cascading Failures on Reliability in Cyber-Physical System. IEEE Trans. Reliab. 2016, 65, 1745–1754. [Google Scholar] [CrossRef]
  6. Wang, Y.-Q. Nearly regular complete bipartite graphs are locally most reliable. Appl. Math. J. Chin. Univ. 2003, 18, 365–370. [Google Scholar]
  7. Buldyrev, S.V.; Shere, N.W.; Cwilich, G.A. Interdependent Networks with Identical Degrees of Mutually Dependent Nodes. Phys. Rev. E 2011, 83, 016112. [Google Scholar] [CrossRef] [PubMed]
  8. Cho, W.; Goh, K.I.; Kim, I.M. Correlated Couplings and Robustness of Coupled Networks. arXiv, 2010; arXiv:arXiv:1010.4971v1. [Google Scholar]
  9. Shao, J.; Buldyrev, S.V.; Havlin, S.; Stanley, H.E. Cascade of Failures in Coupled Network Systems with Multiple Support Dependent Relations. Phys. Rev. E. 2011, 83, 036116. [Google Scholar] [CrossRef] [PubMed]
  10. Yagan, O.; Qian, D.J.; Zhang, J.; Cochran, D. Optimal allocation of inter-connecting links in cyber-physical systems: Interdependence, cascading failures and robustness. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 1708–1720. [Google Scholar] [CrossRef]
  11. Neumann, P.G.; Barnes, A.H. Survivable Computer-Communication Systems: The Problem and Working Group Recommendations; Technical Report VAL-CE-TR-92-22; US Army Research Laboratory: Washington, DC, USA, 1993. [Google Scholar]
  12. Deutsch, M.S.; Willis, R.R. Software Quality Engineering: A Total Technical and Management Approach; Prentice-Hall: Englewood Cillfs, NJ, USA, 1988. [Google Scholar]
  13. Ellison, R.J.; Fisher, D.A.; Linger, C. Survivability: Protecting Your Critical Systems. IEEE Int. Comput. 1999, 3, 55–63. [Google Scholar] [CrossRef]
  14. Moitra, S.D.; Konda, S.L.A. Simulation Model for Managing Survivability of Network Information Systems; Technical Report CMU/SEI-2000-TR-020; Software Engineering Institute–Carnegie Mellon University: Pittsburgh, PA, USA, 2000. [Google Scholar]
  15. Panirahi, D. Survivable network design problems in wireless networks. In Proceedings of the Twenty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, San Francisco, CA, USA, 23–25 January 2011; pp. 1014–1027. [Google Scholar]
  16. Levitin, G.; Hausken, K.; Taboada, H.A.; Coit, D.W. Survivability vs. security in information systems. Reliab. Eng. Syst. Saf. 2012, 100, 19–27. [Google Scholar] [CrossRef]
  17. Liang, Q.; Modiano, E. Survivability in Time-varying Networks. IEEE Trans. Mob. Comput. 2016. [Google Scholar] [CrossRef]
  18. Wan, X.; Wu, J.; Shen, X. Maximal Lifetime Scheduling for Roadside Sensor Networks With Survivability k. IEEE Trans. Veh. Technol. 2015, 64, 5300–5313. [Google Scholar] [CrossRef]
  19. Petridou, S.; Basagiannis, S.; Roumeliotis, M. Survivability Analysis Using Probabilistic Model Checking: A Study on Wireless Sensor Networks. IEEE Syst. J. 2013, 7, 4–12. [Google Scholar] [CrossRef]
  20. Wood, R.K. Factoring algorithms for computing K-terminal network reliability. IEEE Trans. Reliab. 1986, R-35, 269–278. [Google Scholar] [CrossRef]
  21. Bollob´as, B. Random Graphs. Cambridge Studies in Advanced Math; Cambridge University Press: Cambridge, UK, 2001. [Google Scholar]
  22. Moskowitz, F. The analysis of redundancy networks. AIEE Trans. Commun. Electron. 1958, 39, 627–632. [Google Scholar] [CrossRef]
  23. Carlier, J.; Theologou, O. Factoring & reductions for networks with imperfect vertices. IEEE Trans. Reliab. 1991, 40, 210–217. [Google Scholar]
  24. Adjabi, S.; Bouchama, K. K-terminal reliability evaluation of a telecommunications network represented by a discret and a dynamic model. Int. J. Oper. Res. 2011, 8, 34–43. [Google Scholar]
  25. Ayoub, J.N.; Saafm, W.H.; Kahhaleh, B.Z. K-terminal reliability of communication network. In Proceedings of the 7th IEEE International Conference on Electronics, Circuits and Systems, Jounieh, Lebanon, 17–20 December 2000; Volume 1, pp. 374–377. [Google Scholar]
  26. Cancela, H.; Petingi, L.A. Polynomial-time topological reductions that preserve the diameter constrained reliability of a communication network. IEEE Trans. Reliab. 2011, 60, 845–851. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.