Modeling and analysis of cascading node-link failures in multi-sink wireless sensor networks

Modeling and analysis of cascading node-link failures in multi-sink wireless sensor networks

Modeling and Analysis of Cascading Node-Link Failures in Multi-Sink Wireless Sensor Networks Journal Pre-proof Modeling and Analysis of Cascading No...

8MB Sizes 0 Downloads 39 Views

Modeling and Analysis of Cascading Node-Link Failures in Multi-Sink Wireless Sensor Networks

Journal Pre-proof

Modeling and Analysis of Cascading Node-Link Failures in Multi-Sink Wireless Sensor Networks Xiuwen Fu, Yongsheng Yang PII: DOI: Reference:

S0951-8320(19)30842-7 https://doi.org/10.1016/j.ress.2020.106815 RESS 106815

To appear in:

Reliability Engineering and System Safety

Received date: Revised date: Accepted date:

28 June 2019 14 December 2019 19 January 2020

Please cite this article as: Xiuwen Fu, Yongsheng Yang , Modeling and Analysis of Cascading NodeLink Failures in Multi-Sink Wireless Sensor Networks, Reliability Engineering and System Safety (2020), doi: https://doi.org/10.1016/j.ress.2020.106815

This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain. © 2020 Published by Elsevier Ltd.

Highlights • We present a cascading node-link model for multi-sink WSNs. • We propose two sink-oriented load metrics to measure the load distribution on sensor nodes and wireless links respectively. • We evaluate the network robustness under link attacks and node attacks. • We explore the impacts of critical thresholds on the cascading robustness of the network.

1

Modeling and Analysis of Cascading Node-Link Failures in Multi-Sink Wireless Sensor Networks Xiuwen Fu, Yongsheng Yang Institute of Logistics Science and Engineering, Shanghai Maritime University, Shanghai 201306, China [email protected]

Abstract Due to the prominent advantages in network lifetime and energy balance, the application of multi-sink wireless sensor networks (WSNs) is becoming more and more widespread. However, their cascading robustness is still rarely studied. Therefore, in this paper, a realistic cascading model for multi-sink WSNs is proposed. In this model, two load metrics are proposed to characterize the load distributions of sensor nodes and wireless links, and the cascading process of the network is jointly promoted by node overload events and link overload events, which can better reflect the cascading characteristics of multi-sink WSNs in practical scenarios. In addition, we focus on the cascading robustness of the network in the face of node attacks and link attacks. Through extensive experiments, we found that there are critical thresholds for both node capacity and link capacity, which can determine whether capacity expansion is helpful; there is a critical threshold for network load distribution, which can determine whether cascading failures occur; node attacks are more likely to trigger cascading failures than link attacks; increasing node capacity can more effectively reduce the damage of cascading failures to the network. The discovery of the above results can provide theoretical guidance for users to build a more robust multi-sink WSN against cascading failures. Keywords: cascading failures; multi-sink wireless sensor networks; node capacity; link capacity; load distribution; critical threshold; 1. Introduction Wireless sensor networks (WSNs) are an important part of the Internet of things (IoTs) system, which are widely used in industry, agriculture, military and other fields. WSNs are composed of general sensor nodes and sink nodes[1, 2, 3, 4]. General sensor nodes collect environmental data and forward the data to sink nodes, which then upload the data to the cloud. According to the number of deployed sink nodes, WSNs can be divided into single-sink networks and multi-sink networks. Compared with single-sink networks, multi-sink networks are more widely used due to their outstanding advantages in network lifetime and energy balance[5, 6, 7, 8]. Fig.1 shows examples of single-sink WSNs and multi-sink WSNs. Due to the low-cost hardware and constrained energy, WSNs usually adopt “narrowband communication mode[9, 4, 10]”. In this communication mode, the capacity of nodes and links is significantly limited. When the load of a few nodes or links in the network exceeds their capacity, cascading failures may be triggered and the global network may be paralyzed[11, 8, 12]. Because of the serious threat to the entire network, cascading failures in WSNs have been researched extensively. Different cascading models have been proposed to simulate the cascading process of WSNs. However, given the actual load distribution and hardware configurations of WSNs, existing models have several evident limitations: 1) in WSNs, all the messages collected by general sensor nodes will be aggregated at sink nodes and then uploaded to the cloud, Preprint submitted to Elsevier

February 3, 2020

Sink Sink nodes node

SinkSink nodenodes 1 General sensor nodes

Sink node 2

General sensor nodes General sensor nodes

General sensor nodes

(a) Single-sink WSNs

(b) Multi-sink WSNs

Figure 1: Examples of single-sink WSNs and multi-sink WSNs.

this sink-oriented delivery paradigm distinguishes WSNs from general peer-to-peer networks. Existing cascading models for WSNs are developed based on general degree-load metrics or betweenness-load metrics, which cannot properly reflect the impacts of sink nodes on network load distribution; 2) existing cascading models for WSNs are typical cascading node models, in which the cascading process can only be triggered by the failures of sensor nodes. However, in actual WSNs, wireless links are highly likely to fail due to external interference and are also subject to capacity constraints. The failures of links or nodes will result in an update of message routing paths, further renewing network load distribution. In this process, some nodes or links may be overloaded and a new round of load redistribution may occur. In order to explore the actual cascading process of WSNs, the impacts of link failures should not be ignored; 3) due to the outstanding advantages in terms of network lifetime and energy conservation, multi-sink WSNs have become the dominant network architecture in practical applications. Compared with the traditional single-sink WSNs, the load distribution characteristics of multi-sink WSNs are more complicated, which makes their cascading process significantly different from that of general networks. Therefore, in this work, we develop a realistic cascading model for multi-sink WSNs. The major contributions of this work are summarized as follows: 1) To properly characterize the cascading process of multi-sink WSNs, a cascading node-link model is proposed, in which cascading failures are caused by overload of nodes and links. 2) Two robustness metrics are proposed to measure the cascading robustness of multi-sink WSNs in the face of node-failure attacks and link-failure attacks respectively. 3) Through extensive experiments, the soundness and effectiveness of the proposed cascading model have been verified. The impacts of modeling parameters on network robustness have also been explored. The reminders of the paper is organized as follows. A brief survey of related work is presented in Section 2. The details of the proposed cascading model for multi-sink WSNs are presented in Section 3. Experimental results are given in Section 4. Finally, conclusions and the future work are shown in Section 5. 2. Overview and Discussion of Literature In this section, we first present an overview of literature regarding cascading failures in WSNs. Then, we mainly discuss the limitations of existing models by presenting some examples. 2.1. Literature overview Liu et al.[13] presented a betweenness-based cascading model for WSNs. In this model, the load of sensor nodes is represented by their betweenness values and the overload function 3

