Next Article in Journal
Airborne Quantum Key Distribution Performance Analysis under Supersonic Boundary Layer
Next Article in Special Issue
Topological Data Analysis for Multivariate Time Series Data
Previous Article in Journal
Nonlinear Dynamics of Heart Rate Variability after Acutely Induced Myocardial Ischemia by Percutaneous Transluminal Coronary Angioplasty
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Analysis on Cascading Failures of Directed–Undirected Interdependent Networks with Different Coupling Patterns

Institute of Logistics Science and Engineering, Shanghai Maritime University, Shanghai 201306, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(3), 471; https://doi.org/10.3390/e25030471
Submission received: 7 February 2023 / Revised: 2 March 2023 / Accepted: 5 March 2023 / Published: 8 March 2023
(This article belongs to the Special Issue Topology Modeling and Fault Analysis of Complex Systems)

Abstract

:
Most existing studies model interdependent networks as simple network systems consisting of two or more undirected subnets, and the interdependent edges between the networks are undirected. However, many real-world interdependent networks are coupled by a directed subnet and an undirected subnet, such as supply chain networks coupled with cyber networks, and cyber manufacturing networks coupled with service networks. Therefore, in this work, we focus on a ubiquitous type of interdependent network—the directed–undirected interdependent network—and research the cascading failures of directed–undirected interdependent networks with different coupling patterns. Owing to the diversity of coupling patterns to realistic interdependent network systems, we introduce two types of interdependent edges (i.e., directed-to-undirected and undirected-to-directed interdependent edges). On this basis, we generated different types of directed–undirected interdependent networks with varying coupling patterns (i.e., one-to-one, one-to-many, and many-to-one) and investigated the cascading failure robustness of these types of networks. Finally, we explored the cascading robustness of directed–undirected interdependent networks under two different attack strategies (single-node attack and multi-node attack). Through extensive experiments, we have obtained some meaningful findings: (1) the cascading robustness of directed–undirected interdependent networks is positively related to the overload tolerance coefficient and load exponential coefficient; (2) high-degree nodes and high-in-degree nodes should be protected to improve the cascading robustness of directed–undirected interdependent networks; (3) the cascading robustness of one-to-many interdependent networks can be improved by adding directed-to-undirected interdependent edges; and the cascading robustness of many-to-one interdependent networks can be improved by adding undirected-to-directed interdependent edges.

1. Introduction

Modern infrastructure systems are rarely isolated, but rather are highly interdependent [1,2,3,4]. Examples of such coupled critical infrastructures include power grids and water systems, information networks and power grids, seaports with information networks and airports, information networks and supply chains, etc. However, this interdependent pattern further exacerbates the risk of cascading failures in the system. Therefore, analyzing the impact of cascading failures on the network is essential for designing more robust interdependent network systems.
Until now, much research effort has been devoted to the analysis of cascading failures of interdependent systems [5,6,7,8,9,10,11,12,13,14]. Most of these studies modeled interdependent networks to be simple network systems consisting of two or more undirected networks, and the interdependent edges between the networks are undirected. However, many real-world interdependent networks are coupled by a directed subnet and an undirected subnet—e.g., supply chain networks coupled with cyber networks [15,16] and cyber manufacturing networks coupled with service networks [17,18]. Compared with the general interdependent network systems consisting of undirected networks, directed–undirected interdependent networks have significant differences in terms of the load redistribution and propagation process of cascading failure propagation processes. Unfortunately, there are relatively few investigators currently focused on this type of network. In addition, the current research mostly focuses on the cascading failure characteristics of the interdependent network under a single coupling pattern, and lacks the comparative analysis of the cascading failure characteristics of the interdependent network under different coupling patterns.
Therefore, this work focuses on the cascading failure characteristics of directed–undirected interdependent networks with different coupling patterns. First, we constructed a cascading failure model of directed–undirected interdependent networks. Then, we analyzed the impact of the coupling patterns on the cascading failure robustness of the interdependent networks. The main contributions of this work can be summarized as follows:
(1) We constructed an interdependent network model consisting of directed and undirected subnets with different coupling patterns. Considering the diversity of influence relationships between nodes at different levels in real-world interdependent network systems, this model uses two types of interdependent edges (i.e., directed edges pointing from the directed subnet to the undirected subnet and the directed edges pointing from the undirected subnet to the directed subnet).
(2) We investigated the cascading failure propagation process of the directed–undirected interdependent network with different coupling patterns (i.e., one-to-one coupling pattern, one-to-many coupling pattern, and many-to-one coupling pattern), which can provide support for understanding the impact of different coupling patterns on the cascading failure robustness of the network.
(3) We analyzed the robustness of interdependent networks under different attack strategies. We introduced two attack strategies (i.e., single-node attack and multi-node attack). The multi-node attack strategy can be further subdivided into six attack strategies (i.e., high-degree attack strategy, low-degree attack strategy, high-in-degree attack strategy, high-out-degree attack strategy, low-in-degree attack strategy, and low-out-degree attack strategy).
The rest of this paper is organized as follows. In Section 2, we review the related works. In Section 3, we develop a network model for directed–undirected interdependent networks with different coupling patterns. In Section 4, we introduce the cascading failure mechanism in detail. In Section 5, the simulation results are given. Finally, the paper is concluded.

2. Related Works

This section reviews the research progress on cascading failures of interdependent networks from two perspectives: subnet type and coupling pattern.
For the type of subnets, Buldyrev et al. [19] proposed a cascading failure model of power-communication interdependent network which was composed of undirected subnets and undirected interdependent edges. Yang et al. [20] constructed an electrical cyber-physical power network which is composed of two undirected subnets and analyzed the performance of interdependent network with two different coupling schemes. Mu et al. [21] proposed a realistic cascading model of the cyber-physical supply network to construct an information—physical-supply interdependent network, considering that overload of the cyber-power network triggers cascading failures and underload of the physical power supply network triggers chain failures. Wang et al. [22] proposed a high-level architecture (HLA)-based co-simulation method for critical infrastructure networks and established a case study of a dependent network consisting of two undirected subnets for two interdependent power and water systems. Tang et al. [23] analyzed the robustness of a one-to-one complex interdependent supply chain network consisting of a directed physical layer network and an undirected network layer network and developed a priority load redistribution strategy when modeling the network. Peng et al. [24] constructed a interdependent network model for industrial Internet of Things and analyzed the cascading failure dynamics of the intentional attack network. In this network model, the Industrial Internet of Things system is composed of IoT device networks and information networks. Parshani et al. [25] developed an interdependent network system composed of an interdependent worldwide seaport and airport networks and the worldwide airport network and proposed two quantities for measuring the level of inter-similarity between networks.
As for the coupling pattern, Parshani et al. [26] noted that reducing the number of interdependent edges could improve the robustness of the network to lead to a change from a first-order-percolation phase transition to a second-order-percolation transition. Zhong et al. [27] found that the repair effect will change as the proportion of dependent nodes increases. Wang et al. [28] proposed an assortative link, a disassortative link, and a random link by taking the characteristics of nodes on both sides of the interdependent edge into consideration and found that the assortative link was more robust. Shao et al. [29] pointed out that the coupling pattern of nodes in the actual interdependent networks was not one-to-one, but one-to-many or many-to-many. Then, they proposed an interdependent network model with multiple coupling patterns. To improve the robustness of the interdependent networks, Wang et al. [30] developed a coupling optimization strategy based on neighboring-node priority connection. In this strategy, the network degree distribution and the nodes which can avoid the propagation of failures are taken into account.
By observing Table 1, it is easy to find that most of the existing studies on real interdependent network systems focus on the simple network systems composed of two undirected subnets connected by undirected edges. In addition, the existing studies mostly focus on the cascading failure characteristics of the interdependent network under a single coupling pattern, and lack the comparative analysis of the cascading failure characteristics of the interdependent network under different coupling patterns.

3. Theoretical Model of the Directed-Undirected Interdependent Network

This section introduces the directed–undirected interdependent network model in detail. Table 2 shows the notation used in this model.
We consider an interdependent network model of two subnets as follows. The subnets of the directed–undirected interdependent network G are assumed to be a simple directed graph G D = { V D , E D } and a simple undirected graph G U = { V U , E U } . In the directed graph G D , V D = ( v 1 D , v 2 D , v N D D ) and E D = { ( e i , j D | v i D , v j D V D } denote the node set and directed edge set, respectively. In the undirected graph G U , V U = { ν 1 U , ν 2 U , ν N U U } and E U = { e i , j U | v i U , v j U V U } denote the node set and undirected edge set, respectively. These two subnets, G D and G U , are coupled via directed edges E C = { e i , j C | v i D V D , v j U V U } . The states of edges in E D , E U and E C are defined by
E i , j D = 0 , no connection from node v i D to v j U 1 , a directed connection pointing from node v i U to v j D ,
E i , j U = 0 , no connection from node v i U to v j U 1 , a undirected connection pointing from node v i U to v j U ,
E i , j C = 0 , no connection from node v i D to v i U 1 , a directed connection pointing from node v i D to v j U 1 , a directed connection pointing from node v j U to v i D .
In this network model, we consider the coupling patterns of subnets and the proportion of interdependent edges (completely interdependent and partially interdependent). We introduce the coupling patterns in detail. We consider three coupling patterns, i.e., one-to-one coupling, one-to-many coupling, and many-to-one coupling. In the one-to-one coupling pattern, a node in the undirected subnet G U can be connected to only one node in the directed subnet G D by an interdependent edge. The interdependent edge has two types, undirected-to-directed interdependent edges and directed-to-undirected interdependent edges, as shown in Figure 1. The undirected-to-directed interdependent edge is a directed edge from the undirected subnet G U to the directed subnet G D , as shown in Figure 1a. The undirected-to-directed interdependent edge is a directed edge from the undirected subnet G U to the directed subnet G D , as shown in Figure 1b. In the one-to-many coupling pattern, where “many” is set to m, a node in the directed subnet G D can be connected to m ( m > 1 ) nodes in the undirected subnet by interdependent edges. Figure 2 gives all possible combinations in the one-to-two coupling pattern. Figure 3 gives all possible combinations in the two-to-one coupling pattern.
To increase the flexibility of the network model, we define the numbers of nodes with interdependent edges in subnets G D and G U as d D and d U , respectively. On this basis, we can easily get the proportions of nodes with interdependent edges P D and P U in subnets G D and G U , respectively. In the one-to-one coupling pattern, P D = P U . In the one-to-many coupling pattern where “many” is set to m, P U = m P D . In the many-to-one coupling pattern where “many” is set to m, P D = m P U . An example of the one-to-one interdependent network with P D = P U = 1 is shown in Figure 4.
Moreover, we assume that the average degree values of the two subnets are k D and k U , respectively. We use k i D = k i ( i n ) D + k i ( o u t ) D to denote the degree of node, where k i ( i n ) D and k i ( o u t ) D are the in-degree and out-degree of node ν i D , respectively.

4. Cascading Failure Model of Directed–Undirected Interdependent Networks

4.1. Load and Capacity

In this section, we present a cascading model of directed–undirected interdependent networks, in which the network is limited by node capacity and the load is defined according to the degree of nodes.
In many practical directed network systems, the load of nodes is closely related to its out-degree. For example, in many service-oriented networks (e.g., supply chain networks), the out-degree of a node represents the number of service nodes that depend on the services it provides. Obviously, the higher the out-degree, the more services the node needs to provide, and the heavier its load. Therefore, in our model, the initial load of a node in the directed network is represented by its out-degree in an exponential way. We define the initial load of the node v i D in the directed subnet G D as
L i D ( 0 ) = k i ( o u t ) D ( 0 ) β ,
where β > 0 is the load-exponential coefficient to adjust the initial load of nodes. According to the “as much as required” principle [31], the nodes’ capacity is set to be positively related to their initial load:
C i D = ( 1 + σ ) L i D ( 0 ) ,
where σ 0 is the overload-tolerance coefficient to indicate the capacity resources that the node has.
Similarly, the initial load of node v i U in undirected subnet G U is defined as
L i U ( 0 ) = k i U ( 0 ) β ,
and the capacity of node v i U is set to be linearly related to its initial load L i U ( 0 ) ; that is,
C i U = ( 1 + σ ) L i U ( 0 ) .

4.2. Load-Redistribution Schemes

Existing studies generally assumed that the load on the failed node will be redistributed locally. Even redistribution schemes [32,33] and idle redistribution schemes [34,35] are the most widely used local load-redistribution schemes. Under these two schemes, the load initially on the failed node will be redistributed to its neighboring nodes. Since the idle capacity scheme can better help the network withstand the impact of the load redistribution process, we use this load-redistribution scheme in our model.
In directed subnet G D , if node v i D fails at time t, its out-degree neighboring node v j D will receive extra load Δ L j D ( t ) from node v i D ,:
Δ L j D ( t ) = C i D L i D ( t ) j S i D ( t ) [ C j D L j D ( t ) ] L i D ( t ) ,
where S i D ( t ) is the set of the out-degree neighboring nodes of node v i D at time t, and C i D L i D ( t ) is the spare capacity of node v i D at time t. According to (8), under the idle redistribution scheme, nodes with more idle capacity will be assigned more load from the failed node.
To help understand the load-redistribution scheme, we present an example on a simplified network topology (shown in Figure 5). Assuming that node v i D fails at time t, its load will transfer to its out-degree neighboring nodes according to the load-redistribution scheme. At time t + 1 , the loads of nodes v b D , v c D , and v e D will update according to (9).
L b D ( t + 1 ) = L b D ( t ) + Δ L b D ( t ) L c D ( t + 1 ) = L c D ( t ) + Δ L c D ( t ) L e D ( t + 1 ) = L e D ( t ) + Δ L e D ( t ) .
If L i D ( t + 1 ) > C i D , and i { b , c , e } , node v i D fails upon overload. Then, another round of node failures will be triggered. This cascading process will not stop until the loads of the remaining nodes are within their capacities.
In undirected subnet G U , if node v i U fails at time t, its neighboring node v j U will receive extra load Δ L j U ( t ) from node v i U .
Δ L j U ( t ) = C i U L i U ( t ) j S i U ( t ) [ C j U L j U ( t ) ] L i U ( t ) ,
where S i U ( t ) is set of the neighboring nodes of node ν i U at time t, and C i U L i U ( t ) is the spare capacity of node v i U at time t.
To illustrate the load redistribution process after a node failure in undirected subnet G U more clearly, we present an example on a simplified network topology (shown in Figure 6). Assuming that node ν i U fails at time t, the original load it takes will transfer to its neighboring nodes, v b U , v c U , v d U , and v e U , according to the load-redistribution scheme. At time t + 1 , the real time load of nodes v b U , v c U , v d U , and v e U will update according to (11).
L b U ( t + 1 ) = L b U t + Δ L b U ( t ) L c U ( t + 1 ) = L c U t + Δ L c U ( t ) L d U ( t + 1 ) = L d U t + Δ L d U ( t ) L e U ( t + 1 ) = L e U t + Δ L e U ( t ) .
If L i U ( t + 1 ) > C i U , i { b , c , d , e } , node v i U fails upon overload. Then, another round of node failures will be triggered, and this cascading process will not stop until the loads of the remaining nodes are within their capacities.

4.3. Cascading Mechanism

In the proposed cascading failure model, nodes will fall into failure due to three reasons: overload failure, isolation failure, and interdependency failure. The overload failure of a node refers to the failure caused by the load of node exceeding its capacity. The method for identifying isolation-failure node and interdependency-failure nodes will be described in detail below.
Unlike existing research models consisting of two undirected subnets, our model comprises a directed subnet and an undirected subnet. Therefore, in our model, the isolated failed nodes in the undirected subnet G U are the same as in existing studies; i.e., nodes that do not belong to the largest connected component. To illustrate the largest connected component more clearly, we present an example of a simplified network topology (shown in Figure 7). Assuming that node v i U fails, the topology will be divided into two connected components. Connected component 1 consists of nodes v a U , v b U , v c U , and v d U ; and connected component 2 consists of two nodes, v e U and v f U . It is obvious that connected component 1 is the largest connected component. Therefore, the nodes in the connected component 2 fail due to isolation.
Similarly, for directed subnet G D , if the node does not belong to the largest connected component, we consider this node to fall into isolation failure. It should be noted that there are two definitions of the largest connected component in the directed graph (i.e., largest weakly connected component and largest strongly connected component). Compared with the largest strongly connected component that requires two-way connectivity between two nodes, the largest weakly connected component is much looser and more suitable for observing the failure propagation process in directed networks. Therefore, the concept of the largest weakly connected component is commonly used to determine the size of the surviving nodes in directed networks [15,17]. In this work, we also use the largest weakly connected component to determine the connectivity of nodes in directed networks.
To illustrate the largest weakly connected component more clearly, we present an example of a simplified network topology (shown in Figure 8). Assuming that node v i D fails, the topology will be divided into two weakly connected components. Any two of the four nodes v a D , v b D , v c D , and v d D can have at least one directed path, so the four nodes v a D , v b D , v c D , and v d D form weakly connected component 1. There is a directed path between nodes v e D and v f D , which constitutes the weakly connected component 2. Apparently, weakly connected component 1 is the largest-weakly connected component. Hence, the nodes in weakly connected component 2 fail due to isolation.
In our model, the interdependent edges are directed. Hence, we define that the failure of the nodes at the start of the interdependent edges would lead to the failure of the nodes at the ends of the interdependent edges, whereas the failure of the nodes at the ends of the interdependent edges do not cause the failure of the nodes at the start of the interdependent edges. If node i is the end of the interdependent edges of m ( m 1 ) nodes, node i fails only when m nodes all fail; otherwise, node i works normally. If node i is the beginning of m ( m 1 ) interdependent edges, the failure or non-failure of m nodes will not stop node i from working properly. Figure 9 and Figure 10 each show an example of the interdependency failure, in a one-to-one and a one-to-two/two-to-one interdependent network, respectively.

