An approach for modeling vulnerability of the network of networks

被引:25
|
作者
Zhang, Jianhua [1 ]
Song, Bo [1 ]
Zhang, Zhaojun [1 ]
Liu, Haikuan [1 ]
机构
[1] Jiangsu Normal Univ, Sch Elect Engn & Automat, Xuzhou 221116, Peoples R China
基金
中国国家自然科学基金;
关键词
Network of networks; Interdependency; Dependent intensity; Vulnerability; INTERDEPENDENT INFRASTRUCTURE SYSTEMS; CASCADING FAILURES; COMPLEX NETWORKS; SUBWAY SYSTEM; ROBUSTNESS; INTERNET; ANALYZE; EVENTS; ATTACK; SCALE;
D O I
10.1016/j.physa.2014.06.035
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this paper, a framework is given to model the network of networks and to investigate the vulnerability of the network of networks subjected to failures. Because there are several redundant systems in infrastructure systems, the dependent intensity between two networks is introduced and adopted to discuss the vulnerability of the interdependent infrastructure networks subjected to failures. Shanghai electrified rail transit network is used to illustrate the feasibility and effectiveness of the proposed framework. Because the rail network is dependent on the power grid and communication network, the corresponding power grid and communication network are also included in this system. Meanwhile the failures to the power grid and communication network are utilized to investigate the vulnerability of the rail network. The results show that the rail network strongly depends on the power grid and weakly depends on the communication network, and the transport functionality loss of the rail network increases with the increase of dependent intensity. Meanwhile the highest betweenness node-based attack to the power grid and the largest degree node-based attack to the communication network can result in the most functionality losses to the rail network. Moreover, the functionality loss of the rail network has the smallest value when the tolerance parameter of the power grid equals 0.75 and the critical nodes of the power grid and communication network can be obtained by simulations. Crown Copyright (C) 2014 Published by Elsevier B.V. All rights reserved.
引用
收藏
页码:127 / 136
页数:10
相关论文
共 50 条
  • [1] Vulnerability of network of networks
    Havlin, S.
    Kenett, D. Y.
    Bashan, A.
    Gao, J.
    Stanley, H. E.
    [J]. EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS, 2014, 223 (11): : 2087 - 2106
  • [2] Vulnerability of network of networks
    S. Havlin
    D.Y. Kenett
    A. Bashan
    J. Gao
    H.E. Stanley
    [J]. The European Physical Journal Special Topics, 2014, 223 : 2087 - 2106
  • [3] A Continuum Modeling Approach for Network Vulnerability Analysis at Regional Scale
    Ho, H. W.
    Sumalee, Agachai
    Lam, William H. K.
    Szeto, W. Y.
    [J]. 20TH INTERNATIONAL SYMPOSIUM ON TRANSPORTATION AND TRAFFIC THEORY (ISTTT 2013), 2013, 80 : 846 - 859
  • [4] Modeling the Vulnerability of Waterway Networks
    Wu, Lichuan
    Wen, Yuanqiao
    Zhou, Chunhui
    Xiao, Changshi
    Zhang, Jinfeng
    [J]. JOURNAL OF WATERWAY PORT COASTAL AND OCEAN ENGINEERING, 2014, 140 (04)
  • [5] Assessing seismic vulnerability of urban road networks by a Bayesian network approach
    Tang, Yun
    Huang, Shuping
    [J]. TRANSPORTATION RESEARCH PART D-TRANSPORT AND ENVIRONMENT, 2019, 77 : 390 - 402
  • [6] DEVS Modeling of Network Vulnerability
    Seo, Hee Suk
    Kim, Tae Kyung
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 26, PARTS 1 AND 2, DECEMBER 2007, 2007, 26 : 648 - +
  • [7] Network vulnerability: An approach to reliability analysis at the level of national strategic transport networks
    D'Este, GM
    Taylor, MAP
    [J]. NETWORK RELIABILITY OF TRANSPORT, PROCEEDINGS, 2003, : 23 - 44
  • [8] Characterization of the Vulnerability of Road Networks to Fluvial Flooding Using Network Percolation Approach
    Abdulla, Bahrulla
    Mostafavi, Ali
    Birgisson, Bjorn
    [J]. COMPUTING IN CIVIL ENGINEERING 2019: SMART CITIES, SUSTAINABILITY, AND RESILIENCE, 2019, : 428 - 435
  • [9] On modeling computer networks for vulnerability analysis
    Campbell, C
    Dawkins, J
    Pollet, B
    Fitch, K
    Hale, J
    Papa, M
    [J]. RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY, 2003, 128 : 233 - 244
  • [10] An overview of network vulnerability modeling approaches
    Murray A.T.
    [J]. GeoJournal, 2013, 78 (2) : 209 - 221