Title: Comprehensive vulnerability assessment and optimisation method of power communication network

Authors: Chenchen Ji; Peng Yu; Wenjing Li; Puyuan Zhao

Addresses: State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China ' State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China ' State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China ' State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China

Abstract: Vulnerability assessment and optimisation for power communication network can enhance the robustness and sustainability of network. However, current vulnerability assessment method lacks service and availability indicator considerations, and corresponding optimisation method ignores dynamic process for temporal factors as well. Aiming at above problems, a novel and comprehensive vulnerability assessment and optimisation method is proposed. Firstly, for vulnerability assessment, the influence factors are analysed from static and dynamic aspects respectively. Integrating these factors, a comprehensive vulnerability indicator is designed to assess the vulnerability of nodes and edges. And then, to relieve unbalanced vulnerability distribution in the network, a routing optimisation method is proposed through reconfiguration for service routes on the edge with high vulnerability. Finally, the simulation is taken under a real network. Vulnerability assessment with the defined indicator is executed, and the network vulnerability can be balanced with the optimisation method, which has effective theoretical and practical significance.

Keywords: power communication network; comprehensive vulnerability; vulnerability balance; routing optimisation.

DOI: 10.1504/IJES.2019.099421

International Journal of Embedded Systems, 2019 Vol.11 No.3, pp.315 - 324

Received: 02 Mar 2017
Accepted: 02 Aug 2017

Published online: 02 May 2019 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article