| Literature DB >> 25757572 |
Yehiel Berezin1, Amir Bashan2, Michael M Danziger1, Daqing Li3, Shlomo Havlin1.
Abstract
Many real world complex systems such as critical infrastructure networks are embedded in space and their components may depend on one another to function. They are also susceptible to geographically localized damage caused by malicious attacks or natural disasters. Here, we study a general model of spatially embedded networks with dependencies under localized attacks. We develop a theoretical and numerical approach to describe and predict the effects of localized attacks on spatially embedded systems with dependencies. Surprisingly, we find that a localized attack can cause substantially more damage than an equivalent random attack. Furthermore, we find that for a broad range of parameters, systems which appear stable are in fact metastable. Though robust to random failures-even of finite fraction-if subjected to a localized attack larger than a critical size which is independent of the system size (i.e., a zero fraction), a cascading failure emerges which leads to complete system collapse. Our results demonstrate the potential high risk of localized attacks on spatially embedded network systems with dependencies and may be useful for designing more resilient systems.Entities:
Mesh:
Year: 2015 PMID: 25757572 PMCID: PMC4355725 DOI: 10.1038/srep08934
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Figure 1The effect of a localized attack on a system with dependencies.
(a), Propagation of local damage in a system of two interdependent diluted lattices with spatially constrained dependency links between the lattices (only one lattice shown here). The hole on the right is above the critical size and spreads throughout the system while the hole on the left is below and remains essentially the same size. (b), A localized circular failure of radius r in a lattice with dependency links of length up to r. Outside the hole, the survival probability of a node increases with the distance ρ from the edge. The parameter ρ denotes the distance from the edge of the hole at which the occupation probability is equal to the percolation threshold of a lattice without dependencies p ≈ 0.592736. (c), Phase diagram of a lattice with dependencies or two interdependent lattices. Depending on the average degree 〈k〉 and dependency length r, the system is either stable, unstable or metastable. The circles illustrate the increase (when 〈k〉 increases) of the critical attack size () that leads to system collapse in the metastable region. (d), As the system size grows, the minimal number of nodes which cause the system to collapse increases linearly for random attacks but stays constant (≈300) for localized attacks. This figure was obtained for a system of interdependent lattices diluted to 〈k〉 ≈ 2.9 and r = 15 (in the metastable phase-see c), with 1000 runs for each data point.
Figure 2Dependence of the critical attack size on the average degree 〈k〉 and the system dependency length r.
(a, b), The value of as a function of the dependency length r and average degree 〈k〉 represented as a log-scaled colormap. (a), Simulation results. We use a binary search algorithm to find the critical radius size, ie, the minimal r for which the local attack spreads through the entire system. (b), Analytical results. The critical size is calculated as the smallest value of r for which Eq. (3) has a self-consistent solution. For a numerical comparison between the simulation and analytical results in the metastable phase, see Supplementary Fig. 5. (c1, c2, c3), Critical attack size as a function of average degree 〈k〉 for three r values, determined by simulations. The curves represent moving along vertical lines from bottom to top in (a) (cf. the circles in Fig. 1c). The shaded region represents the metastable region of 〈k〉 for each r. The area to the left of the shaded region is unstable and to the right is stable. (d), Critical attack size as a function of system dependency length r for several 〈k〉 values, determined by simulations. The minimum of each curve represents the dependency length for which the system is most vulnerable to localized attacks. The numerical results in this figure were generated using a system of two interdependent diluted lattices. For comparison with a single diluted lattice composed of both, connectivity and dependency links, see Supplementary Information Fig. 1.