Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Arun Das is active.

Publication


Featured researches published by Arun Das.


international conference on computer communications | 2014

Identification of K most vulnerable nodes in multi-layered network using a new model of interdependency

Arunabha Sen; Anisha Mazumder; Joydeep Banerjee; Arun Das; Randy Compton

The critical infrastructures of a nation including the power grid and the communication network are highly interdependent. Recognizing the need for a deeper understanding of the interdependency in a multi-layered network, significant efforts have been made by the research community in the last few years to achieve this goal. Accordingly a number of models have been proposed and analyzed. Unfortunately, most of the models are over simplified and, as such, they fail to capture the complex interdependency that exists between entities of the power grid and the communication networks involving a combination of conjunctive and disjunctive relations. To overcome the limitations of existing models, we propose a new model that is able to capture such complex interdependency relations. Utilizing this model, we provide techniques to identify the K most “vulnerable” nodes of an interdependent network. We show that the problem can be solved in polynomial time in some special cases, whereas for some others, the problem is NP-complete. We establish that this problem is equivalent to computation of a fixed point of a multilayered network system and we provide a technique for its computation utilizing Integer Linear Programming. Finally, we evaluate the efficacy of our technique using real data collected from the power grid and the communication network that span the Maricopa County of Arizona.


military communications conference | 2014

Root Cause Analysis of Failures in Interdependent Power-Communication Networks

Arun Das; Joydeep Banerjee; Arunabha Sen

Studies on communication network robustness, though extensive, have primarily focused on standalone networks. However, real world communication networks do not operate in isolation, but instead are part of complex interdependent ecosystems that function together as a comprehensive symbiotic unit. For instance, communication networks of today are highly dependent on the power infrastructure and hence, any efforts to improve the robustness of communication networks must necessarily take into account the vulnerabilities of the power infrastructure and their shared interdependencies. For example, event-induced failures (failures caused by natural disasters or terrorist attacks), on any of these two infrastructures can trigger further failures (triggered failures) into the system through a cascading process due to the interdependencies between the networks. In such an interdependent system where an event induced failure can cascade and result in a much larger combined (event-induced plus triggered) failure, it may be imperative to identify the original event-induced failure for the purpose of post fault diagnostics, or for pre-cascade network strengthening. This ascertainment of event-induced original failure, or the Root Cause of Failure, from combined failures in interdependent Power-Communication networks is the main focus of this paper. We model interdependencies between the two infrastructures using the recently proposed Implicative Interdependency Model. We introduce the Root Cause of Failure problem, and prove it to be NP-Complete. We also provide optimal solutions using ILP, and provide an O(ln(n)) approximation algorithm. Finally, we validate our analytical results through experiments in the power communication network of Maricopa County, Arizona.


critical information infrastructures security | 2014

Progressive Recovery from Failure in Multi-layered Interdependent Network Using a New Model of Interdependency

Anisha Mazumder; Chenyang Zhou; Arun Das; Arunabha Sen

A number of models have been proposed to analyze interdependent networks in recent years. However most of the models are unable to capture the complex interdependencies between such networks. To overcome the limitations, we have recently proposed a new model. Utilizing this model, we provide techniques for progressive recovery from failure. The goal of the progressive recovery problem is to maximize the system utility over the entire duration of the recovery process. We show that the problem can be solved in polynomial time in some special cases, whereas for some others, the problem is NP-complete. We provide two approximation algorithms with performance bounds of 2 and 4 respectively. We provide an optimal solution utilizing Integer Linear Programming and a heuristic. We evaluate the efficacy of our heuristic with both synthetic and real data collected from Phoenix metropolitan area. The experiments show that our heuristic almost always produces near optimal solution.


conference on computer communications workshops | 2015

On the Entity Hardening Problem in multi-layered interdependent networks

Joydeep Banerjee; Arun Das; Chenyang Zhou; Anisha Mazumder; Arunabha Sen

The power grid and the communication network are highly interdependent on each other for their well being. In recent times the research community has shown significant interest in modeling such interdependent networks and studying the impact of failures on these networks. Although a number of models have been proposed, many of them are simplistic in nature and fail to capture the complex interdependencies that exist between the entities of these networks. To overcome the limitations, recently an Implicative Interdependency Model that utilizes Boolean Logic, was proposed and a number of problems were studied. In this paper we study the “entity hardening” problem, where by “entity hardening” we imply the ability of the network operator to ensure that an adversary (be it Nature or human) cannot take a network entity from operative to inoperative state. Given that the network operator with a limited budget can only harden k entities, the goal of the entity hardening problem is to identify the set of k entities whose hardening will ensure maximum benefit for the operator, i.e. maximally reduce the ability of the adversary to degrade the network. We classify the problem into four cases and show that the problem is solvable in polynomial time for the first case, whereas for others it is NP-complete. We provide an inapproximability result for the second case, an approximation algorithm for the third case, and a heuristic for the fourth (general) case. We evaluate the efficacy of our heuristic using power and communication network data of Maricopa County, Arizona. The experiments show that our heuristic almost always produces near optimal results.


2014 International Conference on Computing, Networking and Communications (ICNC) | 2014

On the impact of coding parameters on storage requirement of region-based fault tolerant distributed file system design

Sujogya Banerjee; Arun Das; Anisha Mazumder; Zahra Derakhshandeh; Arunabha Sen

Advances in technology have resulted in Internet-scale deployment of storage systems such as peer-to-peer storage and cloud storage, where data is distributed over multiple storage nodes in a networked environment. In these environments the storage nodes are often commodity machines and are susceptible to failure. The notion of fault domain, introduced by Microsoft Azure, captures the fault-tolerance aspects of a data center. A fault domain is defined as a set of servers all of which become inaccessible when a single fault (such as the failure of a switch or a router) occurs in the data center. As such a fault domain can be viewed as a spatially correlated or region based failure. In order to enhance reliability through redundancy, maximum distance separable (MDS) codes such as Reed-Solomon codes and (N, K) codings are utilized. In this paper we present analytical results demonstrating that the choice of the coding parameters N and K may have significant impact on storage that will be necessary to achieve reliability. We present a polynomial time algorithm for optimal storage allocation in a mesh network and we conduct extensive experimentation to evaluate the impact of the coding parameters N and K on the storage requirement to provide all region fault tolerance with varying size of the mesh and the fault region.


Networks | 2015

Region-based fault-tolerant distributed file storage system design in networks

Arunabha Sen; Anisha Mazumder; Sujogya Banerjee; Arun Das; Chenyang Zhou; Shahrzad Shirazipourazad

Distributed storage of data files in different nodes of a network enhances its fault tolerance capability by offering protection against node and link failures. Reliability is often achieved through redundancy in one of the following two ways: i storage of multiple copies of the entire file at different locations nodes or ii storage of file segments not entire files at different node locations. In the N,K file distribution scheme, N file segments from a file F are created in such a way that it is possible to reconstruct the entire file, just by accessing any Ki¾?N segments. For the reconstruction scheme to work, it is essential that the K segments of the file are stored in nodes that are connected in the network. However, in the event of node/link failures, the network might become disconnected i.e., split into several connected components. We focus on node failures that are spatially correlated or region based. Such failures are often encountered in disaster situations or natural calamities where only the nodes in the disaster zone are affected. The first goal of this research is to design a least cost file storage scheme to ensure that no matter which region is destroyed; resulting in fragmentation of the network, a largest connected component of the residual network will have enough file segments with which to reconstruct the entire file. In case the least cost to ensure this objective is within the allocated budget, the storage design will be all region fault-tolerant ARFT. In case the least cost exceeds the allocated budget, design of an ARFT file storage system design is impossible. The second goal of this research is to design file storage schemes that will be maximum region fault-tolerant within the allocated budget. The third goal of this research is to investigate the impact of the coding parameters N and K on storage requirements for ensuring all region or \textit{maximum region} fault-tolerant design. We provide maximum region fault-tolerant design. We provide approximation algorithms for the problems and evaluate their performance through simulation using two real networks and compare their results to the optimal solutions obtained using Integer Linear Program. The simulation results demonstrate that the approximation algorithms almost always produce near optimal results in a fraction of the time needed to find the optimal solution.


international conference on social computing | 2013

Spatio-temporal Signal Recovery from Political Tweets in Indonesia

Anisha Mazumder; Arun Das; Nyunsu Kim; Sedat Gokalp; Arunabha Sen; Hasan Davulcu

Online social network community now provides an enormous volume of data for analyzing human sentiment about people, places, events and political activities. It is becoming increasingly clear that analysis of such data can provide great insights on the social, political and cultural aspects of the participants of these networks. As part of the Minerva project, currently underway at Arizona State University, we have analyzed a large volume of Twitter data to understand radical political activity in the provinces of Indonesia. Based on analysis of radical/counter radical sentiments expressed in tweets by Twitter users, we create a Heat Map of Indonesia which visually demonstrates the degree of radical activities in various provinces of Indonesia. We create the Heat Map of Indonesia by computing (i) the Radicalization Index and (ii) the Location Index of each Twitter user from Indonesia, who has expressed some radical sentiment in her tweets. The conclusions derived from our analysis matches significantly with the analysis of Wahid Institute, a leading political think tank of Indonesia, thus validating our results.


design of reliable communication networks | 2016

A Network Planning and Management Tool for mitigating the impact of spatially correlated failures in infrastructure networks

Arun Das; Arunabha Sen; Chunming Qiao; Nasir Ghani; Nathalie Mitton

Current practices of fault-tolerant network design ignore the fact that most network infrastructure faults are localized or spatially correlated (i.e., confined to regions). Network operators require new tools to mitigate the impact of such region based faults on their infrastructures. Utilizing the support from the U.S. Department of Defense, and by consolidating a wide range of theories and solutions developed in the last few years, the authors of this paper have developed an advanced Network Planning and Management Tool (NPMT) that facilitates the design and provisioning of robust and resilient networks. The tool provides multi-faceted network design, evaluation and simulation capabilities for network planners. Future extensions of the tool currently being worked upon not only expand the tools capabilities, but also extend these capabilities to heterogeneous interdependent networks such as communication, power, water and satellite networks.


2016 International Conference on Computing, Networking and Communications (ICNC) | 2016

On mobile sensor data collection using data mules

Arun Das; Anisha Mazumder; Arunabha Sen; Nathalie Mitton

The sensor data collection problem using data mules has been studied fairly extensively in the literature. However, in most of these studies, while the mule is mobile, all sensors are stationary. The objective of most of these studies is to minimize the time needed by the mule to collect data from all the sensors and return to the data collection point from where it embarked on its data collection journey. The problem studied in this paper has two major differences with these earlier studies. First, in this study we assume that both the mule as well as the sensors are mobile. Second, we do not attempt to minimize the data collection time. Instead, we minimize the number of mules that will be needed to collect data from all the sensors, subject to the constraint that the data collection process has to be completed within some pre-specified time. We show that the mule minimization problem is NP-Complete and analyze the problem in two settings. We provide solutions to the problem in both settings by first transforming the problem to a generalized version of the minimum flow problem in a network, and then solving it optimally using Integer Linear Programming. Finally, we evaluate our algorithms through experiments and present our results.


2014 6th International Workshop on Reliable Networks Design and Modeling (RNDM) | 2014

Region based fault-tolerant distributed file storage system design under budget constraint

Anisha Mazumder; Arun Das; Chenyang Zhou; Arunabha Sen

Two independent lines of research, (i) erasure code based file storage system design, and (ii) fault-tolerant network design for spatially correlated (or region-based) failures, have received considerable attention in the networking research community in recent times. A recently proposed (N,K)-coding based distributed file storage scheme ensures complete reconstruction of a file after network fragmentation due to any single region-based fault. For every region of the network, it stores K distinct file segments in one of the largest connected component that results from the fragmentation of the network due to the failure of a region. This distribution scheme provides an all-region fault-tolerant storage system, in the sense that no matter which region of the network fails, a largest connected component of the fragmented network will still have enough distinct file segments with which to reconstruct the file. However, the storage requirement and the associated cost for such an all-region-fault-tolerant storage system may be quite high. As such, with a limited budget it may not be possible to realize such an all-region fault-tolerant storage system. We consider a budget constrained distributed file system design problem and provide solutions that maximizes the number of regions that can be made fault-tolerant, within the specified budget. We show that the problem is NP-complete, and provide an approximation algorithm for the problem. The performance of the approximation algorithm is evaluated through simulation on two real networks. The simulation results demonstrate that the worst case experimental performance is significantly better than the worst case theoretical bound. Moreover, the approximation algorithm almost always produce near optimal solution in a fraction of time needed to find the optimal solution.

Collaboration


Dive into the Arun Das's collaboration.

Top Co-Authors

Avatar

Arunabha Sen

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chenyang Zhou

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nasir Ghani

University of South Florida

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hasan Davulcu

Arizona State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge