skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: A simulation‐based generalized framework to model vulnerability of interdependent critical infrastructure systems under incomplete information
Abstract This paper proposes a novel simulation‐based hybrid approach coupled with time‐dependent Bayesian network analysis to model multi‐infrastructure vulnerability over time under physical, spatial, and informational uncertainties while considering cascading failures within and across infrastructure networks. Unlike existing studies that unrealistically assume that infrastructure managers have full knowledge of all the infrastructure systems, the proposed approach considers a realistic scenario where complete information about the infrastructure network topology or the supply–demand flow characteristics is not available while estimating multi‐infrastructure vulnerability. A novel heuristic algorithm is proposed to construct a dynamic fault tree to abstract the network topology of any infrastructure. In addition, to account for the unavailability of exact supply–demand flow characteristics, the proposed approach constructs the interdependence links across infrastructure network systems using different simulated parameters considering the physical, logical, and geographical dependencies. Finally, using parameters for geographical proximity, infrastructure managers' risk perception, and the relative importance of one infrastructure on another, the multi‐infrastructure vulnerability over time is estimated. Results from the numerical experiment show that for an opportunistic risk perception, the interdependencies attribute to redundancies, and with an increase in redundancy, the vulnerability decreases. On the other hand, from a conservative risk perspective, the interdependencies attribute to deficiencies/liabilities, and the vulnerability increases with an increase in the number of such interdependencies.  more » « less
Award ID(s):
2308524
PAR ID:
10405408
Author(s) / Creator(s):
 ;  
Publisher / Repository:
Wiley-Blackwell
Date Published:
Journal Name:
Computer-Aided Civil and Infrastructure Engineering
Volume:
38
Issue:
18
ISSN:
1093-9687
Format(s):
Medium: X Size: p. 2537-2559
Size(s):
p. 2537-2559
Sponsoring Org:
National Science Foundation
More Like this
  1. Baraldi, P.; null; Zio, E. (Ed.)
    Critical infrastructure networks are becoming increasingly interdependent which adversely impacts their performance through the cascading effect of initial failures. Failing to account for these complex interactions could lead to an underestimation of the vulnerability of interdependent critical infrastructure (ICI). The goal of this research is to assess how important interdependent links are by evaluating the interdependency strength using a dynamic network flow redistribution model which accounts for the dynamic and uncertain aspects of interdependencies. Specifically, a vulnerability analysis is performed considering two scenarios, one with interdependent links and the other without interdependent links. The initial failure is set to be the same under both scenarios. Cascading failure is modeled through a flow redistribution until the entire system reaches a stable state in which cascading failure no longer occurs. The unmet demand of the networks at the stable state over the initial demand is defined as the vulnerability. The difference between the vulnerability of each network under these two scenarios is used as the metric to quantify interdependency strength. A case study of a real power-water-gas system subject to earthquake risk is conducted to illustrate the proposed method. Uncertainty is incorporated by considering failure probability using Monte Carlo simulation. By varying the location and magnitude of earthquake disruptions, we show that interdependency strength is determined not only by the topology and flow of ICIs but also the characteristics of the disruptions. This compound system-disruption effect on interdependency strength can inform the design, assessment, and restoration of ICIs. 
    more » « less
  2. Critical infrastructure networks, including water, power, communication, and transportation, among others, are necessary to society’s functionality. In recent years, the threat of different types of disruptions to such infrastructure networks has become an increasingly important problem to address. Due to existing interdependencies, damage to a small area of one of the networks could have far-reaching effects on the ability to meet demand across the entire system. Common disruption scenarios include, among others, intentional malevolent attacks, natural disasters, and random failures. Similar works have focused on only one type of scenario, but combining a variety of disruptions may lead to more realistic results. Additionally, the concept of social vulnerability, which describes an area’s ability to prepare for and respond to a disruption, must be included. This should promote not only the protection of the most at-risk components but also ensure that socially vulnerable communities are given adequate resources. This work provides a decision making framework to determine the allocation of defensive resources that accounts for all these factors. Accordingly, we propose a multi-objective mathematical model with the objectives of: (i) minimizing the vulnerability of a system of interdependent infrastructure networks, and (ii) minimizing the total cost of the resource allocation strategy. Moreover, to account for uncertainty in the proposed model, this paper incorporates a means to address robustness in finding the most adaptable network protection plan to reduce the vulnerability of the system of interdependent networks to a variety of disruption scenarios. The proposed work is illustrated with an application to social vulnerability and interdependent power, gas, and water networks in Shelby County, Tennessee. 
    more » « less
  3. The recurrence of extreme weather events has led to the development of methods for assessing the vulnerability and interdependencies of physical and human systems. A case example is Hurricane Maria (H-Maria), where Puerto Rico experienced damage to 80% of its electrical power system, leading to massive disruptions of essential services for months. Here we evaluate the effectiveness of various interventions aimed at reducing vulnerability by considering power and water infrastructure and respective water–power dependencies while also considering the social vulnerability of affected communities associated with the physical infrastructure upgrades. On the basis of the current infrastructure configuration, we found that all communities suffered enormously from power and water outages. As one upgrade option, we show that incorporating regional energy grids would reduce outages in an H-Maria scenario. However, a large portion of disadvantaged communities will face service disruption under this option. In contrast, hardening transmission lines, as the second option, would improve service delivery and, most importantly, provide uninterrupted service to the higher portion of the vulnerable population. 
    more » « less
  4. d. Many of the infrastructure sectors that are considered to be crucial by the Department of Homeland Security include networked systems (physical and temporal) that function to move some commodity like electricity, people, or even communication from one location of importance to another. The costs associated with these flows make up the price of the network’s normal functionality. These networks have limited capacities, which cause the marginal cost of a unit of flow across an edge to increase as congestion builds. In order to limit the expense of a network’s normal demand we aim to increase the resilience of the system and specifically the resilience of the arc capacities. Divisions of critical infrastructure have faced difficulties in recent years as inadequate resources have been available for needed upgrades and repairs. Without being able to determine future factors that cause damage both minor and extreme to the networks, officials must decide how to best allocate the limited funds now so that these essential systems can withstand the heavy weight of society’s reliance. We model these resource allocation decisions using a two-stage stochastic program (SP) for the purpose of network protection. Starting with a general form for a basic two-stage SP, we enforce assumptions that specify characteristics key to this type of decision model. The second stage objective—which represents the price of the network’s routine functionality—is nonlinear, as it reflects the increasing marginal cost per unit of additional flow across an arc. After the model has been designed properly to reflect the network protection problem, we are left with a nonconvex, nonlinear, nonseparable risk-neutral program. This research focuses on key reformulation techniques that transform the problematic model into one that is convex, separable, and much more solvable. Our approach focuses on using perspective functions to convexify the feasibility set of the second stage and second order conic constraints to represent nonlinear constraints in a form that better allows the use of computational solvers. Once these methods have been applied to the risk-neutral model we introduce a risk measure into the first stage that allows us to control the balance between an efficient, solvable model and the need to hedge against extreme events. Using Benders cuts that exploit linear separability, we give a decomposition and solution algorithm for the general network model. The innovations included in this formulation are then implemented on a transportation network with given flow demand 
    more » « less
  5. Security concerns have been raised about cascading failure risks in evolving power grids. This paper reveals, for the first time, that the risk of cascading failures can be increased at low network demand levels when considering security-constrained generation dispatch. This occurs because critical transmission cor- ridors become very highly loaded due to the presence of central- ized generation dispatch, e.g., large thermal plants far from de- mand centers. This increased cascading risk is revealed in this work by incorporating security-constrained generation dispatch into the risk assessment and mitigation of cascading failures. A se- curity-constrained AC optimal power flow, which considers eco- nomic functions and security constraints (e.g., network con- straints, 𝑵 − 𝟏 security, and generation margin), is used to pro- vide a representative day-ahead operational plan. Cascading fail- ures are simulated using two simulators, a quasi-steady state DC power flow model, and a dynamic model incorporating all fre- quency-related dynamics, to allow for result comparison and ver- ification. The risk assessment procedure is illustrated using syn- thetic networks of 200 and 2,000 buses. Further, a novel preventive mitigation measure is proposed to first identify critical lines, whose failures are likely to trigger cascading failures, and then to limit power flow through these critical lines during dispatch. Results show that shifting power equivalent to 1% of total demand from critical lines to other lines can reduce cascading risk by up to 80%. 
    more » « less