-读 Comparison analysis on vulnerability of metro networks based on complex network

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Physica A 496 (2018) 72–78

Contents lists available at ScienceDirect

Physica A
journal homepage: www.elsevier.com/locate/physa

Comparison analysis on vulnerability of metro networks


based on complex network
Jianhua Zhang a, *, Shuliang Wang a , Xiaoyuan Wang b
a
School of Electrical Engineering and Automation, Jiangsu Normal University, Xuzhou, 221116, China
b
School of Transportation and Vehicle Engineering, Shandong University of Technology, Zibo, 255000, China

highlights

• The basic characteristics of three metro networks are obtained in this paper.
• Metro networks are vulnerable when they suffer malicious attacks.
• Guangzhou metro network has the best topological structure among them.
• Shanghai metro network has the largest vulnerability among them.

article info a b s t r a c t
Article history: This paper analyzes the networked characteristics of three metro networks, and two
Received 13 July 2017 malicious attacks are employed to investigate the vulnerability of metro networks based
Received in revised form 19 November 2017 on connectivity vulnerability and functionality vulnerability. Meanwhile, the networked
Available online 23 December 2017
characteristics and vulnerability of three metro networks are compared with each other.
Keywords:
The results show that Shanghai metro network has the largest transport capacity, Beijing
Metro networks metro network has the best local connectivity and Guangzhou metro network has the best
Vulnerability global connectivity, moreover Beijing metro network has the best homogeneous degree
Connectivity distribution. Furthermore, we find that metro networks are very vulnerable subjected to
Transport functionality malicious attacks, and Guangzhou metro network has the best topological structure and
reliability among three metro networks. The results indicate that the proposed methodol-
ogy is feasible and effective to investigate the vulnerability and to explore better topological
structure of metro networks.
© 2017 Elsevier B.V. All rights reserved.

1. Introduction

With the growth of the population, traffic congestion has become very serious problem and the ground transportations
cannot meet the needs in large cities. In this context, the metro has been paid much attention and becomes the most
effective traffic pattern to relieve traffic congestions of large cities, hence there are more and more cities constructing
metro networks [1]. Moreover, metro is also an efficient traffic pattern, because the metro runs underground according
to the schedule, and there are few traffic congestions. In developed countries, there are many mature experiences about the
operation and management of metro networks in large cities, such as New York, Paris, London, Berlin, Moscow, Tokyo and
Seoul [2–4]. Certainly, the metro has experienced rapid developments in developing countries, such as China, India, Brazil
and Mexico [5,6]. However, it is known that metro network has a high complexity [7,8].

* Corresponding author.
E-mail address: zhangjianhua@jsnu.edu.cn (J. Zhang).

https://doi.org/10.1016/j.physa.2017.12.094
0378-4371/© 2017 Elsevier B.V. All rights reserved.
J. Zhang et al. / Physica A 496 (2018) 72–78 73

It is known that Shanghai is the largest and most developed city of China, and there are more than 20 millions of people.
Relying on the World Expo in Shanghai, 2010, Shanghai metro network has been greatly improved, so the traffic congestions
of ground transportations have been significantly relieved. The mileage of Shanghai metro network is more than 420 km
and it is the longest system in passenger route length [1]. Beijing is the capital of China, and there are more than 17 millions
of people. In 2008, 29th Olympic Games was held in Beijing, and the public transportations had been improved, especially
Beijing metro network. The mileage of Beijing metro network is more than 220 km. Guangzhou is the largest city in the south
of China, and the 16th Asian Games was held in Guangzhou, 2010. The government of Guangzhou has paid much attention
to the public transportations, and Guangzhou metro network has been greatly improved and the mileage has exceeded 180
km. At present, metro plays the most important role in relieving the traffic congestions in these three cities, meanwhile it
brings in comfortable and convenient travels for residents and travelers.
Although there are many advantages about metro networks, there also exist many risks. We find that the failures of
metro networks come from natural hazards, operational errors, terrorist attacks and power blackouts, which can cause very
serious consequences [9,10]. For example, two trains collided with each other in Shanghai metro network in 2009, and three
explosions caused by terrorists happened in London metro network in July 7, 2005, and 31 persons died in fire at King’s Cross
station in November 18, 1987. Observing the failures of metro networks, it is obvious that the safeties of metro networks
should be paid much attention, and the security check must be more careful. At the same time, the operators must obey the
transport rules and should be given sophisticated training. Overall, appropriate measures must be taken to guarantee the
reliability of metro networks [11–15].
Metro networks can be considered as complex networks [8], so the complex network theory and method [16–21] can be
adopted to investigate performance changes of metro networks subjected to failures. Recently, infrastructure networks have
been given increasingly concerns, and many actual networks have been investigated, such as power grid networks [22–25],
pipeline networks [26,27], transportation networks [28–30], and so on. We also discussed the characteristics and investi-
gated the vulnerability of urban transit rail networks, and obtained several useful results [31–34]. Certainly, there are many
literatures studying the vulnerability of networks [35–38].
This paper is organized as follows. Section 2 introduces the models and analyzes the basic properties of three metro
networks. Section 3 discusses connectivity and vulnerability of metro networks subjected to the largest degree node-based
attacks. Moreover, the connectivity and vulnerability of metro networks subjected to the highest betweenness node-based
attacks are studied in Section 4. Finally, the conclusion is given in Section 5.

2. Characteristic analysis of metro networks

In this section, the networked characteristics of Shanghai, Beijing and Guangzhou metro networks are analyzed according
to complex network theory and the metro network can be abstracted by undirected graph. For any graph G = ⟨V , E ⟩,
V = {v1 , v2 , . . . , vN } is the set of vertices, and E is the set of edges. Topology is the basis of network and the researches about
topological structures of metro networks are necessary. In the paper, the methodology of complex network is used to analyze
the topological characteristics. Meanwhile, the node betweenness is defined as the number of the shortest paths passing the
node all over the network, and the average node betweenness (ANB) reflects the average frequency of the shortest paths
passing a node. The edge betweenness is defined as the number of the shortest paths passing the edge all over the network
and the average edge betweenness (AEB) represents the average frequency of the shortest paths passing an edge.
Table 1 gives the basically topological characteristics of three metro networks and shows that the average degree
of Beijing metro network slightly larger than that of Shanghai and Guangzhou metro networks. Meanwhile, clustering
coefficients of three metro networks are very small and Beijing metro network has the largest clustering. Hence, we can
declare that Beijing metro network has the best local connectivity among them. Table 1 also shows that the ANB and AEB
increase with the increase of the number of nodes (network size). ANB can represent the average transport capacity of nodes
and AEB can represent the average transport capacity of edges of networks. Therefore Table 1 illustrates that Shanghai metro
network has the largest transport capacity among three networks, and Guangzhou metro network has the smallest transport
capacity. According to the ANB and AEB, we know that the nodes and edges of Shanghai metro network bear more loads than
that of the other two metro networks.
Fig. 1 shows the degree distributions of three metro networks. It depicts that when the degree equals 2, the probability on
degree distribution of Shanghai metro network exceeds 0.8, as the same as Guangzhou metro network, but the probability on
degree distribution of Beijing metro network equals 0.76. When the degree equals 4, the probability on degree distributions
of Shanghai and Guangzhou metro networks are less than 0.1, and the probability on degree distribution of Beijing metro
network equals 0.1163. At the other points, degree distributions of these three metro networks are similar with each
other. From Table 1, the maximum degree of Shanghai metro network equals 7, and the maximum degrees of Beijing and
Guangzhou metro networks equal 5. When the degree equals 6 and 7, the probabilities on degree distributions of Shanghai
metro network equal 0.0042. According to Fig. 1, it is known that Beijing metro network has the best homogeneous degree
distribution and Guangzhou metro network possesses the most heterogeneous degree distribution.
74 J. Zhang et al. / Physica A 496 (2018) 72–78

Table 1
The basic topological characteristics of three metro networks.
Parameter Metro
Shanghai Beijing Guangzhou
Node number 240 129 80
Edge number 264 142 84
Maximum degree 7 5 5
Minimum degree 1 1 1
Average degree 2.2 2.2016 2.1
ANB 3232 1284 756.55
AEB 1577.7 641.3521 397.881
Clustering coefficient 0.0018 0.0078 0

Fig. 1. Degree distributions of three metro networks.

