Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2017, Article ID 8673143, 12 pages
https://doi.org/10.1155/2017/8673143
Research Article

Complexity and Vulnerability Analysis of Critical Infrastructures: A Methodological Approach

1State Key Laboratory for Geomechanics & Deep Underground Engineering, China University of Mining and Technology, Xuzhou 22116, China
2School of Mechanics and Civil Engineering, China University of Mining and Technology, Xuzhou 221116, China
3School of Civil Engineering, Southeast University, Nanjing 210096, China
4College of Economic and Management, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
5School of Civil Engineering, Lanzhou University of Technology, Lanzhou 730050, China

Correspondence should be addressed to Liangliang Song; nc.ude.ues@381921032

Received 17 May 2017; Revised 23 August 2017; Accepted 29 August 2017; Published 19 October 2017

Academic Editor: Ruben Specogna

Copyright © 2017 Yongliang Deng et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Masiero and R. Maggi, “Estimation of indirect cost and evaluation of protective measures for infrastructure vulnerability: a case study on the transalpine transport corridor,” Transport Policy, vol. 20, pp. 13–21, 2012. View at Publisher · View at Google Scholar · View at Scopus
  2. J. Wang and L. Rong, “Cascade-based attack vulnerability on the US power grid,” Safety Science, vol. 47, no. 10, pp. 1332–1336, 2009. View at Publisher · View at Google Scholar · View at Scopus
  3. O. Renn, A. Klinke, and M. Van Asselt, “Coping with complexity, uncertainty and ambiguity in risk governance: a synthesis,” Ambio, vol. 40, no. 2, pp. 231–246, 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. W. Kröger, “Critical infrastructures at risk: a need for a new conceptual approach and extended analytical tools,” Reliability Engineering and System Safety, vol. 93, no. 12, pp. 1781–1787, 2008. View at Publisher · View at Google Scholar · View at Scopus
  5. S. V. Buldyrev, R. Parshani, G. Paul, H. E. Stanley, and S. Havlin, “Catastrophic cascade of failures in interdependent networks,” Nature, vol. 464, no. 7291, pp. 1025–1028, 2010. View at Publisher · View at Google Scholar · View at Scopus
  6. E. Rodríguez-Núñez and J. C. García-Palomares, “Measuring the vulnerability of public transport networks,” Journal of Transport Geography, vol. 35, pp. 50–63, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. W. Wei, M. Guo, L. Ye, G. Liao, and Z. Yang, “Work-family conflict and safety participation of high-speed railway drivers: job satisfaction as a mediator,” Accident Analysis and Prevention, vol. 95, pp. 97–103, 2016. View at Publisher · View at Google Scholar · View at Scopus
  8. T. Aldemir, “A survey of dynamic methodologies for probabilistic safety assessment of nuclear power plants,” Annals of Nuclear Energy, vol. 52, pp. 113–124, 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. J. Wang and H. Huang, “Road network safety evaluation using Bayesian hierarchical joint model,” Accident Analysis and Prevention, vol. 90, pp. 152–158, 2016. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Seo, M. Koo, K. Kim, and J. Koo, “A Study on the probability of failure model based on the safety factor for risk assessment in a water supply network,” Procedia Engineering, vol. 119, pp. 206–215, 2015. View at Google Scholar
  11. T. H. Grubesic and T. C. Matisziw, “A typological framework for categorizing infrastructure vulnerability,” GeoJournal, vol. 78, no. 2, pp. 287–301, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. S. Marrone, R. Nardone, A. Tedesco et al., “Vulnerability modeling and analysis for critical infrastructure protection applications,” International Journal of Critical Infrastructure Protection, vol. 6, no. 3, pp. 217–227, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. S. Larocca, J. Johansson, H. Hassel, and S. Guikema, “Topological performance measures as surrogates for physical flow models for risk and vulnerability analysis for electric power systems,” Risk Analysis, vol. 35, no. 4, pp. 608–623, 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Yazdani and P. Jeffrey, “A complex network approach to robustness and vulnerability of spatially organized water distribution networks,” https://arxiv.org/abs/1008.1770.
  15. D. L. Banks, “Foundations of risk analysis: a knowledge and decision-oriented perspective,” Journal of the American Statistical Association, 2012. View at Google Scholar
  16. S. Mu, H. Cheng, M. Chohr, and W. Peng, “Assessing risk management capability of contractors in subway projects in mainland China,” International Journal of Project Management, vol. 32, no. 3, pp. 452–460, 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. W. Kröger and E. Zio, Vulnerable Systems, Springer Science & Business Media, 2011.
  18. J. Johansson and H. Hassel, “An approach for modelling interdependent infrastructures in the context of vulnerability analysis,” Reliability Engineering and System Safety, vol. 95, no. 12, pp. 1335–1344, 2010. View at Publisher · View at Google Scholar · View at Scopus
  19. S. Wang, L. Hong, and X. Chen, “Vulnerability analysis of interdependent infrastructure systems: a methodological framework,” Physica A: Statistical Mechanics and Its Applications, vol. 391, no. 11, pp. 3323–3335, 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. T. Brown, W. Beyeler, and D. Barton, “Assessing infrastructure interdependencies: the challenge of risk analysis for complex adaptive systems,” International Journal of Critical Infrastructures, vol. 1, no. 1, pp. 108–117, 2004. View at Publisher · View at Google Scholar · View at Scopus
  21. A. Tolk and A. M. Uhrmacher, “Agents: agenthood, agent architectures, and agent taxonomies,” Agent-Directed Simulation and Systems Engineering, pp. 75–109, 2009. View at Publisher · View at Google Scholar · View at Scopus
  22. M. Schläpfer, T. Kessler, and W. Kröger, “Reliability analysis of electric power systems using an object-oriented hybrid modeling approach,” https://arxiv.org/abs/1201.0552.
  23. I. Eusgeld, W. Kröger, G. Sansavini, M. Schläpfer, and E. Zio, “The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures,” Reliability Engineering and System Safety, vol. 94, no. 5, pp. 954–963, 2009. View at Publisher · View at Google Scholar · View at Scopus
  24. R. Rehan, A. J. A. Unger, M. A. Knight, and C. T. Haas, “Financially sustainable management strategies for urban wastewater collection infrastructure - Implementation of a system dynamics model,” Tunnelling and Underground Space Technology, vol. 39, pp. 102–115, 2014. View at Publisher · View at Google Scholar · View at Scopus
  25. H.-S. J. Min, W. Beyeler, T. Brown, Y. J. Son, and A. T. Jones, “Toward modeling and simulation of critical national infrastructure interdependencies,” IIE Transactions (Institute of Industrial Engineers), vol. 39, no. 1, pp. 57–71, 2007. View at Publisher · View at Google Scholar · View at Scopus
  26. R. Rehan, M. A. Knight, C. T. Haas, and A. J. A. Unger, “Application of system dynamics for developing financially self-sustaining management policies for water and wastewater systems,” Water Research, vol. 45, no. 16, pp. 4737–4750, 2011. View at Publisher · View at Google Scholar · View at Scopus
  27. B. Genge, I. Kiss, and P. Haller, “A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures,” International Journal of Critical Infrastructure Protection, vol. 10, pp. 3–17, 2015. View at Publisher · View at Google Scholar · View at Scopus
  28. M. Leung, Y. Y. Haimes, and J. R. Santos, “Supply- and output-side extensions to the inoperability input-output model for interdependent infrastructures,” Journal of Infrastructure Systems, vol. 13, no. 4, pp. 299–310, 2007. View at Publisher · View at Google Scholar · View at Scopus
  29. O. Jonkeren and G. Giannopoulos, “Analysing critical infrastructure failure with a resilience inoperability input-output model,” Economic Systems Research, vol. 26, no. 1, pp. 39–59, 2014. View at Publisher · View at Google Scholar · View at Scopus
  30. K. D. S. Yu, K. B. Aviso, M. A. B. Promentilla, J. R. Santos, and R. R. Tan, “A weighted fuzzy linear programming model in economic input–output analysis: an application to risk management of energy system disruptions,” Environment Systems and Decisions, vol. 36, no. 2, pp. 183–195, 2016. View at Publisher · View at Google Scholar · View at Scopus
  31. D. P. Chassin and C. Posse, “Evaluating North American electric grid reliability using the Barabási-Albert network model,” Physica A: Statistical Mechanics and Its Applications, vol. 355, no. 2, pp. 667–677, 2005. View at Publisher · View at Google Scholar · View at Scopus
  32. J. Zhang, X.-B. Cao, W.-B. Du, and K.-Q. Cai, “Evolution of Chinese airport network,” Physica A: Statistical Mechanics and Its Applications, vol. 389, no. 18, pp. 3922–3931, 2010. View at Publisher · View at Google Scholar · View at Scopus
  33. E. Bompard, E. Pons, and D. Wu, “Extended topological metrics for the analysis of power grid vulnerability,” IEEE Systems Journal, vol. 6, no. 3, pp. 481–487, 2012. View at Publisher · View at Google Scholar · View at Scopus
  34. Y. Dai, G. Chen, Z. Dong, Y. Xue, D. J. Hill, and Y. Zhao, “An improved framework for power grid vulnerability analysis considering critical system features,” Physica A: Statistical Mechanics and Its Applications, vol. 395, pp. 405–415, 2014. View at Publisher · View at Google Scholar · View at Scopus
  35. F. Bono and E. Gutiérrez, “A network-based analysis of the impact of structural damage on urban accessibility following a disaster: the case of the seismically damaged port au prince and carrefour urban road networks,” Journal of Transport Geography, vol. 19, no. 6, pp. 1443–1455, 2011. View at Publisher · View at Google Scholar · View at Scopus
  36. K.-Q. Cai, J. Zhang, W.-B. Du, and X.-B. Cao, “Analysis of the Chinese air route network as a complex network,” Chinese Physics B, vol. 21, no. 2, Article ID 028903, 2012. View at Google Scholar · View at Scopus
  37. G. Lanzano, E. Salzano, F. S. De Magistris, and G. Fabbrocino, “Seismic vulnerability of natural gas pipelines,” Reliability Engineering and System Safety, vol. 117, pp. 73–80, 2013. View at Publisher · View at Google Scholar · View at Scopus
  38. I. Bentes, L. Afonso, H. Varum et al., “A new tool to assess water pipe networks vulnerability and robustness,” Engineering Failure Analysis, vol. 18, no. 7, pp. 1637–1644, 2011. View at Publisher · View at Google Scholar · View at Scopus
  39. G. E. Apostolakis and D. M. Lemon, “A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism,” Risk Analysis, vol. 25, no. 2, pp. 361–376, 2005. View at Publisher · View at Google Scholar · View at Scopus
  40. P. Tamvakis and Y. Xenidis, “Comparative evaluation of resilience quantification methods for infrastructure systems,” Procedia-Social and Behavioral Sciences, vol. 74, pp. 339–348, 2013. View at Publisher · View at Google Scholar
  41. T. C. Matisziw, T. H. Grubesic, and J. Guo, “Robustness elasticity in complex networks,” PLoS ONE, vol. 7, no. 7, Article ID e39788, 2012. View at Publisher · View at Google Scholar · View at Scopus
  42. H. Jönsson, H. Johansson, and J. Johansson, “Identifying critical components in technical infrastructure networks,” Proceedings of the Institution of Mechanical Engineers, Part O: Journal of Risk and Reliability, vol. 222, no. 2, pp. 235–243, 2008. View at Publisher · View at Google Scholar · View at Scopus
  43. M. Dilley and T. E. Boudreau, “Coming to terms with vulnerability: a critique of the food security definition,” Food Policy, vol. 26, no. 3, pp. 229–247, 2001. View at Publisher · View at Google Scholar · View at Scopus
  44. J. Johansson, H. Jönsson, and H. Johansson, “Analysing the vulnerability of electric distribution systems: A step towards incorporating the societal consequences of disruptions,” International Journal of Emergency Management, vol. 4, no. 1, pp. 4–17, 2007. View at Publisher · View at Google Scholar · View at Scopus
  45. S. A. Patterson and G. E. Apostolakis, “Identification of critical locations across multiple infrastructures for terrorist actions,” Reliability Engineering and System Safety, vol. 92, no. 9, pp. 1183–1203, 2007. View at Publisher · View at Google Scholar · View at Scopus
  46. P. Trucco, E. Cagno, and M. De Ambroggi, “Dynamic functional modelling of vulnerability and interoperability of Critical Infrastructures,” Reliability Engineering and System Safety, vol. 105, pp. 51–63, 2012. View at Publisher · View at Google Scholar · View at Scopus
  47. J. Johansson, H. Hassel, and E. Zio, “Reliability and vulnerability analyses of critical infrastructures: Comparing two approaches in the context of power systems,” Reliability Engineering and System Safety, vol. 120, pp. 27–38, 2013. View at Publisher · View at Google Scholar · View at Scopus
  48. A. Vespignani, “Complex networks: The fragility of interdependency,” Nature, vol. 464, no. 7291, pp. 984-985, 2010. View at Publisher · View at Google Scholar · View at Scopus
  49. S. Ghosh, A. Banerjee, N. Sharma et al., “Statistical analysis of the Indian Railway Network: a complex network approach,” Acta Physica Polonica B, Proceedings Supplement, vol. 4, no. 2, pp. 123–138, 2011. View at Publisher · View at Google Scholar · View at Scopus
  50. A. Abbasi, L. Hossain, and L. Leydesdorff, “Betweenness centrality as a driver of preferential attachment in the evolution of research collaboration networks,” Journal of Informetrics, vol. 6, no. 3, pp. 403–412, 2012. View at Publisher · View at Google Scholar · View at Scopus
  51. A. M. M. González, B. Dalsgaard, and J. M. Olesen, “Centrality measures and the importance of generalist species in pollination networks,” Ecological Complexity, vol. 7, no. 1, pp. 36–43, 2010. View at Publisher · View at Google Scholar · View at Scopus
  52. E. Almaas, R. V. Kulkarni, and D. Stroud, “Characterizing the structure of small-world networks,” Physical Review Letters, vol. 88, no. 9, Article ID 098101, 2002. View at Google Scholar
  53. M. Ouyang, L. Hong, Z.-J. Mao, M.-H. Yu, and F. Qi, “A methodological approach to analyze vulnerability of interdependent infrastructures,” Simulation Modelling Practice and Theory, vol. 17, no. 5, pp. 817–828, 2009. View at Publisher · View at Google Scholar · View at Scopus
  54. M. A. P. Taylor, S. V. C. Sekhar, and G. M. D'Este, “Application of accessibility based methods for vulnerability analysis of strategic road networks,” Networks and Spatial Economics, vol. 6, no. 3-4, pp. 267–291, 2006. View at Publisher · View at Google Scholar · View at Scopus
  55. E. Jenelius and L.-G. Mattsson, “Road network vulnerability analysis of area-covering disruptions: A grid-based approach with case study,” Transportation Research Part A: Policy and Practice, vol. 46, no. 5, pp. 746–760, 2012. View at Publisher · View at Google Scholar · View at Scopus
  56. A. Chen, C. Yang, S. Kongsomsaksakul, and M. Lee, “Network-based acessibility measures for vulnerability analysis of degradable transportation networks,” Networks and Spatial Economics, vol. 7, no. 3, pp. 241–256, 2007. View at Publisher · View at Google Scholar · View at Scopus
  57. R. Criado, A. García del Amo, B. Hernández-Bermejo, and M. Romance, “New results on computable efficiency and its stability for complex networks,” Journal of Computational and Applied Mathematics, vol. 192, no. 1, pp. 59–74, 2006. View at Publisher · View at Google Scholar · View at Scopus
  58. P. Crucittia, V. Latorab, M. Marchioric, and A. Rapisarda, “Efficiency of scale-free networks: error and attack tolerance,” Physica A: Statistical Mechanics and Its Applications, vol. 320, pp. 622–642, 2003. View at Publisher · View at Google Scholar
  59. J. Zhang, X. Xu, L. Hong, S. Wang, and Q. Fei, “Networked analysis of the Shanghai subway network, in China,” Physica A: Statistical Mechanics and Its Applications, vol. 390, no. 23, pp. 4562–4570, 2011. View at Publisher · View at Google Scholar · View at Scopus
  60. A. Beygelzimer, G. Grinstein, R. Linsker, and I. Rish, “Improving network robustness by edge modification,” Physica A: Statistical Mechanics and Its Applications, vol. 357, no. 3, pp. 593–612, 2005. View at Publisher · View at Google Scholar · View at Scopus
  61. Z. Zhou, J. Irizarry, and Q. Li, “Using network theory to explore the complexit of subway construction accident network (SCAN) for promoting safety management,” Safety Science, vol. 64, pp. 127–136, 2014. View at Publisher · View at Google Scholar · View at Scopus
  62. B. W. Wambeke, M. Liu, and S. M. Hsiang, “Using Pajek and centrality analysis to identify a social network of construction trades,” Journal of Construction Engineering and Management, vol. 138, no. 10, pp. 1192–1201, 2011. View at Publisher · View at Google Scholar · View at Scopus
  63. D. J. Watts and S. H. Strogatz, “Collective dynamics of “small-world” networks,” Nature, vol. 393, no. 6684, pp. 440–442, 1998. View at Publisher · View at Google Scholar · View at Scopus