Please wait a minute...
Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering)  2008, Vol. 9 Issue (10): 1336-1340    DOI: 10.1631/jzus.A0820336
Electrical & Electronic Engineering     
Cascading failures in local-world evolving networks
Zhe-jing BAO, Yi-jia CAO
School of Electrical Engineering, Zhejiang University, Hangzhou 310027, China; College of Electrical and Information Engineering, Hunan University, Changsha 410082, China
Download:     PDF (0 KB)     
Export: BibTeX | EndNote (RIS)      

Abstract  The local-world (LW) evolving network model shows a transition for the degree distribution between the exponential and power-law distributions, depending on the LW size. Cascading failures under intentional attacks in LW network models with different LW sizes were investigated using the cascading failures load model. We found that the LW size has a significant impact on the network’s robustness against deliberate attacks. It is much easier to trigger cascading failures in LW evolving networks with a larger LW size. Therefore, to avoid cascading failures in real networks with local preferential attachment such as the Internet, the World Trade Web and the multi-agent system, the LW size should be as small as possible.

Key wordsComplex network      Local world (LW)      Cascading failures      Power-law      Attack     
Received: 01 May 2008     
CLC:  N94  
  TP393  
Cite this article:

Zhe-jing BAO, Yi-jia CAO. Cascading failures in local-world evolving networks. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(10): 1336-1340.

URL:

http://www.zjujournals.com/xueshu/zjus-a/10.1631/jzus.A0820336     OR     http://www.zjujournals.com/xueshu/zjus-a/Y2008/V9/I10/1336

[1] Hui Xu, Yu-xi Zhao, Lei Cui, Bi Xu. Sulphate attack resistance of high-performance concrete under compressive loading[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2013, 14(7): 459-468.
[2] Cheng-qing LI, Dan ZHANG, Guan-rong CHEN. Cryptanalysis of an image encryption scheme based on the Hill cipher[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(8): 1118-1123.
[3] Yi-xiao LI, Xiao-gang JIN, Fan-sheng KONG, Hui-lan LUO. Strategic games on a hierarchical network model[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(2): 271-278.
[4] Jian WANG, Yan-heng LIU, Jian-qi ZHU, Yu JIAO. Model for cascading failures in congested Internet[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2008, 9(10): 1331-1335.
[5] TOPÇU Ilker Bekir, BİLİR Turhan. Effects of slag fineness on durability of mortars[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2007, 8(11): 1725-1730.
[6] Yang Rui-jun, Xia Qi, Pan Qun-hua, Wang Wei-nong, Li Ming-lu. Cost management based security framework in mobile ad hoc networks[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2006, 7(4 ): 3-.
[7] GUO Xing-yang, TANG Chao-jing. Colluding attacks on a group signature scheme[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2005, 6(10): 1-.
[8] GAN Yuan-ju. Verifiable threshold signature schemes against conspiracy attack[J]. Journal of Zhejiang University-SCIENCE A (Applied Physics & Engineering), 2004, 5(1): 50-54.