is defined as a monotone non-decreasing function with the load of sensor nodes as the only input. The cascading robustness of three topological structures (scale-free topology, plane k connected topology and k -connected dominating topology) was studied. Yin et al.[14] proposed a cascading model based on exponential degree for scale-free WSNs. In this model, the load of sensor nodes is exponentially determined by their own degrees. They mainly explored the relationship between the load and the largest connected component after cascading failures on scale-free WSNs. Based on the exponential-degree cascading model, Ye et al.[15] used the probability generating function method to analyze the cascading robustness of scale-free WSNs under a single random node failure. They found that the scale of cascading failures is positively related to the power law exponent of scale-free networks; Hu et al.[16] researched the cascading robustness of three typical topologies of WSNs (i.e., small-world topology, scale-free topology and random topology) through the general betweenness-based cascading model. In our previous work[17], we developed a degree-based cascading model for hierarchical WSNs. In this model, the connections between nodes are divided into inter-cluster connections and intra-cluster connections. We assumed that the relay load of a sensor node is only related to the number of inter-cluster connections it has, and the sensing load of a sensor node is only related to the number of intra-cluster connections it has. In [18], we researched the cascading robustness of WSNs based on the coupled map lattice (CML) method under three attack schemes (i.e., random attack, max-degree attack, and max-status attack). Although the above researches have made some progress, the cascading models they established fail to consider the decisive impacts of sink nodes on network load distribution, making them unable to properly characterize the load and capacity in multi-sink WSNs. Moreover, existing models mainly consider the impacts of node overload events on the cascading process of WSNs, but ignore the impacts of link overload events. In practical scenarios, wireless links often fail due to interference. As with node failures, link failures can also renew the network load distribution and trigger the cascading process of WSNs. 2.2. Problem statement In this part, we discuss the limitations of existing cascading models in terms of multi-sink orientation and cascading node-link process. 2.2.1. Multi-sink orientation 200 180 160 140

y/m

120 100 80 60 40 20 0 0

20

40

60

80

100

120

140

160

180

200

x/m

Figure 2: Network topology consisting by 300 general sensor nodes and 3 sink nodes.

Fig.2 demonstrates a general network topology of multi-sink WSNs referencing [18]. In this topology, 300 sensor nodes and 3 sink nodes are randomly deployed. Fig.3 shows the 4

network load distributions generated by two most-widely used multi-sink routing protocols (i.e., MUSTER[19] and SGF[20]) respectively. We can clearly observe that the closer the sensor node is to the sink node, the greater the load it will carry. This phenomenon has been confirmed by many researchers and is called “sink hole” effect[21, 22, 23]. The reason for the ”sink hole” effect is that all messages will be gathered at sink nodes, so sensor nodes near sink nodes need to take more load than other nodes in outer regions. 200

160

160

120

120

y/m

y/m

200

80

80

40

40

0

0 0

40

80

120

160

200

0

40

80

x/m

120

160

200

x/m

(a) MUSTER

(b) SGF

Figure 3: Network load distributions generated by MUSTER and SGF.

The network load distributions created by degree-based and betweenness-based cascading models are shown in Fig.4. In the network load distribution obtained by degree-based cascading model, the load distribution is only positively related to the density of wireless links. In the network load distribution obtained by betweenness-based cascading model, sensor nodes that are closer to the center of the network can get a higher load. We can easily observe that in these two models the load of the sensor nodes near sink nodes is not higher than that of sensor nodes in other areas. Apparently, compared with the load distributions shown in Fig.3, the load distributions obtained by degree-based and betweenness-based cascading models fail to reflect the multi-sink orientation characteristics in actual networks. 200

160

160

120

120

y/m

y/m

200

80

80

40

40

0

0 0

40

80

120

160

0

200

40

80

120

160

200

x/m

x/m

(a) Degree

(b) Betweenness

Figure 4: Network load distributions generated by degree-based model and betweenness-based model.

2.2.2. cascading node-link process In this part, we still use the network topology shown in Fig.2 and observe the changes of load on each node and each link before and after deleting first 10 wireless links in the descending order of the load. According to Fig.5, we can clearly observe that the load distributions on nodes and links under MUSTER have changed significantly after deleting highest-load links. If we take the highest-load values of nodes and links in the network before removal as the capacity, we can find that there will be 9 nodes and 25 links exceeding the capacity after deletion. Similarly, 5

1

1 Capacity line

Normalized load

Normalized load

Capacity line

0.8 0.6

Before deletion After deletion

0.4

0.8 Before deletion After deletion

0.6 0.4 0.2

0.2

0

0 0

50

100

150

200

250

300

0

200

400

IDs of nodes

600

800

1000

IDs of links

(a) Nodes

(b) Links

Figure 5: Normalized load on each node and each link under MUSTER. 1

1 Capacity line

Normalized load

Normalized load

Capacity line

0.8 Before deletion After deletion

0.6 0.4

0.8 0.6 0.4 0.2

0.2

0

0 0

50

100

150

200

250

0

300

200

400

600

800

1000

IDs of links

IDs of nodes

(a) Nodes

(b) Links

Figure 6: Normalized load on each node and each link under SGF.

according to Fig.6, we can find that under SGF, 12 nodes and 29 links will be overloaded after the removal. These results clearly tell us that: 1) in addition to node failures, link failures can also renew the network load distribution, which may trigger cascading failures; 2) similar to node overload, wireless links are also at risk of overload during the cascading process; 3) the actual cascading process is driven by overload failures of nodes and links. Apparently, since most of the existing models for WSNs are developed based on the cascading node models, they cannot properly reflect the cascading node-link process in multi-sink WSNs. 3. Cascading Node-Link Model Without loss of generality, a multi-sink WSN can be depicted by an undirected graph G=(V, E), where V ={1, 2, ..., N } is the set consisting by general sensor nodes and sink nodes. E={ei,j |i, j ∈ V } is the set of wireless links between sensor nodes. The N ×N adjacency matrix [aij ] has aij =1 if there is a wireless link between node i and node j. We use the node sets Vg and Vs to represent the set of general sensor nodes and the set of sink nodes respectively. We can easily get that V =Vg ∪Vs . Ng and Ns represent the number of general sensor nodes and the number of sink nodes in the network. Ne is the number of links in the network. 3.1. Multi-oriented betweenness To properly reflect the load distribution of multi-sink WSNs, we propose two load metrics: multi-oriented node betweenness (MNB) and multi-oriented link betweenness (MLB), which are to measure the load on sensor nodes and wireless links respectively. MNB is defined as follow: Dj (t) =

X X wi,m,j (t)/wi,m (t) , Ng NS(i) i∈V g

(1)

m∈S(i)

S(i) = {k|d(i, k) = min [d(i, j), j ∈ Vs ]} , 6

(2)

where S(i) is the set of sink nodes that are closest to node i and d(i, j) is the minimum number of hops between node i and node j. wi,m,j (t) is the number of the shortest paths from node i to its nearest sink node m which pass through node j at time t. wi,m (t) is the number of the shortest paths from node i to its nearest sink node m. Ng is the number of general sensor nodes in the network. NS(i) is the size of the sink set S(i), which can also be considered as the number of the nearest sink nodes of node i. In the case that each of the shortest path from any sensor nodes to their nearest sink nodes passes through node j, Dj (t) takes the maximum value of 1. In the case that no sensor nodes need to go through node j to reach their nearest sink nodes, Dj (t) takes the minimum value of 0. MLB is defined as follow:  X X wi,m,ej,k (t) wi,m (t) , (3) Dej,k (t) = Ng NS(i) i∈V g

m∈S(i)

where wi,m,ej,k (t) is the number of the shortest paths from node i to its nearest sink node m which pass through link ej,k at time t. wi,S(i) (t) is the number of the shortest paths from node i to its nearest sink nodes m. In the case that each of the shortest path from any sensor nodes to their nearest sink nodes pass through link ej,k , Dej,k (t) takes the maximum value of 1. In the case that no sensor nodes need to go through link ej,k to reach their nearest sink nodes, Dej,k (t) takes the minimum value of 0. In order to verify the soundness and effectiveness of the proposed metrics MNB and MLB, we propose two hierarchical topologies (i.e., single-sink topology and multi-sink topology). Fig.7 shows an example of a single-sink hierarchical topology. In this topology, node 1 is the sink node and all other nodes are required to transmit data to the sink node 1. By observing the network traffic distribution, we can easily obtain that all the traffic in the network needs to reach the sink node 1 through node 2; nodes 3 and 4 need to relay the traffic from three nodes (including their own traffic) respectively; nodes 5∼8 only need to relay the traffic generated by themselves. Table 1 gives the MNB of each node in this topology. By comparing the values of MNB with the actual traffic distribution, we can easily conclude that the proposed load metric MNB perfectly characterizes the load distribution in single-sink WSNs. Next, we observe the traffic distribution on each link in Fig.7. We can easily get that link e1,2 needs to relay the traffic of the entire network; links e2,3 and e2,4 need to relay 3/7 of the traffic in the network; links e3,5 , e3,6 , e4,7 and e4,8 only need to relay the traffic from one sensor node. By comparing the values of MLB in Table 1 with the actual traffic distribution on each link, the rationality of MLB in single-sink WSNs can be verified. 5

6

7

8 5

3

6

7

8

4

2

1

3

4

1

2

Figure 7: An example of a single-sink hierarchical topology.

Fig.8 shows an example of a multi-sink hierarchical topology. In this topology, nodes 1 and 2 are sink nodes and all other sensor nodes need to transmit data to the sink node closest to 7

Table 1: MNB of each node in the single-sink hierarchical WSN

6

7

8

Nodes MNB 2 1 3,4 0.428 5,6,7,8 0.143

Links e1,2 e2,3 ,e2,4 e3,5 ,e3,6 ,e4,7 ,e4,8

5 3

7

6

MLB 1 0.428 0.143

8

4

2

1

3

4

1

2

Figure 8: An example of a multi-sink hierarchical topology.

them. We can clearly obtain that nodes 3 and 4 relay the traffic from three nodes (including their own traffic) respectively; nodes 5∼8 only relay their self-generated traffic; links e1,3 and e2,4 take the traffic from 3 sensor nodes; links e3,5 , e3,6 , e4,7 and e4,8 only take the traffic from one sensor node; there is no traffic exchange between node 3 and node 4, so link e3,4 takes no load. Table 2 shows the MNB and MLB of each node and each link in this topology. By comparing the values in Table 2 with the actual traffic distribution, the rationality of MLB and MNB in multi-sink WSNs is verified. Table 2: MNB of each node in the multi-sink hierarchical WSN

Nodes MNB 3,4 0.5 5,6,7,8 0.167

Links e1,3 , e2,4 e3,4 e3,5 ,e3,6 ,e4,7 ,e4,8

MLB 0.5 0 0.167

In WSNs, according to the forwarding direction, message delivery can be divided into two modes: application communication and infrastructure communication[24, 25]. The application communication mode mainly relates to the sensing data transferred from general sensor nodes to sink nodes. The application communication model mainly relates to the configuration and maintenance data transferred from sink nodes to general sensor nodes (i.e., routing set-up query). Since our proposed load metrics evaluate the load of nodes and links from the perspective of network topology, they are applicable to both of the above messaging modes. For example, in Fig.7 and Fig.8, we have verified the soundness and effectiveness of the proposed two load metrics in the application model. If we observe the load distribution of the topology shown in Fig.8 based on the infrastructure communication mode, we can obtain that: the message delivery from the sink node 1 to sensor nodes 5, 6 needs to go through sensor node 3 and link e13 ; the message delivery from sink node 2 to sensor nodes 7, 8 needs to go through node 4 and link e24 ; nodes 5, 6, 7 and 8 only need to take their own load. According to the results in Table 2, MNB and MLB perfectly characterize the above load distribution in the infrastructure mode. 3.2. Load and capacity Since the proposed load metrics MNB and MLB can perfectly reflect the network load distribution on each sensor node and each wireless link respectively, it is reasonable to use 8

MNB and MLB as inputs to define the load functions of nodes and links respectively. For this consideration, we define the load functions of node i and link ej,k at time t as Lj (t) = Dj (t)α ,

(4)

Lej,k (t) = Dej,k (t)α ,

(5)

where α≥0 is the load-exponential coefficient to adjust the network load distribution. In most of the existing cascading models for WSNs, the capacity of a sensor node is positively correlated with its initial load, but this assumption does not match the real situation. In actual WSNs, due to the large-scale deployment, the capacity of each sensor node cannot be customized according to their initial load. Therefore, in this model we define the capacity of each sensor node as P Lj (0) j∈Vs WN = (1 + β)LN (0) = (1 + β) , (6) Ng where β is the node-tolerance coefficient to indicate the capacity resources owned by each sensor node; LN (0) is the average of the node load in the initial network; Ng is the number of nodes in the network. Since in actual WSNs the transmission modules of sensor nodes are always the same, each node has the same capacity. WN can be regarded as the maximum load that can be transmitted by each node. When the current load of a sensor node is greater than its capacity, it will fail at the next moment. We also define the capacity of each wireless link as P Lej,k (0) ej,k ∈E

, (7) Ne where γ is the link-tolerance coefficient to indicate the capacity resources owned by each link; LE (0) is the average of the link load in the initial network; Ne is the number of links in the network. WE is the maximum load that each link can take. When the current load of a link is greater than its capacity, it will fail at the next moment. WE = (1 + γ)LE (0) = (1 + γ)

3.3. Cascading mechanism The initial load on all nodes and links in the network is less than their initial capacity. When a certain proportion of nodes or links are attacked, the network load distribution will be renewed, which may cause some nodes and links to fail due to overload. This cascading process will continue until no new nodes or links fail. In multi-sink WSNs, if a sensor node loses all the paths to sink nodes, it will fail from a functional point of view because it cannot continue to deliver messages to sink nodes. In this case, we consider this kind of nodes as isolated nodes. Fig.9 demonstrates an example of the cascading process in a multi-sink WSN. In this network, nodes 1 and 7 are sink nodes, and other nodes are general sensor nodes. We assume that the load-exponential coefficient α=1, the capacity of both nodes and links is 0.8. In Fig.9(a), all the nodes and links in the network are not overloaded. As is shown in Fig.9(b), when the link between node 6 and node 7 is attacked, the network load distribution will be renewed, where the load on node 6 drops and the load on nodes 2, 3, 4, 9, 10 rises. Since all the paths to the sink node 7 are destroyed, all traffic in the network has to go through node 2 and link e1,2 to reach the remaining sink node 1. At this point, the load on node 2 and link e1,2 will be updated to 1, which is greater than their capacity. Then, they will be overloaded, which means that the paths to the sink node 1 are also destroyed. In Fig.9(c), there will be a huge isolated component where nodes fail because they cannot establish a valid path to sink nodes. At this point, the entire network are paralyzed due to cascading failures. 9

