Username   Password       Forgot your password?  Forgot your username? 


Protection of k-out-of-n Systems under Intentional Attacks using Imperfect False Elements

Volume 9, Number 5, September 2013 - Paper 08 - pp. 529-537


1 Government Polytechnic College, Karur, Tamil Nadu, INDIA
2 PSG College of Technology, Coimbatore, Tamil Nadu, INDIA

(Received on November 20, 2012, revised on June 11, and June 15, 2013)


This paper aims to find the optimal allocation of defense resources between protecting the genuine elements of a k–out–of–n system and deployment of imperfect false elements. Networks such as telecommunication networks, oil pipeline networks can be modeled as k–out–of–n systems. Different type of weapons used in Army, Navy and Air defenses are considered as branches of the force. A country in warfare is defeated if a considerable number of branches are destroyed. This phenomenon is also identical with the failure of a k–out–of–n system. In this work, the destruction probability of a network, protected using imperfect false elements, under intentional attacks is obtained as the damage of a k–out–of–n system. A numerical example is shown to explain this model, and the methodology used in this paper.


References: 13

Click here to download the paper.

Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader


This site uses encryption for transmitting your passwords.