Next Article in Journal
Dwell Time Allocation Algorithm for Multiple Target Tracking in LPI Radar Network Based on Cooperative Game
Previous Article in Journal
Chitosan-Based Nanocomposites for Glyphosate Detection Using Surface Plasmon Resonance Sensor
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Bi-Layer Shortest-Path Network Interdiction Game for Internet of Things

1
Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha 410073, China
2
International Academic Center of Complex Systems, Beijing Normal University, Zhuhai 519087, China
3
Rural Vitalization Research Institute, Changsha University, Changsha 410073, China
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(20), 5943; https://doi.org/10.3390/s20205943
Submission received: 10 September 2020 / Revised: 16 October 2020 / Accepted: 19 October 2020 / Published: 21 October 2020
(This article belongs to the Section Internet of Things)

Abstract

:
Network security is a crucial challenge facing Internet-of-Things (IoT) systems worldwide, which leads to serious safety alarms and great economic loss. This paper studies the problem of malicious interdicting network exploitation of IoT systems that are modeled as a bi-layer logical–physical network. In this problem, a virtual attack takes place at the logical layer (the layer of Things), while the physical layer (the layer of Internet) provides concrete support for the attack. In the interdiction problem, the attacker attempts to access a target node on the logical layer with minimal communication cost, but the defender can strategically interdict some key edges on the physical layer given a certain budget of interdiction resources. This setting generalizes the classic single-layer shortest-path network interdiction problem, but brings in nonlinear objective functions, which are notoriously challenging to optimize. We reformulate the model and apply Benders decomposition process to solve this problem. A layer-mapping module is introduced to improve the decomposition algorithm and a random-search process is proposed to accelerate the convergence. Extensive numerical experiments demonstrate the computational efficiency of our methods.

1. Introduction

With the development of information and communication technologies, more and more functional systems have begun to be built based on information networks. Thanks to the high-speed and massive data transmission of the information network, the scale and efficiency of the functional system has been greatly increased. It makes the multi-layer network system represented by Internet of Things (IoT) widely used in various fields such as energy, health care, communication, transportation and manufacturing [1]. The combination of networks of different layers makes the whole system have far more powerful and intelligent functions than ever before. However, the high integration and connectivity of IoT make them more vulnerable to malicious attacks [2,3,4]. An error or failure of a certain layer may have serious effects on the entire system, and the malicious attacks on the system may be carried out from multiple layers, e.g., the cascading failures of the Italian smart grid on 28 September 2003 [5] and the Stuxnet worm against Iranian nuclear facilities [6]. The great significance and vulnerability of IoT has inspired researchers to pay attention to the security protection of them. Recent literature has carried out relevant research on the security of IoT and other layered network systems from different perspectives [7,8,9,10,11,12,13,14].
On some occasions, we need to interdict the layered network of functional systems to defend against malicious attacks. For example, criminals invade the IoT and occupy some important devices, attempting to issue malicious instructions to destroy key facilities. The network operators hope to delay the criminals’ attack by interdicting some links to buy time for the deployment of heavyweight countermeasures [9]. Such malicious attacks usually spread through direct connections in the network, expand the scope of influence, and ultimately achieve functional damage. To characterize the propagation behavior of malicious attacks in layered network systems such as IoT and to study the defense strategy, a suitable network model is necessary. The logical–physical network model (Concept of logical–physical network. Retrieved from https://www.ibm.com/support/knowledgecenter/en/SSPHQG_7.2/concept/ha_concepts_physical_logical.html), which provides us a proper approach to modeling IoT and other real layered network systems, is used in this paper. IoT is a huge network which combines functional devices with the Internet [15]. In IoT, there are functional collaboration and dependency relationships among smart devices such as information-sensing devices, information-processing devices, information-fusion devices, and effectors. In the framework of logical–physical network models, the network formed by these devices and relationships describes how the system performs tasks and achieves functions, and we call it the logical-layer network. Before being functionally connected, these devices need to be physically connected through the Internet, i.e., they need to transfer information through the actual communication network, which we call the physical-layer network. The specific realization of system functions, on the logical layer, needs devices to cooperate according to certain organizational rules; on the physical layer, needs devices to transmit information through actual communication pathways. Figure 1 shows how the functional processes in the logical-layer network correspond to real physical communication paths, and the difference from the single-layer case.
A specific system function, which is determined by a starting node s l and an ending node t l , may have different implementations on the logical layer, and these logical implementations may correspond to different communication paths. In the sense of optimization, the communication paths are designed to be shortest (i.e., has minimum delay).
How to deploy an effective interdiction strategy when the logical–physical network suffers malicious intrusion is worthy of attention. Appropriate interdiction strategies can earn sufficient time for network operators, and the optimization of interdiction strategies, which we call the logical–physical network shortest-path interdiction (LPNSPI) problem, is exactly what we want to solve in this paper. LPNSPI is a zero-sum game involving two players: an attacker and a defender. The attacker’s goal is to find a path which has minimum delay between a particular origin–destination pair in the logical-layer network, and the defender aims to delay the path as much as possible by interdicting connections in the physical-layer network. LPNSPI is an expansion and supplement of the shortest-path network interdiction (SPNI), which is a derivative of the network interdiction problem (NIP), on logical–physical networks. As an important issue in network attack and defense, NIP has applications in various fields, such as the supply-chain network [16], infrastructure protection [17], interdicting nuclear proliferation [18], etc.
NIP is also a useful model for researching the protection of IoT, e.g., the defensive resource allocation [15] and adversarial outbreak detection [19]. Numerous variations of NIP have been proposed and studied to meet different hypotheses under particular scenarios [16,17,20,21,22,23,24]. Among the many types of NIP, SPNI is a classic and important branch. Generally, SPNI can be described as maximizing the shortest path and may be formulated as a bi-level mixed-integer program. Researchers have applied the SPNI model to transportation [25,26], port security, border patrol and other aspects [27]. However, most of the literature about SPNI focuses on the single-layer network where interdiction and pathfinding happen in the same layer [28,29]. In LPNSPI, interdiction is applied on the physical layer, but the path that the attacker wants to minimize is on the logical layer. With the physical-layer network alone, it is impossible to judge whether a path meets the functional requirements; with the logical-layer network alone, it is impossible to confirm the specific delay of links in the network and the effect of interdiction. The separation of these two layers brings about the non-linearity of the objective function (In Section 2, we present the non-linearity in LPNSPI. The two-layer structure leads to the product term of decision variables in the objective function (Equation (7))), and also make the traditional single-layer NIP solving methods unable to be directly applied to LPNSPI. Recently the layered network interdiction problem has attracted more attention. Kennedy [30] studied the maximum flow interdiction problem in a kind of multi-layer network where different layers are connected by sharing some common elements (nodes or edges). Wei et al. [31] studied the shortest-path interdiction problem in a kind of bi-layer network where the interdiction effects on one layer can be determined by the interdiction on the other layer through logical operations. Baycik et al. [32] studied the interdiction problem in layered physical and information flow networks. In this problem, a physical node can only be used when the flow passing through its corresponding information-layer node is more than a particular demand. Compared to this research, LPNSPI has a completely different setting on the inter-layer relationships of logical–physical networks, which pays more attention to the relationships between logical functions and physical communication paths. Table 1 briefly compares some of the characteristics of LPNSPI and layered network interdiction problems mentioned above.
In this paper, we propose the LPNSPI game and model it as a bi-level integer program. We reformulate the problem and develop a Benders decomposition algorithm framework to solve LPNSPI. There are two major approaches to solve SPNI problems: the decomposition method and the dual method. The advantages of the decomposition approach have been mentioned in [33], and as shown in Table 1, the dual method is not suitable for LPNSPI. Then we propose a Layer-Mapping module to reduce unnecessary calculations of the decomposition algorithm. Also, a Random-Search module is developed to accelerate the convergence of the algorithm with a given approximate ratio. Simulation experiments are designed, and the computational results prove the significant efficiency of Layer-Mapping and Random-Search. Finally, we test our algorithms in a real bi-layer IoT network, and our improving methods perform well in both solving time and interdiction effects.
The paper is organized as follows. In Section 2, the LPNSPI model is defined and formulated. In Section 3, a basic decomposition algorithm is developed after reformulation. Layer-Mapping is introduced in Section 4, and Random-Search is proposed in Section 5. Section 6 provides the experimental results. Conclusions are in Section 7.

