留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

Security Analysis of Opinion Dynamics in Social Networks

SU Shuang-ping YANG Wen ZHAO Zhi-yun

苏霜萍, 杨文, 赵芝芸. 社会网络中观点动力学的安全性分析[J]. 电子科技大学学报, 2020, 49(6): 924-933. doi: 10.12178/1001-0548.2019234
引用本文: 苏霜萍, 杨文, 赵芝芸. 社会网络中观点动力学的安全性分析[J]. 电子科技大学学报, 2020, 49(6): 924-933. doi: 10.12178/1001-0548.2019234
SU Shuang-ping, YANG Wen, ZHAO Zhi-yun. Security Analysis of Opinion Dynamics in Social Networks[J]. Journal of University of Electronic Science and Technology of China, 2020, 49(6): 924-933. doi: 10.12178/1001-0548.2019234
Citation: SU Shuang-ping, YANG Wen, ZHAO Zhi-yun. Security Analysis of Opinion Dynamics in Social Networks[J]. Journal of University of Electronic Science and Technology of China, 2020, 49(6): 924-933. doi: 10.12178/1001-0548.2019234

社会网络中观点动力学的安全性分析

doi: 10.12178/1001-0548.2019234

Security Analysis of Opinion Dynamics in Social Networks

Funds: National Natural Science Foundation of China (61973123)
More Information
    Author Bio:

    SU Shuang-ping(1994-), female, her research interests include opinion dynamic in social network

    Corresponding author: YANG Wen, E-mail:weny@ecust.edu.cn
  • 摘要: 该文考虑了社会网络中带有恶意观点注入的观点动力学。首先,基于DeGroot模型提出了恶意攻击者不断向网络中注入恶意观点的动力学模型,并证明了在该模型中所有个体都将收敛到攻击者的恶意观点。其次,研究了在资源受限的情况下攻击者攻击的节点对网络收敛速率的影响,为抵御攻击者的恶意攻击提出了有效的防御机制,进一步获得了个体稳态下的观点差。最后通过数值仿真验证了网络中节点角色与观点收敛速率的关系,并证实了防御机制的有效性。
  • Figure  1.  A social network in hostile environment.

    Figure  2.  The topology of social network and opinion dynamics in network.

    Figure  3.  $\ln (J({{\varGamma}} ))$ vs $q$ under two selection strategies.

    Figure  4.  The objective function $J({{\varGamma}} )$ under different indices ${C_B}$, ${C_c}$, respectively.

    Figure  5.  The dynamic evolution of opinions under defense mechanism.

    Figure  6.  The evolution of networks in communication under defense mechanism.

  • [1] KHANDPUR R P, JI T, JAN S, et al. Crowdsourcing cybersecurity: Cyber attack detection using social media[C]//Proceedings of the 2017 ACM on Conference on Information and Knowledge Management. [S.l.]: ACM, 2017: 1049-1057.
    [2] YU H, KAMINSKY M, GIBBONS P B, et al. Sybilguard: Defending against sybil attacks via social networks[J]. IEEE/ACM Transactions on Networking, 2008, 16(3): 576-589. doi:  10.1109/TNET.2008.923723
    [3] YU H, GIBBONS P B, KAMINSKY M, et al. Optimal Social network defense against sybil attacks[J]. IEEE-ACM Transactions on Networking, 2010, 18(3): 885-898. doi:  10.1109/TNET.2009.2034047
    [4] AHMADINEJAD S H, FONG P W L. Unintended disclosure of information: Inference attacks by third-party extensions to social network systems[J]. Computers & Security, 2014, 44: 75-91.
    [5] DOUCEUR J R. The sybil attack[C]//International Workshop on Peer-Topeer Systems. Cambridge: Springer, 2002: 251-260.
    [6] NARAYANAN A, SHMATIKOV V. Robust de-anonymization of large sparse datasets[C]//Proceding of the 2008 IEEE Symposium on Security and Privacy.[S.l.]: IEEE, 2008: 111-125.
    [7] MEI B, XIAO Y, LI R, et al. Image and attribute based convolutional neural network inference attacks in social networks[J]. IEEE Transactions on Network Science and Engineering, 2020, 7(2): 869-879. doi:  10.1109/TNSE.2018.2797930
    [8] JIN L, JOSHI J B, ANWAR M. Mutual-friend based attacks in social network systems[J]. Computers & Security, 2013, 37: 15-30.
    [9] YIN D, SHEN Y, LIU C. Attribute couplet attacks and privacy preservation in social networks[J]. IEEE Access, 2017, 5: 25295-25305. doi:  10.1109/ACCESS.2017.2769090
    [10] MEDKOVÁ J. Composition attack against social network data[J]. Computers & Security, 2018, 74: 115-129.
    [11] SHANG Y. Consensus in averager-copier-voter networks of moving dynamical agents[J]. Chaos: An Interdisciplinary Journal of Nonlinear Science, 2017, 27(2): 023116. doi:  10.1063/1.4976959
    [12] QIAN C, CAO J, LU J, et al. Adaptive bridge control strategy for opinion evolution on social networks[J]. Chaos: An Interdisciplinary Journal of Nonlinear Science, 2011, 21(2): 025116. doi:  10.1063/1.3602220
    [13] GALAM S. Minority opinion spreading in random geometry[J]. The European Physical Journal B-Condensed Matter and Complex Systems, 2002, 25(4): 403-406.
    [14] TESSONE C J, TORAL R, AMENGUAL P, et al. Neighborhood models of minority opinion spreading[J]. The European Physical Journal B-Condensed Matter and Complex Systems, 2004, 39(4): 535-544. doi:  10.1140/epjb/e2004-00227-5
    [15] XIA W, CAO M. Clustering in diffusively coupled networks[J]. Automatica, 2011, 47(11): 2395-2405. doi:  10.1016/j.automatica.2011.08.043
    [16] ALTAFINI C. Consensus problems on networks with antagonistic interactions[J]. IEEE Transactions on Automatic Control, 2012, 58(4): 935-946.
    [17] CASTELLANO C, FORTUNATO S, LORETO V. Statistical physics of social dynamics[J]. Reviews of Modern Physics, 2009, 81(2): 591-646. doi:  10.1103/RevModPhys.81.591
    [18] FRENCH J J R. A formal theory of social power[J]. Psychological Review, 1956, 63(3): 181-194. doi:  10.1037/h0046123
    [19] HARARY F. A criterion for unanimity in french’s theory of social power[M]. Oxford, England: University of Michigan, 1956.
    [20] DEGROOT M H. Reaching a consensus[J]. Journal of the American Statistical Association, 1974, 69(345): 118-121. doi:  10.1080/01621459.1974.10480137
    [21] FRIEDKIN N, JOHNSEN E. Social influence networks and opinion change[J]. Advances in Group Processes, 1999, 16(1): 1-29.
    [22] FRIEDKIN N E. Choice shift and group polarization[J]. American Sociological Review, 1999, 64(6): 856-875. doi:  10.2307/2657407
    [23] PARSEGOV S E, PROSKURNIKOV A V, TEMPO R, et al. Novel multidimensional models of opinion dynamics in social networks[J]. IEEE Transactions on Automatic Control, 2016, 62(5): 2270-2285.
    [24] HEGSELMANN R, KRAUSE U. Opinion dynamics and bounded confidence models, analysis, and simulation[J]. Journal of Artificial Societies and Social Simulation, 2002, 5(3): 8.
    [25] DEFFUANT G, NEAU D, AMBLARD F, et al. Mixing beliefs among interacting agents[J]. Advances in Complex Systems, 2000, 3(4): 87-98.
    [26] GU H, CHEN B, ZHU H, et al. Importance of internet surveillance in public health emergency control and prevention: Evidence from a digital epidemiologic study during avian influenza a H7N9 outbreaks[J]. Journal of Medical Internet Research, 2014, 16(1): e20. doi:  10.2196/jmir.2911
    [27] KENNEDY J. Encyclopedia of machine learning[M]. [S.l.]: Springer, 2010.
    [28] CHANG B, XU T, LIU Q, et al. Study on information diffusion analysis in social networks and its applications[J]. International Journal of Automation and Computing, 2018, 15(4): 377-401. doi:  10.1007/s11633-018-1124-0
    [29] BERGER R L. A necessary and sufficient condition for reaching a consensus using degroot’s method[J]. Journal of the American Statistical Association, 1981, 76(374): 415-418. doi:  10.1080/01621459.1981.10477662
    [30] GILARDONI G L, CLAYTON M K. On reaching a consensus using degroot’s iterative pooling[J]. The Annals of Statistics, 1993, 21(1): 391-401. doi:  10.1214/aos/1176349032
    [31] YANG W, WANG X, SHI H. Fast consensus seeking in multi-agent systems with time delay[J]. Systems & Control Letters, 2013, 62(3): 269-276.
    [32] YANG W, WANG Z, ZUO Z, et al. Nodes selection strategy in cooperative tracking problem[J]. Automatica, 2016, 74: 118-125. doi:  10.1016/j.automatica.2016.07.021
    [33] BOYD S, VANDENBERGHE L. Convex optimization[M]. Cambridge: Cambridge University Press, 2004.
    [34] RAVAZZI C, TEMPO R, DABBENE F. Learning influence structure in sparse social networks[J]. IEEE Transactions on Control of Network Systems, 2018, 5(4): 1976-1986. doi:  10.1109/TCNS.2017.2781367
    [35] MO Y, AMBROSINO R, SINOPOLI B. Sensor selection strategies for state estimation in energy constrained wireless sensor networks[J]. Automatica, 2011, 47(7): 1330-1338. doi:  10.1016/j.automatica.2011.02.001
    [36] LIN F, FARDAD M, JOVANOVIC M R. Design of optimal sparse feedback' gains via the alternating direction method of multipliers[J]. IEEE Transactions on Automatic Control, 2013, 58(9): 2426-2431. doi:  10.1109/TAC.2013.2257618
    [37] JOSHI S, BOYD S. Sensor selection via convex optimization[J]. IEEE transactions on Signal Processing, 2008, 57(2): 451-462.
    [38] MORARESCU I C, GIRARD A. Opinion dynamics with decaying confidence: Application to community detection in graphs[J]. IEEE Transactions on Automatic Control, 2010, 56(8): 1862-1873.
    [39] YAN E, DING Y. Applying centrality measures to impact analysis: A coauthorship network analysis[J]. Journal of the American Society for Information Science and Technology, 2009, 60(10): 2107-2118. doi:  10.1002/asi.21128
    [40] GOLDBERG D E, HOLLAND J H. Genetic algorithms and machine learning[J]. Machine Learning, 1988, 3(2): 95-99.
  • [1] 林自展, 肖井华, 周金连, 吴晔.  基于观点动力学的在线点评研究 . 电子科技大学学报, 2020, 49(1): 155-160. doi: 10.12178/1001-0548.2018320
    [2] 邵鹏, 胡平.  复杂网络特殊用户对群体观点演化的影响 . 电子科技大学学报, 2019, 48(4): 604-612. doi: 10.3969/j.issn.1001-0548.2019.04.019
    [3] 刘丹, 李毅超, 余三超, 陈沁源.  面向P2P网络的DDoS攻击抑制方法 . 电子科技大学学报, 2011, 40(1): 85-89.
    [4] 冯涛, 刘媛媛, 马建峰.  可证明安全的群组匿名认证密钥协商协议 . 电子科技大学学报, 2011, 40(2): 273-277. doi: 10.3969/j.issn.1001-0548.2011.02.023
    [5] 周华, 孟相如, 张立, 乔向东.  环形结构的入侵容忍系统研究 . 电子科技大学学报, 2010, 39(4): 589-592. doi: 10.3969/j.issn.1001-0548.2010.04.025
    [6] 陈爱国, 徐国爱, 杨义先.  评价离散度敏感的P2P交易系统信任模型 . 电子科技大学学报, 2010, 39(3): 425-429. doi: 10.3969/j.issn.1001-0548.2010.03.022
    [7] 曾金全, 赵辉, 刘才铭, 彭凌西.  受免疫原理启发的Web攻击检测方法 . 电子科技大学学报, 2007, 36(6): 1215-1218.
    [8] 叶李, 王娟, 秦志光.  用灰色优势分析确定网络安全评估指标 . 电子科技大学学报, 2007, 36(6): 1195-1197,1252.
    [9] 戴江山, 李向阳, 张增军, 肖军模.  网络取证日志分布式安全管理 . 电子科技大学学报, 2007, 36(2): 235-238.
    [10] 陈振国, 李冬艳.  运用核Fisher鉴别分析和MPM分类器的入侵检测 . 电子科技大学学报, 2007, 36(6): 1192-1194.
    [11] 于泠, 陈波, 肖军模.  一种网络攻击路径重构方案 . 电子科技大学学报, 2006, 35(3): 392-395.
    [12] 彭宏.  基于粗糙集理论的入侵检测方法研究 . 电子科技大学学报, 2006, 35(1): 108-110,136.
    [13] 陈雷霆, 张亮.  人工免疫机制在木马检测系统中的应用研究 . 电子科技大学学报, 2005, 34(2): 221-224.
    [14] 陈波, 于泠, 肖军模.  SA算法在基于模型推理入侵检测中的应用 . 电子科技大学学报, 2005, 34(1): 36-39.
    [15] 戴江山, 肖军模, 张增军.  分布式网络实时取证系统研究与设计 . 电子科技大学学报, 2005, 34(3): 347-350.
    [16] 袁丁, 范平志.  电子证据与反拒认协议及形式化分析 . 电子科技大学学报, 2004, 33(5): 531-534.
    [17] 张选芳.  Internet网络安全的信息过滤模型分析 . 电子科技大学学报, 2004, 33(3): 270-272.
    [18] 周海刚, 肖军模.  一种基于移动代理的入侵检测系统框架 . 电子科技大学学报, 2003, 32(6): 683-686.
    [19] 程文彬.  基于网站建设中网页设计的安全缺陷及对策 . 电子科技大学学报, 2003, 32(6): 711-713.
    [20] 周世杰, 秦志光, 耿技.  办公自动化系统中的安全性 . 电子科技大学学报, 2000, 29(2): 201-204.
  • 加载中
图(6)
计量
  • 文章访问数:  4266
  • HTML全文浏览量:  1166
  • PDF下载量:  28
  • 被引次数: 0
出版历程
  • 收稿日期:  2019-10-22
  • 修回日期:  2020-08-10
  • 网络出版日期:  2020-11-25
  • 刊出日期:  2020-11-23

