An approach for modeling vulnerability of the network of networks

被引:25
|
作者
Zhang, Jianhua [1 ]
Song, Bo [1 ]
Zhang, Zhaojun [1 ]
Liu, Haikuan [1 ]
机构
[1] Jiangsu Normal Univ, Sch Elect Engn & Automat, Xuzhou 221116, Peoples R China
基金
中国国家自然科学基金;
关键词
Network of networks; Interdependency; Dependent intensity; Vulnerability; INTERDEPENDENT INFRASTRUCTURE SYSTEMS; CASCADING FAILURES; COMPLEX NETWORKS; SUBWAY SYSTEM; ROBUSTNESS; INTERNET; ANALYZE; EVENTS; ATTACK; SCALE;
D O I
10.1016/j.physa.2014.06.035
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this paper, a framework is given to model the network of networks and to investigate the vulnerability of the network of networks subjected to failures. Because there are several redundant systems in infrastructure systems, the dependent intensity between two networks is introduced and adopted to discuss the vulnerability of the interdependent infrastructure networks subjected to failures. Shanghai electrified rail transit network is used to illustrate the feasibility and effectiveness of the proposed framework. Because the rail network is dependent on the power grid and communication network, the corresponding power grid and communication network are also included in this system. Meanwhile the failures to the power grid and communication network are utilized to investigate the vulnerability of the rail network. The results show that the rail network strongly depends on the power grid and weakly depends on the communication network, and the transport functionality loss of the rail network increases with the increase of dependent intensity. Meanwhile the highest betweenness node-based attack to the power grid and the largest degree node-based attack to the communication network can result in the most functionality losses to the rail network. Moreover, the functionality loss of the rail network has the smallest value when the tolerance parameter of the power grid equals 0.75 and the critical nodes of the power grid and communication network can be obtained by simulations. Crown Copyright (C) 2014 Published by Elsevier B.V. All rights reserved.
引用
收藏
页码:127 / 136
页数:10
相关论文
共 50 条
  • [21] Promoting Resiliency in Emergency Communication Networks: A Network Interdiction Modeling Approach
    Bartolacci, Michael R.
    Dimitrov, Stanko
    LeBlanc, Larry J.
    [J]. PROCEEDINGS OF THE 50TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2017, : 2509 - 2516
  • [22] The vulnerability of communities in complex networks: An entropy approach
    Wen, Tao
    Deng, Yong
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2020, 196
  • [23] Graph Theory Approach to the Vulnerability of Transportation Networks
    Guze, Sambor
    [J]. ALGORITHMS, 2019, 12 (12)
  • [24] Efficiency and Vulnerability in Networks: A Game Theoretical Approach
    Manuel, Conrado M.
    Ortega, Eduardo
    [J]. AXIOMS, 2023, 12 (12)
  • [25] A new approach to vulnerability evaluation of communication networks
    Bulteau, S
    Rubino, G
    [J]. TELETRAFFIC CONTRIBUTIONS FOR THE INFORMATION AGE, 1997, 2 : 681 - 690
  • [26] Worldwide aviation network vulnerability analysis: a complex network approach
    Tran, Q. H. Anh
    Namatame, Akira
    [J]. EVOLUTIONARY AND INSTITUTIONAL ECONOMICS REVIEW, 2015, 12 (02) : 349 - 373
  • [27] Worldwide aviation network vulnerability analysis: a complex network approach
    Q. H. Anh Tran
    Akira Namatame
    [J]. Evolutionary and Institutional Economics Review, 2015, 12 (2) : 349 - 373
  • [28] Vulnerability of sewer network - graph theoretic approach
    Ganesan, Balaraman
    Raman, Sundareswaran
    Ramalingam, Sujatha
    Turan, Mustafa Erkan
    Bacak-Turan, Goksen
    [J]. DESALINATION AND WATER TREATMENT, 2020, 196 : 370 - 376
  • [29] A Novel Approach for Network Vulnerability Analysis in IIoT
    Sudhakar, K.
    Senthilkumar, S.
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 45 (01): : 263 - 277
  • [30] The stochastic approach in road network vulnerability analysis
    Bil, Michal
    Vodak, Rostislav
    [J]. SAFETY AND RELIABILITY: METHODOLOGY AND APPLICATIONS, 2015, : 929 - 932