2. Shortest Path Interdiction Problem in Logical–Physical Networks

The LPNSPI problem involves two different networks: the logical-layer network which represents the flow of information between logical entities, and the physical-layer network which represents the actual transmission path of information in a physical environment. Throughout the present work, we use normal symbols to represent scalars, and bold symbols for vectors/matrices. The logical-layer network is defined as a directed graph G l = ( N l , A l ) , where N l represents the set of logical nodes and A l represents the set of logical arcs. Each logical node corresponds to a logical entity such as a person, a unit, an organization, etc. Each logical arc e l = ( i l , j l ) represents an allowed information transfer direction between logical nodes. The direction of a logical link is generally defined by artificial rules (such as process rules, hierarchy rules, etc.) rather than natural ones. For instance, in the logical network, two nodes are adjacent because they may have a direct functional dependency (the proper functioning of node i depends on the processed information provided by node j) rather than because they have a direct physical connection. Unlike a logical-layer network, a physical-layer network is defined as a bidirected graph G p = ( N p , A p ) , where N p represents the set of physical nodes and A p represents the set of physical arcs. Physical arcs are bidirected because they correspond to connections in the actual physical environment, such as road connections, routing connection, and so on. These connections are not directional in themselves and the flow of information on them can be two-way. Each logical node i l has a corresponding physical node i p , but not necessarily the other way around (many nodes in the physical network serve only as information transfer nodes and are not necessary to perform system functions). Each physical arc e p = ( i p , j p ) A p has a cost of communication c e p for the attacker, which will be increased to c e p + d e p if the arc is interdicted by the defender. In addition, for the defender, the corresponding resource consumption of interdicting e p is denoted as r e p . The total interdiction resource for the defender is R. The communication cost of a logical arc w e l is the total communication cost of a path that the attacker choose to travel in the physical-layer network, the corresponding node of endpoints of the logical arc being the start node and end node of the physical path.
In this problem, we assume both the attacker and the defender have complete information about the network. The defender pre-deploys the defense strategy according to the attacker’s source node s l and target node t l , and blocks some edges in the network. Subsequently, the attacker develops an optimal attack plan to minimize the communication cost from the starting node to the target node. Let x e p (the vector form is denoted by bold x ) denote the defender’s interdiction strategy on e p , and let y e l (the vector form is denoted by bold y ) denote the attacker’s pathfinding variable on the logical layer. Then the attacker’s problem can be formulated as follows:
min y e l A l w e l y e l
s . t . e l F S ( v l ) y e l e l R S ( v l ) y e l = 1 i f v l = s l 1 i f v l = t l 0 e l s e , v l N l
y e l { 0 , 1 } , e l A l
where w e l is the weight of the logical link e l = ( i l , j l ) , i.e., the minimum total cost of its corresponding paths on the physical layer:
w e l = w ( i l , j l ) = min k e p A p ( c e p + x e p d e p ) k e l e p
s . t . e p F S ( v p ) k e l e p e p R S ( v p ) k e l e p = 1 i f v p = i p 1 i f v p = j p 0 e l s e , v p N p
k e l e p { 0 , 1 } , e p A p
where k e l e p (Let K denotes the matrix form) is the pathfinding variable which indicates whether e p is chosen in the corresponding physical path of e l . x e p = 1 when the physical arc e p is interdicted and x e p = 0 otherwise. k e l e p = 1 indicates that e p is in the physical shortest path corresponding to e l . F S ( v p ) and R S ( v p ) represent respectively the arc set directed out of and into node v p . i p and j p are respectively the corresponding physical nodes of i l and j l . Constraint (2) and (5) are the flow-balance constraints. In practice, w e l can be calculated by using common shortest-path algorithms such as the Dijkstra algorithm.
We define V s l t l as the total communication cost from s l to t l . Then the defender’s problem of maximizing V s l t l , which is exactly the LPNSPI problem, can be formulated as follows
[ LPNSPI ] V s l t l * = max x min y V s l t l = max x min y e l A l w e l ( x ) y e l
= max x min y , k e l A l e p A p ( c e p + x e p d e p ) k e l e p y e l
s . t . e l F S ( v l ) y e l e l R S ( v l ) y e l = 1 i f v l = s l 1 i f v l = t l 0 e l s e , v l N l
e p F S ( v p ) k e l e p e p R S ( v p ) k e l e p = 1 i f v p = i p 1 i f v p = j p 0 e l s e , v p N p , e l = ( i l , j l ) A l
x e p = x e p , e p A p
e p A p x e p r e p 2 R
x e p , y e l , k e l e p { 0 , 1 } , e p A p , e l A l
where e p is the reverse arc of e p and constraint (10) indicates that the interdiction of an arc is effective for both directions. Constraint (11) is the resource constraint for the defender, where we use 2 R as the resource limit because of the counting for both directions. It is noted that the objective function (7) is nonlinear, which results from the mapping relationship between the physical-layer network and the logical-layer network. A Benders decomposition algorithm framework and related improvement methods are proposed in this paper.

