Secured Robustness
Secured Robustness
Abstract:
Wireless sensor networks (WSNs) have been the popular targets for cyber attacks in various topologies. One type of network topology
for WSNs, the distribution networks, can effectively withstand random attacks in which the nodes in the topology are randomly
selected as targets. In the distribution networks should be restored by reconfiguring switches automatically with smart grid
technologies. Be that as it may, it is delicate to malicious attacks in which the nodes with high node degrees are chosen as targets.
Thus, how to improve the robustness of the distribution networks against malicious attacks becomes a critical issue. To handle this
issue, this paper proposes a Robustness Optimization plot with multi-populace Co-advancement for distributed wireless sensor
networks (SROCKS) to improve the heartiness of the dissemination networks with smart grid technologies. We build distribution
networks according to the characteristics of WSNs in the real-world environment. Then, we apply our SROCKS with novel crossover
operator and mutation operator to optimize the robustness of the distribution networks constructed for WSNs. For a distribution
networks, our proposed algorithm keeps the initial degree of each node unchanged such that the optimized topology fast screening
algorithm based on hitting set enumeration. In light of a notable measurement for the robustness against malicious assaults, our test
results show that SROCKS generally pairs the power of beginning sans scale WSNs, and beats two existing algorithms by about 16%
when the network size is enormous.
Index Terms: Wireless sensor networks, robustness, Distribution network, hitting set, multi-population co-evolution, restoration.
II. SROCKS
A. Initialization Operation
Figure.5. Candidates for the topology connection. (a) Selected ges eij and ekl. (b) Candidate1. (c) Candidate2
The node 4 will sequentially choose another candidate node in like structure, we generate a new edge between two nodes that
the candidate list. And the node 3 will search all of its neighbors have a similar degree, during which the initial degree of each
for each candidate node until it finds an eligible node to match node is unchanged. We select two edges in the individual
the candidate node. If the node 3 still cannot find an eligible topology and judge the four end nodes of these two edges
node after traversing the candidate list of the node 4, we give up whether they are in the communication range of each other to
generating this edge. guarantee that we can generate ane wedge among these four
nodes. For the edges eij and ekl selected in Fig. 5(a), we propose
C. Mutation Operator a criterion to sort degree and swap edges as follows Eq.(4).
The mutation operator in SROCKS not only increases the Based on the criteria mentioned above, the nodes that have
diversity of a new generation but also produces individuals with similar degrees will connect with each other, thus enabling the
high fitness values. We choose the individual by the mutation evolution of individual topology towards the onion-like
probability Pmut. The goal of mutation operator is to increase structure. Besides, the swapping threshold P swap is defined in
the robustness of the selected individual through exchanging [0, 1), and it cannot be 1 because the two edges will not be
edges, during which the in itialdegree of each node is swapped in that case. We control the efficiency of mutation
unchanged. Metric R is used to measure the robustness of operator by adjusting the value of Ps wap. The appropriate
topology. We search for optimal solution within the local area swapping threshold Ps wap can effectively avoid inefficient
by the mutation operator. Herrmann et al. [8] have found that swapping edges operation.
onion-like structure is stable and robust against malicious
attacks. The nodes with similar degrees connect to each other in D. Migration Operator
onion-like structure. If a node with a large degree failed, another The migration operator in SROCKS is designed to overcome
node with a large degree will replace its function. Therefore, we premature convergence. Individuals with high fitness values can
can minimize the adverse effects of failure nodes as much as be introduced into other populations through migration operator,
possible, and the network topology will remain robust. In order which can effectively prevent falling into a local optimum. We
to make the evolution of individual topology toward the onion- assign different mutation operator and crossover operator
<Pswap
the best individual of each population and mark it by bright
color in Fig. 5(a). The selected individuals make up the elite
Where in, di, dj, dk, dlare the degree of node i, node j, node k
and node l respectively. We sort them in descending order, and
name them as d1, d2, d3, d4. Pswap controls reduction ratio of
degree difference. If the formula on the left is less than Pswap, we
will swap edges according to d1, d2, d3, d4. There are two
candidate strategies in Fig.5(b)andFig.5(c). population in Fig.
5(b). Then as shown in Fig. 5(b), the worst individual in each
population is identified and marked by red. Finally, in Fig. 5(c),
the current optimal individual of popula- tion 1 is used to replace
the worst individual of population 2. The current optimal
individual of population 2 is used to replace the worst individual
of population 3.
The proposed method tests the suspicious cutsets rigorously and 200
identifies truly unrestorablecutsets. In advance, we built two
Throughput
VI. REFERENCES