On auxiliary entity allocation problem in multi-layered interdependent critical infrastructures

Joydeep Banerjee, Arunabha Sen, Chenyang Zhou

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Operation of critical infrastructures are highly interdependent on each other. Such dependencies causes failure in these infrastructures to cascade on an initial failure event. Owing to this vulnerability it is imperative to incorporate efficient strategies for their protection. Modifying dependencies by adding additional dependency implications using entities (termed as auxiliary entities) is shown to mitigate this issue to a certain extent. With this finding, in this article we introduce the Auxiliary Entity Allocation problem. The objective is to maximize protection in Power and Communication infrastructures using a budget in number of dependency modifications using the auxiliary entities. The problem is proved to be NP-complete in general case. We provide an optimal solution using Integer Linear program and a heuristic for a restricted case. The efficacy of heuristic with respect to the optimal is judged through experimentation using real world data sets with heuristic deviating 6.75% from optimal on average.

Original languageEnglish (US)
Title of host publicationCritical Information Infrastructures Security - 11th International Conference, CRITIS 2016, Revised Selected Papers
EditorsRoberto Setola, Stephen Wolthusen, Hypatia Nassopoulos, Grigore Havarneanu, Stephen Wolthusen
PublisherSpringer Verlag
Pages25-37
Number of pages13
ISBN (Print)9783319713670
DOIs
StatePublished - 2017
Event11th International Conference on Critical Information Infrastructures Security, CRITIS 2016 - Paris, France
Duration: Oct 10 2016Oct 12 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10242 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other11th International Conference on Critical Information Infrastructures Security, CRITIS 2016
Country/TerritoryFrance
CityParis
Period10/10/1610/12/16

Keywords

  • Auxiliary entity
  • Dependency modification
  • IIM model
  • Interdependent network
  • K most vulnerable entities

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'On auxiliary entity allocation problem in multi-layered interdependent critical infrastructures'. Together they form a unique fingerprint.

Cite this