Robust Network Tomography: k-identifiability and Monitor Assignment