3. Basic Decomposition Algorithm for LPNSPI

The problem of shortest-path network interdiction can be naturally divided into two processes: blocking resource deployment process and pathfinding process. These two processes respectively correspond to the max operation and min operation in (7), and correspond to the master problem and subproblem of the Benders decomposition algorithm. Let d denote the vector of d e p and D = d i a g ( d ) . z ^ denotes an s p t p path on the physical layer and Z ^ denotes a collection of s p t p paths. The master problem and the subproblem of LPNSPI are defined as follows:
[ Master ( Z ^ ) ] V Z ^ = max x V
s . t . V c T z ^ + x T D z ^ , z ^ Z ^ Constraint ( 10 ) and Constraint ( 11 )
x e p { 0 , 1 } , e p A p
[ Sub ( x ^ ) ] V x ^ = min z e p A p ( c e p + x ^ e p d e p ) z e p s . t . Constraint ( 8 ) and Constraint ( 9 )
z e p = e l A l y e l k e l e p , e l A l
y e l , k e l e p { 0 , 1 } , e p A p , e l A l
In contrast to the case in a single-layer network, z ^ does not necessarily represent a simple path. For the attacker, searching a path with minimum communication cost will lead to the shortest path in the logical layer, which is definitely a simple path. Although the corresponding path in physical and may have repeated arcs, the attacker cannot avoid going through them because the topology of logical layer specifies the process that the attacker must follow to achieve his goal.
Let Z denote the set of shortest physical layer paths that all simple s l - t l paths in logical layer correspond. Notice that z ^ Z is always established, then [Master( Z ^ )] is an equivalent formulation of [LPNSPI] when Z ^ = Z . Benders decomposition algorithm fixes Z ^ and x ^ in turn, and iteratively solves the master problem and subproblem in turn. [Master( Z ^ )] fixes the set of feasible paths Z ^ and solves an optimal interdiction strategy from the aspect of the defender, while [Sub( x ^ )] gives an optimal path selection with fixed logical-layer network status, standing at the angle of the attacker.
Israeli and Wood [33] proposed two types of “supervalid inequalities” (SVI) constraints to strengthen the LP relation of the master problem of Benders decomposition for the shortest-path interdiction problem of single-layer networks. These inequalities are constructed after the subproblem gives a currently optimal path and added to the master problem as constraints. SVIs are based on the following idea: they may make some solutions infeasible but are guaranteed not to eliminate any optimal solutions unless the incumbent is itself optimal; by reducing the size of the feasible region, SVIs accelerate the master problem. These inequalities can be extended to the logical–physical networks, and the proofs are basically the same with the single-layer case. The master problem containing SVIs is as follows:
[ Master ( Z ^ ) - SVI ] V Z ^ = max x V
s . t . V c T z ^ + x T D z ^ , z ^ Z ^
z ^ T x p + 1 , z ^ Z ^
z ˜ T x 1 , z ^ Z ^ Constraint ( 10 ) and Constraint ( 11 )
x e p { 0 , 1 } , e p A p
where c T z ^ + h = 1 p + 1 d m h z ^ m h > V ̲ c T z ^ + h = 1 p d m h z ^ m h for p H and the sequence { d m h z ^ m h } . { d m h z ^ m h } is the descending order of the sequence { d h z ^ h } (the number of terms is H). z ˜ = ( d i a g ( 1 x ^ ) ) z ^ . Constraint (21) is the Type-I SVI and Constraint (22) is the Type-II SVI. For detailed introduction and related proofs of SVI, please refer to [33].
Because of the logical–physical structure, [Sub( x ^ )] contains nonlinear terms and cannot be solved directly. However, we can divide the solution process into two steps: first, calculate the current communication cost w ^ of the logical layer links with the current interdiction strategy x ^ , and then calculate the shortest path of the logical layer. Here we rewrite the subproblem as follows:
[ Sub ( w ^ ) - LM ] V w ^ = min y e l A l w ^ e l y e l s . t . Constraint ( 2 ) and Constraint ( 3 )
We denote the matrix K obtained when calculating w ^ as K ^ , and denote the current logical path given by [Sub( w ^ )-LM] as y ^ , then we have z ^ = K ^ T y ^ . [Sub( w ^ )-LM] is also a necessary reformulation of the subproblem in order to use Layer-Mapping, which we will introduce in the next section. Now we give the basic decomposition algorithm for LPNSPI:
Algorithm 1 Basic Benders decomposition algorithm for LPNSPI
Input : An instance of LPNSPI
Output: An optimal interdiction plan x *
1: x ^ 0 ; Z ^ ; V ̲ ; V ¯
2: while  V ¯ V ̲ > 0   do
3:  Calculate w ^ and K ^ according to x ^ using (4)-(6)
4:  Solve [Sub( w ^ )-LM] for y ^ and the objective value V w ^
5:   z ^ = K ^ T y ^ ; Z ^ Z ^ z ^ ;
6:   if  V ̲ < V w ^   then
7:    x x ^ ; V ̲ V w ^ ;
8:  end if
9:   if  V ¯ V ̲ 0   then
10:   break;
11:  end if
12:  Solve [Master( Z ^ )-SVI] for x ^ and the objective value V Z ^ ;
13:   V ¯ V Z ^ ;
