ORIGINAL RESEARCH article

Front. Phys., 17 November 2020

Sec. Social Physics

Volume 8 - 2020 | https://doi.org/10.3389/fphy.2020.604595

Structural Vulnerability Analysis of Partially Interdependent Networks: The Joint Influence of Interdependence and Local Worlds

  • 1. Key Laboratory of Intelligence Computing and Novel Software Technology, Tianjin University of Technology, Tianjin, China

  • 2. Engineering Research Center of Learning-Based Intelligent System, Ministry of Education, Tianjin, China

Abstract

Previous studies have verified that the local-world mechanism can greatly affect the structural properties and dynamical processes occurring on isolated complex networks; however, the impact of local-world mechanism on structural vulnerability of interdependent systems is still not efficiently explored. Therefore, in this study, the joint influence of interdependence and local worlds on attack vulnerability of interdependent networks is addressed. First, a partially interdependent system model is proposed, consisting of two networks which are dependent on each other with different types of interdependence preference. In particular, each network evolves according to the local-world model with an adjustable parameter to control the size of local worlds during network evolution. Next, the cascading failure process induced by intentional attack on high-degree nodes is presented. Then, the responses of interdependent systems after cascading failures are investigated through large quantities of numerical simulations. The results show that the emergence of local worlds during network evolution plays an important role in the structural vulnerability of both single and interdependent networks; that is, networks with larger size of local worlds are found to be more vulnerable against attacks. Moreover, interdependent links make the entire system much more fragile, especially when the networks are with max–max assortative interdependence and the strength is enhanced. These results are beneficial to the deep understanding of the intrinsic connection between attack robustness and underlying structure of large-scale interdependent systems.

1 Introduction

In the past two decades, network science has been developed rapidly and enriched fruitful results in many fields [13]. Among all the active topics, due to the importance of network models in characterizing the structural properties and dynamics of complex large-scale systems, the study on a variety of network models is of great significance. For example, many real-world systems can be classified into and modeled as scale-free networks, such as Internet, World Wide Web, movie actor collaboration networks, and paper citation networks [4]. Let represent the probability that a randomly selected node has k connections with its direct neighbors in the entire network, the typical feature of scale-free networks is that their node degree distributions follow a power-law form: , which cannot be characterized by widely recognized Erdős and Rényi(ER) random model in graph theory [5].

In order to interpret the underlying formation mechanism of the abovementioned scale-free property, Barabási and Albert proposed the classical BA scale-free model [4], which includes two important ingredients: I) network growth, which means that new nodes and links are added into the network continuously, and II) preferential attachment in linking new-added nodes and old nodes. These two ingredients are thought to be responsible for the appearance of power-law degree distributions in many systems. However, during the evolution of many real-world complex networks, preferential attachment mechanism is found to only take effect in the local worlds, not the entire network [6]. Therefore, considering the local-world effect during network evolution, Li and Chen proposed the local-world evolving model [7]. An adjustable parameter, M, is introduced into the evolution of networks, which controls the size of the local worlds of the new-added nodes in which the preferential attachment mechanism works. As M increases, that is, the local world becomes larger, the resultant networks can show transitional behaviors between exponential and scale-free networks with respect to node degree distributions.

Motivated by this pioneering work, subsequent studies have been focused on local-world effect in modeling real-world complex networks, characterizing underlying structures and analyzing important dynamical processes occurring in complex systems. Some variants of local-world models are continually proposed to better understand the structural and functional properties of real systems, such as wireless communication networks [8], power grids [9], and energy supply–demand system [10]. Also, localization mechanism has been incorporated into the construction of other models in describing the structures of hypernetworks [11], bipartite networks [12], and weighted networks [13]. In addition, several important topological properties, such as clustering [14], community [15], hierarchical structures [16], and local neighborhood [17], are combined with the local-world effect to comprehensively uncover the underling structure of large-scale systems. Furthermore, previous findings have revealed that local-world effect can greatly affect the dynamical processes and collective behaviors of complex networks, including attack robustness [18], synchronization [19], epidemic spreading [20], cascading failures [21], consensus [22], and structural controllability [23].

In reality, many natural, technological, and social systems are composed of fully or partially interdependent networks [24, 25], which are becoming increasingly dependent on each other since no particular network can exist in isolation. Take the interdependence between three modern critical infrastructures, for instance, considering water supply system, communication network, and power grids, communication network and water supply system require power grids to provide power support for normal operations, power grids and water supply system need communication network to transmit control signals, and power grids require water supply system to cool down the electric generators. Particularly, due to the dependencies between networks, interdependent systems are extremely vulnerable to damage; that is, a small disturbance can result in a cascade of failures propagating through the interdependent connections between networks [2628]. Hence, understanding the vulnerability of interdependent systems is of vital importance [2937]. Attack vulnerability is regarded as one fundamental problem in many artificial and real-world interdependent networks, which has attracted extensive attention in the academic communities [3842].

Although localization has been considered as an indispensable mechanism in modeling and analyzing isolated complex systems, the combined study of interdependence and local-world mechanism is not sufficiently explored by far. Especially for attack vulnerability, isolated [18] and fully interdependent local-world networks [43] have been investigated, and it is found that the existence of local worlds during network evolution can have a great impact on networks’ performance-resisting attacks. These results motivate us to extent the study to partially interdependent networks to future explore the joint influence of interdependence and local-world effect on attack vulnerability. First, a partially interdependent system model is constructed, consisting of two networks which are dependent on each other with different coupling preference. In particular, each network is evolved according to the local-world model with an adjustable parameter to control the size of local worlds. Then, after the attack on a small fraction of nodes, the process of cascading failures of nodes and links in partially interdependent system is described. Moreover, different from random attack simulated by selecting and removing nodes randomly, an important and realistic attacking strategy in real world—intentional attack on high-degree nodes—is considered in this study.

The structure of the article is organized as follows. In Section 2, a partially interdependent system model is presented, consisting of two networks which are dependent on each other. Then, the cascading failure process induced by intentional removal of a small fraction of high-degree nodes is described in detail. In Section 3, through large quantities of numerical simulations, the impacts of local worlds and interdependence on system’s performance after cascading failures are investigated. Section 4 includes the conclusion of the whole article and the perspective on future works.

2 Models and Vulnerability Metrics

2.1 Interdependent Local-World Networks

In order to further investigate the joint influence of both interdependence and local worlds on structural vulnerability of interdependent networks, a partially interdependent system model with two networks, that is, networks A and B, is established based on the fully interdependent system model proposed by Buldyrev et al. [24]. This model considers both interdependence strength and preference. In the meantime, to explore the effect of local-world mechanism during network evolution, A and B are constructed according to the local-world evolving model [7].

An example of such interdependent system is exhibited in Figure 1A, which is composed of two networks A () and B (). There are two types of links in interdependent networks, namely, connectivity links and interdependent links. Connectivity links are the links connecting nodes belonging to the same network, such as link (-) and link (-). However, the interdependent links indicate that one endpoint node of a link depends on the node at the other end, such as link (-). The functioning of node depends on the functioning of node and vice versa. Once node fails, its interdependent partner node in network B will also fail. The connectivity and interdependent links are represented by solid and dashed lines in Figure 1, respectively. Regarding the interdependence pattern between network A and B, several important factors should be considered, which are listed as follows:

FIGURE 1

2.1.1 Interdependence Strength

Even in real-world interdependent systems, there exist some nodes which have no dependency on other networks. To this end, different from fully interdependent networks, the partially interdependent model involves an important parameter, q, to define the fraction of nodes in one network which have interdependent links. Thus, q () characterizes the interdependence strength between networks A and B. When q approaches 0, the interdependence between two networks becomes weaker, where failures of nodes and links cannot easily spread from one network to another. On the contrary, when q approaches 1, the interdependence becomes stronger, and more interdependent links are added in the system. As two special cases, corresponds to isolated networks without interdependence on each other, while when , it corresponds to the strongest interdependence, that is, the previous fully interdependent system model [24].

2.1.2 Interdependence Preference

Two kinds of interdependent interaction preference, that is, assortative and disassortative mixing, are usually considered in previous studies. Assortative mixing means that nodes with similar degree tend to be connected, and disassortative mixing indicates that nodes with different degree are connected. However, since only a fraction

q

of nodes have dependency relationships in partially interdependent networks, it is necessary to redefine assortative and disassortative interdependence as following.

  • Random interdependence

Random interdependence means randomly selecting nodes from networks

A

and

B

, respectively, and setting up interdependent links between them.

  • Assortative interdependence: max–max and min–min

First, sort nodes in networks

A

and

B

in the descending order of node degree, respectively, then, in the case of

max–max

interdependence, bidirectional interdependent links are set up between the fraction

q

of high-degree nodes in

A

and the fraction

q

of high-degree nodes in

B

. While, in the mode of

min–min

interdependence, the fraction

q

of low-degree nodes in one network are preferentially dependent on low-degree nodes in other network.

  • Disassortative interdependence: max–min and min–max

Here, max–min and min–max stand for two different kinds of disassortative interdependence. Considering max–min interdependence between networks A and B, it means that bidirectional interdependent links exist between high-degree nodes in A and low-degree nodes in B. On the contrary, in the case of min–max interdependence, the fraction q of low-degree nodes in A depend on the fraction q of high-degree nodes in B and vice versa.

For simplicity, only symmetric and

one-to-one

interdependence is considered, and two networks are with the same numbers of nodes and links in this study.

One-to-one

interdependence indicates that node

is dependent on only one node in network

B

, while

one-to-multiple

interdependence means that node

is dependent on more than one nodes in network

B

. As for

symmetric

interdependence, it means that node

is dependent on node

and

vice versa

. Otherwise, it is called

asymmetric

interdependence. Both networks in the interdependent system are constructed according to the

local-world

evolving model [

7

]. The construction algorithm can be described briefly as follows.

  • Network growth

The network evolves with

m

isolated nodes initially; then, at each time step

, a new node is added into the network, and

m

links are added between this new node and

m

existing nodes. After

T

time steps, the resultant network has

nodes and

links.

  • Locally preferential attachment

At each time step t, nodes are randomly chosen from the existing network and regarded as the local world of the new-added node. Afterward, the new node will connect to m nodes in this selected local world. Let Φ denote the set of nodes in this local world. Then, the linking probability of any node and the new node is defined as . Obviously, is valued over all the nodes . Also, is proportional to node degree . However, this preferential attachment only takes effect locally, which is different from globally preferential attachment proposed in BA scale-free model [4].

The adjustable parameter M controls the extent to which locally preferential mechanism takes effect. If M is equal to the size of existing network at each time step, which is indicated by in the following numerical simulations, the local world of the new-added node does not exist and the preferential attachment mechanism actually works in the whole network-wide; thus, it corresponds to the BA scale-free model, and the degree distribution of the resultant network follows a power-law form: [4]. If , the new-added node will connect all the nodes in the selected local world. It will result in an exponential network with degree distribution following an exponential form: . By tuning the parameter in the local-world model, networks can represent transitional behaviors between these two special cases.

2.2 Iterative Process of Cascading Failures under Intentional Attacks

In reality, targeted attacks on vital nodes are usually considered as effective strategies to destroy networked systems rather than random attacks. Therefore, it is of practical significance to investigate the performance of interdependent systems against intentional attacks. In this study, high-degree nodes are deliberately selected and removed from the system. For simplicity, nodes only in one network are initially attacked. Take the system shown in Figure 1A as an example; if network A is selected as the target, intentional attack can be simulated by sorting all the nodes in the descending order of degree and sequentially removing the nodes with the highest degree from network A.

Because of the interdependence between networks, once a small fraction of nodes are removed from one network, the damage may not be limited therein. The cascading failures of nodes and links can propagate between networks, just resulting in the collapse of the entire system. Figures 1B–G illustrate the propagating process of cascading failures of nodes and links which are caused by the removal of node (Figure 1A). After node is attacked and removed from network A, not only but also all its immediate links (-), (-) and (-) are destroyed (Figure 1B). Consequentially, this makes nodes and lose connection with the main body of network A (Figure 1C). Since node in network B depends on node , the removal of leads to the failures of node and links (-) and (-) (Figure 1D), thus triggering the disconnection of nodes and from the main body of network B consequently (Figure 1E). Due to the existence of dependency link (-), the failure of nodes induces the elimination of nodes and two links (-) and (-) (Figure 1F). Thus, the failures cascade back and forth between networks A and B. This iterative process will not stop until no further node and link are eliminated (Figure 1G). In the finally stabilized system, network A is with the largest connected component and B is with .

2.3 Structural Vulnerability Metrics

Generally speaking, after one network suffers attack on nodes and/or links, the structural vulnerability can be evaluated from two aspects, the damage on connectivity integrity and the loss of communication efficiency. Several widely used robustness measures are listed as follows:

  • S, relative size of the largest connected component

For an unconnected network, considering all the components, that is, the subnetworks of connected nodes, the largest connected component (

LCC

) represents the component which has the maximum number of connected nodes [

44

]. Let

and

denote the number of nodes that remain in the

LCC

and the total number of nodes in the initial undamaged network, respectively. The relative size

S

is defined as

, which is usually used as the main measure of the damage level caused by the elimination of nodes and links from the network, thus characterizing the performance of networks against attacks. Usually, the network is considered to be more robust with a larger value of

S

since more nodes remain connected in the largest component.

  • (2) η, residual communication efficiency

Communication efficiency is an important quantity to characterize how efficiently the information is transmitted between node pairs over the whole network [

45

]. Assume that information is always exchanged along the shortest paths, let

represent the length of shortest paths between node

i

and

j

, and communication efficiency

is defined to be inversely proportional to the shortest distance, that is,

. Thus, global communication efficiency ε of the entire network is the average of

over all node pairs, that is,

. After nodes and links are removed, let

and

denote the communication efficiency of the initial and residual network, respectively, the extent of communication efficiency loss can be defined as

, which can be used to evaluate the damage induced by node attack as well.

  • (3) , critical fraction of removed nodes

The critical threshold is the minimum fraction of nodes that must be eliminated to provoke the avalanche of the whole system. At , the whole network is nearly destroyed with and residual communication efficiency . Thus, is another widely used quantity measuring the vulnerability of networks. A smaller value of indicates that corresponding network is more easily to be destroyed and more vulnerable against attacks.

3 Numerical Simulation Results and Analysis

To explore the influence of both local-world mechanism and interdependence on structural vulnerability of interdependent systems, in the following numerical simulations, partially interdependent systems composed of two networks are established with different interdependence strength q and preference. According to the local-world evolving model, all the networks are constructed with different parameter M. Intentional attack is initiated by the removal of a fraction f of high-degree nodes in one network, indicated as the target network, which induces the cascading failures of nodes and links throughout both networks. When the system reaches the steady state after cascading failures, the damage on connectivity integrity and loss of communication efficiency of the target network are evaluated by monitoring the changes of S, η, and with increasing f.

