From: Survivable strategy set design for malicious attack propagation in NEMO scenario
Transition state | Condition | P ij | State i to state j |
---|---|---|---|
Attack phase | i[0] = 1; j[0] = 0 | λ 1 | (1,1, …,1)→(0,1, …,1) |
{1′} ∉ i | λ 2 | (0,1, …,1)→(0,0, …,1) | |
{1′} ∉ j | … | …… | |
L(i) = L(j) + 1 | λ n | (0,0, …,1)→(0,0, …,0) | |
Repair phase | i[0] = 0; j[0] = 1′ | μ 1 | (0,0, …,0)→(1′,0, …,0) |
{1} ∉ i | μ 2 | (1′,0, …,0)→(1′,1′, …,0) | |
{1} ∉ j | … | …… | |
L′(j) = L(i) + 1 | μ n | (1′,1′, …,0)→(1′,1′, …,1′) |