LL33(0)=0.1875 (0)=0.1875 LL44(0)=0.125 (0)=0.125 LL5(0)=0.1875 5(0)=0.125 L3(0)=0.1875 L4(0)=0.125 L5(0)=0.125 3

1

33

44

55

4 5 LLee3,434(0)=0.0625 LeL5,6e56(0)=0.1875 (0)=0.0625 (0)=0.0625 LLee4,545(0)=0.0625 (0)=0.125 Le34(0)=0.0625 Le45(0)=0.0625 Le56(0)=0.125 LL22(0)=0.5 L6(0)=0.5 (0)=0.5 LLee2,323(0)=0.25 L6(0)=0.5 (0)=0.25 L2(0)=0.5 Le23(0)=0.25 L6(0)=0.5 66 77 11 22 6 7 2 L e 6,7(0)=0.5 Le67(0)=0.5 ee2,10 (0)=0.25 LLee1,212(0)=0.5 2,10(0)=0.25 (0)=0.5 Le2,10LL(0)=0.25 Le67(0)=0.5 Le12(0)=0.5 LLee9,109,10(0)=0.0625 (0)=0.0625 LLee8,989(0)=0.0625 (0)=0.0625 LeL6,8e68(0)=0.1875 (0)=0.125 Le9,1010(0)=0.0625 Le989(0)=0.0625 8 Le68(0)=0.125 10

10

9

9

8

8

LL10 (0)=0.1875 L9(0)=0.125 L8(0)=0.1875 10(0)=0.1875 L9(0)=0.125 L8(0)=0.1875 L10(0)=0.1875 L9(0)=0.125 L8(0)=0.1875

(a) LL33(0)=0.4375 (0)=0.4375 LL44(0)=0.3125 (0)=0.3125 LL5(0)=0.1875 5(0)=0.1875 L3(0)=0.4375 L4(0)=0.3125 L5(0)=0.1875 3 3

4 4

5

5

3 Le34(0)=0.3125 4 Le45(0)=0.1875 5 Node overload Le4,5(0)=0.1875 LeL56e(0)=0.125 Le3,4(0)=0.3125 5,6(0)=0.125 Node overload Le34(0)=0.3125 Le45(0)=0.1875 Le56(0)=0.125 Node overload L2(0)=1 Le23(0)=0.4375 L6(0)=0.125 L2(0)=1 Le2,3(0)=0.4375 LLink 6(0)=0.125 attack L2(0)=1 Le23(0)=0.4375 L6(0)=0.125 attack7 6 Link 1 2 Link attack

1

1

6

2

7

6 Le67(0)=0.125 7 2 Le2,10(0)=0.4375 Le12(0)=1 Le6,7(0)=0.125 Le1,2(0)=1 Le2,10(0)=0.4375 Le67(0)=0.125 Le12Link (0)=1 overloadLe2,10(0)=0.4375 Le9,10(0)=0.3125 Le89(0)=0.1875 Le68(0)=0.125 Link overload Le6,8(0)=0.125 Le9,10(0)=0.3125 Le8,9(0)=0.1875 Link overload Le9,1010(0)=0.3125 Le989(0)=0.1875 8 Le68(0)=0.125 10

10

9

9

8

8

L10(0)=0.4375 L9(0)=0.3125 L8(0)=0.1875 L10(0)=0.4375 L9(0)=0.3125 L8(0)=0.1875 L10(0)=0.4375 L9(0)=0.3125 L8(0)=0.1875

(b) Node overload Node overload Node overload L2(0)=1 1

1 1

3

3 3

L2(0)=1 L2(0)=1 2

4 4

5

5

5

Isolated component Isolated component Isolated component

2

2 Le12(0)=1 Le12overload (0)=1 Le12Link (0)=1

overload LinkLink overload

4

10 10 10

9

9 9

6

6

6

7

7

7

8

8

8

(c) Figure 9: An example of the cascading process in a multi-sink WSN.

10

4. Results and Analysis In this section, we first present two metrics to measure the cascading robustness of multi-sink WSNs. After that, we explore the impacts of modeling parameters on the cascading robustness of multi-sink WSNs. The simulation experiments are based on Matlab. We use the GUROBI optimization tool[26] to speed up the simulation process. 4.1. Performance metrics In most existing works[27, 28, 29], they used the relative size of the giant component after removing a certain number of nodes to measure the cascading robustness of the network. Although this metric is reasonable enough in peer-to-peer network systems, it is not suitable for WSNs. In WSNs, we are more concerned about the number of sensor nodes that can still communicate with sink nodes after attacks. Therefore, we present a new concept “effective component” consisting of nodes that can communicate with sink nodes. An example of the giant component and the effective component is shown in Fig.10. In this example, the giant component is made up of 12 sensor nodes that cannot communicate with sink nodes, while the effective component is made up of 7 sensor nodes that can have at least one path to sink nodes. Another disadvantage of the giant-component based robustness metric is that it can only reflect the network robustness under specific attack modes.

Effective component

Giant component

Sink node Sensor node Failed node Wireless link Failed link

Figure 10: An example of effective component and giant component in WSNs.

Therefore, in order to correctly reflect the cascading robustness of multi-sink WSNs, we design two new robustness metrics based on the effective component. One metric is to evaluate the cascading robustness of the network in the face of node failures, and the other metric is to evaluate the cascading robustness of the network in the face of link failures. In the cascading metric against node failures (CMNF), we first remove a node j from the initial network randomly and observe the size of the effective component Cj (i.e., the number of nodes in the effective component). In a similar way, we can get the size of the effective component after removing remaining nodes one by one. To quantify the network robustness of the whole network against node failures, we use the normalized size of the effective component, i.e., P Ck CN =

k∈Vg

Ng (Ng − 1)

,

(8)

which is the sum of the normalized effective components by removing each sensor node. It is easy to understand that CN = 0 indicates that any node failure can trigger the cascading process and paralyze the entire network. CN = 1 indicates that any node failure in the network will not trigger cascading failures. In the cascading metric against link failures (CMLF), we first remove a link ei,j from the initial network randomly and observe the size of the effective component Cei,j . In a similar 11

way, we can get the size of the effective component after removing remaining links one by one. To quantify the network robustness of the whole network against link failures, we adopt the normalized size of the effective component, i.e., P Cei,j CL =

ei,j ∈E

Ne (Ng − 1)

,

(9)

which is the sum of the normalized effective components by removing each wireless link. CL =0 means that any link failure can trigger the cascading process and paralyze the whole network, while CL =0 means that any link failure will not trigger cascading failures. 4.2. Multi-sink oriented characteristics In this part, we evaluate the multi-sink oriented characteristic of the proposed cascading model. As discussed in many literature works[30, 31], due to the sink-oriented characteristic of WSNs, sensor nodes near sink nodes will take heavier traffic load, resulting in faster energy deletion. This phenomenon is known as the “sink hole” effect. Therefore, the sink-oriented characteristic can be considered as one of the most important criteria for judging the soundness and reasonability of a cascading model of WSNs. In this part, we use the network topology referencing [18]. This topology consists of 300 randomly deployed nodes. The transmission radius of sensor nodes is set to 20m. A certain number of sink nodes will be deployed in the network. The network topology is shown in Fig.11. 200 180 160 140

y/m

120 100 80 60 40 20 0 0

20

40

60

80 100 120 140 160 180 200

x/m

Figure 11: Network topology consisting by 300 general sensor nodes.

Fig.12 demonstrates the load distributions under different number of sink nodes. As can be seen, the load in the area near sink nodes is significantly higher than that in other areas. The multi-sink oriented characteristic has been verified. Moreover, we can also easily observe that with the increase of the number of sink nodes in the network, the network load will become more balanced. The advantages of multi-sink WSNs are further verified. 4.3. Impacts of modeling parameters on cascading robustness As is shown in Fig.13, no matter when the network faces node attacks or link attacks, there is a critical threshold α∗ that can determine whether the network will have cascading failures. When α is less than or equal to α∗ , the network will not have cascading failures, and when α is greater than α∗ , the cascading failures can be triggered. Moreover, in the case that α is greater than α∗ , the cascading robustness of the network tends to decrease with the increase of α. This is because, as the only parameter to determine the exponential distribution of load, the 12

200

200

160

160

160

120

120

120

y/m

y/m

y/m

200

80

80

80

40

40

40

0

0

0

40

80

120

160

0

200

40

80

120

160

0

200

0

(a) Ns =1

(b) Ns =2

160

160

160

120

120

120

80

80

80

40

40

40

0

80

120

160

200

160

200

y/m

y/m

y/m

200

0

120

(c) Ns =3

200

40

80

x/m

200

0

40

x/m

x/m

0

40

80

120

160

200

0 0

40

80

x/m

x/m

(d) Ns =4

120

160

200

x/m

(e) Ns =5

(f) Ns =6

Figure 12: Network load distributions under different number of sink nodes Ns .

1

1

*(=0.5,=0.5) *(=0.5,=1) *(=1,=1)

*(=1.5,=1)

CMLF

CMNF

0.8 0.6 0.4

=0.5,=0.5 =0.5,=1 =1,=1 =1.5,=1

0.9

0.8

*(=0.5,=0.5) *(=0.5,=) *(=,=) *(=,=)

=0.5,=0.5 =0.5,=1 =1,=1 =1.5,=1

0.7 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2

0.2 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2



 (a) CMNF

(b) CMLF

Figure 13: CMNF and CMLF with varying α, β and γ.

13

increase of α will make the network load distribution more uneven, and then increase the risk of cascading failures. In addition, we can also observe that the increase of [β,γ] can significantly improve the cascading robustness of the network. This improvement is mainly reflected in two aspects: (1) under the same setting of α, the increase of [β,γ] can significantly improve CMNF and CMLF, indicating that the damage of cascading failures to the network will also decline; (2) the critical threshold α∗ will increase with the increase of [β,γ], which means that the risk of cascading failures will be reduced.

CMNF

0.8

1

*(=) *(=)

*(=) *(=) *(=)

Curves coincide

0.9

Curves coincide *(=)

0.6

CMLF

1

*  (=)

=0.5 =1 =1.5 =2

0.4

0.8 *(=)

0.7

=0.5 =1 =1.5 =2

0.6

0.5 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9

0.2 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9





(a) CMNF

(b) CMLF

Figure 14: CMNF and CMLF with varying β and γ (α=2).

Fig.14 demonstrates the cascading robustness with varying β and γ. As can be seen, as a key parameter for adjusting the node capacity, the rise of β can significantly improve the cascading robustness of the network. Taking CMNF as an example, in the case of β=0.5 and γ=2, the CMNF is 0.21, which means that there is a high possibility of cascading failures. When γ stays the same and β rises to 2, the CMNF is 0.64, which means that the risk and damage of cascading failures are greatly reduced. In addition, we also observe that there is a critical threshold β ∗ . When β is less than β ∗ , the increase of β is helpful to the cascading robustness of the network. When β is greater than or equal to β ∗ , the lifting effect of node capacity expansion is saturated. This result tells us an important fact: excessive capacity expansion for sensor nodes will not bring about an improvement in the cascading robustness of the network, but it will lead to an increase in network costs. Fig.15 shows the comparison results of CMNF and CMLF with varying β and γ. We can clearly find that compared with node attacks, the network demonstrates stronger cascading robustness against link attacks. For example, in the case of β=0.5 and γ=0.5, the CMNF is 0.21 and the CMLF is 0.59. These results clearly tell us that in this case, the network is prone to large-scale cascading failures when facing node attacks, while more than half of the nodes in the network can function normally when facing link attacks. This is because, compared with deleting links, the disturbance caused by deleting nodes to the network load will be more severe, which in turn will be more likely to cause cascading failures. As is shown in Fig.16, as the only parameter to determine the link capacity, the rise of γ can help the network obtain better cascading robustness. Taking CMNF as an example, in the case of β=0.5 and γ=0.5, the CMNF is 0.25. When β=0.5 remains unchanged and γ rises to 2, the CMNF is 0.46. Through the above results, the suppression effect of link capacity expansion on cascading failures is verified. Moreover, we can also observe a critical threshold γ ∗ . When γ is greater than or equal to γ ∗ , the lifting effect of link capacity expansion on cascading robustness is saturated. Fig.17 shows the comparison results of CMNF and CMLF with varying γ. Under the same setting of γ, the obtained CMLF is always greater than the CMNF. From the perspective of 14

1

CMNF CMLF

Network Robustness

Network Robustness NetworkRobustness

0.8 0.8 0.7 0.7 0.6 0.6 0.5 0.5 0.4 0.4 0.3 0.3

CMNF CMLF

0.8 0.6 0.4 0.2

0.2 0.2 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9

0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9

-

-

(a) γ=0.5 1

CMNF CMLF

Network Robustness

Network Robustness

1

(b) γ=1

0.8

0.6

0.4

CMNF CMLF

0.8

0.6

0.4

0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9

0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9

-

.5 1.7 1.9

-

(c) γ=1.5

(d) γ=2

Figure 15: Comparison results of CMNF and CMLF with varying β and γ (α = 2).

CMNF

0.8

 *(=2)

1 0.9

 *(=1.5)

CMLF

1

0.6  *(=1)

0.4  *(=0.5)

*(=2)

*(=1.5)

0.8 *(=1)

0.7

=0.5 =1 =1.5 =2

0.6

=0.5 =1 =1.5 =2

*(=0.5)

0.5 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9

0.2 0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9





(a) CMNF

(b) CMLF

Figure 16: CMNF and CMLF with varying γ and β (α=2).

15

0.9 CMNF CMLF

Network Robustness

Network Robustness

0.8 0.6 0.4 0.2

0.7 0.6 0.5 0.4

0

0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9

0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9

.

.

(a) β=0.5

(b) β=1

1

1

Network Robustness

Network Robustness

CMNF CMLF

0.8

CMNF CMLF

0.9 0.8 0.7 0.6

CMNF CMLF

0.9 0.8 0.7 0.6

0.5

0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9

0.5 0.7 0.9 1.1 1.3 1.5 1.7 1.9

.

.

(c) β=1.5

(d) β=2

Figure 17: Comparison results of CMNF and CMLF with varying γ and β (α=2).

cascading failures, the conclusion that link attacks are less harmful to the network has been further verified. 4.4. Critical thresholds β ∗ and γ ∗ According to the obtained results from Section 4.3, there is a critical threshold β ∗ . When β is greater than or equal to β ∗ , the lifting effect of node capacity expansion on cascading robustness will be saturated. Similarly, we can also find the critical threshold γ ∗ for link capacity expansion. It is easy to understand that the critical thresholds β ∗ and γ ∗ are important references to guide users to optimize network capacity, so we will focus on them in this subsection. Fig.18 presents the heatmaps of CMNF and CMLF within the parameter space [β,γ]. In both heatmaps, we can easily observe that the critical thresholds β ∗ and γ ∗ divide the heapmap into four zones: sensitive zone, link tolerance zone, node tolerance zone and safety zone. When the capacity parameters [β,γ] fall into the sensitive zone, the cascading robustness of the network (i.e., CMNF and CMLF) varies according to the settings of [β,γ]. In the link tolerance zone, the cascading robustness is only sensitive to the changes of β, which means that adjusting link capacity has no effect. In the node tolerance zone, the cascading robustness can only respond to the changes of γ, indicating that the expansion of node capacity cannot help the network resist cascading failures. In the case that [β,γ] is within the safety zone, the cascading robustness reaches the maximum value of 1, which means that cascading failures will not occur. In the study of cascading failures, we not only focus on how to reduce the damage caused by cascading failures, but also on how to configure the network so that cascading failures do not occur. Apparently, the safety zone is exactly what we need to focus on. The larger the safety zone, the lower the costs of capacity expansion to prevent cascading failures on the network. By comparing the size of the safety zones of CMNF and CMLF, we can clearly find that the network needs more capacity to ensure no cascading failures when facing node attacks. 16

Link Tolerance Zone

Safety Zone CMNF

CMLF

1

2

0.9 0.8

1.5

0.7 0.6

1

0.5 0.4 0.5 0.5

1

1.5

Sensitive Zone

2

Node Tolerance Zone

(a) CMNF

(b) CMLF

Figure 18: Heatmaps of CMNF and CMLF within the parameter space [β,γ] (α=2).

Fig.19 shows the critical thresholds β ∗ and γ ∗ with varying α. We can easily observe that β ∗ and γ ∗ will increase as α rises. This result tells us an important fact that the increase of α will not only increase the risk of cascading failures, but also increase the costs of capacity expansion to prevent cascading failures. In addition, we can also obtain that β ∗ is always greater than γ ∗ . This result shows that the node capacity is the key to determine whether the cascading failures occur. Therefore, when configuring the capacity resources, more resources should be provide for sensor nodes.

1

0.5

-*

1

0 1.5

1.5

1

1

0.5

0.5

1

2

1.5

1.5

.*

-*

1.5

0 0.5

2

2

0 0.5

2

.*

2

0.5 0 1

1.5

,

,

(a) CMNF

(b) CMLF

2

Figure 19: Critical thresholds β ∗ and γ ∗ with varying α.

Fig.20, Fig.21 and Fig.22 present the heatmaps of CMNF and CMLF with varying α. By comparison, we can clearly find that with the increase of α, the size of safety zones become smaller. The impacts of α on the costs of capacity expansion is further verified. By comparing the size of the safety zones of CMNF and CMLF under the same parameter setting, the conclusion that node attacks are more likely to cause cascading failures and require higher network maintenance costs is further verified. 4.5. Number of sink nodes In this subsection, we evaluate the number of sink nodes on the cascading robustness of the network. To give a comprehensive evaluation, we design four cases of parameter settings, as shown in Table.3. Fig.23 shows the CMNF and CMLF with varying number of sink nodes under different cases. We can easily obtain that the increase in the number of sink nodes in the network can significantly improve the cascading robustness of the network. In the case of CMNF, when only 17

Safety Zone CMNF

2

Safety Zone

CMLF 1

2

1

0.9 0.8

1.5

1.5

0.8 0.7





0.6

1

1

0.6

0.4

0.5

0.5

0.5

0.4

0.2

0.3

0 0

0.5

1

1.5

0

2

0

0.5

1

1.5





(a) CMNF

(b) CMLF

2

Figure 20: Heatmaps of CMNF and CMLF within the parameter space [β,γ] (α=1.5). Safety Zone

2

CMNF 1

Safety Zone

CMLF 1

2

0.9

1.5

0.8

1

0.6

0.5

0.4

1.5





0.8

1

0.7 0.6

0.5 0.5

0.2

0 0

0.5

1

1.5

0

2

0

0.5

1

1.5





(a) Ns =1

(b) Ns =2

2

Figure 21: Heatmaps of CMNF and CMLF within the parameter space [β,γ] (α=1). Safety Zone

2

CMNF 1

1.5

0.96

0.8

1





1 0.98

0.9

1.5

CMLF

Safety Zone

2

0.94

1

0.92

0.7

0.5

0.5

0.9

0.6

0.88

0 0

0.5

1

1.5

0

2

0

0.5

1



1.5

2



(a) Ns =1

(b) Ns =2

Figure 22: Heatmaps of CMNF and CMLF within the parameter space [β,γ] (α=0.5). Table 3: Cases of Parameter Settings

Cases

Load-exponential coefficient α

Link-tolerance coefficient β

Node-tolerance coefficient γ

1 2 3 4

0.5 1 1.5 2

0.5 0.5 1 1

0.5 1 0.5 1

18

one sink node is deployed, the CMNF is 0.16, which means that the network is very easy to be completely paralyzed due to cascading failures. In contrast, when the number of sink nodes increases to 5, the CMNF rises to 0.96, indicating that the cascading robustness of the network has been greatly improved and most of cascading failures can be resisted. This is because the increase of the number of sink nodes can contribute to the network load balancing and further reduces the risk and damage of cascading failures. 1

1 1

0.8

0.6 Case 1 Case 2 Case 3 Case 4

0.4 0.2 2

3

4

Case 1 Case 2 Case 3 Case 4

0.4

0 1

0.8 0.6

CMNF

CMLF

CMNF

0.8

0.2

5

1

2

Ns

3

4

5

Ns

(a) CMNF

0.6 0.4 0.2 0 1

(b) CMLF

Figure 23: CMNF and CMLF with varying number of sink nodes Ns under different cases.

Fig.24 depicts the critical thresholds β ∗ and γ ∗ of CMNF with varying number of sink nodes. As can be seen, β ∗ and γ ∗ tend to decrease as more sink nodes are introduced into the network. As discussed in Section 4.4, the critical thresholds β ∗ and γ ∗ can indicate the costs of capacity expansion required for preventing cascading failures. Therefore, we can easily conclude that the increase in the number of sink nodes can reduce the risk of cascading failures, and can also reduce the expansion costs to resist cascading failures. From Fig.25, we can come to a similar conclusion. Although more sink nodes will lead to an increase in the network hardware costs, we consider it worthwhile because of its significant effects on cascading robustness. 2 1.5

,=0.5 ,=1 ,=1.5 ,=2

1

,=0.5 ,=1 ,=1.5 ,=2

1

.*

1.5

-*

-*

1.5

2

1

0.5 0.5

0.5

0 1

0 2 1

3 2

Ns

4 3

5 4

0

5

1

Ns

2

3

4

5

Ns

(a) β ∗

(b) γ ∗

Figure 24: Critical thresholds β ∗ and γ ∗ of CMNF with varying number of sink nodes Ns and α.

