Betweenness centrality is a popular metric in social science, and recently it was adopted also in computer science. Betweenness identifies the node, or the nodes, that are most suitable to perform critical network functions, such as firewalling and intrusion detection. However, computing centrality is resourcedemanding, we can not give for granted that it can be computed in real time at every change in the network topology. This is especially true in mesh networks that generally use devices with few computation resources. This paper shows that using the fastest state-of-the-art heuristic algorithm, it is indeed possible to compute network centrality even in real, low-power networking hardware in a network made of up to 1000 nodes. The observation of a real mesh network not only shows that centrality does not need to be updated at every topology change, but also that it can be safely re-computed with an interval in the order of the tens of minutes. Our findings confirm that centrality can be effectively and successfully used as a building block for security functions in mesh networks.

On the Computation of Centrality Metrics for Network Security in Mesh Networks

Maccari, Leonardo;
2016-01-01

Abstract

Betweenness centrality is a popular metric in social science, and recently it was adopted also in computer science. Betweenness identifies the node, or the nodes, that are most suitable to perform critical network functions, such as firewalling and intrusion detection. However, computing centrality is resourcedemanding, we can not give for granted that it can be computed in real time at every change in the network topology. This is especially true in mesh networks that generally use devices with few computation resources. This paper shows that using the fastest state-of-the-art heuristic algorithm, it is indeed possible to compute network centrality even in real, low-power networking hardware in a network made of up to 1000 nodes. The observation of a real mesh network not only shows that centrality does not need to be updated at every topology change, but also that it can be safely re-computed with an interval in the order of the tens of minutes. Our findings confirm that centrality can be effectively and successfully used as a building block for security functions in mesh networks.
2016
2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings
File in questo prodotto:
File Dimensione Formato  
Final_approved_PDF.pdf

non disponibili

Dimensione 159.71 kB
Formato Adobe PDF
159.71 kB Adobe PDF   Visualizza/Apri

I documenti in ARCA sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10278/3717592
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 17
  • ???jsp.display-item.citation.isi??? 5
social impact