4.4. Cascading Failure Mechanism of the Directed–Undirected Interdependent Network

Without loss of generality, in this part, we introduce the cascading failure mechanism by describing the cascading failure process triggered by removing a fraction of the nodes in the directed subnet G D .

4.4.1. Initial Stage of Cascading Failure Mechanism in the Directed–Undirected Interdependent Network

At the initial stage ( t = 1 ) of cascading failures, we perform the following steps.
Step 1: When a fraction p of nodes V D p in directed subnet G D is removed, the load of failed nodes will propagate through connectivity link in the same subnet according to the responding load-redistribution scheme. Then, we check the load state of each node in the subnet, and put the nodes with loads exceeding their capacities into the overload failure set V D O ( 1 ) .
Step 2: Then, we check the connectivity state of the nodes in the directed subnet, G D . If the nodes do not belong to the largest weakly connected component, we put these nodes into the isolation failure set V D I ( 1 ) .
Step 3: According to the interdependent edges of the failed node in V D F ( 1 ) = V D p V D O ( 1 ) V D I ( 1 ) , some nodes in undirected subnet G U fail due to loss of support nodes. We put these nodes into interdependency failure set V U E ( 1 ) .
Step 4: After that, we update the load redistribution of the undirected subnet G U and put the overload nodes into overload failure set V U O ( 1 ) . Then, we check the connectivity links and put the nodes that do not belong to the largest connected component into the isolation failure set, V U I ( 1 ) .
The framework of the initial stage of cascading failure mechanism in the directed–undirected interdependent network is shown in detail in Figure 11.
For the cascading failure propagation stage ( t 2 ), we perform the following steps.
Step 1: According to the interdependent edges of the failed nodes in V U F ( t 1 ) , we find the node failures for interdependent edges in directed subnet G D . Then, we put these failed nodes in the interdependency failure set, V D E ( t ) .
Step 2: We update the load redistribution of the directed subnet G D and put the overload nodes into overload failure set V D O ( t ) .
Step 3: Then, we check the connectivity links and put the nodes failure for isolation into the isolation failure set V D I ( t ) .
Step 4: We perform steps 1 to 3 on undirected subnet G U and get the interdependency failure set V U E ( t ) , overload failure set V U O ( t ) , and isolation failure set V U I ( t ) . After that, we can gain the latest failure node set V U F ( t ) = V U E ( t ) V U O ( t ) V U I ( t ) in subnet G U .
Step 5: We loop steps 1 to 4 until the failure node set V F ( t ) = V D F ( t ) V U F ( t ) does not change.
The detailed framework of the cascading failure propagation stage in the directed–undirected interdependent network is shown in Figure 12.

4.4.2. Example of Cascading Failure Process in a Directed–Undirected Interdependent Network

In this part, to help understand the proposed cascading failure mechanism in directed–undirected interdependent networks, we use a one-to-one interdependent network as an example for detailed explanation. As shown in Figure 13a, each subnet of the initial directed–undirected interdependent network has 10 nodes. Nodes in directed subnet G D are connected by directed connectivity links, and nodes in undirected subnet G U are connected by undirected connectivity links. As shown in Figure 13b, we first remove node v 6 D of the directed subnet to trigger a cascading failure process. The original load of node v 6 D is transferred to the out-degree neighboring node v 8 D , which causes node v 8 D to fail due to overloading. Moreover, the connectivity links of the failed node are removed. As shown in Figure 13c, the failure of nodes v 6 D and v 8 D cause nodes v 4 D , v 5 D , v 9 D , and v 10 D to fall into isolation failure. As shown in Figure 13d, the failure of node v 6 D can affect the undirected subnet G U through an interdependent edge and cause the failure of node v 6 U . In addition, the load of node v 6 U is transmitted to its neighboring nodes v 5 U and v 9 U . We assume that node v 5 U is not overloaded and that node v 9 U failed via overload. Subsequently, the load of node v 9 U propagates to the neighboring node v 10 U and causes v 10 U to fall into overload failure. As shown in Figure 13e, nodes v 7 U and v 8 U fail for do not belong to the largest connected component. By this step, the initial stage of the cascading failure process have been completed (Figure 13b–e). Starting from Figure 13f, the cascading failure process enters the next moment t = 2 . The failure of node v 7 U affects the node v 7 D through the interdependent edge and causes it to fail. Then, the load of node v 7 D is transferred to node v 3 D and causes the failure of node v 3 D . As can be seen in Figure 13g, node v 3 U fails due to the failure of the support node v 3 D . Then, the load of node v 3 U is transferred to its neighboring node v 4 U and cause the failure of node v 4 U . However, the load redistribution of the load of node v 4 U does not result in the failure of its neighboring node. As shown in Figure 13h, node v 5 U fails to detach from the largest connected component. At this point, the cascading failure process will not continue, and the whole directed–undirected interdependent network has nodes v 1 D , v 2 D , v 1 U , and v 2 U left. We can reasonably believe that the directed–undirected interdependent network has collapsed due to cascading failures.

4.4.3. Time-Varying Interactive Equation of Cascading Failures

We construct time-varying interactive equations of cascading failures based on the cascading failure process described above. After the initial removal P fraction of the nodes, the remaining fraction of nodes in directed subnet G D is δ 1 = 1 p . The load of the initial failed nodes will transfer to its out-degree neighboring nodes. Some nodes receiving an additional load may be overloaded. Therefore, the normal part of directed subnet G D is O D ( δ 1 ) , where O D ( δ 1 ) is the fraction of the normal nodes after load redistribution in directed subnet G D . After that, the overload failed nodes will disconnect some nodes from the largest weakly connected component. The normal fraction of directed subnet G D is δ 1 = I D ( O D ( δ 1 ) ) , where I D ( O D ( δ 1 ) ) is the fraction of the normal nodes after chosing the nodes belong to the largest weakly connected component. As a fraction q 1 U of nodes from undirected subnet G U depends on the failed nodes from directed subnet G D , the fraction of the nodes that fail for interdependent edges is q 1 U ( 1 δ 1 ) . Accordingly, the normal nodes of undirected subnet G U are ζ 1 = 1 q 1 U ( 1 δ 1 ) . The remaining fraction of nodes in undirected subnet G U is ζ 1 = I U ( O U ( ζ 1 ) ) after removing the overload-failed nodes and the nodes that disconnect to the largest connected component. As a fraction of q 2 D nodes from directed subnet G D depends on the failed nodes from undirected subnet G U , the fraction of the nodes that fail for interdependent edges is q 2 D ( N ζ 1 ) . Accordingly, the normal nodes of directed subnet G D are δ 2 = N q 2 D ( N ζ 1 ) . After we remove the overload-failed nodes and the isolation-failed nodes, the normal fraction of nodes in directed subnet G U is δ 2 = I D ( O D ( δ 2 ) ) . It is easy to obtain the recursive relations of cascading failures according to the above description, and the time-varying iterative equations at each time can be summarized by
t = 1 : G D : δ 1 = 1 p , δ 1 = I D ( O D ( δ 1 ) ) G U : ζ 1 = 1 q 1 U ( 1 δ 1 ) , ζ 1 = I U ( O U ( ζ 1 ) ) t = 2 : G D : δ 2 = 1 q 2 D ( 1 ζ 1 ) , δ 2 = I D ( O D ( δ 2 ) ) G U : ζ 2 = 1 q 2 U ( 1 δ 2 ) , ζ 2 = I U ( O U ( ζ 2 ) ) t = n : G D : δ n = 1 q n D ( 1 ζ n 1 ) , δ n = I D ( O D ( δ n ) ) G U : ζ n = 1 q n U ( 1 δ n ) , ζ n = I U ( O U ( ζ n ) ) ,
where δ n and ζ n are the proportion of the normal nodes in the initial state of directed subnet G D and undirected subnet G U at iteration number n, respectively; δ n and ζ n are the proportion of the normal nodes after removing the overload failed nodes and the isolation failed nodes of directed subnet G D and undirected subnet G U at iteration number n, respectively. Equation (12) arrives at a steady state when n , i.e., δ n = δ n = δ n + 1 = δ n + 1 and ζ n = ζ n = ζ n + 1 = ζ n + 1 . At this moment, there are no more overload failed nodes isolation failed nodes and interdependency failed nodes in the interdependent network. Hence, we can obtain that
n : G D : δ n = 1 q n D ( 1 ζ n ) G U : ζ n = 1 q n U ( 1 δ n ) .
Finally, the normal nodes in directed subnet G D and undirected subnet G U are, respectively, 1 q n D ( 1 ζ n ) and 1 q n U ( 1 δ n ) .

5. Simulation Results

5.1. Simulation Setup

We used MATLAB to perform our simulation. MATLAB has the following advantages in simulating the cascading failures of directed–undirected interdependent networks: (1) through the built-in GUROBI optimizer, the time-consuming of simulation can be significantly reduced [36]; (2) the built-in complex network tool box can provide sufficient support for network modeling and statistics of experimental results. To capture the heterogeneity of many real-world networks, both subnets, G D and G U , have scale-free characteristics. In the simulation, the directed subnet G D and the undirected subnet G U included 100 nodes each. The average degree of the directed subnet G D and the undirected subnet G U is k D = k U = 4 . In the proposed interdependent network model, there are two types of interdependent edges, undirected-to-directed interdependent edges and directed-to-undirected interdependent edges. In the experiments of the one-to-one interdependent network, the proportions of these two types of interdependent edges were consistent. The interdependent networks with one-to-many and many-to-one coupling patterns were generated by adding two types of interdependent edges to the one-to-one interdependent network. In the initial one-to-one interdependent network, the proportions of the nodes with interdependent edges in the directed subnet G D and undirected network G U were set to P D = P U = 0.2 .

5.2. Robustness Metrics

In the experiments, in order to fully evaluate the cascading robustness of the directed–undirected interdependent network, we introduced two attack strategies: a single-node attack strategy and a multi-node attack strategy. In the single-node attack strategy, we sequentially removed a node from the directed subnet or undirected subnet and observed the impact of cascading failures. We define the cascading robustness of the directed–undirected interdependent network under the single-node attack strategy as
Q s D = i V D ( N i D + N i U ) N D ( N D + N U ) ,
Q s D = i V U ( N i D + N i U ) N D ( N D + N U ) ,
where Q s D is the cascading robustness of the directed–undirected interdependent network under single-node attack on the directed subnet; N S i D and N S i U represent the number of normal nodes in the directed subnet and undirected subnet after node v i D is removed from the subnet; V D and V U are the sets of nodes in subnets G D and G U . Q s D is positively related to the cascading robustness of the directed–undirected interdependent network. Q s D = 1 means that removing any node in the directed subnet will not trigger the cascading failures. In this case, we can consider that the entire interdependent network is immune to the single-node attacks on the directed subnet. In contrast, Q s D = 0 means that removing any node in the directed subnet will paralyze the entire interdependent network due to cascading failures. Similarly, for Q s U , the above description also applies. In the single-node attacks, we do not need to consider the selection of attack objects, which allows us to focus on the impact of the network’s own attributes. Therefore, in the experiment, we mainly used the single-node attack strategy to evaluate the impacts of modeling parameters on the entire network system.
In the multi-node attack strategies, we remove a certain proportion P of nodes from one subnet. We used multiple commonly used attack strategies, i.e., high-degree attack (HDA), low-degree attack (LDA), high-in-degree attack (HiDA), high-out-degree attack (HoDA), low-in-degree attack (LiDA), and low-out-degree attack (LoDA). In the HDA strategy, high-degree nodes will be attacked first; in the LDA strategy, low-degree nodes will be attacked first; in the HiDA strategy, high-in-degree nodes will be attacked first; in the HoDA strategy, high-out-degree nodes will be attacked first; in the LiDA strategy, low-in-degree nodes will be attacked first; in the LoDA strategy, low-out-degree nodes will be attacked first. We define the cascading robustness of the directed–undirected interdependent networks under the multi-node attack strategy as
Q m D = N D , D P + N U , D P N D + N U ,
Q m U = N D , U P + N U , U P N D + N U ,
where Q m D and Q m U , respectively, represent the cascading robustness levels of the directed–undirected interdependent network after multi-node attacks on the directed subnet and undirected subnets; N U , D P represents the number of normal nodes in the undirected subnet (denoted by U) after removing proportion P of nodes in directed subnet (denoted by D). In the experiments, multi-node attack strategies were mainly used to analyze the main causes of network performance degradation during cascading failures.

5.3. Influences of Load-Redistribution Schemes

To evaluate the impacts of different load-redistribution schemes on the cascading robustness of directed–undirected interdependent networks, we compared the cascading robustness of directed–undirected interdependent networks under the idle redistribution scheme, the even redistribution scheme, and the degree redistribution scheme. The idle redistribution scheme was to distribute the load of the failed node to its neighboring nodes according to their spare capacities, the even redistribution scheme was to distribute the load of the failed node to its neighboring nodes equally, and the degree redistribution was to distribute the load of the failed node to its neighboring nodes according to their degree values.
Figure 14 shows the cascading robustness of directed–undirected interdependent networks with different load-redistribution schemes under the single-node attack. We can easily observe that the cascading robustness of the network under the idle redistribution strategy is significantly better than the other two redistribution strategies. This is due to the fact that under the idle redistribution strategy, nodes with more capacity can receive more load from the failed nodes, thereby minimizing the overload risk of nodes with insufficient capacities. In contrast, under the degree-redistribution strategy and the even-allocation strategy, nodes with insufficient capacity are not subject to addition protection, and may even receive more load from failed nodes, which will significantly increase the overload probability of these vulnerable nodes and lead to an increased risk of cascading failures in the network.

5.4. Influences of Modeling Parameters

In this section, we investigate the effects of network modeling parameters (i.e., the load-exponential coefficient β , the overload-tolerance coefficient σ , and the proportion of nodes with interdependent edges P) on the cascading robustness of directed–undirected interdependent networks. In studying the effects of β and σ in one-to-many and many-to-one networks, we used one-to-two and two-to-one interdependent networks as examples. As P is a concept that is specific to one-to-one interdependent networks. We only studied the effect of P on the cascading robustness in one-to-one interdependent networks.
As shown in Figure 15, as the overload-tolerance coefficient σ increases, the cascading robustness of directed–undirected interdependent networks can be greatly improved. This is because in our model, a higher σ means that nodes can have more capacity to cope with the load. In addition, we can also observe that in both single-node attack scenarios, an increase in the load-exponential coefficient β can significantly improve the cascading robustness of interdependent networks with different coupling patterns. Regarding the single-node attacks on the undirected subnet of the one-to-one interdependent network, in the cases of β = 0.4 and σ = 0.2 , Q s U = 0.3 , which means that there is a high possibility of cascading failures. When σ stays the same and β rises to 2, the Q s U is 0.7, which means that the risk and damage of cascading failures are greatly reduced. In addition, we can also observe that there is a threshold value β * . When β is less than β * , the increase in β is helpful to the cascading robustness of the interdependent network. When β is greater than or equal to β * , the lifting effect of the parameter is saturated.
Figure 16 depicts the heatmaps of Q s D and Q s U in the parameter space [ σ , β ] under the single-node attack. We can easily observe a critical zone of [ σ , β ] . When σ and β fall into this zone, cascading failures will not occur. We call this zone the “safety zone”. By comparing the sizeS of the safety zone in two single-node attack scenarios, we can easily notice that the safety zone in undirected subnet is much larger than that in the directed subnet. This result shows that attacks on the directed subnet cause more damage to the entire interdependent network system than attacks on the undirected subnet.
According to Figure 17, the robustness of the directed–undirected interdependent network decreases as the proportion P of interdependent edges increases. It is easy to understand that an increase in the number of interdependent edges will further increase the coupling degree between the two subnets and thus increase the probability of a node falling into interdependency failure.

5.5. Influence of Coupling Patterns When Adding Different Interdependent Edges

We added specific types of interdependent edges to one-to-one interdependent networks to generate different types of one-to-many interdependent networks and many-to-one interdependent networks. On this basis, we analyzed the effect of different coupling patterns generated by adding different types of interdependent edges on the cascading robustness of the directed–undirected interdependent networks.
Figure 18 shows the effects of different coupling patterns on the cascading robustness of the interdependent network when increasing the directed-to-undirected interdependent edges. We can easily observe that in the one-to-many interdependent network, the cascading robustness decreases significantly as m increases, and in the many-to-one interdependent network, the cascading robustness can be significantly improved as m increases. This is due to the fact that in the one-to-many interdependent network, each node with interdependent edges in the directed subnet needs to establish connections with m nodes in the undirected subnet. In this case, the dependency of the undirected subnet on the directed subnet will gradually increase as the number of directed-to-undirected interdependent edges m increases, which makes the node failure in the directed subnet more easily propagated to the undirected subnet. In contrast, in the many-to-one interdependent network, each node with interdependent edges in the undirected subnet needs to establish connections with m nodes in the directed subnet. As the number of directed–undirected dependent edges m increases, the dependence of the undirected network on the directed subnet will gradually decrease, which makes it more difficult to propagate node failures of the undirected subnet to the directed subnet. At the same time, the conditions for node failure in the directed subnet will become more demanding.
Figure 19 shows the effects of different coupling patterns on the cascading robustness of the dependent network when increasing the undirected-to-directed dependent edges. Figure 18 shows the effects of different coupling patterns on the cascading robustness of the dependent network when increasing the undirected-to-directed dependent edges. It can be easily observed that the trend of cascading robustness with m for different coupling patterns is exactly the opposite of that of increasing the directed-to-undirected interdependent edges when increasing the undirected-to-directed interdependent edges. This is due to the fact that in the one-to-many interdependent network, as the number of undirected-to-directed interdependent edges m increases, the dependency of the directed subnet on the undirected subnet tends to decrease, which makes the propagation of node failures in the directed subnet to the undirected subnet become more difficult. In contrast, in many-to-one networks, the dependence of the directed subnet on the undirected subnet tends to increase as the undirected-to-directed interdependent edges m increase, which in turn leads to a significantly higher possibility of node failure propagation from the undirected subnet to the directed subnet.

5.6. Composition Analysis on Cascading Failures

To eliminate the effect of coupling patterns on the experimental results, we used one-to-one interdependent networks to explore the influences of six attack strategies on network robustness.
Figure 20 shows the cascading robustness when removing fraction p of nodes in the attacked subnet. The ratio p represents the proportion of nodes removed from the network in each multi-node attack according to the specific attack strategy. The higher the value of p, the greater the number of nodes removed from the network. We can easily find that cascading robustness gradually decreases as the attack ratio p increases. In addition, there are significant differences in the degrees of damage caused to the network by different attack strategies. In the case of attacks on the directed subnet, the most harmful to the network are the HiDA and HoDA strategies, followed by the LiDA and LoDA strategies. Among the attacks on the undirected subnet, the most damaging to the network is the HAD strategy, followed by the LDA strategy. Take the the multi-node attack scenario with undirected subnet as an example: Removing 20 % of the nodes in the undirected subnet in the HDA strategy can crash the whole network. In contrast, even if 50 % of the nodes in the undirected subnet are removed by the LDA strategy, more than 60 % of the nodes in the entire network system can still work properly. This result tells us that to improve the cascading robustness of the directed–undirected interdependent network against malicious attacks, we should give priority to protecting the high-in-degree and high-out-degree nodes in the directed subnet and the high degree nodes in the undirected subnet.
Figure 21 depicts the composition of the failed nodes for the interdependent networks with different coupling patterns generated by adding directed-to-undirected interdependent edges. It can be easily observed that the highest proportion of failed nodes in the whole interdependent network system was overload-failure nodes, followed by isolation-failure nodes and interdependency-failure nodes. Therefore, we can improve the cascading robustness of the network by increasing σ and β to help the network nodes better withstand the influence of network-load redistribution. In addition, in the one-to-many interdependent network, the proportions of interdependency-failure nodes, overload-failure nodes, and isolation-failure nodes all increase as m increases; and in the many-to-one interdependent network, the proportions of interdependent failure nodes, overload-failure nodes, and isolation-failure nodes all decrease as m increases. The proportion of each type of faulty node varies with the same trend as m, due to the fact that the appearance of interdependency-failure nodes originates from the mutual propagation of node failures between subnets. Interdependency-failure nodes further affect the numbers of overload-failure nodes and isolation-failure nodes within the subnet due to load redistribution. Next, we explain the reason for the variation in the number of interdependency-failure nodes with m different coupling patterns by analyzing the coupling patterns that appear when adding directed-to-undirected interdependent edges.
In our model, the coupling patterns that occur when adding directed-to-undirected interdependent edges is shown in Figure 22. Figure 22a,b show the coupling patterns of one-to-many interdependent networks. In these coupling patterns, whether the directed or undirected subnet is under attack, the probability of a node in the other subnet failing due to interdependent edges increases with the increase in interdependent edges. For example, the failure of node v 1 D in one-to-one coupling pattern causes node v 1 U to fail, while the failure of node v 1 D in one-to-five coupling pattern causes node v 1 U , v 2 U , v 3 U , v 4 U and v 5 U to fail. Figure 22c,d show the coupling patterns of many-to-one interdependent networks. In these coupling patterns, whether the directed or undirected subnet is under attack, the probability of a node in the other subnet failing due to interdependent edges decreases with the increase in interdependent edges. For example, in the one-to-one coupling mode, the failure of node v 1 D causes v 1 U to fail, whereas in the one-to-five coupling pattern, the failure of v 1 D , v 2 D , v 3 D , v 4 D and v 5 D leads to the failure of node v 1 U . Therefore, the results in Figure 22 can be easily understood.
Figure 23 depicts the composition of the failed nodes for the interdependent networks with different coupling patterns generated by adding undirected-to-directed interdependent edges. Just as increasing the directed-to-undirected dependence edges, the highest proportion of overload-failure nodes is followed by interdependency-failure nodes and isolation-failure nodes. Therefore, we can improve the cascading robustness of the network by increasing σ and β to help the network nodes better withstand the influence of network-load redistribution. In addition, in one-to-many and many-to-one interdependent networks, the trend of each type of failure node with m is opposite to the trend when adding directed-to-undirected interdependent edges. We will explain the above phenomenon by analyzing the coupling patterns that occur by increasing the undirected-to-directed interdependent edges.
Coupling patterns when adding undirected-to-directed interdependent edges are shown in Figure 24. Figure 24a,b are the coupling patterns of one-to-many interdependent networks. In these coupling patterns, whether the directed or undirected subnet is under attack, the probability of a node in the other subnet failing due to interdependent edges decreases as the interdependent edges increase in number. For example, the failure of node v 1 U in one-to-one coupling pattern does not cause the node in G D to fail, whereas the failure of nodes v 2 U , v 3 U , v 4 U , and v 5 U in a one-to-five coupling pattern causes node v 1 D to fail. Figure 24c,d show the coupling patterns of many-to-one interdependent networks. In these coupling patterns, whether the directed or undirected subnet is under attack, the probability of a node in the other subnet failing due to interdependent edges increases as the interdependent edges increase in number. For example, in the one-to-one coupling mode, failure of v 1 D leads to failure of v 1 U ; and in the five-to-one coupling mode, failure of v 1 D leads to failure of v 1 U , and further to failure of v 2 D , v 3 D , v 4 D and v 5 D in G D . Therefore, the results in Figure 23 can be easily understood.

6. Conclusions

In this work, we developed a cascading failure model of directed–undirected interdependent networks with different coupling patterns to characterize its cascading failure characteristics. Through extensive experiments, we have identified the effects of key modeling parameters and coupling patterns on the cascading failure robustness of directed–undirected interdependent networks. Some lessons can be learned from the experimental results for building a robust directed–undirected interdependent network system:
(1) The cascading robustness of directed–undirected interdependent networks is positively related to the overload tolerance coefficient σ and load exponential coefficient β . In addition, there is a critical threshold β * for node load. When the load-exponential coefficient β is greater than or equal to β * , the lifting effect of the parameter is saturated.
(2) The attack on directed subnets causes greater damage to the whole interdependent network system than that on undirected subnets. Therefore, the directed subnet should be protected with emphasis.
(3) High-degree nodes, high in-degree nodes and high-out-degree nodes should be protected to improve the cascading robustness of directed–undirected interdependent networks.
(4) The cascading robustness of one-to-many interdependent networks can be improved by adding directed-to-undirected interdependent edges; and the cascading robustness of the many-to-one interdependent networks can be improved by adding undirected-to-directed interdependent edges.
(5) The highest proportion of failed nodes in the whole interdependent network system is overload-failure nodes, followed by the isolation-failure nodes and interdependency-failure nodes. Therefore, we improve σ and β to help the network to withstand the influence of network-load redistribution.
Many studies have shown that the coupling preferences between interdependent networks can effectively improve the network cascading failure robustness by adjusting the coupling preferences [37,38]. In the next step of our work, we will design a cascading-robust topology evolutionary mechanism for directed–undirected interdependent networks based on coupling preferences.

