By Topic

A graph based security dependency analysis of data communication networks to their topology

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Fouladi, R. ; ICT Security Fac., Iran Telecommun. Res. Center, Tehran, Iran ; Salimi, S. ; Salahi, A.

Infrastructure networks like power systems can be suitable media for data communication, either as broadband which it is called BPL (broadband over power line) or narrowband which it is known PLC (power line carrier). Also it is claimed that security robustness of complex communication networks like the Internet to an intentional attack (that brings down network nodes) depends on their topology. In this article, we investigate the dependency of BPL data communication network (as a kind of communication networks) security robustness against the intentional attack to the topology of power system that has been ignored in past studies. The analysis is based on graph theory. We derived two security criteria (biggest cluster size and cluster diameter) for our assessment. It is shown that by changing the structure of power system, the security robustness of the data communication network will be varied. This study brightens the way for future layout development of combined data communication networks with different infrastructures.

Published in:

Computer Science & Education, 2009. ICCSE '09. 4th International Conference on

Date of Conference:

25-28 July 2009