@inproceedings{903f95ecc90f4c0987fec98f38515263,
title = "On auxiliary entity allocation problem in multi-layered interdependent critical infrastructures",
abstract = "Operation of critical infrastructures are highly interdependent on each other. Such dependencies causes failure in these infrastructures to cascade on an initial failure event. Owing to this vulnerability it is imperative to incorporate efficient strategies for their protection. Modifying dependencies by adding additional dependency implications using entities (termed as auxiliary entities) is shown to mitigate this issue to a certain extent. With this finding, in this article we introduce the Auxiliary Entity Allocation problem. The objective is to maximize protection in Power and Communication infrastructures using a budget in number of dependency modifications using the auxiliary entities. The problem is proved to be NP-complete in general case. We provide an optimal solution using Integer Linear program and a heuristic for a restricted case. The efficacy of heuristic with respect to the optimal is judged through experimentation using real world data sets with heuristic deviating 6.75% from optimal on average.",
keywords = "Auxiliary entity, Dependency modification, IIM model, Interdependent network, K most vulnerable entities",
author = "Joydeep Banerjee and Arunabha Sen and Chenyang Zhou",
note = "Publisher Copyright: {\textcopyright} 2017, Springer International Publishing AG.; 11th International Conference on Critical Information Infrastructures Security, CRITIS 2016 ; Conference date: 10-10-2016 Through 12-10-2016",
year = "2017",
doi = "10.1007/978-3-319-71368-7_3",
language = "English (US)",
isbn = "9783319713670",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "25--37",
editor = "Roberto Setola and Stephen Wolthusen and Hypatia Nassopoulos and Grigore Havarneanu and Stephen Wolthusen",
booktitle = "Critical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers",
}