Author Contributions

Conceptualization, X.X.; Methodology, X.X.; Software, X.X.; Investigation, X.F.; Writing—original draft, X.X.; Writing—review & editing, X.X. and X.F.; Supervision, X.F.; Project administration, X.F.; Funding acquisition, X.F. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China (NSFC) under Grant No. 61902238, the China Postdoctoral Science Foundation under Grant No. 2021M692493, and the Shanghai Science and Technology Innovation Plan Project under Grant (No. 22692194600).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. De Domenico, M.; Granell, C.; Porter, M.A.; Arenas, A. The physics of spreading processes in multilayer networks. Nat. Phys. 2016, 12, 901–906. [Google Scholar] [CrossRef] [Green Version]
  2. Fu, X.; Yao, H.; Yang, Y. Modeling and optimizing the cascading robustness of multisink wireless sensor networks. IEEE Trans. Reliab. 2020, 70, 121–133. [Google Scholar] [CrossRef]
  3. Boccaletti, S.; Bianconi, G.; Criado, R.; Del Genio, C.I.; Gómez-Gardenes, J.; Romance, M.; Sendina-Nadal, I.; Wang, Z.; Zanin, M. The structure and dynamics of multilayer networks. Phys. Rep. 2014, 544, 1–122. [Google Scholar] [CrossRef] [Green Version]
  4. Fu, X.; Yang, Y. Modeling and analyzing cascading failures for Internet of Things. Inf. Sci. 2021, 545, 753–770. [Google Scholar] [CrossRef]
  5. Rosato, V.; Issacharoff, L.; Tiriticco, F.; Meloni, S.; Porcellinis, S.; Setola, R. Modelling interdependent infrastructures using interacting dynamical models. Int. J. Crit. Infrastruct. 2008, 4, 63–79. [Google Scholar] [CrossRef]
  6. Rinaldi, S.M.; Peerenboom, J.P.; Kelly, T.K. Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst. Mag. 2001, 21, 11–25. [Google Scholar]
  7. Vaknin, D.; Bashan, A.; Braunstein, L.A.; Buldyrev, S.V.; Havlin, S. Cascading failures in anisotropic interdependent networks of spatial modular structures. New J. Phys. 2021, 23, 113001. [Google Scholar] [CrossRef]
  8. Wang, N.; Jin, Z.Y.; Zhao, J. Cascading failures of overload behaviors on interdependent networks. Phys. A Stat. Mech. Its Appl. 2021, 574, 125989. [Google Scholar] [CrossRef]
  9. Zio, E. Challenges in the vulnerability and risk analysis of critical infrastructures. Reliab. Eng. Syst. Saf. 2016, 152, 137–150. [Google Scholar] [CrossRef]
  10. Bashan, A.; Parshani, R.; Havlin, S. Percolation in networks composed of connectivity and dependency links. Phys. Rev. E 2011, 83, 051127. [Google Scholar] [CrossRef] [Green Version]
  11. Bachmann, I.; Bustos-Jiménez, J.; Bustos, B. A survey on frameworks used for robustness analysis on interdependent networks. Complexity 2020, 2020, 2363514. [Google Scholar] [CrossRef]
  12. Wang, Z.; Chen, G.; Liu, L.; Hill, D.J. Cascading risk assessment in power-communication interdependent networks. Phys. A Stat. Mech. Its Appl. 2020, 540, 120496. [Google Scholar] [CrossRef]
  13. Shen, Y.; Ren, G.; Zhang, N.; Song, G.; Wang, Q.; Ran, B. Effects of mutual traffic redistribution on robustness of interdependent networks to cascading failures under fluctuant load. Phys. A Stat. Mech. Its Appl. 2020, 560, 125138. [Google Scholar] [CrossRef]
  14. Zhou, D.; Stanley, H.E.; D’Agostino, G.; Scala, A. Assortativity decreases the robustness of interdependent networks. Phys. Rev. E 2012, 86, 066103. [Google Scholar] [CrossRef] [Green Version]
  15. Shi, X.; Long, W.; Li, Y.; Deng, D. Robustness of interdependent supply chain networks against both functional and structural cascading failures. Phys. A Stat. Mech. Its Appl. 2022, 586, 126518. [Google Scholar] [CrossRef]
  16. Baycik, N.O.; Sharkey, T.C.; Rainwater, C.E. Interdicting layered physical and information flow networks. IISE Trans. 2018, 50, 316–331. [Google Scholar] [CrossRef]
  17. Fu, X.; Pace, P.; Aloi, G.; Guerrieri, A.; Li, W.; Fortino, G. Tolerance Analysis of Cyber-Manufacturing Systems to Cascading Failures. ACM Trans. Internet Technol. 2023. [Google Scholar] [CrossRef]
  18. Fu, X.; Wang, Y.; Yang, Y.; Postolache, O. Analysis on cascading reliability of edge-assisted Internet of Things. Reliab. Eng. Syst. Saf. 2022, 223, 108463. [Google Scholar] [CrossRef]
  19. Radicchi, F. Percolation in real interdependent networks. Nat. Phys. 2015, 11, 597–602. [Google Scholar] [CrossRef] [Green Version]
  20. Gao, J.; Barzel, B.; Barabási, A.L. Universal resilience patterns in complex networks. Nature 2016, 530, 307–312. [Google Scholar] [CrossRef]
  21. Buldyrev, S.V.; Parshani, R.; Paul, G.; Stanley, H.E.; Havlin, S. Catastrophic cascade of failures in interdependent networks. Nature 2010, 464, 1025–1028. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  22. Mu, D.; Yue, X.; Ren, H. Robustness of Cyber-Physical Supply Networks in Cascading Failures. Entropy 2021, 23, 769. [Google Scholar] [CrossRef] [PubMed]
  23. Wang, F.; Magoua, J.J.; Li, N. Modeling cascading failure of interdependent critical infrastructure systems using HLA-based co-simulation. Autom. Constr. 2022, 133, 104008. [Google Scholar] [CrossRef]
  24. Yang, L.; Gu, Z.; Dang, Y.; He, P. Analysis of Vulnerability on Weighted Power Networks under Line Breakdowns. Entropy 2022, 24, 1449. [Google Scholar] [CrossRef]
  25. Tang, L.; Jing, K.; He, J.; Stanley, H.E. Complex interdependent supply chain networks: Cascading failure and robustness. Phys. A Stat. Mech. Its Appl. 2016, 443, 58–69. [Google Scholar] [CrossRef]
  26. Peng, H.; Qian, Z.; Kan, Z.; Zhao, D.; Yu, J.; Han, J. Cascading failure dynamics against intentional attack for interdependent industrial internet of things. Complexity 2021, 2021, 7181431. [Google Scholar] [CrossRef]
  27. Parshani, R.; Rozenblat, C.; Ietri, D.; Ducruet, C.; Havlin, S. Inter-similarity between coupled networks. EPL (Europhys. Lett.) 2011, 92, 68002. [Google Scholar] [CrossRef] [Green Version]
  28. Parshani, R.; Buldyrev, S.V.; Havlin, S. Interdependent networks: Reducing the coupling strength leads to a change from a first to second order percolation transition. Phys. Rev. Lett. 2010, 105, 048701. [Google Scholar] [CrossRef] [Green Version]
  29. Zhong, J.; Zhang, F.; Yang, S.; Li, D. Restoration of interdependent network against cascading overload failure. Phys. A Stat. Mech. Its Appl. 2019, 514, 884–891. [Google Scholar] [CrossRef]
  30. Wang, J.; Jiang, C.; Qian, J. Robustness of interdependent networks with different link patterns against cascading failures. Phys. A Stat. Mech. Its Appl. 2014, 393, 535–541. [Google Scholar] [CrossRef]
  31. Shao, J.; Buldyrev, S.V.; Havlin, S.; Stanley, H.E. Cascade of failures in coupled network systems with multiple support-dependence relations. Phys. Rev. E 2011, 83, 036116. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  32. Wang, X.; Zhou, W.; Li, R.; Cao, J.; Lin, X. Improving robustness of interdependent networks by a new coupling strategy. Phys. A Stat. Mech. Its Appl. 2018, 492, 1075–1080. [Google Scholar] [CrossRef]
  33. Hong, S.; Zhang, X.; Zhu, J.; Zhao, T.; Wang, B. Suppressing failure cascades in interconnected networks: Considering capacity allocation pattern and load redistribution. Mod. Phys. Lett. B 2016, 30, 1650049. [Google Scholar] [CrossRef]
  34. Motter, A.E.; Lai, Y.C. Cascade-based attacks on complex networks. Phys. Rev. E 2002, 66, 065102. [Google Scholar] [CrossRef] [Green Version]
  35. Gao, X.; Peng, M.; Chi, K.T.; Zhang, H. A stochastic model of cascading failure dynamics in cyber-physical power systems. IEEE Syst. J. 2020, 14, 4626–4637. [Google Scholar] [CrossRef]
  36. Yin, R.R.; Liu, B.; Liu, H.R.; Li, Y.Q. The critical load of scale-free fault-tolerant topology in wireless sensor networks for cascading failures. Phys. A Stat. Mech. Its Appl. 2014, 409, 8–16. [Google Scholar] [CrossRef]
  37. Li, Y.P.; Li, J.; Wang, N.; Che, X.S.; Chen, H.B.; Liu, Z.T. Optical and structural properties of co-sputtered Ge1-xCx thin films as a function of the substrate temperature. Thin Solid Films 2014, 551, 74–78. [Google Scholar] [CrossRef]
  38. Cai, Y.; Cao, Y.; Li, Y.; Huang, T.; Zhou, B. Cascading failure analysis considering interaction between power grids and communication networks. IEEE Trans. Smart Grid 2015, 7, 530–538. [Google Scholar] [CrossRef]
Figure 1. One-to-one coupling patterns between nodes in subnet G D and subnet G U . (a) Undirected-to-directed interdependent edge. (b) Directed-to-undirected interdependent edge.
Figure 1. One-to-one coupling patterns between nodes in subnet G D and subnet G U . (a) Undirected-to-directed interdependent edge. (b) Directed-to-undirected interdependent edge.
Entropy 25 00471 g001