14: end while
15: x * x
16: return  x *
The correctness of Algorithm 1 is based on the following facts: V w ^ gives a lower bound on the attacker’s optimal objective value and V Z ^ gives a upper bound on the defender’s optimal objective value. Although the actual path in the physical layer z may no longer be a simple path in the case of layered network, the corresponding path in logical layer y is certainly simple, whose number is finite. The number of possible interdiction plans x is also finite. In addition, once y and x are fixed, z is fixed, which means that the algorithm converges in a finite number of iterations.

4. Layer-Mapping Module

As shown in Algorithm 1, during the iteration of the decomposition algorithm, the current interdiction strategy x ^ changes when the master problem finds a better solution. In addition, the change of the interdiction strategy results in the change of the network status which can be represented by w ^ and K ^ : w ^ indicates the weights of logical links and K ^ indicates the corresponding relationships between logical links and physical paths. Once the current network status ( w ^ and K ^ ) is determined, we can solve a relatively simple subproblem [Sub( w ^ )-LM] ([Sub( w ^ )-LM] shares the same representation form with the subproblem of the single-layer case ) and give the currently optimal logical path y ^ . However, this process (line 3 in Algorithm 1) contains a lot of double counting during the iteration because we recalculate w ^ e l and k ^ e l e p for every logical link and physical arc in each iteration. It inspires us to add a Layer-Mapping module between the master problem and the subproblem to find the specific changes of the network status when x ^ changes.
Since the interdiction impact d e p is positive, interdicting a physical arc will not shorten any physical shortest path. So, the change of x ^ has no effect on a physical shortest path (that means this path is still shortest) if no arc of it is interdicted. Let x 0 denote an initial interdiction strategy. Let w 0 denote the corresponding weights (communication costs) of logical links and let K 0 denote the corresponding path-mapping matrix K . When the interdiction strategy changes to x ^ which satisfies { e p | x e p 0 = 1 } { e p | x ^ e p = 1 } , we need only to recalculate w ^ e l and k ^ e l e p for logical link e l if there exists a physical arc e p e p A p | x e p 0 x ^ e p which makes K e l e p 0 = 1 . In practice, we set x 0 to 0 , and thus K 0 indicates the initial network status when there is no interdiction. When the resource limit makes the number of physical arcs that can be interdicted simultaneously much smaller than the edge number of the physical network, layer-mapping will significantly reduce the weight calculations for logical links.
Algorithm 2 Layer-Mapping
Input: Initial interdiction strategy x 0 ; initial network status w 0 and K 0 ; the new interdiction strategy x ^
Output: The new network status w ^ and K ^ ;
1: Initialize w ^ and K ^
2: D i f f ^ = e p A p | x 0 e p x ^ e p
3: for  e l A l   do
4:  flag ← 0;
5:   for  e p D i f f ^   do
6:     if  K e l e p 0 = 1   then
7:      Calculate w ^ e l and K ^ e l using (4)-(6);
8:      flag ← 1;
9:      break;
10:    end if
11:  end for
12:  if flag = 0 then
13:     w ^ e l w 0 e l , K ^ e l K 0 e l
14:    end if
15: end for
16: return  w ^ and K ^
K ^ e l in Layer-Mapping is the vector of k ^ e l e p when e l is fixed (it can also be explained as the e l th row vector of matrix K ^ ), and K 0 e l shares the same representation. Layer-Mapping intuitively shows the change of the mapping status of the logical–physical network when interdiction happens, which not only avoids the non-linearity of the objective function from explicitly appearing in the decomposition algorithm, but also speeds up the solution of the subproblem. For simplicity, we call this module Layer-Mapping( x 0 , x ^ ), where x 0 is the initial interdiction strategy and x ^ is the new one. Applying Layer-Mapping to the basic decomposition algorithm, we get Algorithm 3.
Algorithm 3 Improved decomposition algorithm with Layer-Mapping
Input: An instance of LPNSPI
Output: An optimal interdiction plan x *
1: x ^ 0 ; Z ^ ; V ̲ ; V ¯
2: while  V ¯ V ̲ > 0   do
3:   if  x ^ = 0   then
4:     x 0 x ^ ; Calculate w 0 and K 0 using (4)-(6);
5:     w ^ w 0 ;
6:  else
7:      Solve Layer-Mapping( x 0 , x ^ ) for w ^ and K ^ ;
8:  end if
9:  Solve [Sub( w ^ )-LM] for y ^ and the objective value V w ^
10:   z ^ = K ^ T y ^ ; Z ^ Z ^ z ^ ;
11:   if  V ̲ < V w ^   then
12:     x x ^ ; V ̲ V w ^ ;
13:  end if
14:   if  V ¯ V ̲ 0   then
15:    break;
16:  end if
17:  if [Master( Z ^ )-SVI] is feasible then
18:    Solve [Master( Z ^ )-SVI] for x ^ and the objective value V Z ^ ;
19:     V ¯ V Z ^ ;
20:  else
21:    break;
22:  end if
23: end while
24: x * x
25: return  x *

