Evaluation of network robustness using a node tearing algorithm

Until recently the study of failure and vulnerability in complex networks focused on the role of high degree nodes, and the relationship between their removal and network connectivity. Recent evidence suggested that in some network configurations, the removal of lower degree nodes can also cause net...

Full description

Saved in:
Bibliographic Details
Published inPhysica A Vol. 391; no. 24; pp. 6674 - 6681
Main Authors Ma, A., Mondragón, R.J.
Format Journal Article
LanguageEnglish
Published Elsevier B.V 15.12.2012
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Until recently the study of failure and vulnerability in complex networks focused on the role of high degree nodes, and the relationship between their removal and network connectivity. Recent evidence suggested that in some network configurations, the removal of lower degree nodes can also cause network fragmentation. We present a disassembling algorithm that identifies nodes that are core to network connectivity. The algorithm is based on network tearing in which communities are defined and used to construct a hierarchical structure. Cut-nodes, which are located at the boundaries of the communities, are the key interest. Their importance in the overall network connectivity is characterized by their participation with neighbouring communities in each level of the hierarchy. We examine the impact of these cut-nodes by studying the change in size of the giant component, local and global efficiencies, and how the algorithm can be combined with other community detection methods to reveal the finer internal structure within a community. ► Network tearing is used to reveal the overall network structure and configuration. ► Nodes in between communities, referred to as cut-nodes, are key to network stability. ► Cut-nodes are not limited to high centrality nodes. ► Ranking strategies based on network structure can be used to identify cut-nodes. ► Removal of cut-nodes will fragment a network aggressively.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ISSN:0378-4371
1873-2119
DOI:10.1016/j.physa.2012.07.058