Abstract
In this paper, we study a new coupled network model that multiple equal-mixed models to study the security of the coupled system in distributed heterogeneous environments. We propose a method for analyzing cascading failures, in which we can derive the critical threshold of the coupled system. Then we verify the correctness of the critical threshold by simulation experiments. And the simulation experiments are concluded that the coupled system exhibits a first-order phase transition near the critical threshold. The analytical methods we propose in this paper can analyze the wide range of applicability of coupling systems at various scales.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Albert, R., Jeong, H., Barabási, A.L.: Error and attack tolerance of complex networks. Nature 406(6794), 378–382 (2000)
Brummitt, C.D., D’Souza, R.M., Leicht, E.A.: Suppressing cascades of load in interdependent networks. Proc. Nat. Acad. Sci. 109(12), E680–E689 (2012)
Buldyrev, S.V., Parshani, R., Paul, G., Stanley, H.E., Havlin, S.: Catastrophic cascade of failures in interdependent networks. Nature 464(7291), 1025–1028 (2010)
Dartmann, G., Song, H., Schmeink, A.: Big data analytics for cyber-physical systems. In: Machine Learning for the Internet of Things. Elsevier (2019)
Dey, P., Mehra, R., Kazi, F., Wagh, S., Singh, N.M.: Impact of topology on the propagation of cascading failure in power grid. IEEE Trans. Smart Grid 7(4), 1970–1978 (2016)
Gao, J., Buldyrev, S.V., Stanley, H.E., Havlin, S.: Networks formed from interdependent networks. Nat. Phys. 8(1), 40–48 (2012)
Hartmann, T., Fouquet, F., Klein, J., Le Traon, Y., Pelov, A., Toutain, L., Ropitault, T.: Generating realistic smart grid communication topologies based on real-data. In: 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 428–433. IEEE (2014)
Huang, Y., Li, B., Liu, Z., Li, J., Yiu, S.M., Baker, T., Gupta, B.B.: Thinoram: Towards practical oblivious data access in fog computing environment. IEEE Trans. Serv. Comput. 13, 602–612 (2019)
Ke, S., Zhenxiang, H., Yijia, C.: Review on models of cascading failure in complex power grid. Power Syst. Technol. Beijing 29(13), 1 (2005)
Li, T., Li, J., Chen, X., Liu, Z., Lou, W., Hou, T.: NPMML: A framework for non-interactive privacy-preserving multi-party machine learning. IEEE Trans. Dependable Secure Comput. (2020). https://doi.org/10.1109/TDSC.2020.2971598
Li, W., Bashan, A., Buldyrev, S.V., Stanley, H.E., Havlin, S.: Cascading failures in interdependent lattice networks: The critical role of the length of dependency links. Phys. Rev. Lett. 108(22), 228702 (2012)
Liu, Z., Li, B., Huang, Y., Li, J., Xiang, Y., Pedrycz, W.: Newmcos: Towards a practical multi-cloud oblivious storage scheme. IEEE Trans. Knowl. Data Eng. 32(4), 714–727 (2019)
Manik, D., Rohden, M., Ronellenfitsch, H., Zhang, X., Hallerberg, S., Witthaut, D., Timme, M.: Network susceptibilities: Theory and applications. Phys. Rev. E 95(1), 012319 (2017)
Newman, M.: Networks. Oxford University Press (2018)
Rosato, V., Issacharoff, L., Tiriticco, F., Meloni, S., Porcellinis, S., Setola, R.: Modelling interdependent infrastructures using interacting dynamical models. Int. J. Crit. Infrastruct. 4(1–2), 63–79 (2008)
Sun, K.: WAMS-based controlled system separation to mitigate cascading failures in smart grid. In: Stoustrup, J., Annaswamy, A., Chakrabortty, A., Qu, Z. (eds.) Smart Grid Control. Power Electronics and Power Systems. Springer, Cham (2019)
Toft, M.B., Schuitema, G., Thøgersen, J.: Responsible technology acceptance: Model development and application to consumer acceptance of smart grid technology. Appl. Energy 134, 392–400 (2014)
Wang, T., Liang, Y., Yang, Y., Xu, G., Peng, H., Liu, A., Jia, W.: An intelligent edge-computing-based method to counter coupling problems in cyber-physical systems. IEEE Netw. 34(3), 16–22 (2020)
Xu, G., Liu, J., Lu, Y., Zeng, X., Zhang, Y., Li, X.: A novel efficient maka protocol with desynchronization for anonymous roaming service in global mobility networks. J. Netw. Comput. Appl. 107, 83–92 (2018)
Xu, G., Zhang, Y., Sangaiah, A.K., Li, X., Castiglione, A., Zheng, X.: CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems. Inf. Sci. 476, 505–515 (2019)
Zhu, Y., Yan, J., Tang, Y., Sun, Y.L., He, H.: Joint substation-transmission line vulnerability assessment against the smart grid. IEEE Trans. Inf. Forensics Secur. 10(5), 1010–1024 (2015)
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China (Grant No.61902359, No.61672467 and No.61672468), in part by the Social Development Project of Zhejiang Provincial Public Technology Research (Grant No.2016C33168), in part by Zhejiang Provincial Natural Science Foundation of China (Grant No.LQ19F030010), and in part by the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security (Grant No.AGK2018001).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Peng, H., Kan, Z., Zhao, D., Han, J., Hu, Z. (2020). Risk Assessment of Heterogeneous CPS Systems Under Different Proportions of Links. In: Xiang, Y., Liu, Z., Li, J. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2020. Communications in Computer and Information Science, vol 1298. Springer, Singapore. https://doi.org/10.1007/978-981-15-9031-3_32
Download citation
DOI: https://doi.org/10.1007/978-981-15-9031-3_32
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9030-6
Online ISBN: 978-981-15-9031-3
eBook Packages: Computer ScienceComputer Science (R0)