Enhancing structural robustness of scale-free networks by information disturbance

Abstract Many real-world systems can be described by scale-free networks with power-law degree distributions. Scale-free networks show a “robust yet fragile” feature due to their heterogeneous degree distributions. We propose to enhance the structural robustness of scale-free networks against intent...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Jun Wu, Suo-Yi Tan, Zhong Liu, Yue-Jin Tan, Xin Lu
Formato: article
Lenguaje:EN
Publicado: Nature Portfolio 2017
Materias:
R
Q
Acceso en línea:https://doaj.org/article/e13519ac3d8d447bb70b9e3cd0fd1d80
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
Descripción
Sumario:Abstract Many real-world systems can be described by scale-free networks with power-law degree distributions. Scale-free networks show a “robust yet fragile” feature due to their heterogeneous degree distributions. We propose to enhance the structural robustness of scale-free networks against intentional attacks by changing the displayed network structure information rather than modifying the network structure itself. We first introduce a simple mathematical model for attack information and investigate the impact of attack information on the structural robustness of scale-free networks. Both analytical and numerical results show that decreasing slightly the attack information perfection by information disturbance can dramatically enhance the structural robustness of scale-free networks. Then we propose an optimization model of disturbance strategies in which the cost constraint is considered. We analyze the optimal disturbance strategies and show an interesting but counterintuitive finding that disturbing “poor nodes” with low degrees preferentially is more effective than disturbing “rich nodes” with high degrees preferentially. We demonstrate the efficiency of our method by comparison with edge addition method and validate the feasibility of our method in two real-world critical infrastructure networks.