Show simple item record

dc.contributor.authorZussman, Gil
dc.contributor.authorCohen, Reuven
dc.contributor.authorNeumayer, Sebastian J.
dc.contributor.authorModiano, Eytan H
dc.date.accessioned2018-05-07T14:36:31Z
dc.date.available2018-05-07T14:36:31Z
dc.date.issued2011-12
dc.identifier.issn1063-6692
dc.identifier.issn1558-2566
dc.identifier.urihttp://hdl.handle.net/1721.1/115240
dc.description.abstractCommunication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an electromagnetic pulse (EMP) attack. Such real-world events happen in specific geographical locations and disrupt specific parts of the network. Therefore, the geographical layout of the network determines the impact of such events on the network's connectivity. In this paper, we focus on assessing the vulnerability of (geographical) networks to such disasters. In particular, we aim to identify the most vulnerable parts of the network. That is, the locations of disasters that would have the maximum disruptive effect on the network in terms of capacity and connectivity. We consider graph models in which nodes and links are geographically located on a plane. First, we consider a simplistic bipartite graph model and present a polynomial-time algorithm for finding a worst-case vertical line segment cut. We then generalize the network model to graphs with nodes at arbitrary locations. We model the disaster event as a line segment or a disk and develop polynomial-time algorithms that find a worst-case line segment cut and a worst-case circular cut. Finally, we obtain numerical results for a specific backbone network, thereby demonstrating the applicability of our algorithms to real-world networks. Our novel approach provides a promising new direction for network design to avert geographical disasters or attacks.en_US
dc.description.sponsorshipUnited States. Defense Threat Reduction Agency (Grant HDTRA1-07-1-0004)en_US
dc.description.sponsorshipUnited States. Defense Threat Reduction Agency (Grant HDTRA09-1-005)en_US
dc.description.sponsorshipUnited States. Defense Threat Reduction Agency (Grant HDTRA1-09-1-0057)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Grant CNS-1017800)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Grant CNS0830961)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Grant CNS-1018379)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Grant CNS-1054856)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Grant CNS-0626781)en_US
dc.description.sponsorshipAmerican Society for Engineering Education. National Defense Science and Engineering Graduate Fellowshipen_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Grant EEC-0812072)en_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1109/TNET.2011.2128879en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT Web Domainen_US
dc.titleAssessing the Vulnerability of the Fiber Infrastructure to Disastersen_US
dc.typeArticleen_US
dc.identifier.citationNeumayer, Sebastian, et al. “Assessing the Vulnerability of the Fiber Infrastructure to Disasters.” IEEE/ACM Transactions on Networking, vol. 19, no. 6, Dec. 2011, pp. 1610–23.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorNeumayer, Sebastian J.
dc.contributor.mitauthorModiano, Eytan H
dc.relation.journalIEEE/ACM Transactions on Networkingen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dc.date.updated2018-04-06T13:06:31Z
dspace.orderedauthorsNeumayer, Sebastian; Zussman, Gil; Cohen, Reuven; Modiano, Eytanen_US
dspace.embargo.termsNen_US
dc.identifier.orcidhttps://orcid.org/0000-0001-8238-8130
mit.licenseOPEN_ACCESS_POLICYen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record