Skip to main content
Log in

Graph-Based Self-Regulation for Different Types of Networks with Adaptive Topology

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract—

This article presents graph theory-based approaches to self-regulation of networks with adaptive network topology. These approaches are limited to networks with no node mobility—peer-to-peer and heterogeneous sensor networks, as well as industrial networks on the example of Smart Grid smart energy consumption networks. For each network type, a generalized target function is described, conditions for self-regulation are formulated, and a formal description of the process of self-regulation is provided.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.

REFERENCES

  1. Januario, F., Cardoso, A., and Gil, P., A distributed multi-agent framework for resilience enhancement in cyber-physical systems, IEEE Access, 2019, vol. 7, pp. 31342–31357. https://doi.org/10.1109/access.2019.2903629

    Article  Google Scholar 

  2. Pavlenko, E.Yu., Systematization of cyber threats to large-scale systems with adaptive network topology, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp. 906–915. https://doi.org/10.3103/s0146411622080132

    Article  Google Scholar 

  3. Basati, A., Cyber-resilient control structures in DC microgrids with cyber-physical threats, PhD Thesis, Aalborg, Denmark: Aalborg University, 2023. https://doi.org/10.54337/aau548142466

  4. Student, V. and Dhir, R., A study of ad hoc network: A review, Int. J., 2013, vol. 3, no. 3, pp. 135–138.

    Google Scholar 

  5. Amulya, V.V., Cyber physical systems by using wireless sensor networks, 2018. https://api.semanticscholar.org/CorpusID:53403798.

  6. Kandris, D., Nakas, C., Vomvas, D., and Koulouras, G., Applications of wireless sensor networks: An up-to-date survey, Appl. Syst. Innovation, 2020, vol. 3, no. 1, p. 14. https://doi.org/10.3390/asi3010014

    Article  Google Scholar 

  7. Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976. https://doi.org/10.3103/s0146411618080084

    Article  Google Scholar 

  8. Zegzhda, D. and Stepanova, T., Achieving Internet of Things security via providing topological sustainability, 2015 Science and Information Conf. (SAI), London, 2015, IEEE, 2015, pp. 269–276. https://doi.org/10.1109/sai.2015.7237154

  9. Wang, W. and Lu, Z., Cyber security in the smart grid: Survey and challenges, Comput. Networks, 2013, vol. 57, no. 5, pp. 1344–1371. https://doi.org/10.1016/j.comnet.2012.12.017

    Article  Google Scholar 

  10. Boyer, W.F. and McBride, S.A., Study of security attributes of smart grid systems-current cyber security issues (No. INL/EXT-09-15500), Idaho Falls, Idaho: Idaho National Lab.(INL), 2009.

  11. Pavlenko, E.Yu., Functional model of adaptive network topology of large-scale systems based on dynamical graph theory, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp. 1016–1024. https://doi.org/10.3103/s0146411622080168

    Article  Google Scholar 

  12. Zou, H.-X., Zhao, L.-Ch., Wang, Q., Gao, Q.-H., Yan, G., Wei, K.-X., and Zhang, W.-M., A self-regulation strategy for triboelectric nanogenerator and self-powered wind-speed sensor, Nano Energy, 2022, vol. 95, p. 106990. https://doi.org/10.1016/j.nanoen.2022.106990

    Article  CAS  Google Scholar 

  13. Balaji, S. and Sasilatha, T., Detection of denial of service attacks by domination graph application in wireless sensor networks, Cluster Comput., 2018, vol. 22, no. S6, pp. 15121–15126. https://doi.org/10.1007/s10586-018-2504-5

    Article  Google Scholar 

  14. Boubiche, D.E., Athmani, S., Boubiche, S., and Toral-Cruz, H., Cybersecurity issues in wireless sensor networks: current challenges and solutions, Wireless Personal Commun., 2020, vol. 117, no. 1, pp. 177–213. https://doi.org/10.1007/s11277-020-07213-5

    Article  Google Scholar 

  15. Gunduz, M.Z. and Das, R., Cyber-security on smart grid: Threats and potential solutions, Comput. Networks, 2020, vol. 169, p. 107094. https://doi.org/10.1016/j.comnet.2019.107094

    Article  Google Scholar 

  16. Bi, S. and Zhang, Y.J.A., Graph-based cyber security analysis of state estimation in smart power grid, IEEE Commun. Mag., 2017, vol. 55, no. 4, pp. 176–183. https://doi.org/10.1109/mcom.2017.1600210c

    Article  Google Scholar 

  17. Ferrag, M.A., Babaghayou, M., and Yazici, M.A., Cyber security for fog-based smart grid SCADA systems: Solutions and challenges, J. Inf. Secur. Appl., 2020, vol. 52, p. 102500. https://doi.org/10.1016/j.jisa.2020.102500

    Article  Google Scholar 

Download references

Funding

This study was supported by the Russian Science Foundation, project no. 22-21-20008, https://rscf.ru/project/22-21-20008/, and the Saint Petersburg Science Foundation, contract no. 61/220 dated April 15, 2022.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Yu. Pavlenko.

Ethics declarations

The authors of this work declare that they have no conflicts of interest.

Additional information

Translated by A. Ovchinnikova

Publisher’s Note.

Allerton Press remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pavlenko, E.Y., Pakhomov, M.A. Graph-Based Self-Regulation for Different Types of Networks with Adaptive Topology. Aut. Control Comp. Sci. 57, 1055–1062 (2023). https://doi.org/10.3103/S0146411623080217

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411623080217

Keywords: