A Graph Based Security Dependency Analysis of Data Communication Networks to Their Topology
2009 (English)In: Proceedings of 2009 4th International Conference on Computer Science and Education, ICCSE 2009, New York: IEEE , 2009, 284-288 p.Conference paper (Refereed)
Infrastructure networks like power systems can be suitable media for data communication, either as broadband which it is called BPL (Broadband over Power Line) or narrowband which it is known PLC (Power Line Carrier). Also it is claimed that security robustness of complex communication networks like the Internet to an intentional attack (that brings down network nodes) depends on their topology. In this article, we investigate the dependency of BPL data communication network (as a kind of communication networks) security robustness against the intentional attack to the topology of power system that has been ignored in past studies. The analysis is based on graph theory. We derived two security criteria (biggest cluster size and cluster diameter) for our assessment. It is shown that by changing the structure of power system, the security robustness of the data communication network will be varied. This study brightens the way for future layout development of combined data communication networks with different infrastructures.
Place, publisher, year, edition, pages
New York: IEEE , 2009. 284-288 p.
broadband communication, graph, power system communication, power system modeling, security
Electrical Engineering, Electronic Engineering, Information Engineering
IdentifiersURN: urn:nbn:se:kth:diva-96793ISI: 000271688600060ISBN: 978-1-4244-3519-7OAI: oai:DiVA.org:kth-96793DiVA: diva2:532684
2009 4th International Conference on Computer Science and Education, ICCSE 2009; Nanning; 25 July 2009 through 28 July 2009
QC 201206152012-06-122012-06-122012-06-15Bibliographically approved