3. Connectivity vulnerability of metro networks

In this section, two different attack protocols are involved to investigate the vulnerability of metro networks. Continuous
targeted-attacks will be adopted to delete the nodes one by one, and two attack protocols are designed as follows. (1) The
largest degree node-based attacks. That is to say, from the original state, the largest degree node will be deleted from the
network and all the topological characteristics of metro networks will be recalculated after the attack, and the attacks
continue. (2) The highest betweenness node-based attacks. The highest betweenness node is removed from the network
firstly, meanwhile the topological characteristics of metro networks are also recalculated, and the attacks continue. From
the aforementioned attack protocols, it is known that the nodes will be deleted from the network one by one and the
performances of metro networks will be changed after attacks. In this paper, these two continuous targeted-attacks are
applied to assess characteristic changes of metro networks.
The connectivity describes the topological structure of metro network and the connectivity vulnerability can reflect
the characteristic changes of topological structure when the metro network encounters malicious attacks. Hence, the
global connectivity and the shortest path between two nodes are considered in this paper. The shortest path between two
nodes vi and vj is defined as the minimum number dij of links necessary to follow from node vi to node vj , and network
efficiency [39,40] describing global connectivity of metro networks is defined as follows,
N
2 ∑ 1
E= (1)
N(N − 1) dij
i,j=1(i̸ =j)

where the sum is over all N(N − 1)/2 pairs of nodes. It is obvious that the smaller the shortest path between two nodes is,
the larger the network efficiency of network is.
Fig. 2 shows the changes of network efficiencies of three metro networks subjected to the largest degree node-based
attacks, and it depicts that Guangzhou metro network has the largest network efficiency and Shanghai metro network has
the smallest network efficiency. Network efficiency reflects the global connectivity of networks, that is to say, Guangzhou
J. Zhang et al. / Physica A 496 (2018) 72–78 75

Fig. 2. Network efficiency subjected to the largest degree node-based attacks.

metro network has the best global connectivity. From Fig. 2, we can find that network efficiency of Beijing metro network
has a few differences with that of Guangzhou metro network when the fraction of removed nodes is smaller than 0.07,
this phenomenon illustrates that the removed nodes can result in similar damages to these two metro networks. However,
this difference of these two metro network becomes larger when the fraction of removed nodes belongs to the interval
[0.07, 0.35], this phenomenon indicates that the removed nodes can lead to different damages to these two metro networks.
When the fraction of removed nodes is larger than 0.35, network efficiencies of three metro networks are very small and have
a few differences with each other, which illustrates that these three metro networks have become fragmented. Moreover,
we find that Shanghai metro network has the largest vulnerability subjected to the largest degree node-based attacks.
Fig. 3 shows the changes of network efficiencies of three metro networks subjected to the highest betweenness node-
based attacks. Fig. 3 shows that the network efficiencies of three networks are quickly reduced and it also illustrates
that Guangzhou metro network has the largest network efficiency and Shanghai metro network has the smallest network
efficiency. Therefore it is obvious that Guangzhou metro network has the best global connectivity and Shanghai metro
network has the worst global connectivity. Moreover, we also find that Shanghai metro network has the largest vulnerability
subjected to the largest degree node-based attacks. The results shown in Fig. 3 are similar with the results obtained from
Fig. 2. Hence we can declare that the metro networks are very vulnerable when they suffer malicious attacks.

4. Functionality vulnerability of metro networks

An interdependence analysis about the nodes of metro network is introduced in this section, and it is adopted to
investigate the transport functionality of metro networks. In this paper, functionality loss is proposed to assess the
vulnerability of transport functionality of metro networks [34]. Supposing that the initial transport functionalities of all
the nodes equal 1, F0 (vh ) = 1, h = 1, 2, . . . , N, and the transport functionality of isolated node equals 0. When the node vi is
attacked and removed from the network, if this attack is the mth attack, the transport functionality loss of the node vj (j ̸ = i)
is portrayed by
m

FL(vj ) = [Fl−1 (vj ) − Fl (vj )] (2)
l=1

where Fl (vj ) is the transport functionality of node vj after the lth attack. Meanwhile, the iteration about the transport
functionality of node vj is given as,
1
Fl (vj ) = Fl−1 (vj ) − Fl−1 (vj ) (3)
d2ij kj
where dij is the shortest path length between node vj and vi after the (m − 1)th attack, and kj is the present degree of the
node vj after the (m − 1)th attack. After the node vi being deleted, the transport functionality loss of network is obtained by
N

FLN = FL(vj ). (4)
j=1,j̸ =i
76 J. Zhang et al. / Physica A 496 (2018) 72–78

Fig. 3. Network efficiency subjected to the highest betweenness node-based attacks.

Fig. 4. Functionality loss subject to the largest degree node-based attacks.

Because of the interdependence of nodes, transport functionalities of other nodes will be affected when one node is
removed from the network. Additionally, peoples’ psychologies will be influenced by the failures of nodes if they travel by
metros. Hence, the transport functionalities of the other nodes of metro network will be affected and reduced. Meanwhile,
the transport functionalities of nodes will become smaller and smaller subjected to continuous attacks, so the functionality
loss of network becomes larger and larger. Thence, it is suitable to apply the functionality loss to assess vulnerability of metro
networks.
Fig. 4 describes the changes of functionality losses of three metro networks subjected to the largest degree node-based
attacks and it shows that Guangzhou metro network has the smallest functionality loss and Beijing metro network has the
most functionality loss. It is obvious that Guangzhou metro network has the best reliability among them. Fig. 5 introduces
the changes of transport functionality losses of metro networks subjected to the highest betweenness node-based attacks.
We know that the functionality loss of Guangzhou metro network is slightly smaller than that the other two networks, but
the functionality loss of Beijing metro networks is similar with that of Shanghai metro network. Fig. 5 also illustrate that
Guangzhou metro network has the best the reliability among them. In addition, Guangzhou metro network has the best
J. Zhang et al. / Physica A 496 (2018) 72–78 77

Fig. 5. Functionality loss subject to the highest betweenness node-based attacks.

global connectivity among them according to Fig. 3, so we can declare that Guangzhou metro network has the best topology
among them.

5. Conclusion

In this paper, the vulnerability of metro networks is investigated according to different attack protocols which are
considered as the malicious attacks. Meanwhile network efficiency and functionality loss are presented to measure the
vulnerability of metro networks, and the characteristic changes of three networks subjected to malicious attacks have been
compared with each other. The results show that Shanghai metro network has the largest transport capacity, Beijing metro
network has the best local connectivity and Guangzhou metro network has the best global connectivity. Meanwhile, we
find that metro networks are very vulnerable when they suffer malicious attacks, and Shanghai metro network has the
largest vulnerability and Guangzhou metro network has the best reliability subjected to malicious attacks. Based on the
analyses, it is obvious that there is a trade-off between connectivity and transport capacity of metro networks. Moreover,
the aforementioned results show that the proposed methodology is effective and feasible to investigate the vulnerability
and to explore better topological structure of metro networks.

Acknowledgments

This work was supported jointly by the National Natural Science Foundation of China (61304175, 61503166, 61673197
and 61503164), Science and Technology project of Xuzhou (KC16SG253), and the Natural Science Foundation for Youths of
Jiangsu Province of China (BK20140241).

References

[1] Wikipedia. http://en.wikipedia.org/wiki/List_of_metro_systems.


[2] V. Latora, M. Marchiori, Is the Boston subway a small-world network? Physica A 314 (2002) 109–113.
[3] K. Lee, et al., Statistical analysis of the Metropolitan Seoul Subway System: Network structure and passenger flows, Physica A 387 (2008) 6231–6234.
[4] C. Chen, J. Chen. J. Barry, Diurnal pattern of transit ridership: a case study of the New York City subway system, J. Transp. Geogr. 17 (2009) 176–186.
[5] M.D. Jong, et al., Introducing public–private partnerships for metropolitan subways in China: what is the evidence? J. Transp. Geogr. 18 (2010) 301–313.
[6] A. Crotte, R.B. Noland, D.J. Graham, Is the Mexico City metro an inferior good? Transp. Policy 16 (2009) 40–45.
[7] S. Derrible, C. Kennedy, The complexity and robustness of metro networks, Physica A 389 (2010) 3678–3691.
[8] P. Angeloudis, D. Fisk, Large subway systems as complex networks, Physica A 367 (2006) 553–558.
[9] D. Gabay, Fire safety: a short history in the Paris subway, Tunnelling Underground Space Technol. 17 (2002) 139–143.
[10] S. Gupta, G. Degrande, G. Lombaert, Experimental validation of a numerical model for subway induced vibrations, J. Sound Vib. 321 (2009) 786–812.
[11] Ö. Yalcınkaya, G.M. Bayhan, Modelling and optimization of average travel time for a metro line by simulation and response surface methodology,
European J. Oper. Res. 196 (2009) 225–233.
[12] P.M. Santiago del Río, et al., A reliability analysis of Double-Ring topologies with Dual Attachment using p-cycles for optical metro networks, Comput.
Netw. 54 (2010) 1328–1341.
[13] J. Barberillo, J. Saldaña, Navigation in large subway networks: An informational approach, Physica A 390 (2011) 374–386.
78 J. Zhang et al. / Physica A 496 (2018) 72–78