Figure 2. One-to-two coupling patterns between nodes in subnet G D and subnet G U . (a) The one-to-two coupling pattern consisting of two undirected-to-directed interdependent edges. (b) The one-to-two coupling pattern consisting of an undirected-to-directed interdependent edge and a directed-to-undirected interdependent edge. (c) The one-to-two coupling pattern consisting of two directed-to-undirected interdependent edges. (d) The one-to-two coupling pattern consisting of a directed-to-undirected interdependent edge and an undirected-to-directed interdependent edges.
Figure 2. One-to-two coupling patterns between nodes in subnet G D and subnet G U . (a) The one-to-two coupling pattern consisting of two undirected-to-directed interdependent edges. (b) The one-to-two coupling pattern consisting of an undirected-to-directed interdependent edge and a directed-to-undirected interdependent edge. (c) The one-to-two coupling pattern consisting of two directed-to-undirected interdependent edges. (d) The one-to-two coupling pattern consisting of a directed-to-undirected interdependent edge and an undirected-to-directed interdependent edges.
Entropy 25 00471 g002
Figure 3. Two-to-one coupling patterns between nodes in subnet G D and subnet G U . (a) The two-to-one coupling pattern consisting of two undirected-to-directed interdependent edges. (b) The two-to-one coupling pattern consisting of an undirected-to-directed interdependent edge and a directed-to-undirected interdependent edge. (c) The two-to-one coupling pattern consisting of two directed-to-undirected interdependent edges. (d) The two-to-one coupling pattern consisting of a directed-to-undirected interdependent edge and an undirected-to-directed interdependent edge.
Figure 3. Two-to-one coupling patterns between nodes in subnet G D and subnet G U . (a) The two-to-one coupling pattern consisting of two undirected-to-directed interdependent edges. (b) The two-to-one coupling pattern consisting of an undirected-to-directed interdependent edge and a directed-to-undirected interdependent edge. (c) The two-to-one coupling pattern consisting of two directed-to-undirected interdependent edges. (d) The two-to-one coupling pattern consisting of a directed-to-undirected interdependent edge and an undirected-to-directed interdependent edge.
Entropy 25 00471 g003
Figure 4. An example of a one-to-one interdependent network with P D = P U = 1.
Figure 4. An example of a one-to-one interdependent network with P D = P U = 1.
Entropy 25 00471 g004
Figure 5. An example of load redistribution in the directed subnet G D after a node failure.
Figure 5. An example of load redistribution in the directed subnet G D after a node failure.
Entropy 25 00471 g005
Figure 6. An example of load redistribution in the undirected subnet G U after a node failure.
Figure 6. An example of load redistribution in the undirected subnet G U after a node failure.
Entropy 25 00471 g006
Figure 7. An example of the largest connected component in a undirected subnet after a node failure.
Figure 7. An example of the largest connected component in a undirected subnet after a node failure.
Entropy 25 00471 g007
Figure 8. An example of the largest weakly connected component in a directed subnet after a node failure.
Figure 8. An example of the largest weakly connected component in a directed subnet after a node failure.
Entropy 25 00471 g008
Figure 9. An example of interdependency failure in a one-to-one interdependent network. (a) Failure of node v 1 does not lead to failure of node v 2 . (b)Failure of node v 1 leads to node v 2 interdependency failure.
Figure 9. An example of interdependency failure in a one-to-one interdependent network. (a) Failure of node v 1 does not lead to failure of node v 2 . (b)Failure of node v 1 leads to node v 2 interdependency failure.
Entropy 25 00471 g009
Figure 10. An example of interdependency failure in a one-to-two/two-to-one coupling interdependent network. (a) Failure of node v 1 does not lead to failure of node v 2 and v 3 . (b) Failure of node v 1 lead to failure of node v 3 . (c) Failure of node v 1 does lead to failure of node v 2 and v 3 . (d) Failure of node v 2 does not lead to failure of node v 1 . (e) Failure of node v 1 and v 2 lead to failure of node v 1 . (f) Failure of node v 1 and v 2 does not lead to failure of node v 1 . (g) Failure of node v 2 does not lead to failure of node v 1 .
Figure 10. An example of interdependency failure in a one-to-two/two-to-one coupling interdependent network. (a) Failure of node v 1 does not lead to failure of node v 2 and v 3 . (b) Failure of node v 1 lead to failure of node v 3 . (c) Failure of node v 1 does lead to failure of node v 2 and v 3 . (d) Failure of node v 2 does not lead to failure of node v 1 . (e) Failure of node v 1 and v 2 lead to failure of node v 1 . (f) Failure of node v 1 and v 2 does not lead to failure of node v 1 . (g) Failure of node v 2 does not lead to failure of node v 1 .
Entropy 25 00471 g010
Figure 11. Initial stage of cascading failure mechanism in the directed–undirected interdependent network.
Figure 11. Initial stage of cascading failure mechanism in the directed–undirected interdependent network.
Entropy 25 00471 g011
Figure 12. Propagation stage of cascading failure mechanism in the directed–undirected interdependent network.
Figure 12. Propagation stage of cascading failure mechanism in the directed–undirected interdependent network.
Entropy 25 00471 g012
Figure 13. Cascading failure process in a one-to-one directed–undirected interdependent network. (a) Initial network. (b) Step 1. (c) Step 2. (d) Step 3. (e) Step 4. (f) Step 5. (g) Step 6. (h) Step 7.
Figure 13. Cascading failure process in a one-to-one directed–undirected interdependent network. (a) Initial network. (b) Step 1. (c) Step 2. (d) Step 3. (e) Step 4. (f) Step 5. (g) Step 6. (h) Step 7.
Entropy 25 00471 g013
Figure 14. Cascading robustness of directed–undirected interdependent networks with different load-redistribution schemes under the single-node attack ( σ = 0.6 , β = 1 ). (a) Attack on the directed subnet of a one-to-many interdependent network. (b) Attack on an undirected subnet of a one-to-many interdependent network. (c) Attack on a directed subnet of a many-to-one interdependent network. (d) Attack on an undirected subnet of a many-to-one interdependent network.
Figure 14. Cascading robustness of directed–undirected interdependent networks with different load-redistribution schemes under the single-node attack ( σ = 0.6 , β = 1 ). (a) Attack on the directed subnet of a one-to-many interdependent network. (b) Attack on an undirected subnet of a one-to-many interdependent network. (c) Attack on a directed subnet of a many-to-one interdependent network. (d) Attack on an undirected subnet of a many-to-one interdependent network.
Entropy 25 00471 g014
Figure 15. Cascading robustness while varying σ and β under the single-node attack. (a) Attack on the directed subnet of a one-to-one interdependent network. (b) Attack on the undirected subnet of a one-to-one interdependent network. (c) Attack on the directed subnet of a one-to-two interdependent network. (d) Attack on the undirected subnet of a one-to-two interdependent network. (e) Attack on the directed subnet of a two-to-one interdependent network. (f) Attack on the undirected subnet of a two-to-one interdependent network.
Figure 15. Cascading robustness while varying σ and β under the single-node attack. (a) Attack on the directed subnet of a one-to-one interdependent network. (b) Attack on the undirected subnet of a one-to-one interdependent network. (c) Attack on the directed subnet of a one-to-two interdependent network. (d) Attack on the undirected subnet of a one-to-two interdependent network. (e) Attack on the directed subnet of a two-to-one interdependent network. (f) Attack on the undirected subnet of a two-to-one interdependent network.
Entropy 25 00471 g015
Figure 16. Heatmaps of Q s D and Q s U in the parameter space [ σ , β ] under the single-node attack. (a) Attack on the directed subnet of a one-to-one interdependent network. (b) Attack on the directed subnet of a one-to-one interdependent network. (c) Attack on the directed subnet of a one-to-two interdependent network. (d) Attack on the undirected subnet of a one-to-two interdependent network. (e) Attack on the directed subnet of a two-to-one interdependent network. (f) Attack on the undirected subnet of a two-to-one interdependent network.
Figure 16. Heatmaps of Q s D and Q s U in the parameter space [ σ , β ] under the single-node attack. (a) Attack on the directed subnet of a one-to-one interdependent network. (b) Attack on the directed subnet of a one-to-one interdependent network. (c) Attack on the directed subnet of a one-to-two interdependent network. (d) Attack on the undirected subnet of a one-to-two interdependent network. (e) Attack on the directed subnet of a two-to-one interdependent network. (f) Attack on the undirected subnet of a two-to-one interdependent network.
Entropy 25 00471 g016
Figure 17. Network robustness with varying P under a single-node attack ( σ = 0.6 , β = 1 ).
Figure 17. Network robustness with varying P under a single-node attack ( σ = 0.6 , β = 1 ).
Entropy 25 00471 g017
Figure 18. Network robustness with various coupling patterns when adding directed-to-undirected interdependent edges under a single-node attack ( σ = 0.6 , β = 1 ). (a) Attack on directed subnet. (b) Attack on undirected subnet.
Figure 18. Network robustness with various coupling patterns when adding directed-to-undirected interdependent edges under a single-node attack ( σ = 0.6 , β = 1 ). (a) Attack on directed subnet. (b) Attack on undirected subnet.
Entropy 25 00471 g018
Figure 19. Network robustness with various coupling patterns when adding undirected-to-directed interdependent edges under the single-node attack ( σ = 0.6 , β = 1 ). (a) Attack on directed subnet. (b) Attack on undirected subnet.
Figure 19. Network robustness with various coupling patterns when adding undirected-to-directed interdependent edges under the single-node attack ( σ = 0.6 , β = 1 ). (a) Attack on directed subnet. (b) Attack on undirected subnet.
Entropy 25 00471 g019
Figure 20. Network robustness under the different multi-node attack strategies ( σ = 0.6 , β = 1 ). (a) Attack on directed subnet. (b) Attack on undirected subnet.
Figure 20. Network robustness under the different multi-node attack strategies ( σ = 0.6 , β = 1 ). (a) Attack on directed subnet. (b) Attack on undirected subnet.
Entropy 25 00471 g020
Figure 21. Composition of failed nodes when adding undirected-to-directed interdependent edges under a multi-node attack ( σ = 0.6 , β = 1 , p = 0.1 ). (a) HiDA on the directed subnet of a one-to-many interdependent network. (b) HDA on the undirected subnet of a one-to-many interdependent network. (c) HiDA on the directed subnet of many-to-one interdependent network. (d) HDA on the undirected subnet of many-to-one interdependent network.
Figure 21. Composition of failed nodes when adding undirected-to-directed interdependent edges under a multi-node attack ( σ = 0.6 , β = 1 , p = 0.1 ). (a) HiDA on the directed subnet of a one-to-many interdependent network. (b) HDA on the undirected subnet of a one-to-many interdependent network. (c) HiDA on the directed subnet of many-to-one interdependent network. (d) HDA on the undirected subnet of many-to-one interdependent network.
Entropy 25 00471 g021
Figure 22. Coupling patterns when adding directed-to-undirected interdependent edges. (a) Coupling pattern 1 of one-to-many interdependent networks. (b) Coupling pattern 2 of one-to-many interdependent networks. (c) Coupling pattern 1 of many-to-one interdependent networks. (d) Coupling pattern 2 of many-to-one interdependent networks.
Figure 22. Coupling patterns when adding directed-to-undirected interdependent edges. (a) Coupling pattern 1 of one-to-many interdependent networks. (b) Coupling pattern 2 of one-to-many interdependent networks. (c) Coupling pattern 1 of many-to-one interdependent networks. (d) Coupling pattern 2 of many-to-one interdependent networks.
Entropy 25 00471 g022
Figure 23. Composition of failed nodes when adding undirected-to-directed interdependent edges under the multi-node attack ( σ = 0.6 , β = 1 , p = 0.1 ). (a) HiDA on the directed subnet of a one-to-many interdependent network. (b) HDA on the undirected subnet of a one-to-many interdependent network. (c) HiDA on the directed subnet of a many-to-one interdependent network. (d) HDA on the undirected subnet of a many-to-one interdependent network.
Figure 23. Composition of failed nodes when adding undirected-to-directed interdependent edges under the multi-node attack ( σ = 0.6 , β = 1 , p = 0.1 ). (a) HiDA on the directed subnet of a one-to-many interdependent network. (b) HDA on the undirected subnet of a one-to-many interdependent network. (c) HiDA on the directed subnet of a many-to-one interdependent network. (d) HDA on the undirected subnet of a many-to-one interdependent network.
Entropy 25 00471 g023
Figure 24. Coupling patterns when adding undirected-to-directed interdependent edges. (a) Coupling pattern 1 of one-to-many interdependent networks. (b) Coupling pattern 2 of one-to-many interdependent networks. (c) Coupling pattern 1 of many-to-one interdependent networks. (d) Coupling pattern 2 of many-to-one interdependent networks.
Figure 24. Coupling patterns when adding undirected-to-directed interdependent edges. (a) Coupling pattern 1 of one-to-many interdependent networks. (b) Coupling pattern 2 of one-to-many interdependent networks. (c) Coupling pattern 1 of many-to-one interdependent networks. (d) Coupling pattern 2 of many-to-one interdependent networks.
Entropy 25 00471 g024
Table 1. Summary of existing interdependent network models.
Table 1. Summary of existing interdependent network models.
ReferenceNetwork TypeCoupling PatternSubnet TypeInterdependent Edge Type
 [19]Power-Information Networkone-to-oneUndirected-UndirectedUndirected
 [20]Power-Information Networkone-to-oneUndirected-UndirectedUndirected
 [21]Supply-Information Networkone-to-oneUndirected-UndirectedUndirected
 [22]Water-Power Networkone-to-oneUndirected-UndirectedUndirected
 [23]Supply-Information Networkone-to-oneDirected-UndirectedUndirected
 [24]IoT-Information Networkone-to-threeUndirected-UndirectedUndirected
 [25]Seaport-Airport- World-wide Airport Networkone-to-oneUndirected-Undirected-UndirectedUndirected
 [26]General Networkone-to-oneUndirected-UndirectedUndirected
 [27]General Networkone-to-oneUndirected-UndirectedUndirected
 [28]General Networkone-to-oneUndirected-UndirectedUndirected
 [29]General Networkone-to-oneUndirected-UndirectedUndirected
 [30]General Networkone-to-oneUndirected-UndirectedUndirected
Table 2. Notation in the directed–undirected interdependent network model.
Table 2. Notation in the directed–undirected interdependent network model.
NotationDescription
G D The directed subnet.
G U The undirected subnet.
V D The set of nodes in subnet G D .
V U The set of nodes in subnet G U .
E D The set of connectivity links in subnet G D .
E U The set of connectivity links in subnet G U .
v i D A node i in directed subnet G D .
v i U A node i in directed subnet G U .
E C Interdependent edge matrix between subnet.
N D Node number in subnet G D .
N U Node number in subnet G U .
d D Number of nodes with interdependent edges in subnet G D .
d U Number of nodes with interdependent edges in subnet G U .
P D Proportion of nodes with interdependent edges in subnet G D .
P U Proportion of nodes with interdependent edges in subnet G U .
PProportion of nodes with interdependent edges in both subnet of
one-to-one interdependent networks.
k i D Degree of node v i D .
k i U Degree of node v i U .
k i ( i n ) D In-degree of node v i D .
k i ( o u t ) D Out-degree of node v i D .
k D Average degree of subnet G D .
k U Average degree of subnet G U .
S i D The set of out-degree nodes of node v i D .
S i U The set of out-degree nodes of node v i U .
pProportion of nodes initially removed under multi-node attack.
V D p The set of the initially removed nodes in subnet G D .
V D O ( t ) The set of overload failure nodes in subnet G D at time t.
V D I ( t ) The set of isolation failure nodes in subnet G D at time t.
V D E ( t ) The set of interdependency failure nodes in subnet G D at time t.
V D F ( t ) The set of failure nodes in subnet G D at time t.
V U O ( t ) The set of overload failure nodes in subnet G U at time t.
V U I ( t ) The set of isolation failure nodes in subnet G U at time t.
V U E ( t ) The set of interdependency failure nodes in subnet G U at time t.
V U F ( t ) The set of failure nodes in subnet G U at time t.
V F ( t ) The set of failure nodes in directed–undirected interdependent
network G at time t.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xu, X.; Fu, X. Analysis on Cascading Failures of Directed–Undirected Interdependent Networks with Different Coupling Patterns. Entropy 2023, 25, 471. https://doi.org/10.3390/e25030471

AMA Style

Xu X, Fu X. Analysis on Cascading Failures of Directed–Undirected Interdependent Networks with Different Coupling Patterns. Entropy. 2023; 25(3):471. https://doi.org/10.3390/e25030471

Chicago/Turabian Style

Xu, Xiaojie, and Xiuwen Fu. 2023. "Analysis on Cascading Failures of Directed–Undirected Interdependent Networks with Different Coupling Patterns" Entropy 25, no. 3: 471. https://doi.org/10.3390/e25030471

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop