Abstract

The interdependence of critical infrastructures, particularly of information and telecommunication networks and systems and electrical power networks has been studied intensively employing a number of different methods ranging from semi-qualitative Leontief models via percolation models and related approaches from statistical physics to agent and graph-theoretical models. In this paper we focus on the latter approach and study the structures arising from incomplete joining of two power-law networks. Both ICT and power networks are artificial networks, but a number of studies demonstrate that such networks generally exhibit scale-free properties and can be described with high accuracy by power-law degree sequence graphs. A well-known result is that the robustness of such networks to random failures and intentional attack differs considerably, with high levels of vulnerability to targeted attacks. However, differences in robustness exist based on the exact degree sequence. Dependencies between two or more such networks can result in both dependency paths, where the length of paths and the existence of vertex-and edge-disjoint paths can inform mitigation mechanisms; more importantly, however, cycles arising indicate the existence of interdependencies that may be more difficult to recover from or mitigate. This has been studied previously for both simple graphs and for flows; however, we argue that particularly for the case of (inter-)dependencies between power and ICT networks in smart grid environments, this relation between the graphs is itself not static. We consider the existence, addition, or removal of dependencies in the form of sparse random graphs resulting in the creation of interdependence cycles. The diameter of such cycles can serve as a strong indicator of the vulnerability of the overall network as it is indicative of the attack surface of the network. The introduction of additional edges in the graph, indicating information flows in the smart grid, can hence reduce vulnerabilities, hence the efficient discovery of such structures for a given graph is of particular interest.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.