Security Analysis of Opinion Dynamics in Social Networks

doi: 10.12178/1001-0548.2019234
    基金项目:  National Natural Science Foundation of China (61973123)
    作者简介:

    SU Shuang-ping(1994-), female, her research interests include opinion dynamic in social network

    通讯作者: YANG Wen, E-mail:weny@ecust.edu.cn

摘要: 该文考虑了社会网络中带有恶意观点注入的观点动力学。首先,基于DeGroot模型提出了恶意攻击者不断向网络中注入恶意观点的动力学模型,并证明了在该模型中所有个体都将收敛到攻击者的恶意观点。其次,研究了在资源受限的情况下攻击者攻击的节点对网络收敛速率的影响,为抵御攻击者的恶意攻击提出了有效的防御机制,进一步获得了个体稳态下的观点差。最后通过数值仿真验证了网络中节点角色与观点收敛速率的关系,并证实了防御机制的有效性。

English Abstract

苏霜萍, 杨文, 赵芝芸. 社会网络中观点动力学的安全性分析[J]. 电子科技大学学报, 2020, 49(6): 924-933. doi: 10.12178/1001-0548.2019234
引用本文: 苏霜萍, 杨文, 赵芝芸. 社会网络中观点动力学的安全性分析[J]. 电子科技大学学报, 2020, 49(6): 924-933. doi: 10.12178/1001-0548.2019234
SU Shuang-ping, YANG Wen, ZHAO Zhi-yun. Security Analysis of Opinion Dynamics in Social Networks[J]. Journal of University of Electronic Science and Technology of China, 2020, 49(6): 924-933. doi: 10.12178/1001-0548.2019234
Citation: SU Shuang-ping, YANG Wen, ZHAO Zhi-yun. Security Analysis of Opinion Dynamics in Social Networks[J]. Journal of University of Electronic Science and Technology of China, 2020, 49(6): 924-933. doi: 10.12178/1001-0548.2019234
  • Social network is a system in which a group of people or groups are connected in some way. The interaction of humans in social networks forms a huge and complex human-machine system. With the development of large-scale networks, the network security problem has become a hot issue involving information leakage and hostile attacks of individuals, organizations, society and countries due to the openness and sharing of network. It’s a challenge to provide solid theory that can then be formulated as scalable algorithms and software implementable in practical systems with potential security issues, which has attracted widespread attention of researchers from diverse areas. Over the past decades, many researches on security issues in social networks have emerged, and some works focus on the network performance analysis under typical attacks[1-4] including Sybil attack[5], de-anonymization attacks[6], or inference attacks[7], and so on. Meanwhile, with the increasingly sophisticated defense system, the hostile attacks have evolved into more complicated and diverse formations. More and more types of attacks appear, such as mutual friend attacks[8], attribute couplet attacks[9], composition attacks[10], which have greatly threatened social security and information privacy.

    In social networks, positive and secure public opinions play a vital role in establishing a healthy and stable society. A hybrid opinion dynamics comprising averager, copier, and voter agents is studied in Ref.[11]. An adaptive bridge control strategy is proposed to control a special kind of bridge nodes for some other targeted immunization and acquaintance immunization in Ref.[12]. In recent years, the researchers from diverse areas have proposed some models to capture the properties of opinion dynamics and simulate the opinion evolution rule, which can explain the social phenomena such as few opinions surviving[13-14], clustering[15], consensus[16]. The analysis of social opinion in physical models[17] investigate the evolution of public opinion suffered malicious opinion injection. Actually, the evolution of public opinion has been extensively studied by sociologists, which can trace back to the works of Ref.[18] and Ref.[19]. A classical model is proposed by Ref.[20], which studies the process of social group reaching consensus by pooling their opinions. To better explore the internal factors of opinion dynamics, Ref.[21] studied a model (called FJ model) as an improvement of the DeGroot model to describe a phenomenon that the individuals insist on their initial biases, i.e., considering the individuals’ inherent prejudices. In FJ model, disagreements definitely emerge under the influence of prejudices, and an extended work also pointed out the importance of diverging research in Ref.[22]. Recently, Ref.[23] studied a novel multi-dimensional model which describes the opinion dynamics in social networks on several interdependent topics. In addition, Hegselmann-Krause(HK) model[24] and Deffuant-Weisbuch(DW) model[25] were proposed to consider prejudice assimilation and bounded confidence, where each individual only communicates with those individuals whose opinions are close enough.

    With the development of social networking tools such as Twitter, Facebook, WeChat, et.al, people are increasingly inclined to express their opinions freely. However, the convenience of free expression also brings hidden danger[26-27]. For example, the intruders could spread malicious opinions among the individuals through the social networking tool, which leads to serious consequences. Specifically in recent years, many network rumor events have been reported frequently. Hence, it is necessary to study the opinion dynamic evolution in social networks with hostile opinion injection. Some similar works can refer to the information diffusion[28]. Based on the traditional DeGroot model, we develop a modified model by considering the malicious opinion injection, where parts of ‘target’ individuals are injected into malicious opinions from the intruder unconsciously. We also investigate the ‘target’ individual selection problem that the intruder can select those ‘key’ individuals as target individuals such that the convergence speed of reaching consensus on the malicious opinion is maximized. We further design a defense mechanism based on statistical learning to resist the malicious opinion injection.

    Notation. ${\rm{Tr}}({{\varGamma}} )$ is the trace of matrix ${{\varGamma}} $. For a finite set ${{V}}$, we denote the cardinality of ${{V}}$ by $\left| {{V}} \right|$.

    • Consider a social network with n individuals denoted by an weighted undirected graph $G = \{ V,E,{{W}}\} $, where $V = \{ 1,2, \cdots ,n\} $ is the set of nodes(individuals) and $E \subseteq V \times V$ is the set of edges representing the interaction between pairs of nodes. ${{W}} = [{w_{ij}}] \in {{\mathbb{R}}^{n \times n}}$ denotes the edge weight in the graph, which is a stochastic matrix satisfying $\displaystyle\sum\limits_{j = 1}^n {{w_{ij}}} = 1$,$\forall i \in V$. If $(i,j) \in E$, then ${w_{ij}} > 0$. In an undirected graph, $(u,v) \in E$ means than $(v,u) \in E$. The neighboring set of node $i$ is denoted by ${N_i}$, i.e. ${N_i}: = \{ j \in V:(i,j) \in E\} $.

      In the following, we firstly introduce the classic DeGroot model proposed in Ref.[20]. Then, we develop a dynamic evolution model of social opinion in a hostile environment, where an intruder intends to guide the network opinion into its malicious opinion.

    • The DeGroot model mainly explores the relationship between the opinion dynamis of individuals and internal coupling among the individuals. Each individual updates its opinion by:

      $$ {x_i}(k + 1) = \sum\limits_{j = 1}^n {{w_{ij}}{x_j}(k)} $$ (1)

      where ${x_i}(k) \in {\mathbb{R}}$ is the opinion of individual $i$ at time step $k \in {\mathbb{N}}$. As Eq. (1) shows, the opinion of each individual $i$ at each time step, $\forall i \in V$, is updated by synthesizing its own opinion and its neighbors’ opinions.

      Much work has been directed to the convergence analysis of the DeGroot model, such as Ref.[29-30]. In Ref.[29], a sufficient and necessary condition for the group opinion consensus is obtained.

    • The classic DeGroot model mainly considers the influence of system parameters and network topology on opinion evolving in an ideal environment, i.e., no extra opinion input. However, the scenario that an intruder inject malicious opinion into the individuals happens frequently, where the opinion dynamics could be much more complicated due to the intervention of other factors. In this paper, we develop a model based on the DeGroot model, considering an extra input term from the intruder describing the malicious opinion.

      Definition 1 The intruder with hostile opinion selects a subset of individuals to be target individuals at initial time. At each time step, the intruder can obtain the opinion states of those target individuals, and disguise itself as a neighbor of target individuals with designed opinion state.

      In Fig.1, the network consisting of blue and red individuals, the blue one represents the normal individual and red one represents the target individual. The intruder colored in grey is a hidden character. The intruder disguises itself as one of the neighbors of the target individuals, and sends an extra input ${u_i}(k)$ to every target individual. This effect will penetrate into the opinion of the target individuals like virus spreading in the crowd, potentially leading the normal individuals on malicious opinion. The opinion dynamics of each individual is described as:

      Figure 1.  A social network in hostile environment.

      $$ {x_i}(k + 1) = \sum\limits_{j = 1}^n {{w_{ij}}{x_j}(k) + l} {\gamma _i}{u_i}(k) $$ (2)

      and

      $$ {u_i}(k) = c - {x_i}(k) $$

      where $0 < l < 1$ is a constant weight designed by the intruder, and $c$ is the malicious opinion of the attacker. ${\gamma _i} \in \{ 0,1\} $ denotes whether the individual $i$ is selected to be target individual or not. Let ${V_t} = \{ j:{\gamma _j} = 1,\forall j\} $ be the set of target individuals and ${V_n} = \{ j:{\gamma _j} = 0,\forall j\} $ be the set of normal individuals who are not selected by the attacker. Note that at each time step the intruder can obtain the state ${x_i}(k)$, $i \in {V_t}$ and then calculate the difference ${u_i}(k)$ between ${x_i}(k)$ and $c$. Then the intruder disguises itself as a neighboring individual of individual $i \in {V_t}$ with its opinion state equalling to ${u_i}(k)$. Moreover, if ${\gamma _i} = 0$, $\forall i \in V$, that is ${V_n} = V$, then the proposed model is degenerated into the DeGroot model. Intuitively, the designed opinion state ${u_i}(k)$ calculated by the intruder has a feedback effect on individual i’s opinion, it will lead individual i’s opinion to the malicious opinion $c$ if no defense mechanism is adopted by individuals.

      Define ${{x}}(k) = {[{x_1}(k),{x_2}(k), \cdots ,{x_n}(k)]^{\rm{T}}}$, ${{\varGamma}} = {\rm{diag}}\{ {\gamma _1}, {\gamma _2}, \cdots ,{\gamma _n}\} $. By collecting all the states of individuals, we can rewrite the system (2) as the following vector form:

      $$ {{x}}(k + 1) = ({{W}} - l{{\varGamma }}){{x}}(k) + cl{{\varGamma }}{{{\textit{1}}}_n} $$ (3)

      Apparently, with the continuously injecting input into the target individuals, the hostile opinion c of the intruder could be broadcasted to the whole network, then all the individuals’ opinion will converge to the malicious opinion.

      In social networks, if a group of individuals without prejudice aggregate to reach consensus, the resulting opinion tends to synthesize the opinions of all the individuals in this group and form a moderate opinion. When some individuals in this network are potentially injected extra input from the intruder without being aware of danger and actively participate in group discussions, the entire group ultimately forms an opinion that is consistent with the intruder’s intention. Actually, these phenomena happen occasionally in real life, which motivates us to investigate the dynamic evolution of social opinion in hostile environments.

      In the following, we are going to analyze the convergence of system (3), and firstly introduce some assumptions and definitions.

      Assumption 1 (Connection) The network is connected and W is irreducible. i.e. there is at least one path between any two nodes in the network.

      Theorem 1 (Stability) Under Assumption 1, the system (3) is stable if $0 < l < {\min _i}\{ 2{w_{ii}},1\} $.

      Proof: Let ${\tilde{ W}} = {{W}} - l{{\varGamma}} $. All the eigenvalues of matrix ${\tilde{ W}} = [{\tilde w_{ij}}] \in {{\mathbb{C}}^{n \times n}}$ are in the union set of its n Gershgorin disk. The Gershgorin disk radius of matrix ${\tilde{ W}}$ is ${R_i} = \displaystyle\sum\limits_{j = 1,j \ne i}^n {\left| {{{\tilde w}_{ij}}} \right|} = 1 - {w_{ii}}$, then the $i$-th Gershgorin disk of matrix ${\tilde{ W}}$ is ${G_i} = \{ z\left| {\left| {z - {{\tilde w}_{ii}}} \right|} \right. \leqslant {R_i},z \in {\mathbb{C}}\} $. To guarantee the stability of the system (3), ${\tilde{ W}}$ should be a Schur stable matrix. The Gershgorin disk on the complex plane is analyzed, and there are three cases of ${\tilde w_{ii}} = 0$, ${\tilde w_{ii}} > 0$ and ${\tilde w_{ii}} < 0$.

      1) When ${\tilde w_{ii}} = 0$, there are two situations here. If ${\gamma _i} = 0$, we got that ${w_{ii}} = 0$ and ${R_i} = 1$. The matrix ${\tilde{ W}}$ is not Schur stable due to $\rho ({\tilde{ W}}) = 1$. While ${\gamma _i} = 1$, by the conditions mention above, ${w_{ii}} = 1$ which means ${R_{ii}} = 1 - l$. To guarantee the stability, $0 \leqslant {R_{ii}} < 1$, and we have $0 < l \leqslant 1$.

      2) When ${\tilde w_{ii}} > 0$ there are also two cases. If ${\gamma _i} = 0$, ${w_{ii}} > 0$. Further, ${R_i} < 1$, ${\tilde{W}}$ is Schur stable in this case. While ${\gamma _i} = 1$, to make the absolute maximum eigenvalue of matrix ${\tilde{ W}}$ less than one, the inequation of ${\tilde w_{ii}} + {R_i} < 1$ should be satisfied. We have $l > 0$ by solving the inequation.

      3) When ${\tilde w_{ii}} < 0$, there is only the case of ${\gamma _i} = 1$. By the inequation of weii ${\tilde w_{ii}} - {R_i} < - 1$, we have $2{w_{ii}} > l$.

      Take the intersection of all the conditions mention above, the range of parameter $l$ should be $0 < l < {\min _i}\{ 2{w_{ii}},1\} $, and the case of ${\gamma _i} = 0$ in (i) could not happen in a strict condition.

      Definition 1 (Consensus) For the system (3) with any initial state ${{x}}(0)$, if there exists a constant $\chi \in {\mathbb{R}}$ such that:

      $$\mathop {\lim }\limits_{k \to \infty } {{x}}(k) = \chi {{{\textit{1}}}_n}$$

      then we say the system (3) achieves consensus.

      Lemma 1 Under Assumption 1, if the system (3) is stable with ${\rm{tr}}({{\varGamma}} ) \geqslant 1$, all the states ${{x}}(k)$ finally reach consensus on ${{{x}}^{\dagger} } = c{{{\textit{1}}}_n}$.

      Proof: From Theorem 1, we obtain $\rho ({\tilde{ W}}) < 1$. By iterations:

      $$ \begin{aligned} & \qquad\qquad\;\;\;{{x}}(k + 1) = \tilde {{W}}{{x}}(k) + cl{{\varGamma}} {{{\textit{1}}}_n}=\\ & {(\tilde {{W}})^k}{{x}}(0) + [{{I}} + \tilde {{W}} + {(\tilde {{W}})^2} + \cdots + {(\tilde {{W}})^{k - 1}}]cl{{\varGamma}} {{{\textit{1}}}_n}=\\ &\qquad\qquad\;\; {(\tilde {{W}})^k}{{x}}(0) + cl\left( {\sum\limits_{i = 0}^{k - 1} {{{(\tilde {{W}})}^i}} } \right){{\varGamma}} {{{\textit{1}}}_n} \end{aligned} $$

      Since $\mathop {\lim }\limits_{k \to \infty } {({\tilde{ W}})^k}{{x}}(0) = 0$, we obtain ${{{x}}^{\dagger} } = cl{( {{{I}} - {\tilde{ W}}} )^{ - 1}} {{\varGamma}} {{{\textit{1}}}_n}$. Denote ${{\psi}} = l{({{I}} - {\tilde{ W}})^{ - 1}}{{\varGamma}} $, and rewrite the formula as:

      $$ \begin{aligned} &\quad {{\psi}} {{{\textit{1}}}_n} = {({{I}} - {{W}} + l{{\varGamma}} )^{ - 1}}l{{\varGamma}} {{{\textit{1}}}_n} = {({{I}} - {{W}} + l{{\varGamma}} )^{ - 1}}\\ &({{I}} - {{W}} + l{{\varGamma}} ){{{\textit{1}}}_n} \cdots - {({{I}} - {{W}} + l{{\varGamma}} )^{ - 1}}({{I}} - {{W}}){{{\textit{1}}}_n}=\\ &\qquad\quad\;\;\; {{{\textit{1}}}_n} - {({{I}} - {{W}} + l{{\varGamma}} )^{ - 1}}({{\textit{1}}} - {{W}}){{{\textit{1}}}_n} \end{aligned} $$

      Obviously, ${({{I}} - {{W}} + l{{\varGamma}} )^{ - 1}}({{\textit{1}}} - {{W}}){{{\textit{1}}}_n} = 0$. It means that ${{\psi}} $ is stochastic matrix, thus the steady state of ${{x}}(k)$ is ${{{x}}^{\dagger} } = c{{{\textit{1}}}_n}$.

    • In social networks, the intruders usually induce the public opinion to incite the individuals and use the public opinion to benefit from it. Motivated by the above phenomenon, we further investigate system (3) in an attack-defense environment with the goal of finding a way protecting public opinion in the presence of malicious opinion injection. Moreover, we are also interested into two other problems: 1) in the scenario that the intruder can only select the limited number target individuals, how to select those target individuals such that the convergence speed of achieving consensus on malicious opinion is maximized. The answer to this problem makes the efficient selection for the intruder, and also can help us adopting the defense strategy by protecting some ’key’ individuals; 2) how to design a defense mechanism for each individual in order to protect public opinion from malicious opinion?

    • Firstly, we try to solve the first problem, which is similar to the works in Ref.[31-32]. We formulate it as the following optimization problem:

      $$ \begin{aligned} &\;\;\; ({P_1}):\mathop {\min }\limits_{{\varGamma}} J({{\varGamma}} ) = \sum\limits_{k = 0}^\infty {\left\| {{{u}}(k)} \right\|_2^2} \\ & \;\;\;{\rm{s}}{\rm{.t}}{\rm{.}}\begin{array}{*{20}{c}} {} \end{array}{\gamma _i} \in \{ 0,1\} \begin{array}{*{20}{c}} {}&{} \end{array}i = 1,2, \cdots ,n\\ &\qquad\qquad\quad\quad {\left\| \varGamma \right\|_0} \leqslant q \end{aligned} $$

      where the object function $J({{\varGamma}} )$ characterizes the convergence speed of reaching consensus on the malicious opinion $c$, because ${{u}}(k)$ measures the gap between individual opinions and $c$ at each time step. The smaller $J({{\varGamma}} )$, the faster the convergence speed. To characterize the limited resources of the intruder, the number of target individuals is limited to $q$.

      To solve the problem ${P_1}$, we derive the iteration equation of ${{u}}(k)$ as:

      $$ \begin{aligned} & \;\;\;\;\; {{u}}(k + 1) = c{{{\textit{1}}}_n} - {{x}}(k + 1)=\\ & \;\;\;\;\; c{{{\textit{1}}}_n} - [\tilde {{W}}{{x}}(k) + cl{{\varGamma}} {{{\textit{1}}}_n}]=\\ & c{{{\textit{1}}}_n} - \{ \tilde {{W}}[c{{{\textit{1}}}_n} - {{u}}(k)] + cl{{\varGamma}} {{{\textit{1}}}_n}\} = \\ & \;c{{{\textit{1}}}_n} - c{{W}}{{{\textit{1}}}_n} + \tilde {{W}}{{u}}(k) = \tilde {{W}}{{u}}(k) \end{aligned} $$

      with ${\tilde{ W}} = {{W}} - l{{\varGamma}} $, then the objective function $J({{\varGamma}} )$ can be rewritten as:

      $$ \begin{aligned} & \qquad\quad\;\ J({{\varGamma}} ) = \sum\limits_{k = 0}^\infty {{{u}}{{(k)}^{\rm{T}}}{{u}}(k)}= \\ & \qquad\;\ {{u}}{(0)^{\rm{T}}}\sum\limits_{k = 0}^\infty {{{({{\tilde {{W}}}^k})}^{\rm{T}}}{{\tilde {{W}}}^k}{{u}}(0)} =\\ &\qquad\;\ {{u}}{(0)^{\rm{T}}}{({{{I}}_n} - {{\tilde {{W}}}^2})^{ - 1}}{{u}}(0)=\\ & 1/2{{u}}{(0)^{\rm{T}}}[{({{{I}}_n} + \tilde {{W}})^{ - 1}} + {({{{I}}_n} - \tilde {{W}})^{ - 1}}]{{u}}(0) \end{aligned} $$

      After appropriate conversion of the first condition in ${P_1}$, we can use ${\tilde{ W}}$ to represent the range of ${\gamma _i}$, thus to make it easy for computer simulation. It should be noted that this conversion has no effect on the following results:

      $$ \begin{aligned} & \qquad\qquad \qquad\qquad\quad ({P_2}):\\ & \mathop {\min }\limits_{{\varGamma}} J({{\varGamma}} ) = {{u}}{(0)^{\rm{T}}}[{({{{I}}_n} + \tilde {{W}})^{ - 1}} + {({{{I}}_n} - \tilde {{W}})^{ - 1}}]{{u}}(0)\\ & {\rm{s}}{\rm{.t}}{\rm{.}}\quad{\gamma _i} \geqslant \left\| {1 - } \right\|{(\tilde {{W}})_i}\left\| {_1} \right.\left\| {_0} \right.\quad i = 1,2, \cdots ,n\\ & \qquad\qquad\qquad\quad\;\; {\rm{tr}}({{\varGamma}} ) \leqslant q \end{aligned} $$

      where ${({\tilde{ W}})_i}$ is the $i$-th row of ${\tilde{ W}}$.

      The above optimization problem has been transformed into a convex optimization problem, which can be solved by some typical methods[33].

      It is NP-hard to traverse all possible results for Boolean combinatorial problems in large-scale networks. For solving the combinatorial optimization problem, ${l_1}$ norm is often used instead of ${l_0}$ norm to obtain a more flexible calculation method[34]. Similar to the method in Ref.[35], we use an weighted ${l_1}$ norm to obtain an approximation guarantee for node selection strategy. Using all the above arguments, we implement an algorithm to solve suboptimal problem ${P_3}$ relaxed by ${P_2}$, which sacrifices a certain selection accuracy while reducing the computation complexity greatly.

      Algorithm 1: Suboptimal selection algorithm

      Input: input parameters ${{W}}$,$c$,$l$,$e$.

      Output: selection strategy ${{\varGamma}} $ and suboptimal object function value ${{J}}$.

      1) Initialization parameters: ${x_i}(0)$, ${f_i}(0)$.

      2) Solve the optimization problem with interior point method and replace ${l_0}$ norm with ${l_1}$ norm:

      $$ \begin{aligned} &\qquad\qquad\qquad\qquad\;\; ({P_3}):\\ & \mathop {\min }\limits_{{\varGamma}} J({{\varGamma}} ) = {{u}}{(0)^{\rm{T}}}[{({{{I}}_n} + \tilde {{W}})^{ - 1}} + {({{{I}}_n} - \tilde {{W}})^{ - 1}}]{{u}}(0)\\ & {\rm{s}}{\rm{.t}}{\rm{.}}\quad{\gamma _i} \geqslant {f_i}(t)(1 - {\left\| {{{(\tilde {{W}})}_i}} \right\|_1})\quad i = 1,2, \cdots ,n\\ &\qquad\qquad\qquad\qquad {\rm{tr}}({{\varGamma}} ) \leqslant q \end{aligned} $$

      3) Update the weights by ${f_i}(t + 1) = {({\gamma _i}(t) + e)^{ - 1}}$, here $e > 0$ is a small real number to prevent the denominator from being zero.

      4) Let $t: = t + 1$, and return to step 2) until the solution of the algorithm in iteration has converged or $t$ reaches maximum.

      The solution of the above algorithm could be computed in $O({n^2})$ operations. Besides, convex optimization method including active-set or stepwise quadratic programming can also solve this problem effectively.

      By solving the optimization problem, we obtain a suboptimal solution due to the replacement of ${l_0}$ norm. Numerous efforts have been directed towards using the approximation method to solve the combinatorial problems including ${l_1}$-replacement with the aid of ADMM[36]and convex relaxation[37]. Here, we are more interested into providing a heuristic method rather than obtaining the optimal solution.

    • In this section, a defense mechanism is designed to resist hostile opinion from the intruder by identifying target individuals in the network so as to avoid continuous hostile opinion injection. The purpose of the intruder is to make individuals deviating from the original opinions and achieving on the hostile opinion of attacker. Generally, the malicious opinion of the intruder differs from the original weighted averaged opinion of individuals at steady state with large gap. From the perspective of the network, if it is aware of the potential attack and the attacking types of the attacker, it can implement a defense mechanism on each individual to identify the compromised opinion at each time step.

      Aggressive behavior in attack-defense environ-ment often leads the individuals’ original agreement opinion to a completely different situation, which means that the intruder’s target opinion will be greatly deviat-ed from the opinion reached in the unattacked case. Assume that the opinion of the intruder is significantly different from the weighted averaged opinion of individuals in the normal situation at the steady state. Suppose that each individual is aware of the intruder lurking in the network and disguising itself as its neighboring individual with a certain probability, but the identity of the target individuals selected by the attacker is still unknown. Thus, each individual needs to identify whether it has been selected by the intruder. To solve this problem, we propose a defense mechanism, where the individual decides to stop communicating with its neighboring individuals by comparing its opinion with its neighboring individuals’ averaged opinion. The mechanism is similar to the infectious resource tracing and control in virus broadcasting area.

      With this mechanism, at each time step individual $i \in V$ compares the gap of its opinion and the average opinion of its neighboring individuals with a given threshold:

      $$ \left| {{x_i}(k) - {\rm{E}}[{x_i}(k)]} \right| \leqslant \varepsilon (k) $$ (4)

      with:

      $$ {\rm{E}}[{x_i}(k)] = \frac{1}{{{m_i}(k)}}\sum\limits_{j \in {{{N}}_i}(k)} {{x_j}(k)} $$

      where ${m_i}(k) = |{{{N}}_i}(k)|$. If the gap is larger than the given threshold, individual $i$ will no longer communicate with its neighboring individuals. According to the above rule, parts of individuals stop sending data to its neighboring individuals at a certain time. Thus the neighboring set of individual $i$ is time-varying, i.e., ${{{N}}_i}(k)$, $\forall i$. Assuming that $\varepsilon (k)$ is a heterogeneous threshold, which follows:

      $$\varepsilon (k) = R{\rho ^k}$$ (5)

      with parameter $R$ is a non-zero positive number, and $0 < \rho < 1$.

      Recall that the initial opinions of individuals are random. If the initial $\varepsilon (0)$ is sufficient small, the false alarm rate may occur and normal individuals could be isolated prematurely. Thus, the initial $\varepsilon (0)$ should not be too small. With the continuous communication of individuals, the opinions of individuals evolve with a period of time, and the gap between the various opinions gradually decreases. If $\varepsilon (k)$ is too large, the target individuals cannot be identified. Hence, we adopt an attenuated threshold. Existing work has examined the opinion dynamic with declining confidence using function (5) in Ref.[38], where parameter $R$ limits the threshold range and parameter $\,\rho $ characterizes the confidence decay of individuals. Apparently, the choice of coefficient $R$, $\rho $ have direct influences on the defense effects.

      In addition, because the neighboring set of individual $i$ is time-varying, the edge weights are also recalculated at each time step, which evolves as:

      $$ {w_{ij}}(k + 1) = \left\{ \begin{aligned} & \frac{{{w_{ij}}(k)}}{{\displaystyle\sum\limits_{j \in {{{N}}_i}(k)} {{w_{ij}}(k)} }}\quad j \in {{{N}}_i}(k)\\ & 0\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;{\rm{otherwise}} \end{aligned} \right. $$

      In the communication network topology, if $\left| {{x_i}(k)} \right. - $$\left. {{\rm{E}}[{x_i}(k)]} \right| \leqslant \varepsilon (k)$, then the neighboring set of individual $i$ is:

      $$ {N_i}(k + 1) = \{ j:\left| {{x_j}(k) - {\rm{E}}[{x_j}(k)]} \right| \leqslant \varepsilon (k),j \in {N_i}(k)\} $$

      with ${N_i}(0) = {N_i}$,${N_i}(k) \subseteq {N_i}$. Conversely, if individual $i$ regards itself being injected malicious opinion at time step $k$, i.e.,$\left| {{x_i}(k) - {\rm{E}}[{x_i}(k)]} \right| > \varepsilon (k)$, then ${N_i}(k + 1) = \emptyset $ and its weight ${w_{ii}} = 1$ and ${w_{ij}} = 0$, $i \ne j$.

      Overall, the opinion of each individual equipped with the proposed defense mechanism is updated by:

      $$ {x_i}(k + 1) = \sum\limits_{j = 1}^n {{w_{ij}}(k){x_j}(k)} + l{\gamma _i}{u_i}(k) $$ (6)

      Equipped with the above mechanism, each individual conducts a self-assessment after each round of communication, and judges whether it has been attacked. If the individual is suspicious of being target individual, then it stops communicating with its neighboring individuals. It is similar to the isolation scheme of flu virus spreading in the crowd, where the infected people are consciously away from the group to avoid group infection. Eventually, those individuals identifying themselves as target individuals turn to be the isolated in the network. Meanwhile, the normal individuals might also turn to be isolated nodes, i.e.${w_{ij}} = 0$, $\forall i$, $j \in V$, $i \ne j$ if $\varepsilon (k)$ does not fit the evolving of opinions well. With the simulation tool, we also find that most of the normal individuals achieve steady-state before turning to isolated nodes.

      In the following, we begin to analyze the convergence of the Eq. (6).

      Theorem 2 (Convergence) For the Eq. (6) equipped with the defense mechanism Eq. (4), the opinion ${x_i}(k)$ converges to a steady-state opinion, i.e., $x_i^ * = \mathop {\lim }\limits_{k \to \infty } {x_i}(k)$.

      Proof: Let $i,j \in V$. The upper bound of opinion gap at each interval is derived by:

      $$\begin{aligned} &\qquad\;\; \left| {{x_i}(k + 1) - {x_i}(k)} \right| = \\ & \left| {\left( {\sum\limits_{j = 1}^n {{w_{ij}}(k){x_j}(k) + l{\gamma _i}{u_i}(k)} } \right) - {x_i}(k)} \right| \leqslant \\ & \left| {\sum\limits_{j = 1}^n {{w_{ij}}(k){x_j}(k) - {x_i}(k)} } \right| + \left| {l{\gamma _i}{u_i}(k)} \right| = \\ & \left| {\sum\limits_{j = 1}^n {{w_{ij}}(k)({x_j}(k) - {x_i}(k)} )} \right| + \left| {l{\gamma _i}{u_i}(k)} \right| = \\ & \left| {\sum\limits_{j \in {{{N}}_i}(k)} {{w_{ij}}(k)({x_j}(k) - {x_i}(k))} } \right| + \left| {l{\gamma _i}{u_i}(k)} \right| \leqslant \\ & \sum\limits_{j \in {{{N}}_i}(k)} {{w_{ij}}(k)\left| {{x_j}(k) - {x_i}(k)} \right|} + \left| {l{\gamma _i}{u_i}(k)} \right| = \\ & \sum\limits_{j \in {{{N}}_i}(k)} {{w_{ij}}(k)\left| {{x_j}(k) + {\rm{E}}[{x_j}(k)] - {\rm{E}}[{x_j}(k)]} \right.} + \\ & \;\;\;\;\left. {{\rm{E}}[{x_i}(k)] - {\rm{E}}[{x_i}(k)] - {x_i}(k)} \right| + \left| {l{\gamma _i}{u_i}(k)} \right| \end{aligned} $$

      Let ${\Delta _{ij}}(k) = \left| {{\rm{E}}[{x_i}(k)] - {\rm{E}}[{x_j}(k)]} \right|$, then the above derivation can be rewrite as:

      $$\begin{aligned} & \qquad\qquad\;\;\;\;\; \left| {{x_i}(k + 1) - {x_i}(k)} \right| \leqslant \\ &\sum\limits_{j \in {{{N}}_i}(k)} {{w_{ij}}(k)(\left| {{x_j}(k) - {\rm{E}}[{x_j}(k)]} \right|} + \left| {{x_i}(k) - {\rm{E}}[{x_i}(k)]} \right| + \end{aligned} $$
      $$\begin{aligned} &\qquad\;\;\;\;\;\;\;\;\; {\Delta _{ij}}(k)) + \left| {l{\gamma _i}{u_i}(k)} \right| = \\ &(1 - {w_{ii}}(k))(\left| {{x_j}(k) - {\rm{E}}[{x_j}(k)]} \right| + \left| {{x_i}(k) - {\rm{E}}[{x_i}(k)]} \right| + \\ & \qquad\;\;\;\;\;\;\;\;\;{\Delta _{ij}}(k)) + \left| {l{\gamma _i}{u_i}(k)} \right| \\ \end{aligned} $$

      and both $i$ and $j$ satisfy the inequation (4) at the same time, we have:

      $$\begin{aligned} & \left| {{x_i}(k + 1) - {x_i}(k)} \right| \leqslant 2(1 - {w_{ii}}(k))R{\rho ^k} + \\ &\;\;\;\;\; l{\gamma _i}\left| {{u_i}(k)} \right| + (1 - {w_{ii}}(k)){\Delta _{ij}}(k) \\ \end{aligned} $$

      Note that $0 < {w_{ii}}(k) \leqslant 1$. It follows that:

      $$\begin{aligned} & \left| {{x_i}(k + 1) - {x_i}(k)} \right| \leqslant 2R{\rho ^k} + l{\gamma _i}\left| {{u_i}(k)} \right| + \\ & \;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;\;(1 - {w_{ii}}(k)){\Delta _{ij}}(k) \\ \end{aligned} $$

      Then the gap between the individual’s opinions at time $k$ and $k + \tau $ is:

      $$\begin{split} & \left| {{x_i}(k + \tau ) - {x_i}(k)} \right| \leqslant 2\sum\limits_{s = 0}^{\tau - 1} {R{\rho ^{k + s}} + l{\gamma _i}\sum\limits_{s = 0}^{\tau - 1} {\left| {{u_i}(k + s)} \right| + } } \\ & \quad\;\;\;\;\;\;\;\;\;\;\sum\limits_{s = 0}^{\tau - 1} {(1 - {w_{ii}}(k + s))} {\Delta _{ij}}(k + s) \end{split} $$ (7)

      Let $\varPsi = 2\displaystyle\sum\limits_{s = 0}^{\tau - 1} {R{\rho ^{k + s}}} = (2R/(1 - \rho )){\rho ^k}(1 - {\rho ^\tau })$, $\varUpsilon = $$\displaystyle\sum\limits_{s = 0}^{\tau - 1} {(1 - {w_{ii}}(k + s))} (\left| {{\rm{E}}[{x_i}(k + s)] - {\rm{E}}[{x_j}(k + s)]} \right|)$ and $\varPhi = l{\gamma _i}\times \displaystyle\sum\limits_{s = 0}^{\tau - 1} {\left| {{u_i}(k + s)} \right|} $. We will consider two situa-tions next.

      1) If ${\gamma _i} = 0$, Eq.(7) equals to $\left| {{x_i}(k + \tau ) - {x_i}(k)} \right|$$ \leqslant \varPsi + \varUpsilon $. As explained in Remark 5, if the network defense mechanism develops without limit, the individuals in the network will become isolated individuals at a certain moment since threshold $\varepsilon $ can’t always fit in the changes of opinions, i.e., $\mathop {\lim }\limits_{\tau \to \infty } (1 - {w_{ii}}(k + \tau )) = 0$. It’s hard to judge at which time point the individuals becomes isolated, but we can be sure that $\mathop {\lim }\limits_{\tau \to \infty } \varUpsilon = (1 + {w_{ii}}(k)){\Delta _{ij}}(k) + (1 + {w_{ii}}(k{\rm{ + }}1)) {\Delta _{ij}}(k{\rm{ + }}1) + $ $ \cdots + 0$ is limited. As $\tau $ goes to infinity, the inequality is going to be $\left| {{x_i}(k + \tau ) - {x_i}(k)} \right| \leqslant $$(2R/(1 - \rho )){\rho ^k} + \mathop {\lim }\limits_{\tau \to \infty } \varUpsilon $. Let $\varTheta = \mathop {\lim }\limits_{\tau \to \infty } \varUpsilon $, the above conclusion means that $\mathop {\lim }\limits_{k \to \infty } 1 - {w_{ii}}(k) = 0$, and $\mathop {\lim }\limits_{k \to \infty } \varTheta = 0$. In summary, $\mathop {\lim }\limits_{k \to \infty } {\rm{|}}{x_i}(k + \tau )$$ - {x_i}(k){\rm{|}} = 0$, i.e., ${x_i}(k)$ converges to steady state.

      2) If ${\gamma _i} = 1$, because the weight matrix ${{W}}(k)$ is time-varying under defense mechanism, it is difficult to derive simpler form. But in extreme conditions, when all the individuals are target individuals, all the opinions eventually converge to the attacker’s opinion $c$. Thus, when ${\gamma _i} = 1$, $\forall i$, $\left| {{x_i}(k + \tau ) - {x_i}(k)} \right| \leqslant \left| {c - {x_i}(0)} \right|$ is definitely established.

    • In this section, we provide some numerical results to verify the derived theoretical results. Notice that the graph remains conncted in all the examples.

      Example 1 (DeGroot model in the presence of an intruder). Consider a social network consisting of 20 individuals (see Fig. 2a. Here, the blue square represents normal individuals and the red triangle represents target individuals.), with the second largest eig-envalue of the weight matrix is ${\lambda _2}({{W}}) = 0.978\;2$ and ${\min _i}({w_{ii}}) = 0.066$. Let the malicious opinion be $c = 0.8$ and the weight be $l = 0.8 {\min _i}({w_{ii}})$. We generate ${{\varGamma}} $ with $||{{\varGamma}} |{|_0} = 10$, and choose the initial opinions ${x_i}(0) \in [0,1]$ randomly.

      Figure 2.  The topology of social network and opinion dynamics in network.

      The evolving of opinions of Eq. (3) is shown as Fig. 2b. Lines of different colors represent different individuals. Obviously, the individuals’ opinions converge to the malicious opinion $c$ in short time.

      Example 2 (Suboptimal selection strategy). Consider the social network in Fig. 2a with identical system parameters as Example 1. Algorithm 1 returns a suboptimal selection solution for the intruder such that the aggregation speed is maximized.

      Fig. 3 shows the relationship between the objective function $J({{\varGamma}} )$ and the number $q$ under suboptimal selection strategy and random selection strategy. Obviously, the aggrega-tion speed under the former is faster than one of the latter. In addition, the aggregation speed increases as $q$ increasing, which also satisfies with the intuitive results.

      In order to better understand the optimization process, we also investigate the objective function $J({{\varGamma}} )$ under two different centrality indices[39], i.e., betweenness centrality ${C_B}$ and closeness centrality ${C_c}$, in complex networks in the case of $q = 1$. Betweenness centrality ${C_B}$ is an index to describe the importance of a node by the number of shortest paths through the node. Closeness centrality ${C_c}$ is reflected in the proximity between one node and other nodes in the network. Fig. 4 shows that individuals with higher ${C_B}$, ${C_c}$ lead to smaller $J({{\varGamma}} )$ generally. Here, the path length is represented by edge weight in the calculation of ${C_c}$. This result is obvious, the greater the influence of the nodes, the greater the contribution on the evolution of the network. It also inspires us to use network centrality to investigate target individual selection strategy from the perspective of network topology.

      Figure 3.  $\ln (J({{\varGamma}} ))$ vs $q$ under two selection strategies.

      Figure 4.  The objective function $J({{\varGamma}} )$ under different indices ${C_B}$, ${C_c}$, respectively.

      Example 3 (defense mechanism). In this example, we further study the Eq. (3) under defense mechanism with heterogeneous threshold $\varepsilon (k) = 0.9 \times {0.95^k}$. As shown in Fig. 5a, the opinions of individuals are slowly far away from the intruder’s influence, and divide into many clusters at steady state. Here, the solid line represents target individuals, and the dotted line represents normal individuals. The. In order to better understand the evolving process of opinions, Fig. 6 shows the network topology at certain time step. As the communication network topology evolves, the target individuals selected by the intruder become isolated. It is worth mentioning that the choice of parameters of threshold function has great influence on the false alarm rate, i.e., the normal individual is mistaken for target individual, or vice versa. Thus, it is key to find a suitable threshold function. However, to the best of our knowledge, few results have been obtained to the choice of the threshold. In the existing literatures, the works[27,40] provide some heuristic algorithms to generate threshold functions which cannot be simply characterized by general explicit expressions.

      Figure 5.  The dynamic evolution of opinions under defense mechanism.

      Figure 6.  The evolution of networks in communication under defense mechanism.

    • In this paper, we have investigated the dynamic evolution of individual social opinions in an attack-defense environment, where an intruder disguises itself as one of neighboring individual of target individuals in order to guide the network opinion to a serious direction. First, we have developed a modified DeGroot model in the presence of malicious opinion injection, and have proved that all the individuals’ opinions converge to the malicious opinion of the intruder if no defense mechanism is implemented. Second, we have proposed an algorithm to obtain a suboptimal solution to select target individuals in order to maximize the convergence speed of opinion aggregation when the number of target individuals is limited. The results can help us effectively improve the defense capability of the network by protecting those ’key’ individuals. Third, we have proposed a defense mechanism using the online gap comparison to resist hostile attacks, which is similar to the self-inspecting and isolating scheme in virus spreading area. We have also analyzed the opinion convergence performance of individuals with defense mechanism. Finally, the numerical simulation have verified all the derived results and explored some performances of the proposed model.

参考文献 (40)

目录

    /

    返回文章
    返回