4.6. Cascading process under multi-node attacks and multi-link attacks According to the proposed CMNF and CMLF, we can only evaluate the cascading robustness of the network when facing single-node attack or single-link attack. In practical scenarios, in addition to the above two attack schemes, multi-node attacks and multi-link attacks are also very common. In this subsection, we evaluate the cascading robustness of the network when 19

2

2

1.5 ,=0.5 ,=1 ,=1.5 ,=2

1

.*

-*

1.5

,=0.5 ,=1 ,=1.5 ,=2

1

0.5

0.5 0

5

1

2 2

3 3

4

Ns4

0

5

1

2

3

5

4

5

Ns

Ns (a) β ∗

(b) γ ∗

Figure 25: Critical thresholds β ∗ and γ ∗ of CMLF with varying number of sink nodes Ns and α.

facing these two attacks. Consistent with most of the existing literature[32, 33, 34], we choose the intentional attack mode (i.e., select a fixed proportion of nodes from high to low importance to attack). In this work, the attack proportion is set to 5% and the importance of nodes and links are determined by their multi-oriented betweenness values (i.e., MNB and MLB). We use the survival ratio Ps (t) (i.e., the proportion of nodes in the network that can still work normally at time t) to observe the cascading process. We use Ps (∞) to denote the final survival ratio (i.e., the proportion of surviving nodes after the cascading process stops). Moreover, we also explore the impacts of network size (i.e., number of sensor nodes in the network) on cascading robustness. 1

1 Case 1 Case 2 Case 3 Case 4

0.6

Case 1 Case 2 Case 3 Case 4

0.8

Ps(t)

0.8

Ps(t)

4

0.6 0.4

0.4

0.2

0.2 0

1

2

3

4

5

6

7

8

9 10

0

1

2

3

4

5

6

7

8

9 10

t

t (a) Multi-node attacks

(b) Multi-link attacks

Figure 26: Cascading process under multi-node attacks and multi-link attacks.

Fig.26 depicts the cascading process under multi-node attacks and multi-link attacks. As can be seen, in Case 1, the network has the strongest cascading robustness, and its cascading process stops at t=3. In contrast, the cascading robustness of Case 4 is the worst and its cascading process does not stop until t=7. We can easily conclude that the duration of cascading process is positively related to the scale of cascading failures. This result reminds us that the larger the cascading failure scale is, the longer the failure-spreading process will take, which also provides us with more time to adjust the network to further prevent cascading failures. Moreover, in the cascading process, although the changes in network load will affect the energy consumption of sensor nodes, the impacts of energy consumption on the network can be ignored when compared with the immediate failures of nodes or links caused by overload. Fig.27 shows the final survival ratio with varying network size under multi-node attacks and multi-link attacks. We can easily obtain that with the expansion of network size, the 20

Ps(1)

0.5 0.5

Case 1 Case 2 Case 3 Case 4

PS(1)

0.4 0.4 0.3

Case 1 Case 2 Case 3 Case 4

0.7

Ps(1)

0.6 0.6

0.3

0.6 0.5 0.4

0.2 0.2

0.1 300 350 400 450 500 0.1 300 350 N 400 450 500

N (a) Multi-node attacks

0.3 300

350

400

450

500

N

(b) Multi-link attacks

Figure 27: Survival ratio with varying network size under multi-node attacks and multi-link attacks.

final survival ratio Ps (∞) has a slight decline. Our analysis is that although the expansion of network size will increase the network load, the network connectivity will also be improved in this process and contribute to the network load balancing. Through the interaction of the positive and negative aspects above, the cascading robustness of the network will not decline dramatically. 5. Conclusions and Future Work Cascading failures are one of the main factors affecting the actual performance of multi-sink WSNs, which makes cascading robustness become a hot research topic in current research. Existing cascading models fail to properly reflect the cascading process of WSNs. On the one hand, these models cannot properly characterize the load distribution of multi-sink WSNs. On the other hand, they only consider the network cascading process as a load redistribution process caused by node overload, which ignore the impacts of link overload. Therefore, this paper proposes a more realistic cascading model for multi-sink WSNs. In our model, the cascading process of the network is jointly promoted by node overload events and link overload events, which can better reflect the cascading characteristics of multi-sink WSNs in practical scenarios. In addition, we focus on the cascading robustness of the network in the face of node attacks and link attacks. We have obtained some meaningful results, which can provide theoretical guidance for the establishment of networks with higher cascading robustness: 1) There are critical thresholds β ∗ and γ ∗ for node capacity and link capacity. Excessive capacity expansion will not lead to the improvement of network cascading robustness, but will lead to the increase of network costs; 2) There is a critical threshold γ ∗ for network load distribution. To reduce the risk of cascading failures, the network load should be balanced as much as possible; 3) Node attacks are more likely to trigger cascading failures than link attacks. To prevent cascading failures, node capacity expansion should be given more priority. In the future, we will focus on the optimization of cascading robustness. We believe that there are two aspects worth trying: 1) we can optimize the layout of multiple sink nodes to make the network more load balanced and reduce the risk of cascading failures. How to determine a reasonable number of sink nodes and how to evaluate the load balance of the network will be the key to this solution; 2) we can also introduce mobile sink nodes to help multi-sink WSNs resist cascading failures. If there is an overload risk in an area of the network, the mobile sink nodes can move to that area to reduce the risk by alleviating the load. The key to this solution is how to determine the high-risk area and how to schedule the trajectory of mobile sink nodes reasonably. 21

Acknowledgement This work is supported by the National Natural Science Foundation of China (NSFC) under Grant No.61902238, and Science and the Technology Commission of Shanghai Municipality under Grant No.18510745100. Declaration of Interest The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. Author Statement Xiuwen Fu Conceptualization, Methodology, Software , Data curation, Writing Original draft preparation , Visualization, Investigation. Yongsheng Yang : Writing Reviewing and Editing , Supervision References [1] S. Chakraborty, N. Goyal, S. Mahapatra, and S. Soh, “A Monte-Carlo Markov chain approach for coverage-area reliability of mobile wireless sensor networks with multistate nodes,” Reliability Engineering & System Safety, vol. 193, p. 106662, 2020. [2] S. Xiang and J. Yang, “Performance reliability evaluation for mobile ad hoc networks,” Reliability Engineering & System Safety, vol. 169, pp. 32–39, 2018. [3] Y. Mo, L. Xing, W. Guo, S. Cai, Z. Zhang, and J. H. Jiang, “Reliability analysis of IoT networks with community structures,” IEEE Transactions on Network Science and Engineering, pp. 1–1, 2018. [4] X. Fu, G. Fortino, W. Li, P. Pace, and Y. Yang, “Wsns-assisted opportunistic network for low-latency message forwarding in sparse settings,” Future Generation Computer Systems, vol. 91, pp. 223–237, 2019. [5] H. Barani, Y. Jaradat, H. Huang, Z. Li, and S. Misra, “Effect of sink location and redundancy on multi-sink wireless sensor networks: a capacity and delay analysis,” IET Communications, vol. 12, no. 8, pp. 941–947, 2018. [6] X. Fu, G. Fortino, P. Pace, G. Aloi, and W. Li, “Environment-fusion multipath routing protocol for wireless sensor networks,” Information Fusion, vol. 53, pp. 4–19, 2020. [7] C. Wang, L. Xing, A. E. Zonouz, V. M. Vokkarane, and Y. Sun, “Communication reliability analysis of wireless sensor networks using phased-mission model,” Quality and Reliability Engineering International, vol. 33, no. 4, pp. 823–837, 2017. [8] X. Fu, H. Yao, and Y. Yang, “Modeling and analyzing cascading dynamics of the clustered wireless sensor network,” Reliability Engineering & System Safety, vol. 186, pp. 1–10, 2019. [9] Y. D. Beyene, R. Jantti, O. Tirkkonen, K. Ruttik, S. Iraji, A. Larmo, T. Tirronen, and J. Torsner, “NB-IoT technology overview and experience from cloud-RAN implementation,” IEEE Wireless Communications, vol. 24, no. 3, pp. 26–32, 2017. [10] L. Feltrin, G. Tsoukaneri, M. Condoluci, C. Buratti, T. Mahmoodi, M. Dohler, and R. Verdone, “Narrowband IoT: A survey on downlink and uplink perspectives,” IEEE Wireless Communications, vol. 26, no. 1, pp. 78–86, 2019. 22

[11] C. Wang, L. Xing, V. M. Vokkarane, and Y. L. Sun, “Infrastructure communication sensitivity analysis of wireless sensor networks,” Quality and Reliability Engineering International, vol. 32, no. 2, pp. 581–594, 2016. [12] Y. Wang, L. Xing, and L. Mandava, “Probabilistic competing failure analysis in multistate wireless sensor networks,” in 2018 Annual Reliability and Maintainability Symposium (RAMS). IEEE, 2018, pp. 1–7. [13] H. Liu, L. Zhao, R. Yin, X. Hao, Y. Li, and B. Liu, “A metric of topology fault-tolerance based on cascading failures for wireless sensor networks,” Journal of Information & Computational Science, vol. 8, no. 14, pp. 3227–3237, 2011. [14] R. Yin, B. Liu, H. Liu, and Y. Li, “The critical load of scale-free fault-tolerant topology in wireless sensor networks for cascading failures,” Physica A: Statistical Mechanics and its Applications, vol. 409, pp. 8–16, 2014. [15] Z. Ye, T. Wen, Z. Liu, X. Song, and C. Fu, “Fault-tolerant scheme for cascading failure of scale-free wireless sensor networks,” in 2016 IEEE International Conference on Information and Automation (ICIA). IEEE, 2016, pp. 2006–2011. [16] X. Hu, W. Li, and X. Fu, “Analysis of cascading failure based on wireless sensor networks,” in 2015 IEEE International Conference on Systems, Man, and Cybernetics. IEEE, 2015, pp. 1279–1284. [17] X. Fu, Y. Yang, and O. Postolache, “Invulnerability of clustering wireless sensor networks against cascading failures,” IEEE Systems Journal, vol. 13, no. 2, pp. 1431–1442, 2018. [18] X. Fu, Y. Yang, and H. Yao, “Analysis on invulnerability of wireless sensor network towards cascading failures based on coupled map lattice,” Complexity, vol. 2018, no. 6386324, 2018. [19] L. Mottola and G. P. Picco, “MUSTER: a daptive energy-aware multisink routing in wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 10, no. 12, pp. 1694–1709, 2010. [20] P. Huang, H. Chen, G. Xing, and Y. Tan, “SGF: a state-free gradient-based forwarding protocol for wireless sensor networks,” ACM Transactions on Sensor Networks (TOSN), vol. 5, no. 2, p. 14, 2009. [21] X. Fu, H. Yao, O. Postolache, and Y. Yang, “Message forwarding for WSN-assisted opportunistic network in disaster scenarios,” Journal of Network and Computer Applications, vol. 137, pp. 11–24, 2019. [22] J. Ren, Y. Zhang, K. Zhang, A. Liu, J. Chen, and X. S. Shen, “Lifetime and energy hole evolution analysis in data-gathering wireless sensor networks,” IEEE transactions on industrial informatics, vol. 12, no. 2, pp. 788–800, 2015. [23] J. Hu, J. Luo, Y. Zheng, and K. Li, “Graphene-grid deployment in energy harvesting cooperative wireless sensor networks for green IoT,” IEEE Transactions on Industrial Informatics, vol. 15, no. 3, pp. 1820–1829, 2018. [24] A. Shrestha, X. Liudong, and H. Liu, “Modeling and evaluating the reliability of wireless sensor networks,” in 2007 Annual Reliability and Maintainability Symposium. IEEE, 2007, pp. 186–191.

23

[25] A. Shrestha and L. Xing, “Quantifying application communication reliability of wireless sensor networks,” International Journal of Performability Engineering, vol. 4, no. 1, pp. 43–56, 2008. [26] I. Gurobi Optimization, “Gurobi optimizer reference manual,” URL http://www. gurobi. com, 2015. [27] Z. Yang and J. Liu, “Robustness of scale-free networks with various parameters against cascading failures,” Physica A: Statistical Mechanics and its Applications, vol. 492, pp. 628–638, 2018. [28] R. Ghanbari, M. Jalili, and X. Yu, “Correlation of cascade failures and centrality measures in complex networks,” Future Generation Computer Systems, vol. 83, pp. 390–400, 2018. [29] X. Wei, S. Gao, T. Huang, E. Bompard, R. Pi, and T. Wang, “Complex network-based sascading faults graph for the analysis of transmission network vulnerability,” IEEE Transactions on Industrial Informatics, vol. 15, no. 3, pp. 1265–1276, 2018. [30] X. Wu, G. Chen, and S. K. Das, “Avoiding energy holes in wireless sensor networks with nonuniform node distribution,” IEEE Transactions on parallel and distributed systems, vol. 19, no. 5, pp. 710–720, 2008. [31] K. L. Prabha and S. Selvan, “Energy efficient energy hole repelling (EEEHR) algorithm for delay tolerant wireless sensor network,” Wireless Personal Communications, vol. 101, no. 3, pp. 1395–1409, 2018. [32] Y. Cai, Y. Cao, Y. Li, T. Huang, and B. Zhou, “Cascading failure analysis considering interaction between power grids and communication networks,” IEEE Transactions on Smart Grid, vol. 7, no. 1, pp. 530–538, 2015. [33] L. Liu, K. Meng, and Z. Dong, “Robustness of networks formed from interdependent correlated networks under intentional attacks,” Physica A: Statistical Mechanics and its Applications, vol. 491, pp. 329–339, 2018. [34] Z. Chen, W. Du, X. Cao, and X. Zhou, “Cascading failure of interdependent networks with different coupling preference under targeted attack,” Chaos, Solitons & Fractals, vol. 80, pp. 7–12, 2015.

24