The proposed framework presented in
Chapter 4, exploiting concepts of queuing theory, was demonstrated for wireless multihop networks (RGGs). Additionally, results were provided for static and dynamic networks, where for the case of networks
with churn, the results involved other types of complex networks as well. However, a significant number of minor or major open problems remain open. In this section, we review the most noteworthy of these problems, accompanied with a small outline of the steps one might initially take in order to tackle them, or at least attempt a first approach.
•
Analytic solutions for nondynamic complex networks. For the case of fixed (nondynamic) networks, the framework was demonstrated analytically for malware propagative and spreading random geometric (multihop) topologies. Similar results can be obtained for other complex networks, e.g. regular and scale-free. Obtaining analytic solutions for these topologies pends on the availability of closed-form expressions for the degree distribution of each network. Within Network Science some of these expressions are available, e.g. regular and scale-free, but for others, especially small-world, the characterization is based on rule-of-thumb definitions. Thus, for networks that the analytic expression of their connectivity is available, the methodology of
Chapter 4 can be employed. On a per network type basis, the involved algebra might be cumbersome, but it seems viable to obtain at least sufficient analytic approximations in closed-form, depending on the special features of each topology.
•
Analytic solutions for complex networks with churn. Malware diffusion models for dynamic networks with churn were explained in
Chapter 4, and the results provided were obtained via simulations. An interesting extension would be to obtain analytic solutions for those types of complex networks, similarly to the nondynamic networks. The methodology will be similar, since due to the closed three-queue network model (
Fig. 4.22a), an intermediate step is required to suppress the three-queue network into a two-queue Norton network before proceeding in its analysis as demonstrated in
Chapter 4.
•
Malware-propagative networks with churn. An equally interesting, and seemingly fairly straightforward, direction to extend the model presented for networks with churn is the malware propagation case. In
Chapter 4, only the case of malware spreading was considered. Following the same lines as for malware-propagative nondynamic networks, similar results for malware-propagative networks with churn can be obtained.
•
Taking into account energy constraints. In
Chapter 4, the models presented for nondynamic networks do not take into account energy considerations. Incorporating directly such type of constraints on the model is a very challenging task. The main complication arises from the nodes depleting their energy reserves and being removed from the network. This impacts the ergodicity of the system. An alternative way to tackle this has been presented in the second half of
Chapter 4, in Section
4.4. In the latter, modifying appropriately the churn processes to accurately describe the effect of energy depletion (node removal) and the addition of new recharged nodes allows to utilize the methodology of Section
4.4 to solve for the steady-state of the system. It allows also to obtain solutions for specific types of networks and their parameters, e.g. multihop or mobile (as currently this has not been achieved).
•
Heterogeneous infection/recovery rates. In all of the models in
Chapter 4, uniform infection/recovery rates were considered, i.e.
λm=λ,μk=μ for all links
m, nodes
k. Considering heterogeneous values is a straightforward but complicated task, with considerable practical merit, nevertheless, since in real scenarios such rates are expected to be heterogeneous. The analytic expressions are expected to be much more complicated.
• Impact of mobility. Currently, no mobility considerations have been taken into account, for the same purposes as with energy constraints. A possible way to tackle this is as with energy, via the model developed for dynamics networks with churn, where a node may be considered as disappearing in its original position and reappearing in the final predicted by the mobility model. However, this is a rather complicated approach. Searching for a seamless technique to address this within the queuing framework is currently an important open problem.