5. A Random-Search Method for Accelerating Convergence

To accelerate the convergence speed of the decomposition algorithm, we try to use the information of z ^ obtained by the subproblem as much as possible in each iteration to limit the feasible domain of the master problem. We propose a Random-Search procedure to increase the number of paths added to Z ^ for each iteration, which shares the basic idea of Local-Search proposed by Wood [33] in the NIP of a single-layer network. We hope to find more near-optimal paths in one iteration. However, the existence of inter-layer relationships in multi-layer networks makes the search for near-optimal paths complicated, and the time cost of finding all near-optimal paths in each iteration, which is what Local-Search does, is not small in the face of the large-scale layered network. The process of Random-Search is described as follows. The total communication consumption of these paths is limited by a set constant λ and the current lower bound V ̲ . Let z ^ λ denote an near-optimal path found by Random-Search and let V ^ λ denote the communication cost of this path with an interdiction plan x ^ λ , of which the initial value is set to x ^ . For a path z ^ found by the subproblem, Random-Search first selects one of its edges (denoted as e p a 1 ) at random and interdict it, i.e., set x ^ λ e p a 1 = 1 and provisionally set d e p a 1 = . Then, for each edge e l in logical layer, recalculate the weight w ^ e l of it if k ^ e l e p a 1 = K ^ e l , e p a 1 = 1 . As for the edges of the logical layer that satisfy K ^ e l , e p a 1 = 0 , their weights will not change. e p a 1 does not appear in the physical paths they correspond, so the blocking of e p a 1 will not change the mapping relationship between them and these paths. Please note that the process of recalculating w ^ e l can be represented by Layer-Mapping( x ^ , x ^ λ ). The shortest path calculated based on the updated edge weights is a near-optimal path. If the total weight of the path newly found is no more than λ V ̲ , the path will be added into Z ^ as z ^ λ . After that, Random-Search will choose a new edge e p a 2 of the path z ^ λ to interdict and repeat the searching process. The process ends when the blocking of edge e p a n leads V ^ λ > λ V ̲ . Figure 2 shows the execution of Random-Search.
As z ^ λ Z is naturally established, adding constraint V c T z ^ λ + x T D z ^ λ to the master problem will not eliminate any optimal solution. We can still use [Master( Z ^ )-SVI] with the Z ^ extended by Random-Search even if (22) and (23) are not supervalid (for convenience, we name these inequalities “ λ -SVIs”). Since we keep V ^ λ > λ V ̲ in every iteration, adding corresponding λ -SVIs to [Master( Z ^ )-SVI] will finally lead to an approximate objective value V λ * which satisfies V λ * 1 λ V * . We give the properties of λ -SVIs and prove it as follows.
Theorem 1.
For an interdiction plan x ^ given by [Master( Z ^ )] during an iteration of Algorithm 2, let z ^ λ denote a feasible solution of [Sub( x ^ )] that may be non-optimal. Let V ^ λ = e p A p ( c e p + x ^ e p d e p ) z ^ λ e p and let V * denote the global optimal objective value of [Master(Z)]. Then Type-I inequality z ^ λ T x 1 does not eliminate all optimal solutions of [Master(Z)] unless the incumbent solution x ^ leads to a lower bound V ̲ 1 λ V * , providing that V ^ λ λ V ̲ .
Proof of Theorem 1.
Let x * denote the global optimal solution of the defender’s interdiction plan. Assuming that V ̲ < 1 λ V * during an iteration, if Type-I inequality z ^ λ T x 1 eliminates all optimal solutions, which means z ^ λ T x * = 0 , then
V * c T z ^ λ + x * T D z ^ λ ( is naturally established ) = c T z ^ λ ( because z ^ λ T x * = 0 ) = V ^ λ x ^ T D z ^ λ V ^ λ λ V ̲ < V * ( which is a contradiction )
In fact, the two types of SVIs and their corollaries can be modified to apply to a non-optimal pathfinding result z ^ if z ^ is an approximate optimal solution of the current subproblem [Sub( x ^ )]. The modified inequalities are not supervalid, which means that the inequalities may eliminate all optimal solutions. However, when this happens, we will already have an approximate global optimal interdiction solution.
Corollary 1.
For a feasible solution z ^ λ of [Sub( x ^ )], which leads to an objective value V ^ λ λ V ̲ . Order the d m z ^ λ m > 0 so that d m 1 z ^ λ m 1 d m 2 z ^ λ m 2 d m H z ^ λ m H . Then, if λ V ̲ c T z ^ λ + h = 1 p d m h z ^ λ m h for p H , the Type-I inequality of Theorem 1 can be tightened to z ^ λ T x p + 1
Proof of Corollary 1.
Assuming that z ^ λ T x p , then
V * c T z ^ λ + x * T D z ^ λ c T z ^ λ + h = 1 p d m h z ^ λ m h ( because z ^ λ T x p and z ^ λ m h N imply that the number of edges selected by both z ^ λ and x * is no more than p ) λ V ̲ < V * ( which is a contradiction )
Theorem 2.
For an interdiction plan x ^ given by [Master( Z ^ )] during an iteration of Algorithm 2, let z ^ λ denote a feasible solution of [Sub( x ^ )] that may be non-optimal. Let z ˜ λ = ( d i a g ( 1 x ^ ) ) z ^ λ . Then, the Type-II inequality z ˜ λ T x 1 does not eliminate all optimal solutions of [Master(Z)] unless the incumbent solution x ^ leads to a lower bound V ̲ 1 λ V * , providing that V ^ λ λ V ̲ .
Proof of Theorem 2.
Assuming that V ̲ < 1 λ V * , if Type-II inequality z ˜ λ T x 1 eliminates all optimal solutions, which means z ˜ λ T x * = x * T ( d i a g ( 1 x ^ ) ) z ^ λ = x * T ( I d i a g ( x ^ ) ) z ^ λ = 0 , we can obtain that x * T ( I d i a g ( x ^ ) ) D z ^ λ = 0 because all elements in vector x * T ( I d i a g ( x ^ ) ) are 0 or 1. Then
V ( x * , z ^ λ ) = c T z ^ λ + x * T D z ^ λ = c T z ^ λ + x * T ( d i a g ( x ^ ) ) D z ^ λ c T z ^ λ + x ^ D z ^ λ = V ^ λ λ V ̲ < V * ( which contradicts the fact that x * and V * are global optimal solutions )
Corollary 2.
For a Type-II inequality z ˜ λ 1 T x 1 , let M ˜ λ 1 = { m | z ˜ λ 1 m = 1 } and let M ˜ λ 2 be any subset of M ˜ λ 1 such that m M ˜ λ 2 d m + ( c T z ^ λ 1 + x ^ 1 T D z ^ λ 1 ) λ V ̲ . Then, the Type-II SVI of Theorem 2 can be tightened to z ˜ λ 2 T x 1 , where z ˜ λ 2 m = z ˜ λ 1 m for all m M ˜ λ 1 \ M ˜ λ 2 and 0 otherwise.
Proof of Corollary 2.
Assuming that V ̲ < 1 λ V * , if Type-II inequality z ˜ λ 2 T x 1 eliminates all optimal solutions, which means z ˜ λ 2 T x * = 0 , let M ^ λ 1 = { m | z ^ λ 1 m 1 } , then
V ( x * , z ^ λ 1 ) = c T z ^ λ + x * T D z ^ λ = m ( M ^ λ 1 \ M ˜ λ 1 ) ( c m z ^ λ m + x m * d m z ^ λ m ) + m M ˜ λ 2 ( c m z ^ λ m + x m * d m z ^ λ m ) + m ( M ˜ λ 1 \ M ˜ λ 2 ) ( c m z ^ λ m + x m * d m z ^ λ m ) = m ( M ^ λ 1 \ M ˜ λ 1 ) ( c m z ^ λ m + x m * d m z ^ λ m ) + m M ˜ λ 2 ( c m z ^ λ m + x m * d m z ^ λ m ) = m M ˜ λ 2 x m * d m z ^ λ m + m ( M ^ λ 1 \ M ˜ λ 1 ) ( c m z ^ λ m + x m * d m z ^ λ m ) + m M ˜ λ 2 c m z ^ λ m m M ˜ λ 2 d m + ( c T z ^ λ 1 + x ^ 1 T D z ^ λ 1 ) λ V ̲ < V * ( which leads to a contradiction )
Based on Algorithm 3, we add the Random-Search module and get Algorithm 4 as follows:
Algorithm 4 Improved decomposition algorithm with Layer-Mapping and Random-Search
Input: An instance of LPNSPI and a tolerable approximation ratio 1 λ
Output: A tolerable near-optimal interdiction plan x λ *
1: x ^ 0 ; Z ^ ; V ̲ ; V ¯
2: while  V ¯ V ̲ > 0   do
3:   if  x ^ = 0   then
4:     x 0 x ^ ; Calculate w 0 and K 0 using (4)-(6);
5:     w ^ w 0 ;
6:  else
7:    Solve Layer-Mapping( x 0 , x ^ ) for w ^ and K ^ ;
8:  end if
9:  Solve [Sub( w ^ )-LM] for y ^ and the objective value V w ^ ;
10:   z ^ = K ^ T y ^ ; Z ^ Z ^ z ^ ;
11:   if  V ̲ < V w ^   then
12:     x x ^ ; V ̲ V w ^ ;
13:  end if
14:   if  V ¯ V ̲ 0   then
15:    break;
16:  end if
17:  Solve Random-Search( x ^ , z ^ , K ^ , λ , V ̲ ) for Z ^ λ ;
18:   Z ^ Z ^ Z ^ λ ;
19:  if [Master( Z ^ )-SVI] is feasible then
20:    Solve [Master( Z ^ )-SVI] for x ^ and the objective value V Z ^ ;
21:     V ¯ V Z ^ ;
22:  else
23:    break;
24:   end if
25: end while
26: x λ * x
27: return  x λ *

