×

Improving connectivity of compromised digital networks via algebraic connectivity maximisation. (English) Zbl 1487.90089

Summary: Automation and digitalisation in the logistics industry enhance the performance of customer service, while sabotage of the digital logistics network adversely deteriorates the performance. Although precautionary strategies are implemented to protect critical assets in the digital logistics network, a high-level adversary can still penetrate the network and launch attacks inside the organisation. Thus, real-time recovery plays an important role in facing real-time cyberattacks. This paper proposes a novel max-min integer programming model subject to a budget constraint to improve network connectivity of a compromised digital logistics network via a strategy of maximising algebraic connectivity. Due to the NP-hardness of the maximisation problem, the optimal solution may not be found quickly. Thus, several heuristic algorithms, including greedy algorithms, tabu search and relaxed semidefinite programming (SDP) with rounding, are proposed. Verification of these heuristic algorithms is achieved by applying them, firstly to a hypothetical network, then to a large scale-free network which mimics a digital logistics network.

MSC:

90B06 Transportation, logistics and supply chain management
05C40 Connectivity
90C35 Programming involving graphs or networks
90C47 Minimax problems in mathematical programming
90C59 Approximation methods and heuristics in mathematical programming

Software:

YALMIP
Full Text: DOI

References:

[1] Alenazi, M. J.; Cetinkaya, E. K.; Sterbenz, J. P., Network design and optimisation based on cost and algebraic connectivity, (Proceedings of the 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) (2013), IEEE), 193-200
[2] Barabási, A. L.; Albert, R., Emergence of scaling in random networks, Science (New York, N.Y.), 286, 5439, 509-512 (1999) · Zbl 1226.05223
[3] Bavelas, A., Communication patterns in task-oriented groups, The Journal of the Acoustical Society of America, 22, 6, 725-730 (1950)
[4] Bell, M. G.H.; Kurauchi, F.; Perera, S.; Wong, W., Investigating transport network vulnerability by capacity weighted spectral analysis, Transportation Research Part B: Methodological, 99, 251-266 (2017)
[5] Bonacich, P., Some unique properties of eigenvector centrality, Social networks, 29, 4, 555-564 (2007)
[6] Borrero, J. S.; Prokopyev, O. A.; Sauré, D., Sequential interdiction with incomplete information and learning, Operations Research, 67, 1, 72-89 (2019) · Zbl 1443.90206
[7] Boyd, S.; Vandenberghe, L., Convex optimization (2004), Cambridge university press · Zbl 1058.90049
[8] Cheeger, J., A lower bound for the smallest eigenvalue of the Laplacian, (Proceedings of the Princeton conference in honor of Professor S. Proceedings of the Princeton conference in honor of Professor S, Bochner (1969)), 195-199 · Zbl 0212.44903
[9] Cheung, K. F.; Bell, M. G.H., Attacker-Defender model against quantal response adversaries for cyber security in logistics management: an introductory study, European Journal of Operational Research (2019)
[10] Colicchia, C.; Creazza, A.; Menachof, D. A., Managing cyber and information risks in supply chains: Insights from an exploratory analysis, Supply Chain Management: An International Journal, 24, 2, 215-240 (2019)
[11] Coppersmith, D.; Winograd, S., Matrix multiplication via arithmetic progressions, Journal of symbolic computation, 9, 3, 251-280 (1990) · Zbl 0702.65046
[12] Courant, R., Über die Eigenwerte bei den Differentialgleichungen der mathematischen Physik, Mathematische Zeitschrift, 7, 1, 1-57 (1920) · JFM 47.0455.02
[13] De Abreu, N. M.M., Old and new results on algebraic connectivity of graphs, Linear algebra and its applications, 423, 1, 53-73 (2007) · Zbl 1115.05056
[14] Dekhne, A., Hastings, G., Murnane, J., & Neuhaus, F. (2019, ). Automation in logistics: Big opportunity, bigger uncertainty. Retrieved from McKinsey & Companyhttps://www.mckinsey.com/industries/travel-logistics-and-transport-infrastructure/our-insights/automation-in-logistics-big-opportunity-bigger-uncertainty [accessed 26 August 2020].
[15] Denis, L.; Krishnakumar, T.; Karthikeyan, M.; Sasipriya, S., a secured and tamper free authentication and verification of transactions over the network in cash logistics industry, International Journal of Scientific and Technology Research, 9, 2, 956-959 (2020)
[16] DeSmit, Z.; Kulkarni, A. U.; Wernz, C., Enhancing cyber-physical security in manufacturing through game-theoretic analysis, Cyber-Physical Systems, 4, 4, 232-259 (2018)
[17] Di Francesco, M.; Gaudioso, M.; Gorgone, E.; Murthy, I., A new extended formulation with valid inequalities for the Capacitated Concentrator Location Problem, European Journal of Operational Research (2019)
[18] Doostmohammadi, M.; Akartunalı, K., Valid inequalities for two-period relaxations of big-bucket lot-sizing problems: Zero setup case, European Journal of Operational Research, 267, 1, 86-95 (2018) · Zbl 1403.90015
[19] Dua, A., & Lund, S. (2019, October). Automation and economic disparity: A new challenge for CEOs. McKinsey & Company. Retrieved from https://www.mckinsey.com/featured-insights/future-of-work/automation-and-economic-disparity-a-new-challenge-for-ceos [accessed 26 August 2020].
[20] Elsner, T., Fuchs, C., Klein, B., & Richter, W. (2019, November). How airlines should manage IT failures and security breaches to improve operational stability. McKinsey & Company. Retrieved from https://www.mckinsey.com/industries/travel-logistics-and-transport-infrastructure/our-insights/how-airlines-should-manage-it-failures-and-security-breaches-to-improve-operational-stability [accessed 26 August 2020].
[21] Enayaty-Ahangar, F.; Albert, L. A.; DuBois, E., A survey of optimization models and methods for cyberinfrastructure security, IISE Transactions (2020)
[22] Fiedler, M., Algebraic connectivity of graphs, Czechoslovak Mathematical Journal, 23, 2, 298-305 (1973) · Zbl 0265.05119
[23] Fraile, F.; Tagawa, T.; Poler, R.; Ortiz, A., Trustworthy industrial IoT gateways for interoperability platforms and ecosystems, IEEE Internet of Things Journal, 5, 6, 4506-4514 (2018)
[24] Freeman, L. C., Centrality in social networks conceptual clarification, Social Networks, 1, 3, 215-239 (1978)
[25] Ghosh, A.; Boyd, S., Growing well-connected graphs, (Proceedings of the 45th IEEE conference on decision and control (CDC) (2006), IEEE), 6605-6611
[26] Glover, F., Tabu search—Part I, ORSA Journal on computing, 1, 3, 190-206 (1989) · Zbl 0753.90054
[27] Glover, F., Tabu search—Part II, ORSA Journal on computing, 2, 1, 4-32 (1990) · Zbl 0771.90084
[28] Hasham, S.; Joshi, S.; Mikkelsen, D., Financial crime and fraud in the age of cybersecurity, McKinsey & Company (2019), [accessed 26 August 2020]
[29] Huang, W.; Chow, T. W., Effective strategy of adding nodes and links for maximizing the traffic capacity of scale-free network, Chaos: An Interdisciplinary Journal of Nonlinear Science, 20, 3, Article 033123 pp. (2010)
[30] Jones, R. A.; Horowitz, B., A system-aware cyber security architecture, Systems Engineering, 15, 2, 225-240 (2012)
[31] Li, G.; Hao, Z. F.; Huang, H.; Wei, H.; Yan, X. M., A maximum algebraic connectivity increment edge-based strategy for capacity enhancement in scale-free networks, Physics Letters A, 383, 17, 2046-2050 (2019) · Zbl 1495.90041
[32] Löfberg, J., YALMIP: A toolbox for modeling and optimization in MATLAB, (Proceedings of the 2004 IEEE international symposium on computer aided control systems design (CACSD), 2-4 September 2004. Proceedings of the 2004 IEEE international symposium on computer aided control systems design (CACSD), 2-4 September 2004, Taipei, Taiwan (2004)), 284-289
[33] Lysne, O.; Hole, K. J.; Otterstad, C.; Ytrehus, Ø.; Aarseth, R.; Tellnes, J., Vendor malware: Detection limits and mitigation, Computer, 49, 8, 62-69 (2016)
[34] McKelvey, R. D.; Palfrey, T. R., Quantal response equilibria for normal form games, Games and Economic Behavior, 10, 1, 6-38 (1995) · Zbl 0832.90126
[35] Molitierno, J. J., Applications of combinatorial matrix theory to Laplacian matrices of graphs (2016), Chapman and Hall/CRC · Zbl 1243.05002
[36] Mosk-Aoyama, D., Maximum algebraic connectivity augmentation is NP-hard, Operations Research Letters, 36, 6, 677-679 (2008) · Zbl 1152.05343
[37] Nagarajan, H.; Rathinam, S.; Darbha, S.; Rajagopal, K., Algorithms for synthesizing mechanical systems with maximal natural frequencies, Nonlinear Analysis: Real World Applications, 13, 5, 2154-2162 (2012) · Zbl 1254.70036
[38] Parlett, B. N., The symmetric eigenvalue problem, Vol. 20 (1998), siam · Zbl 0885.65039
[39] Pólya, G.; Szegő, G., Isoperimetric inequalities in mathematical physics. (Annals of mathematics studies - 27) (1951), Princeton University Press
[40] Smith, J. C.; Song, Y., A survey of network interdiction models and algorithms, European Journal of Operational Research, 283, 3, 797-811 (2020) · Zbl 1441.90048
[41] Sydney, A.; Scoglio, C.; Gruenbacher, D., Optimizing algebraic connectivity by edge rewiring, Applied Mathematics and computation, 219, 10, 5465-5479 (2013) · Zbl 1280.05072
[42] Tsubakitani, S.; Evans, J. R., Optimizing tabu list size for the traveling salesman problem, Computers & Operations Research, 25, 2, 91-97 (1998) · Zbl 0907.90226
[43] UK P&I Club, NYA, & TT Club. (2018). Risk Focus: Cyber Considering threats in the maritime supply chain. TT Club. Retrieved from https://www.ttclub.com/news-and-resources/publications/stoploss/stoploss-18—risk-focus—cyber/ [accessed 26 August 2020].
[44] Wang, H.; Van Mieghem, P., Algebraic connectivity optimization via link addition, (Proceedings of the 3rd International Conference on Bio-Inspired Models of Network, Information and Computing Systems (2008), ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)), 22
[45] Wang, X. F.; Chen, G., Complex networks: Small-world, scale-free and beyond, IEEE circuits and systems magazine, 3, 1, 6-20 (2003)
[46] Wee, H. M.; Blos, M. F.; Yang, W. H., Risk management in logistics, Handbook on decision making, 285-305 (2012), Springer: Springer Berlin, Heidelberg
[47] Wei, P.; Chen, L.; Sun, D., Algebraic connectivity maximization of an air transportation network: The flight routes’ addition/deletion problem, Transportation Research Part E: Logistics and Transportation Review, 61, 13-27 (2014)
[48] Zarreh, A.; Saygin, C.; Wan, H.; Lee, Y.; Bracho, A., Cybersecurity analysis of smart manufacturing system using game theory approach and quantal response equilibrium, Procedia manufacturing, 17, 1001-1008 (2018)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.