skip to main content

This content will become publicly available on December 1, 2023

Title: Recovery coupling in multilayer networks
Abstract The increased complexity of infrastructure systems has resulted in critical interdependencies between multiple networks—communication systems require electricity, while the normal functioning of the power grid relies on communication systems. These interdependencies have inspired an extensive literature on coupled multilayer networks, assuming a hard interdependence, where a component failure in one network causes failures in the other network, resulting in a cascade of failures across multiple systems. While empirical evidence of such hard failures is limited, the repair and recovery of a network requires resources typically supplied by other networks, resulting in documented interdependencies induced by the recovery process. In this work, we explore recovery coupling, capturing the dependence of the recovery of one system on the instantaneous functional state of another system. If the support networks are not functional, recovery will be slowed. Here we collected data on the recovery time of millions of power grid failures, finding evidence of universal nonlinear behavior in recovery following large perturbations. We develop a theoretical framework to address recovery coupling, predicting quantitative signatures different from the multilayer cascading failures. We then rely on controlled natural experiments to separate the role of recovery coupling from other effects like resource limitations, offering direct evidence more » of how recovery coupling affects a system’s functionality. « less
Authors:
;
Award ID(s):
1735505
Publication Date:
NSF-PAR ID:
10336171
Journal Name:
Nature Communications
Volume:
13
Issue:
1
ISSN:
2041-1723
Sponsoring Org:
National Science Foundation
More Like this
  1. Boosting critical infrastructures’ (CIs) preparedness to threats, including natural disasters and manmade attacks, is a global imperative. The intrinsic dependencies and interdependencies between CIs hinder their resiliency. Moreover, the evolution of CIs is, in many cases, en routè to tighten those interdependencies. The goal of this paper is to uncover and analyze the rising interdependency between the electric power grid, information and communication technology (ICT) networks, and transportation systems that are heavily reliant on electric-power drivetrains, collectively referred to hereafter as electro-mobility (e-mobility). E-mobility includes electric vehicles (EVs) and electric railway systems. A new influence graph-based model is introduced, as a promising approach to model operational interdependencies between CIs. Each of the links of the influence graph represents the probability of failure of the sink node following a failure of the source node. A futuristic scenario has been analyzed assuming increased dependency of the power grid on ICT for monitoring and control, and high penetration levels of EVs and distributed energy resources (DERs) in an urban region. Inspecting the influence graph shows that the impact of interdependency between the power grid, the ICT network, and the transportation network, for the case study analyzed in this paper, does not lead tomore »failures during normal operation with proper design; however, it is severe during emergency conditions since it leads to failure propagation among the three CIs. This paper sets the stage for more research on this topic, and calls for more attention to interdependency analysis.« less
  2. This paper studies the problem of robustifying an interdependent network by rewiring a small number of links in realtime during a cascading attack. Interdependent networks have been widely used to model interconnected complex systems such as a critical infrastructure network including both the power grid and the Internet. Realtime robustification of interdependent networks, therefore, has significant practical importance. This paper formulates the problem using the Markov decision process (MDP) framework. We first show the problem is NP-hard and then develop an effective and efficient greedy algorithm, named R EAL W IRE , to robustify the network in realtime. R EAL W IRE scores each link (and each node) based on the expected number of links failures resulted from the failure of the link (or the node), and rewires the links greedily according to the scores. Extensive experimental results show that R EAL W IRE outperforms other algorithms on multiple trobustness metrics.
  3. Critical infrastructure networks, including water, power, communication, and transportation, among others, are necessary to society’s functionality. In recent years, the threat of different types of disruptions to such infrastructure networks has become an increasingly important problem to address. Due to existing interdependencies, damage to a small area of one of the networks could have far-reaching effects on the ability to meet demand across the entire system. Common disruption scenarios include, among others, intentional malevolent attacks, natural disasters, and random failures. Similar works have focused on only one type of scenario, but combining a variety of disruptions may lead to more realistic results. Additionally, the concept of social vulnerability, which describes an area’s ability to prepare for and respond to a disruption, must be included. This should promote not only the protection of the most at-risk components but also ensure that socially vulnerable communities are given adequate resources. This work provides a decision making framework to determine the allocation of defensive resources that accounts for all these factors. Accordingly, we propose a multi-objective mathematical model with the objectives of: (i) minimizing the vulnerability of a system of interdependent infrastructure networks, and (ii) minimizing the total cost of the resource allocation strategy.more »Moreover, to account for uncertainty in the proposed model, this paper incorporates a means to address robustness in finding the most adaptable network protection plan to reduce the vulnerability of the system of interdependent networks to a variety of disruption scenarios. The proposed work is illustrated with an application to social vulnerability and interdependent power, gas, and water networks in Shelby County, Tennessee.« less
  4. The fast-growing installation of solar PVs has a significant impact on the operation of distribution systems. Grid-tied solar inverters provide reactive power capability to support the voltage profile in a distribution system. In comparison with traditional inverters, smart inverters have the capability of real time remote control through digital communication interfaces. However, cyberattack has become a major threat with the deployment of Information and Communications Technology (ICT) in a smart grid. The past cyberattack incidents have demonstrated how attackers can sabotage a power grid through digital communication systems. In the worst case, numerous electricity consumers can experience a major and extended power outage. Unfortunately, tracking techniques are not efficient for today’s advanced communication networks. Therefore, a reliable cyber protection system is a necessary defense tool for the power grid. In this paper, a signature-based Intrusion Detection System (IDS) is developed to detect cyber intrusions of a distribution system with a high level penetration of solar energy. To identify cyberattack events, an attack table is constructed based on the Temporal Failure Propagation Graph (TFPG) technique. It includes the information of potential cyberattack patterns in terms of attack types and time sequence of anomaly events. Once the detected anomaly events are matchedmore »with any of the predefined attack patterns, it is judged to be a cyberattack. Since the attack patterns are distinguishable from other system failures, it reduces the false positive rate. To study the impact of cyberattacks on solar devices and validate the performance of the proposed IDS, a realistic Cyber-Physical System (CPS) simulation environment available at Virginia Tech (VT) is used to develop an interconnection between the cyber and power system models. The CPS model demonstrates how communication system anomalies can impact the physical system. The results of two example cyberattack test cases are obtained with the IEEE 13 node test feeder system and the power system simulator, DIgSILENT PowerFactory.« less
  5. Baraldi, P. ; Zio, E. (Ed.)
    Critical infrastructure networks are becoming increasingly interdependent which adversely impacts their performance through the cascading effect of initial failures. Failing to account for these complex interactions could lead to an underestimation of the vulnerability of interdependent critical infrastructure (ICI). The goal of this research is to assess how important interdependent links are by evaluating the interdependency strength using a dynamic network flow redistribution model which accounts for the dynamic and uncertain aspects of interdependencies. Specifically, a vulnerability analysis is performed considering two scenarios, one with interdependent links and the other without interdependent links. The initial failure is set to be the same under both scenarios. Cascading failure is modeled through a flow redistribution until the entire system reaches a stable state in which cascading failure no longer occurs. The unmet demand of the networks at the stable state over the initial demand is defined as the vulnerability. The difference between the vulnerability of each network under these two scenarios is used as the metric to quantify interdependency strength. A case study of a real power-water-gas system subject to earthquake risk is conducted to illustrate the proposed method. Uncertainty is incorporated by considering failure probability using Monte Carlo simulation. By varyingmore »the location and magnitude of earthquake disruptions, we show that interdependency strength is determined not only by the topology and flow of ICIs but also the characteristics of the disruptions. This compound system-disruption effect on interdependency strength can inform the design, assessment, and restoration of ICIs.« less