Abstract
The Internet of Things (IoT) devices have limited resources and are vulnerable to attacks, so optimizing their network topology to resist random failures and malicious attacks has become a key issue. The scale-free network model has strong resistance to random attacks, but it is very vulnerable to malicious attacks. The existing studies mostly adopt heuristic algorithms to optimize the ability of scale-free networks to resist malicious attacks, but their high computational cost cannot meet the timeliness requirements of the real IoT. Therefore, this paper proposes an intelligent topology robustness optimization model based on a graph convolutional network (ROGCN). The model extracts the onion-like structural features of the highly robust network topology from the data set through supervised learning, and on this basis, different search strategies are designed to meet the needs of different IoT scenarios. The extensive experimental results demonstrate that ROGCN can more effectively improve the robustness of scale-free IoT networks against malicious attacks compared to two existing heuristic algorithms, with a lower computational cost.
Keywords
Introduction
As a multidisciplinary fusion system, the Internet of Things (IoT) integrates the fifth-generation (5G) ultra-dense cellular system [1], heterogeneous ad hoc networks [2], wireless sensor networks [3], hybrid mobile networks, wireless fidelity networks, and data center networks [4]. The IoT is widely used in social life, industrial production, national defense construction and other areas [5]. However, due to the limited storage, computing, communication capabilities and energy of IoT devices, the application environment is complex and diverse, making these devices vulnerable to man-made attacks, natural damage, energy depletion and other problems [6], which breaks the connectivity of the IoT. The connectivity between IoT devices is the basis of communication. If devices are regarded as nodes and communication between devices as connecting edges, the IoT can be abstracted as a complex network topology, and corresponding random failures and malicious attacks are regarded as destruction of the network topology. Therefore, efficiently constructing a robust network topology has become a research focus in the field of the IoT.
As a classic model in complex network theory, the scale-free model is widely used in modeling the homogeneous network topology of various real systems [7, 8]. This research is aimed at the homogeneous IoT; that is, the device nodes have similar communication ranges and bandwidths, so the scale-free network is used for network topology modeling of the IoT. The degree distribution of the scale-free network follows a power-law distribution, which makes it highly resistant to random attacks but very vulnerable to malicious attacks [9, 10]. Therefore, this paper aims to optimize the ability of the scale-free IoT to resist malicious attacks while ensuring strong robustness against random failures.
Robustness optimization of scale-free IoT topology under malicious attacks is an NP-hard problem [11]. Heuristic algorithms are widely used to solve this problem and have achieved good results, such as the hill climbing algorithm (HCA) [12], simulated annealing algorithm (SAA) [13], memetic algorithm (MA) [14] and genetic algorithm (GA) [15, 16]. The empirical results of heuristic algorithms confirm that the optimized highly robust network topology has an onion-like structure, which is characterized by nodes with a large degree located in the center of the topology surrounded by nodes with a gradually decreasing degree, and in which nodes with a similar degree tend to connect, showing an onion-like hierarchical structure. Tanizawa et al. [17] chose the onion-like structure of the interconnected random regular graph and proved its robustness against malicious attacks through rigorous mathematical theoretical analysis. The above theoretical and empirical studies show that there is a certain evolution pattern from the initial topology to a highly robust optimization topology. However, the evolution of heuristic algorithms from the initial topology to a highly robust optimization topology involves many edge selection, edge swapping, and robustness value calculation operations, which leads to a high time cost and cannot meet the needs of IoT topology optimization in low-latency scenarios. In addition, heuristic algorithms easily fall into the local optimum solution, their optimization effect decreases with increasing network size, and the scalability of the algorithm needs to be improved. Based on the above analysis, this paper introduces the deep learning method to learn the evolution pattern from the initial topology to the target topology to reduce the time cost and improve the scalability of the robust optimization method.
The IoT network topology, as a kind of graph structure data, is different from Euclidean structure data [18] such as images and voices and cannot be directly used as the input of classic deep learning models. A graph neural network is an end-to-end deep learning model designed specifically for graph structure data [19, 20], which is different from classic neural networks and has adaptability to graph structure data. Therefore, this paper transforms the topology robustness optimization problem into an evolution pattern problem of adding and deleting connected edges between the initial topology and the target topology with high robustness by learning the graph neural network. That is, according to the initial topology, we extract all node features and comprehensively calculate the edge features between nodes, obtain the probability of each edge in the target topology based on the edge features, and determine the target topology.
The introduction of graph neural networks to solve the topology robustness optimization problem faces the following difficulties: one is how to design the corresponding graph neural network input for the topology robustness optimization problem, which is crucial to the learning of evolutionary patterns. Considering that the onion-like structure of highly robust topology has a strong correlation with the degree difference between nodes, the traditional definition of degree difference is directly introduced into the model, which has a slow convergence speed. Therefore, a new degree difference representation method is proposed as the edge feature input of the graph neural network. The second difficulty is based on the constraint that the number of nodes and edges of the target topology should be consistent with the initial topology, and it concerns how to obtain the target topology according to the connected edge probability of the output of the graph neural network. Considering that different IoT scenarios have different requirements for the topology robustness optimization effect and timeliness, different search strategies are proposed to achieve the goal from the edge probability to the target topology.
The main contributions of this paper are as follows:
To the best of our knowledge, a graph convolutional network is applied to the robustness optimization problem of IoT topology for the first time. For the topology robustness optimization problem, a new degree difference representation method is proposed to accelerate the convergence of the graph convolutional network model. This paper proposes three different search strategies to suit the needs of different IoT scenarios.
The rest of this paper is organized as follows: In Section 2, we review the background and related work. In Section 3, we present the new degree difference representation method and propose our algorithm. In Section 4, we present the performance evaluation results. Finally, Section 5 concludes this paper.
Scale-free IoT topology generation
The scale-free property means that a small number of nodes in the network have a large number of connections, while most nodes have only a few connections, which is shown in the power-law distribution of node degrees [21, 22]. To explain the mechanism of this phenomenon, Barabási and Albert [23] proposed the classic Barabási-Albert (BA) model for constructing a scale-free network topology. However, due to the limited communication range and energy of IoT devices, nodes can only connect to neighboring nodes, and the maximum number of connections that can be connected is limited [24]. Based on this constraint, Qiu et al. [25] improved the traditional BA model and proposed a scale-free IoT topology construction method. The process is as follows: first, all nodes are placed in the communication area, and then, beginning from the starting node of the topology center, connections are established between the nodes in sequence, where a newly added node selects neighbors according to the degrees of the other nodes in the communication range, and tend to connect the nodes with larger degrees and not reaching the maximum degree limit. The process is implemented through a roulette mechanism.
Types of cyber-attacks
The main dangers facing IoT topology can be divided into random attacks and malicious attacks. Random attacks include random equipment failure, natural disasters and equal probability attacks, while malicious attacks include intrusion attacks, terrorist attacks and energy depletion [26]. Corresponding to the attack method in complex network theory, a random attack randomly selects any node in the network to attack, and all nodes are attacked with the same probability; a malicious attack refers to the targeted selection of the most important node in the network to attack. Its purpose is to cause the greatest damage to the network with the least attack cost. In this paper, a high-degree adaptive (HDA) attack strategy [27] is used to simulate real malicious attacks on the IoT topology. Each time the node with the largest degree of the current network is selected for attack, the node and its connected edges are deleted.
Robustness metric
Based on percolation theory [28] and statistical methods, Schneider et al. [29] proposed a network topology robustness metric
where
In recent years, significant progress has been made in the research of robustness enhancement strategies for scale-free networks under malicious attacks. Herrmann et al. [12] proposed an HCA based on a random swapping edge strategy. The algorithm is simple and effective, but it easily falls into a local optimal solution. Buesser et al. [13] proposed a probabilistic edge swapping strategy based on an SAA, which solves the problem of the HCA easily falling into a local optimum but performs redundant edge swapping operations and R value calculations in a larger solution space, resulting in higher calculation costs. Zhou et al. [14] proposed an MA by combining the global search capability of the population and the local heuristic search capability of the individual. Rong et al. [30] analyzed the types of edges that affect the size of the largest connected subgraph and proposed a heuristic algorithm based on edge classification, which to some extent solves the problem of a poor optimization effect when the network size is large. However, the MA and the edge classification algorithm do not consider the energy and communication range limitations of nodes, so they are not suitable for a scale-free IoT. Aiming at the problem that traditional genetic algorithms tend to fall into premature convergence [31], Qiu et al. [16, 32] proposed multiple-population genetic algorithms (MPGA) and adaptive robustness evolution algorithms (AREA), which can effectively enhance the robustness of scale-free IoT topology. However, with increasing network size, the computational efficiency of genetic algorithms decreases, and they cannot meet the low-latency requirements of the IoT. To avoid the above problems, this paper adopts another research idea, based on deep learning technology, to transform the topology robustness optimization problem into an evolution pattern problem from learning the initial topology to the highly robust target topology. Compared with traditional heuristic algorithms, this method has a lower computational cost and better scalability, and is suitable for different network sizes.
ROGCN model
Overview of ROGCN.
An overview of the ROGCN model proposed is shown in Fig. 1. The main process is as follows:
Given the initial scale-free IoT topology, based on the onion-like structural features of the evolution from the initial topology to the highly robust topology, the design new degree difference matrix as a priori knowledge to extract the onion-like evolution pattern of the network. The new degree difference matrix and adjacency matrix are used as the initial features of the network into the graph convolutional network. The feature representations of all nodes and edges are extracted through the designed multi-layer graph convolutional network layer, the final feature representations of all edges are input to the multi-layer perceptron layer, and the probability matrix of connected and unconnected edges in the predicted topology is output. The loss of the adjacency matrix between the prediction matrix and the label topology is calculated by using the weighted binary cross-entropy loss function. Then, the loss is minimized through gradient descent, and repeated iterations are used to complete the training of the model parameters. In the testing phase, considering the prerequisite constraints that the number of nodes and edges of the final predicted topology need to be consistent with the initial topology, and different IoT scenarios have different requirements for optimization effects and calculation costs, this paper designs different search strategies to convert the edge prediction probability matrix obtained by the model into the adjacency matrix of the final predicted topology.
The ROGCN is trained based on supervised learning, using the state-of-the-art AREA in topology robustness optimization as the label data.
The main feature of the onion-like structure is that nodes with similar degrees are connected together as much as possible; that is, the degree difference between the two nodes of each edge is as small as possible. In this way, when a node in the network fails, its connected nodes can replace its original function to the greatest extent, weakening the damage caused by malicious attacks [33]. Therefore, the onion-like structure has a strong correlation with the degree difference between nodes, and the degree difference can be used as the input of the graph convolutional network to learn the evolution pattern from the initial topology to the highly robust target topology. However, by using the traditional definition of degree difference as the input of the graph convolutional network, it is found that the convergence speed of the model is slow. To better represent the degree difference information between nodes and improve the convergence speed of the model, this paper proposes a new representation method for the degree difference between nodes, as shown in Eq. (2).
where
where
where
where
In this work, we leverage the graph convolutional network framework proposed by Bresson et al. [37, 38], as shown in Fig. 2. Let
where
Residual gated graph convolutional network.
where
As seen from the above section, the output of the graph convolutional network model is the probability
[b] Degree search
The algorithm is implemented in two stages. The first stage is to select nodes whose predicted topology is consistent with the initial topology degree. The connected edges of such nodes will be the final output; the corresponding position of the adjacency matrix is assigned as 1, and the corresponding degree is also modified (lines 4–13). The second stage selects edges according to the probability of edge existence in descending order. When the degrees of the nodes at both ends of the selected edge are greater than 0, the edge is determined as the final output, and the adjacency matrix and node degree are modified until the total number of edges in the predicted adjacency matrix is equal to the total number of edges in the initial topology when the search stops (lines 15–25).
[b] Robustness search
The algorithm is implemented in three stages. In the first stage, the nodes whose predicted topology is consistent with the initial topology degree are selected. The connecting edges of such nodes are retained and do not participate in subsequent edge deleting operations (lines 3–11). In the second stage, the edges are selected in ascending order according to the probability of edge existence. After the selected edges are deleted, if the network remains fully connected and the robustness value increases, the deletion of the edges is accepted; otherwise, it is rejected. This process repeats until the remaining connected edges in the predicted topology are equal to the number of initial topological edges (lines 12–23). If the number of predicted topological edges is still greater than that in the initial topology after the second stage, the third stage is executed. The difference between the third stage and the second stage is that the condition of edge deletion is relaxed. When the network remains fully connected and robustness does not decrease after an edge is deleted, edge deletion is accepted until the number of remaining connected edges in the predicted topology is equal to the number of edges in the initial topology (lines 24–26).
This section first introduces the data set, experimental environment and parameter settings. Then, we evaluate the convergence of the loss values of the model under the traditional and new degree difference representation, and we compare the effects, advantages and disadvantages of different search strategies and the topology changes before and after optimization. Second, we compare the connectivity of the scale-free topology optimized by the ROGCN, SAA and AREA algorithms under random attacks and malicious attacks, and we observe the robustness optimization effects of various algorithms under different numbers of nodes and edge densities. Finally, the optimization efficiency of the different algorithms is evaluated.
In addition, the experimental results in this section are the average of
Data sets
In this paper, the initial scale-free IoT topological data set is generated based on the method in [25], AREA is used to optimize the robustness of the initial topology data set, and the obtained optimized topology of the onion-like structure is used as the label data set. Specifically, the data set is
Parameter settings
This experiment is based on PyTorch 1.8.1 and Python 3.7. The initial scale-free IoT topology is constructed by randomly deploying
Parameter settings of ROGCN
Parameter settings of ROGCN
This section verifies the convergence ability of the ROGCN model under the traditional and new node degree difference representation based on the scale-free network topology with the number of nodes
The convergence of the ROGCN loss.
Comparison of the robustness optimization effects of three search strategies on scale-free IoT topologies with different network sizes.
This section compares the robustness of the three search strategies against malicious attacks under different network sizes. The number of scale-free IoT nodes
Comparison between the initial topology and optimized topology
This section compares the changes in the network topology before and after ROGCN optimization. The basic topological features of the data sets are shown in Table 2. |V| and |E| are the total numbers of nodes and edges, respectively.
Basic topological features of the data sets
Basic topological features of the data sets
To compare the changes in the network topology before and after the algorithm optimization more vividly, a scale-free IoT topology with
Comparison of the topology before and after optimization.
Comparison of the connectivity of scale-free IoT topologies optimized by different algorithms under random attacks.
This section compares the connectivity of network topologies optimized by different algorithms under random and malicious attacks. The experiment is based on a scale-free IoT topology with the number of nodes
Figure 7 shows the variation trend of the maximum connected subgraph size of the scale-free IoT topology under malicious attacks. With the progression of the malicious attack, the number of nodes in the maximum connected subgraph of the initial scale-free IoT topology decreases rapidly, indicating that it is vulnerable to malicious attacks. The topology optimized by the various algorithms for resisting malicious attacks has been improved, among which
Comparison of the connectivity of scale-free IoT topologies optimized by different algorithms under malicious attacks.
This section compares the robustness optimization effects of different algorithms against malicious attacks in different network sizes. The number of scale-free IoT nodes
Comparison of the robustness optimization effects of ROGCN and other algorithms on scale-free IoT topologies with different network sizes.
Comparison of the robustness optimization effects of ROGCN and other algorithms on scale-free IoT topologies with different edge densities.
This section compares the robustness optimization effects of the ROGCN, SAA and AREA algorithms against malicious attacks under different edge densities. The number of scale-free IoT nodes
Time cost of different algorithms for optimizing a single IoT topology in different network sizes (unit: s)
Time cost of different algorithms for optimizing a single IoT topology in different network sizes (unit: s)
This section gives the statistics of the running time of various algorithms for different network sizes. The number of scale-free IoT nodes
In the ROGCN model based on three search strategies, the computational cost of
Conclusion
Considering the limited communication range, connection degree and computing power of device nodes in the real IoT and the vulnerability to malicious attacks, this paper proposes a scale-free IoT topology robustness optimization method based on graph convolutional networks. Referring to the onion-like structural characteristics of highly robust topology, a new degree difference representation method is proposed to meet the feature extraction requirements of graph convolutional networks and accelerate the convergence speed. Then, the graph convolutional network with residual gating is used to extract the onion-like structural features from the initial topology to the label topology evolution process, and on this basis, different search strategies are designed to suit the needs of different IoT scenarios and effectively improve the ability of the IoT topology to resist malicious attacks. Finally, the experiments show that the proposed algorithm is superior to the SAA and AREA algorithms in terms of topology robustness optimization performance and computational cost.
In future research, transfer learning and reinforcement learning will be considered to achieve larger-scale network topology optimization and better optimization performance. In addition, future endeavors will explore a robustness enhancement mechanism that combines a small-world model and heterogeneous IoT. With the coming era of the Internet of Everything, topology optimization of the IoT will be challenging and meaningful research work.
Footnotes
Acknowledgments
This research was supported by the National Natural Science Foundation of China (No. 61803384). We would like to thank Ning Chen for his kind helps. We also would like to thank the anonymous reviewers for helpful comments and suggestions that certainly contribute to improve this paper.