6. Computational Experiments

We tested our algorithms in a set of generated layered networks with directed random networks as their logical layers. Random networks, small-world networks, scale-free networks and grid networks are used as physical layer in these instances. The network in the logical layer are smaller than the physical-layer network in each instance, and each node of the logical layer correspond a randomly selected node of the physical layer, which means that these two nodes share the same entity. We generated random networks by connecting newly added nodes to previous nodes with a certain probability p. p is adjusted for each instance to ensure that all the random networks have the same expected average degree. The small-world networks are generated by first constructing a nearest-neighbor coupling network and then reconnecting the edges with different probabilities. For the scale-free case, we first generate a small random network, and then assign the connection probabilities according to the degrees of nodes, and finally preferentially connect the newly added nodes to the nodes with better connectivity in the light of the probabilities. As for the grid networks, conventional square lattice networks are used. The communication costs of edges c e p s and the interdiction increments d e p s in physical layer are integers that are randomly distributed on [1, 20] and [200, 1000], respectively. The resource consumption of interdiction r is set to 1 in practice. A time limit of 3600 s is set for each experiment.
Table 2 shows the parameters of the test problems we used. The blank cells repeat values from cells above. The numbers in the brackets of the column “ N l ” and column “ N p ” represent the average degree of the generated networks. For each problem we generated ten instances. We programmed the algorithms presented above using the MATLAB toolbox YALMIP and CPLEX 12.8 callable library. Computation is performed on a Windows 10 64-bit laptop with an Intel Core i7-9700K CPU (3.60 GHZ) and 16 GB of RAM.
The value of λ in Algorithm 4 is set as 1.05, 1.10 and 1.15, respectively, and the error range of the corresponding optimal objective value is 95.2%, 90.9% and 87.0%. The basic results for LPNSPI are shown in Table 3. The column “instance” represents the number of instances we used for comparison in the problem of a certain scale. T, average solution time in seconds; S t d . T , the standard deviation of the solution time; N, average iteration times; S t d . N , the standard deviation of the iteration times. The numbers in brackets of the column “T” indicate the number of the instances which were solved within 3600 s. The “–”s of the same rows indicates “not applicable” because there was at least one instance which was not successfully solved within the allotted time. It can be intuitively seen from Table 3 that the Layer-Mapping module make Algorithm 3 much faster than the basic decomposition algorithm with almost the same number of iterations, especially when the scale of the physical layer is large. However, despite this, Algorithm 3 cannot solve all the instances within the stipulated time. Combining Random-Search with Layer-Mapping, Algorithm 3 takes significantly less time and fewer iterations, and successfully solved all the instances. It should be noted that among the ten instances of ’gn1000’, there are two extreme instances, which increase the average solving time of ’gn1000’ problem (even more than the average solving time of ’gn2000’). However, it does not affect the comparison between the performance of different algorithms.
To analyze the specific running time of each part (i.e., the master problem, the subproblem and the Random-Search part) of the three algorithms, we selected some “easy” instances of the hardest problems of each network type in Table 3 (that is, rd20000, sf20000, sw20000 , gn1000 and gn2000), where “easy" means that all three algorithms can solve the problem within 3600 s. The results are shown in Table 4. T . M is the running time of the master problem; T . S is the running time of the subproblem; T . R S is the time spent on Random-Search. Initialization, formatting, and other parts of the program only account for a small portion of the time and are not listed. E r r is the average error rate of the results obtained by Algorithm 4, and the numbers in parentheses indicate the number of instances where Algorithm 3 find a near-optimal solution rather than an exact optimal solution. S t d . E r r is the standard deviation of E r r . As Table 4 shows, Algorithm 3 takes almost the same time in solving the master problem as Algorithm 1, but takes much less time to solve the subproblem. With Random-Search, Algorithm 3 greatly reduces the time of the master problem and the subproblem, but it also takes a considerable amount of time in Random-Search to find near-optimal paths.
A suitable value of λ allows Random-Search to find a large number of near-optimal paths, but at the same time, the final result may have some errors from the actual optimal solution. In our test instances, Algorithm 3 solved many instances accurately, with an overall average accuracy of more than 99.7%. Of course, we can set the value of λ to 0, which will make the final result the global optimal solution, but also make it difficult for Random-Search to find near-optimal paths. We tested Algorithm 3 on the case when λ = 0 , and found that the running time results are not so satisfying because much fewer near-optimal paths were found.
To study the effect of the value of λ on the solution speed of Algorithm 3, we set three cases of λ = 1.05 , λ = 1.1 , and λ = 1.15 , and tested the algorithm on all the instances of the problems in Table 4. Table 5 compares the algorithm time, number of iterations, and errors of the near-optimal solution in the three cases. We used all ten instances of each problem when comparing the running time and the number of iterations of the algorithm. However, for “rd20000”, “sf20000” and “sw20000”, there were instances where Algorithm 1 and Algorithm 2 could not give the exact optimal results. The numbers in parentheses in the column “Err” indicate the number of instances used in calculating the average error rate and the number of non-optimal solutions given by Algorithm 3. For example, “0.25%(2 in 8)” means that in 8 verifiable instances, Algorithm 3 gives 2 approximate solutions (and 6 exact solutions), with an average error of 0.25%.
Due to the randomness of the pathfinding results of Random-Search, the number of near-optimal paths found in a specific iteration will fluctuate, and the contribution of these paths and the corresponding SVIs to the master problem is also uncertain. In some instances, the algorithm took more time with a larger λ than with a smaller one. However, in general, as Table 5 shows, a slightly larger λ makes the algorithm converge faster.
Furthermore, we examine our improving methods in commercial data of a bi-layer network which is obtained from scanning over the Internet. This bi-layer network includes a physical layer of 36,409 nodes and 49,084 edges, and a logical layer of 32,490 nodes and 51,340 edges. The physical nodes contain switching equipment, terminal equipment, storage equipment, control equipment, etc., and they are connected by physical links which consist of optical fibers, twisted-pair lines, coaxial cables, wireless media links, etc. On the logical layer, nodes represent operating systems and other software, and links represent information transfers, remote logins, network sessions, etc. The network structure is shown in Figure 3.
After data cleaning of the original network (remove isolated nodes and connected components which do not include the source-destination pair), we designed experiments to test the changes of the algorithm running time and blocking effect with the increase of interdiction resources. The time limit is set to 3600 s.
As shown in Table 6, the processing time of the algorithms increases rapidly when the number of interdicted edges (R) grows larger. Both Algorithm 3 and Algorithm 4 solve the problem with much less time than Algorithm 1 (benchmark) when interdicted edges are no more than 8, which confirms the effectiveness of Layer-Mapping. As a large number of near-optimal paths are found by Random-Search, when R is small, the solution of Algorithm 3 is faster than that of Algorithm 4. However, when R grows up to 9, neither Algorithm 1 nor Algorithm 3 can solve the problem within 3600 s. Algorithm 3 with both Layer-Mapping and Random-Search successfully solves the problem when R is no more than 12. The interdiction effects of the three algorithms are compared in Figure 4. The objective function, which is the length of the shortest s l - t l path, increases when R grows. We find that even if the λ in Algorithm 4 is set to 1.15, which leads to a potential error range of 87%, accurate optimal solutions are found in comparable cases (i.e., when R is no more than 8).

7. Conclusions

This paper focuses on blocking malicious network behaviors in IoT systems which can be modeled as logical–physical networks. The problem is represented as the shortest-path interdiction problem in layered networks, where the target paths and the interdiction behaviors are on different layers of the network. The attacker seeks to minimize the total communication cost of the attacking path from the source node to the target node on the logical layer, and the defender aims to maximize this path by interdicting edges on the physical layer. The interdiction of edges on the physical layer affects edges on the logical layer through the inter-layer relationship. In this problem, every node in the logical-layer network has a corresponding node on the physical layer, and the weight of each logical-layer edge is decided by a shortest path on the physical layer, with the endpoints of the logical-layer edge being the start node and the end node.
By referring to the experience of interdiction problems in monolayer networks, we model LPNSPI as a solvable form of Benders decomposition algorithm and apply “supervalid inequalities” (SVIs) on it. A Layer-Mapping module is proposed to deal with the explicit non-linearity of the objective function and reduce double counting of the subproblem. Layer-Mapping recalculates the status of the physical layer, basing on the current solution of the master problem and the initial network status. To accelerate the convergence of the decomposition algorithm, we raise Random-Search. By specifying an acceptable approximation range, Random-Search can randomly find multiple near-optimal paths in an iteration; as a result these paths and the corresponding SVIs can be added as constraints to the master problem. Computational results show the effectiveness of Layer-Mapping and Random-Search.

Author Contributions

Conceptualization, J.Y. and K.X.; methodology, J.Y. and K.X.; software, J.Y.; validation, J.Y.; formal analysis, J.Y.; investigation, J.Y.; resources, J.Y. and C.Z.; data curation, J.Y.; writing—original draft preparation, J.Y.; writing—review and editing, J.Y., K.X., C.Z., J.W.; visualization, J.Y., K.X. and G.Y.; supervision, W.Z.; project administration, C.Z.; funding acquisition, W.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was in part supported by the National Natural Science Foundation of China under Grants Nos. 71571186 and 71871217, and in part by the Natural Science Foundation of Hunan Province under Grant No. 2019JJ20019.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Gao, J.; Buldyrev, S.V.; Stanley, H.E.; Havlin, S. Networks formed from interdependent networks. Nat. Phys. 2011, 8, 40–48. [Google Scholar] [CrossRef] [Green Version]
  2. Farivar, F.; Haghighi, M.S.; Jolfaei, A.; Alazab, M. Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT. IEEE Trans. Ind. Inf. 2020, 16, 2716–2725. [Google Scholar] [CrossRef]
  3. Liu, L.; Ma, Z.; Meng, W. Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Future Gener. Comput. Syst. 2019, 101, 865–879. [Google Scholar] [CrossRef]
  4. Ahmed, A.; Latif, R.; Latif, S.; Abbas, H.; Khan, F.A. Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review. Multimedia Tools Appl. 2018, 77, 21947–21965. [Google Scholar] [CrossRef]
  5. Cowie, J.; Ogielski, A.; Premore, B.; Smith, E.; Underwood, T. Impact of the 2003 Blackouts on Internet Communications: Preliminary Report; Technical Report; Renesys: Tokyo, Japan, 2004. [Google Scholar]
  6. Kushner, D. The real story of stuxnet. IEEE Spectr. 2013, 50, 48–53. [Google Scholar] [CrossRef]
  7. Cho, C.S.; Chung, W.H.; Kuo, S.Y. Cyberphysical Security and Dependability Analysis of Digital Control Systems in Nuclear Power Plants. IEEE Trans. Syst. Man Cybern. Syst. 2016, 46, 356–369. [Google Scholar] [CrossRef]
  8. Chen, B.; Ho, D.W.C.; Zhang, W.A.; Yu, L. Distributed Dimensionality Reduction Fusion Estimation for Cyber-Physical Systems Under DoS Attacks. IEEE Trans. Syst. Man Cybern. Syst. 2017, 49, 455–468. [Google Scholar] [CrossRef]
  9. Xiao, K.; Zhu, C.; Xie, J.; Zhou, Y.; Zhu, X.; Zhang, W. Dynamic Defense Strategy against Stealth Malware Propagation in Cyber-Physical Systems. In Proceedings of the IEEE INFOCOM 2018—IEEE Conference on Computer Communications, Honolulu, HI, USA, 16–19 April 2018; pp. 1790–1798. [Google Scholar] [CrossRef]
  10. Deng, Y.; Wu, J.; Xiao, Y.; Zhang, M.; Yu, Y.; Zhang, Y. Optimal Disintegration Strategy With Heterogeneous Costs in Complex Networks. IEEE Trans. Syst. Man Cybern. Syst. 2018, 1–9. [Google Scholar] [CrossRef]
  11. Qi, M.; Deng, Y.; Deng, H.; Wu, J. Optimal disintegration strategy in multiplex networks. Chaos Interdiscip. J. Nonlinear Sci. 2018, 28, 121104. [Google Scholar] [CrossRef]
  12. Bica, I.; Chifor, B.C.; Arseni, C.; Matei, I. Multi-Layer IoT Security Framework for Ambient Intelligence Environments. Sensors 2019, 19, 4038. [Google Scholar] [CrossRef] [Green Version]
  13. Suárez-Albela, M.; Fraga-Lamas, P.; Fernández-Caramés, T. A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices. Sensors 2018, 18, 3868. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  14. Holme, P.; Kim, B.; Yoon, C.; Han, S.K. Attack Vulnerability of Complex Networks. Phys. Review. E Stat. Nonlinear Soft Matter Phys. 2002, 65, 056109. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  15. Liu, B.; Xu, H.; Zhou, X. Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things. Sensors 2018, 18, 4074. [Google Scholar] [CrossRef] [Green Version]
  16. Lim, C.; Smith, J.C. Algorithms for discrete and continuous multicommodity flow network interdiction problems. IIE Trans. 2007, 39, 15–26. [Google Scholar] [CrossRef]
  17. Scaparra, M.P.; Church, R.L. A bilevel mixed-integer program for critical infrastructure protection planning. Comput. Oper. Res. 2008, 35, 1905–1923. [Google Scholar] [CrossRef]
  18. Morton, D.P.; Pan, F.; Saeger, K.J. Models for nuclear smuggling interdiction. IIE Trans. 2007, 39, 3–14. [Google Scholar] [CrossRef]
  19. Chen, L.; Wang, Z.; Li, F.; Guo, Y.; Geng, K. A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things. Sensors 2020, 20, 804. [Google Scholar] [CrossRef] [Green Version]
  20. Washburn, A.; Wood, K. Two-Person Zero-Sum Games for Network Interdiction. Oper. Res. 1995, 43, 243–251. [Google Scholar] [CrossRef]
  21. Goldberg, N. Non-zero-sum nonlinear network path interdiction with an application to inspection in terror networks. Nav. Res. Logist. (NRL) 2017, 64. [Google Scholar] [CrossRef]
  22. Janjarassuk, U.; Linderoth, J. Reformulation and sampling to solve a stochastic network interdiction problem. Networks 2008, 52, 120–132. [Google Scholar] [CrossRef] [Green Version]
  23. Lunday, B.; Sherali, H. A Dynamic Network Interdiction Problem. Inf. Lith. Acad. Sci. 2010, 21, 553–574. [Google Scholar] [CrossRef]
  24. Rad, M.; Kakhki, H. Maximum dynamic network flow interdiction problem: New formulation and solution procedures. Comput. Ind. Eng. 2013, 65, 531–536. [Google Scholar] [CrossRef]
  25. Yates, J.; Sanjeevi, S. A length-based, multiple-resource formulation for shortest path network interdiction problems in the transportation sector. Int. J. Crit. Infrastruct. Prot. 2013, 6, 107–119. [Google Scholar] [CrossRef]
  26. Xiangyu, W.; Cheng, Z.; Kaiming, X.; Quanjun, Y.; Yabing, Z. Shortest Path Network Interdiction with Goal Threshold. IEEE Access 2018, 6, 29332–29343. [Google Scholar]
  27. Yates, J.; Lakshmanan, K. A constrained binary knapsack approximation for shortest path network interdiction. Comput. Ind. Eng. 2011, 61, 981–992. [Google Scholar] [CrossRef]
  28. Bayrak, H.; Bailey, M.D. Shortest path network interdiction with asymmetric information. Networks 2010, 52, 133–140. [Google Scholar] [CrossRef]
  29. Claudio, M.R.S.; Ramirez-Marquez, J.E. A bi-objective approach for shortest-path network interdiction. Comput. Ind. Eng. 2010, 59, 232–240. [Google Scholar]
  30. Kennedy, K.T. Synthesis, Interdiction, and Protection of Layered Networks. Ph.D. Thesis, Air Force Institute of Technology, Wright-Patterson AFB, OH, USA, 2009. [Google Scholar]
  31. Xiangyu, W.; Kaiming, X.; Wei, D. Shortest path network interdiction of bi-layer networks with goal threshold. In Proceedings of the 2016 13th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, China; 2016; pp. 70–75. [Google Scholar]
  32. Baycik, N.O.; Sharkey, T.C.; Rainwater, C.E. Interdicting layered physical and information flow networks. IISE Trans. 2018, 50, 316–331. [Google Scholar] [CrossRef]
  33. Israeli, E.; Wood, R.K. Shortest-path network interdiction. Netw. Int. J. 2002, 40, 97–111. [Google Scholar] [CrossRef]
Figure 1. A simple example of the logical–physical network in IoT. The logical layer contains a sensor, an effector and three different processors. The physical layer is the communication network, where the time delay of each link is given by the number beside it. Each dotted line between the two layers connects the functional part and the communicating part of the same entity. The sensor collects information and sends it to either of the processors. The processor analyzes the information and then sends order to the effector. As the figure shows, the shortest logical flow Sensor → Processor3 → Effector corresponds to a physical path A(Sensor) → E → G(Processor 3) → K → L(Effector), which weighs 9. Although the shortest AL path on the physical layer is A(Sensor) → E → H → L(Effector) with total weight 8, it is not functionally feasible because no processor is on this path and thus no effective order can be sent to Effector.
Figure 1. A simple example of the logical–physical network in IoT. The logical layer contains a sensor, an effector and three different processors. The physical layer is the communication network, where the time delay of each link is given by the number beside it. Each dotted line between the two layers connects the functional part and the communicating part of the same entity. The sensor collects information and sends it to either of the processors. The processor analyzes the information and then sends order to the effector. As the figure shows, the shortest logical flow Sensor → Processor3 → Effector corresponds to a physical path A(Sensor) → E → G(Processor 3) → K → L(Effector), which weighs 9. Although the shortest AL path on the physical layer is A(Sensor) → E → H → L(Effector) with total weight 8, it is not functionally feasible because no processor is on this path and thus no effective order can be sent to Effector.
Sensors 20 05943 g001
Figure 2. The process of Random-Search.
Figure 2. The process of Random-Search.
Sensors 20 05943 g002
Figure 3. The structure of a real bi-layer IoT network (after data cleaning).
Figure 3. The structure of a real bi-layer IoT network (after data cleaning).
Sensors 20 05943 g003
Figure 4. Interdiction effects in the bi-layer IoT network.
Figure 4. Interdiction effects in the bi-layer IoT network.
Sensors 20 05943 g004
Table 1. Comparisons with LPNSPI and other layered network interdiction problems.
Table 1. Comparisons with LPNSPI and other layered network interdiction problems.
Kennedy [30]Wei et al. [31]Baycik et al. [32]LPNSPI
objective functionMinimize the
maximum flow
Maximizing the
shortest path
Minimize the
maximum flow
Maximizing the
shortest path
inter-layer
relationship
geographical co-located
relations
logic constraintsflow requirement
constraints
path constraints
dualityYesYesYesNo
Table 2. Test problem statistics.
Table 2. Test problem statistics.
Problem NameType of G p Type of G l N l N p R
rd2000randomrandom100 (3)2000 (2)2
rd5000 200 (3)5000 (2)3
rd10000 500 (3)10,000 (2)4
rd20000 1000 (3)20,000 (2)5
sf2000scale-free 100(3)2000 (3)2
sf5000 200 (3)5000(3)3
sf10000 500 (3)10,000 (3)4
sf20000 1000 (3)20,000 (3)5
sw2000small-world 100 (3)2000 (4)2
sw5000 200 (3)5000 (4)3
sw10000 500 (3)10,000 (4)4
sw20000 1000 (3)20,000 (4)5
gd1000grid 100 (3)1000 (2)2
gd2000 100 (3)2000 (2)2
Table 3. The computational results for networks of different scale and different types.
Table 3. The computational results for networks of different scale and different types.
ProblemAlgorithm 1Algorithm 3Algorithm 4 ( λ = 1.05 )
TStd.TNStd.NTStd.TNStd.NTStd.TNStd.N
rd20005.72.517.36.93.51.417.36.93.01.28.94.8
rd500022.412.930.416.58.75.830.416.56.93.211.75.7
rd10000163.5113.764.343.639.233.564.343.616.59.314.310.6
rd20000(7)(8)86.5132.825.026.7
sf20008.42.724.16.85.31.824.16.83.41.211.13.2
sf500039.920.347.122.517.811.447.122.58.43.315.65.5
sf10000406.2272.4127.275.1134.6118.9127.275.128.58.923.36.7
sf20000(8)(9)95.439.926.47.2
sw20007.22.919.76.64.41.619.76.62.60.68.72.3
sw500046.130.949.128.020.215.749.128.06.32.012.84.0
sw10000560.2518.8145.2111.2224.2264.6145.2111.226.614.823.912.4
sw20000(6)(7)84.041.327.712.7
gn1000933.2969.7579.6359.8812.7867.4579.6359.8192.0144.857.131.0
gn2000757.3675.9488.4267.8655.5622.1488.4276.8157.5126.745.024.9
Table 4. The running time of the main parts and the error of Algorithm 4.
Table 4. The running time of the main parts and the error of Algorithm 4.
ProblemInstanceAlgorithm 1Algorithm 3Algorithm 4 ( λ = 1.05 )
T.MT.ST.MT.ST.MT.ST.RSErrStd.Err
rd200007108.7695.0107.216.96.99.313.60.28% (2)0.005
sf200008300.91435.0313.467.419.514.848.90.11% (1)0.003
sw200006321.01473.0337.129.420.712.329.00 (0)0
gn100010746.7183.5740.669.097.96.587.20.23% (5)0.003
gn200010582.7171.2597.854.291.24.461.40.30% (4)0.005
Table 5. Results for Algorithm 4 when λ changes.
Table 5. Results for Algorithm 4 when λ changes.
ProblemAlgorithm 4
λ = 1 . 05 λ = 1 . 1 λ = 1 . 15
TNErrTNErrTNErr
rd2000086.525.00.25% (2 in 8)48.914.30.15% (1 in 8)36.49.70.46% (2 in 8)
sf2000095.426.40.10% (1 in 9)83.319.70.66% (4 in 9)75.115.41.91% (5 in 9)
sw2000084.027.70 (0 in 7)66.218.50 (0 in 7)51.011.70.50% (1 in 7)
gn1000192.057.10.23% (5 in 10)110.129.60.69% (7 in 10)75.617.01.17% (8 in 10)
gn2000157.545.00.30% (4 in 10)89.925.10.68% (6 in 10)74.016.70.81% (8 in 10)
Table 6. The processing time when defender’s resources increase.
Table 6. The processing time when defender’s resources increase.
RProcessing Time
Algorithm 1Algorithm 3Algorithm 4 ( λ = 1.15 )
181.318.748.4
2187.833.555.5
3275.551.674.5
4299.092.4103.5
5258.281.8116.9
6265.0115.883.6
7605.2276.4211.6
8828.2403.0292.9
9--384.2
10--499.5
11--1528.7
12--2456.1
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yan, J.; Xiao, K.; Zhu, C.; Wu, J.; Yang, G.; Zhang, W. Bi-Layer Shortest-Path Network Interdiction Game for Internet of Things. Sensors 2020, 20, 5943. https://doi.org/10.3390/s20205943

AMA Style

Yan J, Xiao K, Zhu C, Wu J, Yang G, Zhang W. Bi-Layer Shortest-Path Network Interdiction Game for Internet of Things. Sensors. 2020; 20(20):5943. https://doi.org/10.3390/s20205943

Chicago/Turabian Style

Yan, Jingwen, Kaiming Xiao, Cheng Zhu, Jun Wu, Guoli Yang, and Weiming Zhang. 2020. "Bi-Layer Shortest-Path Network Interdiction Game for Internet of Things" Sensors 20, no. 20: 5943. https://doi.org/10.3390/s20205943

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop