IIT-M creates algorithm to protect networks like air traffic control from attacks | Latest news India

Researchers at the Indian Institute of Technology (IIT) in Madras have developed an algorithm to mitigate disruptions to critical networks such as air traffic control and power distribution during a terrorist attack. The research, peer-reviewed and published in the international journal ‘Physica A: Statistical Mechanics and its Applications’. Experts have noted that with IoT, or the Internet of Things, devices that exchange data with other devices over the Internet, becoming more popular, protecting networks vital to national security is critical.

“The terrorist attacks of September 11, 2001…targeting a single country brought the entire airline industry to a standstill. Such threats are a reminder that in today’s highly interconnected world, there is a high risk of that an adverse event leads to the interruption of the entire network”.

“Road and air traffic, energy distribution, and even social media platforms are examples of highly connected networks, and therefore highly vulnerable to targeted attacks,” said Karthik Raman, senior fellow at the Robert Bosch Center. of Data and Artificial Sciences of the IIT-M. Intelligence, he said he.

“A variety of technology networks form the backbone of the modern world’s infrastructure, and it is essential to build in security measures to protect against failures and targeted attacks.”

The proposed strategy is an algorithm that generates additional capacity in a given network. This means that if a node (name given to an entity linked to others) is attacked, the affected node’s traffic is routed through this available capacity and the network can continue to function.

This has been tested in two infrastructure networks: air traffic and power distribution.

“The algorithm was found to increase the robustness of these networks against targeted attacks,” PTI quoted Sai Saranga Das, a student and lead author of the study.

“The algorithm was also very effective in increasing the robustness of ‘canonical scale-free networks,’ which are representative of many real-world networks compared to existing strategies to mitigate attacks targeting these networks,” he added.

With contributions from the PTI


Leave a Comment