[14] S. Raveau, J.C. Muñoz, L.D. Grange, A topological route choice model for metro, Transp. Res. A 45 (2011) 138–147.
[15] G. Laporte, et al., Planning rapid transit networks, Soc.-Econ. Plann. Sci. 45 (2011) 95–104.
[16] S.H. Strogatz, Exploring complex networks, Nature 410 (2001) 268–276.
[17] D.J. Watt, S.H. Strogatz, Collective dynamics of ‘small world’ network, Nature 393 (1998) 440–442.
[18] A.L. Barabasi, R. Albert, Emergence of scaling in random networks, Science 286 (1999) 509–512.
[19] R. Albert, H. Jeong, A.L. Barabasi, Attack and error tolerance in complex networks, Nature 406 (2000) 378–482.
[20] M.E.J. Newman, D.J. Watts, Renormalization group analysis of small world network model, Phys. Lett. A 263 (1999) 341–346.
[21] P. Erdos, A. Rényi, On the evolution of random graphs, Publ. Math. Inst. Hung. Acad. Sci. 5 (1960) 17–60.
[22] A.E. Motter, Y.C. Lai, Cascade-based attacks on complex networks, Phys. Rev. E 66 (2002) 065102.
[23] M. Ouyang, L. Dueñas-Osorio, Multi-dimensional hurricane resilience assessment of electric power systems, Struct. Saf. 48 (2014) 15–24.
[24] J.H. Zhang, et al., Vulnerability analysis of the US power grid based on local load-redistribution, Saf. Sci. 80 (2015) 156–162.
[25] L. Duenas-Osorio, S.M. Vemuru, Cascading failures in complex infrastructure systems, Struct. Saf. 31 (2009) 157–167.
[26] M. Ouyang, et al., Emergency response to disaster struck scale-free network with redundant systems, Physica A 387 (2008) 4683–4691.
[27] R. Carvalho, et al., Robustness of trans-European gas networks, Phys. Rev. E 80 (2009) 016106.
[28] L. Hong, et al., Vulnerability assessment and mitigation for the Chinese railway system under floods, Reliab. Eng. Syst. Saf. 137 (2015) 58–68.
[29] P. Vansteenwegen, V.D. Van, Decreasing the passenger waiting time for and intercity rail network, Transp. Res. B 41 (2007) 478–492.
[30] Ouyang M., et al., Vulnerability analysis of complementary transportation systems with applications to railway and airline systems in China, Reliab.
Eng. Syst. Saf. 142 (2015) 248–257.
[31] J.H. Zhang, et al., Characteristics on hub networks of urban transit networks, Physica A 447 (2016) 502–507.
[32] J.H. Zhang, et al., An approach for modeling vulnerability of the network of networks, Physica A 412 (2014) 127–136.
[33] J.H. Zhang, et al., Networked characteristics of the urban rail transit networks, Physica A 392 (2013) 1538–1546.
[34] J.H. Zhang, et al., Networked analysis of the Shanghai subway network, in China, Physica A 390 (2011) 4562–4570.
[35] P. Crucitti, et al., Efficiency of scale-free networks: error and attack tolerance, Physica A 320 (2003) 622–642.
[36] P.P. Holme, et al., Attack vulnerability of complex networks, Phys. Rev. E 65 (2002) 056109.
[37] V. Latora, M. Marchiori, How the science of complex networks can help developing strategies against terrorism, Chaos Solitons Fractals 20 (2004)
69–75.
[38] J. Gao, et al., Networks formed from interdependent networks, Nat. Phys. 8 (2012) 40–48.
[39] V. Latora, M. Marchiori, Efficiency behavior of small world networks, Phys. Rev. Lett. 87 (2001) 198701.
[40] A.E. Motter, et al., Range-based attack on lines in scale free networks: Are long-range links responsible for the small-world phenomenon? Phys. Rev.
E 66 (2002) 065103.

You might also like