World Scientific
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

EFFECT OF ATTACK ON SCALE-FREE NETWORKS DUE TO CASCADING FAILURE

    https://doi.org/10.1142/S0217984909019557Cited by:7 (Source: Crossref)

    In this paper, based on the local preferential redistribution rule of the load after removing a node, we propose a cascading model and explore cascading failures on scale-free networks. Assuming that a failed node leads only to a redistribution of the load passing through it to its neighboring nodes, we study the response of scale-free networks subject to attacks on nodes. The network robustness against cascading failures is quantitatively measured by the critical threshold Tc, at which a phase transition occurs from normal state to collapse. For each case of attacks on nodes, four different attack strategies are used: removal by the descending order of the degree, attack by the ascending order of the degree, random removal of breakdown, and removal by the ascending order of the average degree of neighboring nodes of a broken node. Compared with the previous result, i.e. the robust-yet-fragile property of scale-free networks on random failures of nodes and intentional attacks, our cascading model has totally different and interesting results. On the one hand, as unexpected, choosing the node with the lowest degree is more efficient than the one with the highest degree when α < 1, which is a tunable parameter in our model. On the other hand, the robustness against cascading failures and the harm order of four attack strategies strongly depends on the parameter α. These results may be very helpful for real-life networks to protect the key nodes and avoid cascading-failure-induced disasters.