3.1 Effect of Local-World Mechanism

First, the influence of local-world mechanism on vulnerability of isolated networks is investigated, which is corresponding to the special case of strength of interdependent systems proposed in section 2.1. All the networks are constructed with parameters , , average degree for different M( and ). Figures 2 A and B show the relative size S and residual communication efficiency η versus the fraction f of initially removed nodes for networks with different M, respectively. (curves with solid •) and (curves with solid ) correspond to two special cases of local-world model, exponential and scale-free network, respectively.

FIGURE 2

From Figure 2A, with the increasing of f, the values of S inevitably are reduced to near 0. However, S is observed to decline more sharply in networks with the increasing of M. The rapid decrease of the size of largest connected component implies that nodes break off from the main body and all the connected components break into small pieces quickly, just accelerating the collapse of the whole network. For example, at , with ; however, when and , S drops to , indicating the avalanche of the entire network.

Meanwhile, after cascading failures, the residual communication efficiency η of networks is also examined (Figure 2B). As more nodes are attacked and removed from the network, that is, η monotonically decreases, with the increasing of the fraction f of eliminated nodes. However, as M increases (from top to bottom), under the same level of external damage, that is, with the same f, η declines more rapidly in networks with higher values of M. For example, when , the residual efficiency of network with is , which is larger than in the network with . Also, as shown in Figure 2, is observed to become smaller in networks as M increases. For instance, when , , however, is observed to be about 0.26 when (Figure 2A). As mentioned above, a smaller means corresponding network is more fragile and can be destroyed more easily.

Second, the impact of local-world mechanism on structural vulnerability of fully interdependent local-world networks is also explored, which can be regarded as a special case of partially interdependent system with strength . In the numerical experiments, based on local-world model, all the networks are constructed with parameters , , average degree for different M. As for fully interdependent systems, N interdependent links are set up between all the nodes of both networks, indicating that each node in the system is dependent on one and only one node in the other network. Note that, since q equals to 1, max–max are identical with min–min for assortative interdependence and max–min are identical with min–max for disassortative interdependence.

Figures 35 show the relative size S of the largest connected component and the residual communication efficiency η as functions of the fraction f of initially removed high-degree nodes for fully interdependent local-world networks in the case of random, assortative and disassortative interdependence, respectively. It can be observed from Figures 3A, 4A, 5A that, as M is increased, the decline of S becomes more drastically with increasing f, implying that corresponding networks are more vulnerable against cascading failures. Also, as shown in Figures 3B, 4B, 5B, residual communication efficiency η decreases more rapidly in networks with higher values of M. Note that, these behaviors are consistent with those of isolated local-world networks (Figure 2).

FIGURE 3

FIGURE 4

FIGURE 5

In summary, the simulation results demonstrate that the emergence of local worlds during network evolution has great influence on structural vulnerability of both single and interdependent networks. Deliberate attacks on highly connected nodes can induce more damage and sequentially more easily lead to abrupt collapse on networks with larger size M of local worlds. In other words, networks with larger size of local worlds are found to be more vulnerable against attacks.

3.2 Influence of Interdependence Preference

Previous study has verified that interdependent links accelerate the cascading spreading of node and link failures between networks, thus greatly enhancing the fragility of entire system against cascading failures [24]. This can be proved by the following observation of the simulation results. From Figures 35, compared with isolated networks (Figure 2), S decreases more drastically and becomes lower in fully interdependent networks. For example, for isolated network with (Figure 2A), while for networks with in random case (Figure 3A).

Considering the effect of different interdependence preference, systems with assortative interdependence (Figure 4) are found to be the most vulnerable resisting cascading failures compared with random (Figure 3) and disassortative (Figure 5) cases. As M is fixed, the relative size S declines most rapidly and drops to at the lowest values of in the case of assortative interdependence. For instance, in networks with (curves with solid ), S drops more drastically to at the lowest with assortative interdependence (Figure 4A), however, and in networks with random (Figure 3A) and disassortative interdependence (Figure 5A), respectively. The same phenomena can be observed in networks with (curves with solid •), is the smallest in assortative case (), while the values in random coupling and disassortative cases are and , respectively.

Moreover, the effect of interdependence preference can also be verified by exploring the loss of communication efficiency induced by the elimination of nodes and links at the end of a cascading process. The changes of residual communication efficiency η versus the fraction f of initially removed high-degree nodes are shown in Figures 3B, 4B, 5B, which are corresponding to systems with random, assortative, and disassortative interdependence, respectively. In Figure 4B, for interdependent networks with assortative interdependence and local world size (curves with solid ), at , which means that of high-degree nodes are initially eliminated from the network, the residual efficiency is , while at , the residual efficiency is approximately in networks with random (Figure 3B) and disassortative interdependence. All the simulation results strongly confirm that compared with random and disassortative interdependence, interdependent networks coupled in an assortative way are more easily to be destroyed.

3.3 Impact of Interdependence Strength

Sequentially, in the following simulations, the vulnerability of partially interdependent networks after cascading failures is investigated by monitoring the joint influence of interdependence strength q, interdependence preference, and local world size M on the values of critical node threshold (Figure 6). Here, indicates the minimum number of nodes whose removal can trigger the cascade process of failure of nodes and links in both networks and lead to the abrupt collapse of the entire system. Meanwhile, different types of interdependence preference, namely, random, max–max, min–min, max–min and min–max, are considered. The results are obtained by averaging over 50 independent realizations on interdependent systems consisting two local-world networks, which are separately constructed with , , and for different M ( and ).

FIGURE 6

In all the plots of Figure 6, from top () to bottom (), with the same interdependence strength q, as M increases, is observed to decrease monotonically, implying that partially interdependent systems composed of networks with relatively larger size M of local worlds become more vulnerable once cascading failures of nodes and links occur. Also, the results illustrate that interdependent networks become more fragile with enhanced coupling strength. When M is fixed, is observed to decrease with the increasing of q, indicating that the emergence of more interdependent links makes both networks more vulnerable against attacks.

Compared with random interdependence (Figure 6A), drops more rapidly at relatively smaller values of q in networks with assortative max–max interdependence (Figure 6B). This reveals that max–max interdependence makes interdependent system more fragile resisting cascading failures. After targeted attacks occur in one network, since high-degree nodes of each network are depend on each other, the failures of high-degree nodes can not only trigger the breakdown of their neighbors in the same network but also lead to the failures of counterpart nodes in other networks. Especially, when q becomes larger, that is, , the propagation of failures will lead to the quick collapse of both networks. On the contrary, in networks with min–min interdependence (Figure 6C), interdependent links preferentially connect low-degree nodes of both networks; thus, the failures induced by interdependence are limited to low-degree nodes. Therefore, networks with min–min interdependence are more robust than other cases under attacks, especially when the interdependence strength is relatively small (Figure 6C).

As q is increased, for example, , it can be observed from Figures 6 D and E that, with the same M, the values of in networks with max–min interdependence are relatively larger than those in networks with min–max interdependence. In other words, compared with max–min interdependence, networks with min–max interdependence are more fragile against cascading failures. Qualitatively, this can be explained as follows: max–min and min–max are two different types of disassortative interdependence between networks. For interdependent system with networks A and B, in the case of max–min interdependence, high-degree nodes in A and low-degree nodes in B are dependent on each other, while, in the case of min–max interdependence, low-degree nodes in A depend on high-degree nodes in B and vice versa. If A is selected as the attacking target, a fraction f of high-degree nodes in A are intentionally removed from the network, which triggers the cascading failures of nodes and links in both networks. In the case of max–min interdependence, the removal of high-degree nodes in A can only directly destroy low-degree nodes in B. The failures of low-degree nodes in B can bring less damage on connectivity compared with the failures of high-degree nodes in B in the case of min–max interdependence, thus suppressing the propagation of failures of nodes and links in both networks.

In previous studies, it has been revealed that node degree distribution and degree heterogeneity are essentially important for attack robustness of complex networks [4649]. Two basic topological metrics, and , are introduced to characterize the extent of heterogeneity of node degree distribution. is defined to be the maximal value of degrees among all the nodes. And denotes the variance of the entire node degree sequence, that is, . Figures 7 A and B exhibit and as a function of M in local-world networks, respectively. As observing from Figure 7A, increases monotonously with M, implying that corresponding networks become more heterogeneous in connectivity. As well, becomes larger with increasing M (Figure 7B), indicating that hub nodes with more links emerge in resultant networks.

FIGURE 7

The results in Figure 7 demonstrate that with the increasing of size M of local worlds, the local-world characteristic of the network decreases, especially when the local-world mechanism loses effect thoroughly and the resultant network reduces to the classic BA scale-free model [4]. The losing of local-world feature makes the network become more heterogeneous in connectivity, that is, the emergence of hub nodes and increased degree variance. Also, the network becomes more fragile against attacks. Intentional attack on high-degree nodes can lead to more drastic damage on connectivity integrity in more heterogeneous networks. This is the reason why isolated and interdependent networks with increased M are more fragile to be destroyed. In particular, in systems with max–max assortative interdependence, hub nodes in both networks depend on each others, when targeted attack is initiated, the removal of hub nodes in one network can cause the failures of hub nodes in the other network, just accelerating the propagation of node and link failures between networks. Thus, compared with other types of preference, systems with max–max interdependence are the most vulnerable against cascading failures caused by the attack on highly connected nodes.

4 Conclusion

To give a deep insight into the joint influence of interdependence and local worlds on complex interdependent networks with respect to the structural vulnerability after cascading failures, an interdependent system composed of two networks is established incorporating the consideration of both interdependence strength and preference. Especially, based on the local-world model, both networks are constructed with an adjustable parameter which controls the size of local worlds during network evolution. Through numerical simulations, it has been revealed that local-world mechanism can greatly affect the vulnerability of both isolated and interdependent networks. As the size of local world increases, corresponding networks are found to be more vulnerable after cascading failures induced by node removal. Additionally, the research results strongly verify that interdependent links can accelerate the collapse of the entire system. Comparing different interdependence preference, networks with max–max assortative interdependence are the most fragile against cascading failures. These results suggest that protecting highly connected nodes and weakening the interdependence between high-degree nodes can be effective for enhancing the robustness of interdependent systems. Especially, from the viewpoint of network evolution, controlling the extent of preferential attachment can be quite beneficial to preventing the drastic catastrophic failures of isolated and interdependent networks.

In this study, the investigation on network vulnerability against cascading failures is mainly focused on a simple binary networked system model, where links between nodes are only with two states, that is, present or absent. Nonetheless, most real-world networks are naturally weighted with some interaction values associated to the links (i.e., the link weight) [13, 44]. Thus, in the following work, the study on the relationships between local-world effect and network attack will be extended to weighted interdependent networks and real-world networks. Recently, many protection approaches have been developed to improve attack robustness and avoid abrupt collapse of complex systems, including setting reinforced nodes to support their neighborhood [50], targeted node recovery [5153], and introducing node repair after collapse [54]. Therefore, local-world mechanism should be incorporated into the robustness improvement of interdependent systems, which remains as an interesting topic to be explored extensively. Moreover, several important dynamical behaviors, such as system crash behavior [36], epidemic dynamics [55] and structural controllability [56], have been extended into multiple networked systems. The effect of local worlds on these dynamic behaviors in interdependent systems deserves further study as well.

Funding

This work is partially supported by the Natural Science Foundation of Tianjin under Grant No. 18JCYBJC87800 and the National Natural Science Foundation of China under Grant No. 61773286.

Statements

Data availability statement

The original contributions presented in the study are included in the article/supplementary materials; further inquiries can be directed to the corresponding author/s.

Author contributions

JW and SS conceived and conducted the numerical experiments. LW and CX proposed the advice. All the authors analyzed the research results and together wrote the first version of the manuscript.

Acknowledgments

We would like to thank all the anonymous reviewers for their helpful suggestions to improve the quality of our manuscript.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  • 1.

    AlbertRBarabásiAL. Statistical mechanics of complex networks. Rev Mod Phys (2002). 74:4797. 10.1103/RevModPhys.74.47

  • 2.

    NewmanMEJ. The structure and function of complex networks. SIAM Rev (2003). 45:167256. 10.1137/S003614450342480

  • 3.

    BoccalettiSLatoraVMorenoYChavezMHwangD. Complex networks: structure and dynamics. Phys Rep (2006). 424:175308. 10.1016/j.physrep.2005.10.009

  • 4.

    BarabásiALAlbertR. Emergence of scaling in random networks. Science (1999). 286:50912. 10.1126/science.286.5439.509

  • 5.

    ErdősPRényiA. On the evolution of random graphs. Publ Math Inst Hung Acad Sci (1960). 5:1761. 10.1515/9781400841356.38

  • 6.

    LiXYing JinYChenG. Complexity and synchronization of the world trade web. Phys Stat Mech Appl (2003). 328:28796. 10.1016/S0378-4371(03)00567-3

  • 7.

    LiXChenG. A local-world evolving network model. Physica A (2003). 328:24786. 10.1016/S0378-4371(03)00604-6

  • 8.

    DingYLiXTianYCLedwichGMishraYZhouC. Generating scale-free topology for wireless neighborhood area networks in smart grid. IEEE Trans Smart Grid (2019). 10:424552. 10.1109/TSG.2018.2854645

  • 9.

    XingYFChenXGuanMXLuZM. An evolving network model for power grids based on geometrical location clusters. IEICE Trans Info Syst (2018). E101.D:53942. 10.1587/transinf.2017EDL8177

  • 10.

    SunMHanDLiDFangC. The general evolving model for energy supply-demand network with local-world. Int J Mod Phys C (2013). 24:1350070. 10.1142/S0129183113500708

  • 11.

    YangGYLiuJG. A local-world evolving hypernetwork model. Chin Phys B (2014). 23:018901. 10.1088/1674-1056/23/1/018901

  • 12.

    TianLHeYHuangY. A novel local-world-like evolving bipartite network model. Acta Phys Sin (2012). 61:228903. 10.7498/aps.61.228903.

  • 13.

    LiPZhaoQWangH. A weighted local-world evolving network model based on the edge weights preferential selection. Int J Mod Phys B (2013). 27:1350039. 10.1142/S0217979213500392

  • 14.

    ZhangZRongLWangBZhouSGuanJ. Local-world evolving networks with tunable clustering. Phys Stat Mech Appl (2007). 380:63950. 10.1016/j.physa.2007.02.045

  • 15.

    XieZLiXWangX. A new community-based evolving network model. Phys Stat Mech Appl (2007). 384:72532. 10.1016/j.physa.2007.05.031

  • 16.

    WangLNGuoJLYangHXZhouT. Local preferential attachment model for hierarchical networks. Phys Stat Mech Appl (2009). 388:171320. 10.1016/j.physa.2008.12.028

  • 17.

    MuJZhengWWangJLiangJ. A novel edge rewiring strategy for tuning structural properties in networks. Knowl Base Syst (2019). 177:5567. 10.1016/j.knosys.2019.04.004

  • 18.

    SunSLiuZChenZYuanZ. Error and attack tolerance of evolving networks with local preferential attachment. Phys Stat Mech Appl (2007). 373:85160. 10.1016/j.physa.2006.05.049

  • 19.

    SunSLiuZChenZYuanZ. On synchronizability of dynamical local-world networks. Int J Mod Phys B (2008). 22:271323. 10.1142/S0217979208039770

  • 20.

    XiaCLiuZChenZSunSYuanZ. Epidemic spreading behavior with time delay on local-world evolving networks. Front Electr Electron Eng China (2008). 3:12935. 10.1007/s11460-008-0033-3.

  • 21.

    BaoZjCaoYj. Cascading failures in local-world evolving networks. J Zhejiang Univ-Sci (2008). 9:133640. 10.1631/jzus.A0820336

  • 22.

    WuZPGuanZHWuX. Consensus problem in multi-agent systems with physical position neighbourhood evolving network. Phys Stat Mech Appl (2007). 379:68190. 10.1016/j.physa.2006.12.026

  • 23.

    SunSMaYWuYWangLXiaC. Towards structural controllability of local-world networks. Phys Lett (2016). 380:191217. 10.1016/j.physleta.2016.03.048

  • 24.

    BuldyrevSVParshaniRPaulGStanleyHEHavlinS. Catastrophic cascade of failures in interdependent networks. Nature (2010). 464:102528. 10.1038/nature08932

  • 25.

    KiveläMArenasABarthelemyMGleesonJPMorenoYPorterMA. Multilayer networks. Journal of Complex Networks (2014). 2:20371. 10.1093/comnet/cnu016

  • 26.

    BoccalettiSBianconiGCriadoRdel GenioCIGómez-GardeñesJRomanceM. The structure and dynamics of multilayer networks. Phys Rep (2014). 544:1122. 10.1016/j.physrep.2014.07.001

  • 27.

    LiJWangYHuangSXieJShekhtmanLHuYet alRecent progress on cascading failures and recovery in interdependent networks. Internat J Disaster Risk Reduction (2019). 40:101266. 10.1016/j.ijdrr.2019.101266

  • 28.

    JiangWLiuRFanTLiuSLuL. Overview of precaution and recovery strategies for cascading failures in multilayer networks. Acta Phys Sin (2020). 69:088904. 10.7498/aps.69.20192000.

  • 29.

    AlbertRJeongHBarabásiAL. Error and attack tolerance of complex networks. Nature (2000). 406:37882. 10.1038/35019019

  • 30.

    PodobnikBHorvaticDLipicTPercMBuldúJMStanleyHE. The cost of attack in competing networks. J R Soc Interface (2015). 12:20150770. 10.1098/rsif.2015.0770

  • 31.

    QiuTLiuJSiWHanMNingHAtiquzzamanM. A data-driven robustness algorithm for the internet of things in smart cities. IEEE Commun Mag (2017). 55:1823. 10.1109/MCOM.2017.1700247

  • 32.

    ZhouMLiuJ. A two-phase multiobjective evolutionary algorithm for enhancing the robustness of scale-free networks against multiple malicious attacks. IEEE Trans Cybern (2016). 47:114. 10.1109/TCYB.2016.2520477

  • 33.

    LinYBurghardtKRohdenMNoëlP-AD’SouzaRM. Self-organization of dragon king failures. Phys Rev E (2018). 98:022127. 10.1103/PhysRevE.98.022127

  • 34.

    KornbluthYBarachGTuchmanYKadishBCwilichGBuldyrevSV. Network overload due to massive attacks. Phys Rev E (2018). 97:052309. 10.1103/PhysRevE.97.052309

  • 35.

    YangYNishikawaTMotterAE. Vulnerability and cosusceptibility determine the size of network cascades. Phys Rev Lett (2017). 118:048301. 10.1103/PhysRevLett.118.048301

  • 36.

    YuYXiaoGZhouJWangYWangZKurthsJet alSystem crash as dynamics of complex networks. Proc Natl Acad Sci USA (2016). 113:1172631. 10.1073/pnas.1612094113

  • 37.

    YangYNishikawaTMotterAE. Small vulnerable sets determine large network cascades in power grids. Science (2017b). 358:eaan3184. 10.1126/science.aan3184

  • 38.

    DuanDLvCSiSWangZLiDGaoJ. Universal behavior of cascading failures in interdependent networks. Proc Natl Acad Sci USA (2019). 116:224527. 10.1073/pnas.1904421116

  • 39.

    CaiYCaoYLiYHuangTZhouB. Cascading failure analysis considering interaction between power grids and communication networks. IEEE Trans Smart Grid (2016). 7:5308. 10.1109/TSG.2015.2478888

  • 40.

    ChenZWuJXiaYZhangX. Robustness of interdependent power grids and communication networks: a complex network perspective. IEEE Trans Circuits Syst II (2018). 65:11519. 10.1109/TCSII.2017.2705758

  • 41.

    ZhangHPengMGuerreroJMGaoXLiuYLiuY. Modelling and vulnerability analysis of cyber-physical power systems based on interdependent networks. Energies (2019). 12:3439. 10.3390/en12183439

  • 42.

    ZhouDBashanA. Dependency-based targeted attacks in interdependent networks. Phys Rev E (2020). 102:022301. 10.1103/PhysRevE.102.022301

  • 43.

    WuYSunSWangLXiaC. Attack vulnerability of interdependent local-world networks: the effect of degree heterogeneity. In: Proc. IEEE IECON 2017 - 43rd Ann. Conf. of the IEEE Ind. Elect. Soc. 2017 (2017). p. 87637. 10.1109/IECON.2017.8217540

  • 44.

    BellingeriMBevacquaDScotognellaFAlfieriRNguyenQMontepietraDet alLink and node removal in real social networks: a review. Front Physiol (2020). 8:228. 10.3389/fphy.2020.00228

  • 45.

    LatoraVMarchioriM. Efficient behavior of small-world networks. Phys Rev Lett (2001). 87:198701. 10.1103/PhysRevLett.87.198701

  • 46.

    YuanXShaoSStanleyHEHavlinS. How breadth of degree distribution influences network robustness: comparing localized and random attacks. Phys Rev E (2015). 92:032122. 10.1103/PhysRevE.92.032122

  • 47.

    SunSWuYMaYWangLGaoZXiaC. Impact of degree heterogeneity on attack vulnerability of interdependent networks. Sci Rep (2016). 6:32983. 10.1038/srep32983

  • 48.

    BuldyrevSVShereNWCwilichGA. Interdependent networks with identical degrees of mutually dependent nodes. Phys Rev E (2011). 83:016112. 10.1103/PhysRevE.83.016112

  • 49.

    ZhouDStanleyHED’AgostinoGScalaA. Assortativity decreases the robustness of interdependent networks. Phys Rev E (2012). 86:066103. 10.1103/PhysRevE.86.066103

  • 50.

    YuanXHuYStanleyHEHavlinS. Eradicating catastrophic collapse in interdependent networks via reinforced nodes. Proc Natl Acad Sci USA (2017). 114:331115. 10.1073/pnas.1621369114

  • 51.

    MajdandzicAPodobnikBBuldyrevSVKenettDYHavlinSEugene StanleyH. Spontaneous recovery in dynamical networks. Nat Phys (2014). 10:348. 10.1038/NPHYS2819

  • 52.

    GongMMaLCaiQJiaoL. Enhancing robustness of coupled networks under targeted recoveries. Sci Rep (2015). 5:8439. 10.1038/srep08439

  • 53.

    ZhouDElmokashfiA. Network recovery based on system crash early warning in a cascading failure model. Sci Rep (2018). 8:19. 10.1038/s41598-018-25591-6

  • 54.

    MajdandzicABraunsteinLACurmeCVodenskaILevy-CarcienteSEugene StanleyHet alMultiple tipping points and optimal repairing in interacting networks. Nat Commun (2016). 7:110. 10.1038/ncomms10850

  • 55.

    WangZGuoQSunSXiaC. The impact of awareness diffusion on sir-like epidemics in multiplex networks. Appl Math Comput (2019). 349:13447. 10.1016/j.amc.2018.12.045

  • 56.

    XiangLChenFRenWChenG. Advances in network controllability. IEEE Circ Syst Mag (2019). 19:832. 10.1109/MCAS.2019.2909446

Summary

Keywords

interdependent networks, complex networks, structural vulnerability, cascading failures, local worlds, network attack

Citation

Wang J, Sun S, Wang L and Xia C (2020) Structural Vulnerability Analysis of Partially Interdependent Networks: The Joint Influence of Interdependence and Local Worlds. Front. Phys. 8:604595. doi: 10.3389/fphy.2020.604595

Received

09 September 2020

Accepted

29 September 2020

Published

17 November 2020

Volume

8 - 2020

Edited by

Mahdi Jalili, RMIT University, Australia

Reviewed by

Yongxiang Xia, Hangzhou Dianzi University, China

Michele Bellingeri, University of Parma, Italy

Updates

Copyright

*Correspondence: Shiwen Sun,

This article was submitted to Social Physics, a section of the journal Frontiers in Physics

Disclaimer

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

Outline

Figures

Cite article

Copy to clipboard


Export citation file


Share article

Article metrics