Next Article in Journal
Estimation of Dynamic Error Parameters in a Measurement Chain Based on the Spectrum of Input Quantities
Previous Article in Journal
Class-Balanced Random Patch Training to Address Class Imbalance in Tiling-Based Farmland Classification
Previous Article in Special Issue
Designing Traffic Light Signals to Ease Congestion Caused by Traffic Accidents Using Timed Petri Net
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Vulnerability Assessment Framework for Physical Protection Systems Integrating Complex Networks and Fuzzy Petri Nets

1
College of Information and Cyber Security, People’s Public Security University of China, Beijing 100038, China
2
National Engineering Research Center of Classified Protection and Safeguard Technology for Cybersecurity, The Third Research Institute of the Ministry of Public Security Shanghai, Shanghai 200030, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2025, 15(13), 7062; https://doi.org/10.3390/app15137062
Submission received: 15 April 2025 / Revised: 13 June 2025 / Accepted: 16 June 2025 / Published: 23 June 2025
(This article belongs to the Special Issue Petri Net-Based Specifications: From Theory to Applications)

Abstract

Modern physical protection systems (PPSs) play a pivotal role in safeguarding critical infrastructure and maintaining public safety. Yet increasingly complex system architectures and evolving threat landscapes pose significant vulnerability challenges to PPSs. Conventional vulnerability assessment methods predominantly rely on expert knowledge or single-path analysis, which inadequately captures complex inter-component relationships and the impact of uncertainties on PPS vulnerabilities. To bridge this gap, this paper introduces a hybrid analytical framework synergizing complex network theory with fuzzy Petri net (FPN). The proposed method operates through two integrated phases: (1) constructing topological models of PPS using complex network theory to characterize component interrelationships, and (2) incorporating FPN to establish vulnerability propagation models that simulate cascading effects and quantify overall system vulnerability. Compared with conventional methods, the proposed approach demonstrates superior effectiveness in identifying critical vulnerability points within the system, providing a scientifically grounded foundation for enhancing PPS security and implementing risk control measures.

1. Introduction

With the rapid development of society and the continuous advancement of technology, the physical protection system (PPS) has been playing an increasingly important role in areas such as critical infrastructure protection, public security management, and smart city construction. Integrating various technological measures including video surveillance, intrusion detection, and access control, the PPS provides crucial support for safeguarding social security, and preventing, and responding to diverse security threats. However, with the continuous expansion of system scale and increasing complexity, the PPS itself faces numerous vulnerability issues [1]. These system vulnerabilities may originate from hardware failures, software system flaws, network communication defects, or even human operational errors. If these vulnerabilities are maliciously exploited, they may lead to system malfunctions, data breaches, or even trigger severe security incidents [2]. Therefore, conducting scientific and comprehensive vulnerability assessments of PPSs, identifying system weaknesses, and implementing effective protective measures are of significant importance for enhancing overall system security.
Traditional vulnerability assessment methods for PPSs can be primarily categorized into two types. The first type involves establishing an indicator system for system components, typically using weighted calculation methods to progressively assess vulnerabilities from basic components to subsystems and ultimately to the complete physical protection system [3,4,5]. This approach offers simplicity and intuitiveness when dealing with a relatively simple PPS. Its notable drawbacks are as follows: (1) such methods assume independence among system components, neglecting their complex interrelationships; (2) they focus on the types and quantities of physical protection system components while overlooking the system’s spatial characteristics.
The second category analyzes the shortest intrusion path in the PPS, evaluating system vulnerability by connecting components from outer to inner layers to form a quantifiable pathway. These methods are primarily represented by the Estimate of Adversary Sequence Interruption (EASI) method and its derivatives [2]. The advantage of this approach lies in its partial mitigation of the subjectivity inherent in expert judgment, while quantitatively reflecting how spatial configurations affect PPS vulnerability in path selection. Notable limitations include the following: (1) The EASI method and its extensions (e.g., System Analysis of Vulnerability to Intrusion, SAVI) predominantly focus on shortest-path analysis, neglecting alternative intrusion paths and their interdependencies. (2) These methods typically assume independence among component vulnerabilities, failing to account for vulnerability propagation and accumulation effects within the system. This assumption may lead to underestimation of overall system vulnerability.
To address these issues, this paper proposes a vulnerability assessment method for PPS based on complex network theory and fuzzy Petri net (FPN). Complex network theory effectively characterizes inter-component relationships, providing a powerful tool for modeling PPS topology, while FPN theory simulates vulnerability propagation processes and quantitatively evaluates overall system vulnerability. The integrated approach demonstrates enhanced adaptability and flexibility, enabling more comprehensive and accurate PPS vulnerability assessment to inform security protection and risk control. The primary contributions of this work include the following:
(1)
A complex network-based PPS topology modeling method characterizing inter-component relationships;
(2)
A fuzzy Petri net-driven vulnerability propagation model to simulate cascading failure mechanisms and quantify systemic risks.
(3)
Demonstration of method validity through case studies illustrating vulnerability assessment reasoning and computation processes.
The remainder of this paper is organized as follows: Section 2 reviews the relevant literature, highlighting advancements and limitations in existing research. Section 3 elaborates on the theoretical foundations of the proposed assessment model, including complex network theory and the FPN theory. Section 4 details the construction of a vulnerability assessment model specifically tailored to PPS. Section 5 demonstrates the model’s application through a representative case study, validating its practicality. Finally, Section 6 presents the key findings and outlines directions for future research.

2. Literature Review

Vulnerability assessment of PPSs serves as a critical component in ensuring system security and reliability. Existing research methods can be primarily categorized into two groups: component-based assessment approaches and intrusion path-based assessment approaches. This section provides a review of these two methodologies.

2.1. Component-Based PPS Assessment Methods

Drago et al. [6] proposed a model-driven approach to support PPS design and evaluation, which assesses vulnerability of different system configurations through Unified Modeling Language (UML) models and Bayesian network models representing threats, protective facilities, assets, and their relationships. Čakija et al. [7] addressed the computational intensity of traditional PPS by introducing a domain experience exploration method that optimizes the search for optimal solutions, thereby significantly reducing assessment computations. Moo et al. [8] applied PPS vulnerability assessment methods to a typical small nuclear research reactor’s physical protection system, identifying through simulations that nuclear facility barriers were vulnerable to shaped charge TNT threats. Gregoire [9] demonstrated the application of defense-in-depth principles to traditional PPSs, using nuclear facility protection systems as an example to categorize detection, delay, and response functions of multi-layered barriers, offering new perspectives for nuclear physical security. Complementing these developments, Kapusta et al. [10] presented assessment methods using integrated simulation tools and dynamic risk modeling, which were employed to evaluate and optimize the effectiveness of a nuclear power plant PPS while investigating how to maintain equivalent protection levels with reduced response personnel costs. Yaseen et al. [11] conducted vulnerability assessments of PPSs at nuclear and radiological facilities using traditional threat analysis and component-based analysis of PPS configurations.

2.2. Intrusion Path-Based Analysis Methods

Intrusion path-based vulnerability assessment methods for PPS currently represent the predominant research direction. These research methods originated from the EASI model developed by Sandia National laboratories (SNL), which evaluates protection vulnerability along a designated path under specified threat scenarios [4,12]. Subsequently, SNL developed the SAVI, Very-Simplified EASI (VEASI), Multipath Very-simplified EASI (MP-VEASI), and Analytic System and Software for Evaluating Safeguards and Security (ASSESS) models as enhanced and simplified versions of the original EASI framework [12,13,14]. Other researchers have also conducted studies based on the EASI model, with Andiwijayakusuma et al. being the first to apply it to calculate vulnerability in nuclear reactor PPSs [15]. The team later developed a multi-path model for nuclear facility PPSs that identifies paths with the lowest interruption probabilities. Zou et al. [16] addressed vulnerable path assessment in a PPS through a heuristic path-finding algorithm that analyzes adversary attack paths, using detection and interruption probabilities as heuristic information based on design-based threats. They subsequently established a virtual environment-based method for PPS design, analysis, and training exercises. Yang Jun et al. [17] proposed an adaptive probability mapping matrix search algorithm for PPS vulnerability analysis, which identifies critical adversary paths from a risk perspective. Later, they developed a heuristic backward path search algorithm incorporating the EASI model to evaluate the remaining delay time after critical detection points. Zhang et al. [18] optimized PPS communication probabilities based on intrusion modeling theory, considering the equivalence between communication delay time and timely response time, thereby improving the accuracy of interruption probability assessment. Wadoud et al. [19,20] designed a PPS for nuclear facilities that integrates multiple advanced technologies, evaluated its security using the EASI methodology, and subsequently collaborated with other researchers to assess a hypothetical nuclear research center using the SAVI method. Li et al. [21] developed an EASI-based three-dimensional method for identifying PPS vulnerability paths that incorporates both aerial and underwater threat response capabilities. Kapusta et al. [11] enhanced the EASI method to include the evaluation of cyber-attack response capabilities in PPS.

3. Theoretical Foundations

The proposed vulnerability assessment framework integrates complex network theory, fuzzy production rule (FPR), and fuzzy Petri net (FPN) theory to enable systematic modeling, vulnerability propagation simulation, and quantitative evaluation. This section delineates the fundamental concepts of these three theoretical pillars and their synergistic application logic.

3.1. Complex Network Theory

Complex network theory serves as a fundamental theoretical framework for studying the topological structure and dynamic behavior of large-scale, nonlinear interactive systems, with its core method employing graph theory models to characterize inter-component relationships [22,23]. Formally, a complex network can be defined as a weighted directed graph G = (N, E) [24,25], where
(1)
Node set N represents physical or functional components.
(2)
Edge set E denotes inter-component relationships with weights quantifying interaction intensity or propagation likelihood.
In public transportation planning, researchers have adopted the Space-L complex network modeling method to analyze bus routes and stations. This method constructs topological models of transit networks by treating bus stations as nodes and adjacency relationships between stations as edges [26,27]. Similarly, in PPSs, protection zones and their connecting pathways can be abstracted as nodes and edges in complex networks, making the Space-L method applicable for protection system modeling. The core principle states that an edge exists between two nodes if direct or indirect connecting paths exist between them, while no edge is established for nodes without physical connections in real environments [28]. This modeling approach effectively characterizes PPS topology, providing a foundation for subsequent vulnerability analysis.
Figure 1a shows a schematic diagram of a physical protection system (PPS), where red lines indicate inter-zone connecting paths. As illustrated in Figure 1a, nodes n1 and n2 represent vehicle and pedestrian access points on the perimeter, providing access to n3 (an outdoor area within the PPS) and, subsequently, to n4 (internal building passageways), ultimately leading to zones n5 and n6 (rooms housing critical assets). Figure 1b demonstrates its complex network representation, where directional edges encode reachability relationships between zones.
In complex networks, heterogeneous node/edge significance necessitates quantified characterization. This study employs the following statistically validated metrics to evaluate topological criticality [29]:
(1)
Degree Centrality (K)
The degree Ki of node i refers to the number of other nodes that are directly connected to it. It reflects the level of connectivity of the node within the network. A higher degree indicates that the node has more connections with other nodes, implying a greater involvement or centrality in the network structure.
(2)
Average Path Length (L)
Average path length is defined as the mean value of the shortest paths between all node pairs in the network. In our study, the complex network contains designated source and target nodes. We specifically define this metric as the average length of the shortest directed paths from all source nodes to the target node.
(3)
Betweenness Centrality (B)
Node betweenness represents the frequency with which a node appears in all shortest paths. For our framework, we calculate node betweenness as the proportion of source-to-target shortest paths that pass through a given node. Higher betweenness values indicate greater nodal influence within the network.
(4)
Node Importance (ND)
Node importance measures the significance of nodes within the network. Following complex network theory, we integrate node degree (Ki) and betweenness centrality (Bi) to compute node importance [30], as shown in Equation (1):
N D i = B i + K i
where NDi denotes the criticality of node i, Bi′ represents the normalized betweenness centrality, defined as B i = B i M A X B i , and Ki′ corresponds to the normalized degree centrality, calculated as K i = K i M A X K i , for i = 1, 2, …, n.
(5)
Edge Importance (Sij)
Edge importance quantifies the significance of edges within the network. The importance of an edge is determined by the importance of its connected nodes—edges linking more important nodes have higher importance. We calculate edge importance based on the importance scores of its terminal nodes, as shown in Equation (2):
S i j = N D i + N D j 2
where Sij denotes the criticality of the edge connecting nodes i and j, with i, j ∈ {1, 2, …, n}.

3.2. FPN and FPR

Fuzzy Petri net (FPN) has been extensively applied in the domains of social safety and risk assessment [31], where researchers have utilized fuzzy Petri net for safety evaluations of long-distance oil pipelines [32], PPSs for petroleum industrial facilities in high-risk areas [33], chemical production processes [34], railway infrastructure [35], and air traffic management systems [36].
Following the complex network-based modeling of PPS topology, it is essential to model both vulnerability generation and propagation during intrusion processes. In risk assessment, a conventional approach integrates fuzzy production rule (FPR) and fuzzy Petri net, where fuzzy production rule establishes causality for vulnerability triggering and diffusion, while fuzzy Petri net quantifies propagation pathways and overall system risk—collectively termed fuzzy production rule-based fuzzy Petri net [31,37].
Within the risk assessment literature, definitions and representations of this fuzzy Petri net variant exhibit minor variations while maintaining consistent functional principles. The standard definition characterizes fuzzy production rule-based fuzzy Petri net as an eleven-tuple network, structured as follows [34]:
(1)
P = {p1, p2, …, pn} is a finite nonempty set of places represented by circles;
(2)
T = {t1, t2, …, tn} is a finite nonempty set of transitions that are represented as rectangles;
(3)
D = {d1, d2, …, dn} is a finite nonempty set of propositions, where there is a one-to-one mapping between P and D;
(4)
β: P → D is an association function, a bijective mapping from places to propositions;
(5)
α: P → [0, 1] is a truth degree function that maps each place to a real value in [0, 1], i.e., α(pi) indicates the truth degree of proposition β(pi), where β(pi) ∈ D;
(6)
I: P × T → {0, 1} is an n × m input matrix, that is, iij records whether a directed arc exists from pi to tj (i = 1, 2, …, n; j = 1, 2, …, m), where
i i j = 1 , i f   t h e r e   i s   a   d i r e c t e d   a r c   f r o m   p i   t o   t j ; 0 , o t h e r w i s e
(7)
O: T × P → {0, 1} is an n × m output matrix, in which oij records whether a directed arc exists from tj to pi (i = 1, 2, …, n; j = 1, 2, …, m), where
o i j = 1 , i f   t h e r e   i s   a   d i r e c t e d   a r c   f r o m   t j   t o   p j ; 0 , o t h e r w i s e
(8)
W: P × T → [0, 1], is an n × m weight function, where wij is the weight of an arc from pi to tj;
(9)
µ: µ → (0, 1] is the threshold vector, µ=(µ1, µ2, …, µn), where µj is the threshold of tj;
(10)
CF: T × P → [0, 1] is a confidence function and expressed as a m × n matrix CF = [cfij]m×n. The element cfij ∈ [0, 1] is the certainty factor of the rule corresponding to tj, which indicates the confidence of β(pi) after the reasoning rule associated with tj is enabled;
(11)
M = (m1, m2, …, mn)T is a state vector, where mi = α(pi) ∈ [0, 1], with the initial state vector denoted as M0.
Fuzzy production rule enables the representation of uncertain, ambiguous knowledge and facilitates fuzzy reasoning processes [38]. In vulnerability assessment frameworks, Fuzzy production rule establishes causal relationships governing vulnerability triggering and propagation mechanisms. These rules incorporate two fundamental fuzzy inference operators—AND and OR—which correspond to distinct Petri net structural configurations when formalized within a fuzzy Petri net framework [33,39].
  • AND rule: IF d11, w11) AND d22, w21) AND … AND dkk, wk1), then dgg, cfg1, µ1);
  • OR rule: IF d1(α1) OR d2(α2) OR … OR dk (αk), then dg(αg, cfg1, cfg2 … cfgk, µ1, µ2 … µk).
  • The fuzzy Petri net transformed from the “AND” rule is shown in Figure 2, where,
    α g = α 1 × w 11 + α 2 × w 21 + + α k × w k 1 × c f g 1
In the AND fuzzy Petri net model, a transition t can be fired when α1w1 + α2w2 + … + αkwk > µ, indicating that this fuzzy inference can occur.
Figure 2. FPN model of AND fuzzy production rule.
Figure 2. FPN model of AND fuzzy production rule.
Applsci 15 07062 g002
The fuzzy Petri net transformed from the OR rule is shown in Figure 3, where
α g = m a x α 1 c f g 1 + α 2 c f g 2 + + α k c f g k .
In the OR fuzzy Petri net model, a transition t can be fired when αm > µm, indicating that this fuzzy inference can occur.

4. Assessment Framework Based on Complex Networks and Fuzzy Petri Nets

This section proposes a vulnerability assessment framework for PPSs, integrating complex network theory with FPN. The framework’s core method employs system topology modeling, vulnerability rule inference, and dynamic propagation simulation to achieve a multidimensional assessment, from structural analysis to risk quantification.
The key implementation steps are as follows:
(1)
Topological Modeling
Constructing a directed network representation of PPS using complex network theory (Section 4.1).
(2)
Rule-Based Vulnerability Inference
Defining vulnerability propagation logic through FPR (Section 4.2).
(3)
Dynamic Risk Propagation
Developing dynamic propagation models based on FPN. (Section 4.3).
The complete workflow is illustrated in Figure 4. Section 4.1, Section 4.2 and Section 4.3 detail implementation protocols, parametric definitions, and computational workflows for each phase.

4.1. Complex Network-Based Topological Modeling

Classical security systems are spatially and functionally stratified into four concentric defense layers (from outer to inner): Perimeter, Surveillance Zone, Protection Zone, and Restricted Zone. A successful intrusion typically requires sequential breaching of these four layers. Each layer comprises multiple subzones:
(1)
Perimeter: Includes fencing/walls and access points for vehicles and personnel.
(2)
Surveillance Zone: Area between perimeter and buildings, including gathering points, parking lots, and outdoor pathways.
(3)
Protection Zone: The building area containing critical assets, including building exteriors and internal passageways.
(4)
Restricted Zone: Specific rooms containing core assets; unauthorized access to this zone signifies system failure.
It should be noted that a Protection Zone may encompass multiple buildings, while a Restricted Zone may involve several rooms. This multi-layered spatial configuration significantly increases the complexity of physical protection systems.
Based on the spatial layout and functional characteristics of the PPS, the system can be abstracted as a directed graph G = (N, E), where
(1)
Node N: represents sub-areas with defined functions and spatial boundaries within each PPS protection layer.
(2)
Edge E: denotes the pathways primarily connecting different functional areas within the PPS.
In the PPS complex network model, the graph contains multiple source nodes (representing Perimeter sub-areas) and terminal nodes (representing Restricted Zones that house critical assets). A connected path from source to terminal nodes constitutes a complete intrusion path, with multiple potential paths existing between them.
Based on the Chinese national standards GB 50348-2018 [40] and GJB 7674-2012 [41], along with industry standards such as GAT 1093-2013 [42], GJB 6118-2007 [43], GAT 1399.1-2017 [44], GAT 1399.2-2017 [45], and GAT 992-2012 [46], and incorporating field investigations of PPSs at various military-industrial facilities, museums, large stadiums, and educational institutions, a two-level indicator system has been developed, as detailed in Appendix A. This system is designed to quantify the protective capacity of sub-areas represented by nodes. The first-level indicators define the PPS protection zones, which form nodes and edges within the complex network, while the second-level indicators correspond to specific PPS components and their attributes that affect the protective capabilities at the first level.
Second-level indicators are further classified into three dimensions: Detection, Delay, and Response. According to Appendix A Table A1, evaluators can quantify the protective capability of security zones represented by first-level indicators, with this quantified result defined as the protection score in this study. The protection scores serve as critical input parameters for the FPN model used to evaluate overall system vulnerability.

4.2. FPR-Driven Vulnerability Propagation Logic

FPR employs fuzzy inference to model the causal logic of PPS failures. To enable fuzzy inference, we extend the complex network model of PPS beyond basic nodes (N) and edges (E) with the following definitions:
(1)
Intrusion Path (R): Intrusion Path Set R comprises all possible paths (r1–rn) from potential entry points to critical asset locations, with each individual intrusion path rm representing a complete route from a specific entry point to a particular critical asset location.
(2)
Protection Chain (C): Protection Chain Set C consists of all protection chains (c1–cn). An individual protection chain cm is defined as the collection of all intrusion paths from potential entry points to a particular critical asset. A PPS containing multiple critical assets is considered to have multiple protection chains.
Consider the network in Figure 1b: Restricted Zones n5, n6 store critical assets A, B, with n1, n2 as intrusion origins. This system contains four intrusion paths and two protection chains, as shown in Table 1.
Based on FPR inference rules and system characteristics, we define four failure propositions:
(1)
Component Failure: edge/node security compromise
(2)
Path Failure: security breach along an intrusion path R
(3)
Chain Failure: compromise of a protection chain c
(4)
System Failure: global security collapse
In accordance with the established reasoning framework, Figure 1b’s components are formally mapped as nodes (p1/d1–p6/d6), edges (p7/d7–p11/d11), paths (p12/d12–p15/d15), protection chains (p16/d16–p17/d17), and system failure (p18/d18). Table 2 exemplifies these propositions using the Figure 1b network.
The inference process is outlined as follows: The vulnerability of edges and nodes, reflecting their likelihood of failure, enables the derivation of intrusion path vulnerability. This, in turn, allows the calculation of the vulnerability of the protection chain that encompasses these intrusion paths. Ultimately, the overall vulnerability of the PPS can be inferred from the vulnerabilities of these protection chains.
  • Node/Edge → Path: AND logic governs the inference, as all components must fail to compromise a path.
  • Path → Chain: OR logic applies, breaching one path suffices to compromise a chain.
  • Chain → System: Two mission-driven logics exist: (1) AND: System vulnerability scales with partial asset loss (e.g., redundant systems); (2) OR: Any chain failure triggers total system failure (e.g., critical infrastructure)
For the Figure 1b case study, taking intrusion path r1 as an example, if all security zones (n1, n3, n4, n5) and connecting paths (e1, e3, e4) experience a protection failure, the entire path is considered compromised, which follows the “AND” rule in FPR. Table 1 presents the corresponding proposition numbers for these events. Thus, the complete causal logic for the failure of path r1 is expressed in FPR as
d1 and d7 and d3 and d9 and d4 and d10 and d5 Then d12
For protection chain c1, intruders reaching critical room n5 through either path r1 or r2 follow FPR’s “OR” rule, expressed formally as
d12 or d13 then d16
Similarly, the complete inference process is as shown in Table 3:

4.3. Dynamic Risk Quantification via FPN Simulation

According to the FPR in Section 4.2, Table 1, and Figure 2 and Figure 3, the FPN shown in Figure 5 can be obtained.:
Building upon the FPN modeling principles detailed in Section 2 and referencing the works of Zhou et al. [33] and Guo et al. [32], this framework additionally requires initialization of the following parameters: Transition thresholds μj, Transition certainty factors cfij, Arc weights wij, and Initial marking vector M0.
Following the parameter configuration by Zhou et al. [33], we set μ = 0.05 and cf = 1 uniformly. The arc weight w has two calculation methods: (1) weights for node/edge-to-path vulnerability inference, determined by nodal/edge importance; (2) weights in AND-logic for protection chain places, determined by asset value or stakeholder priorities in the PPS.
For method (1), Section 3.1 presents our importance calculation: let xᵢ denote the importance value of the corresponding edge/node of place pᵢ (xi may take the value of either NDi or Sij), then the arc weight to transition tⱼ is
w i j = x i 1 n x i
The initial truth degree mi for input places is calculated as
m i = 1 y i 10
where yi ∈ [0, 10] represents the protection score of subzone i (Section 4.1). Non-input places initialize to mi = 0.
The classical computation method for output place truth degrees typically uses matrix operations to calculate the output vector Mn at system stability from the initial vector M0 [32,33]. However, as the number of places in FPN increases, the computational complexity of matrix operations grows significantly, making this approach impractical for FPN modeling and inference in complex PPS.
To address this limitation, we adopt the method proposed by Wang et al. [34], which computes vulnerability propagation values layer-by-layer at the transition level, enabling the efficient derivation of output place truth degrees. The FPN output place truth degree mn ∈ [0, 1] indicates higher PPS vulnerability as the values increase. Following the conventional 5-level risk assessment classification, the truth degree is divided into five equal levels, where higher values indicate greater vulnerability levels, necessitating more immediate and essential mitigation actions [33]. We propose the grading criteria for PPS vulnerability assessment, as shown in Table 4:

5. Example and Validation

In this section, we first demonstrate the complete assessment process using a basic PPS and then conduct simulation experiments based on an institutional PPS to validate the effectiveness of the proposed method.

5.1. Illustrative Example

To validate the efficacy of the proposed vulnerability assessment method, this section conducts a case study on a representative security system. Following the analytical framework established in Section 3.1, the system is spatially and functionally divided into four defense layers with the following configurations:
(1)
Perimeter: includes one personnel access point, one vehicle passage, and perimeter fencing.
(2)
Surveillance Zone: comprises a parking lot and an open plaza.
(3)
Protection Zone: houses critical assets across two buildings (A and B).
(4)
Restricted Zone: contains an archive room in Building A and a data center in Building B.
This multilayered defense architecture exemplifies typical security system configurations, effectively demonstrating the method’s applicability to complex systems. Subsequent subsections perform vulnerability assessment using the integrated complex network and FPN framework.
Based on the system’s topological structure, Figure 6 illustrates its complex network representation.
The various zones of the PPS are represented as n1 − n9 in the complex network. The protection regions corresponding to each node in Figure 6 are shown in Table 5, and the edges indicate the connectivity paths between the regions.
Based on the intrusion paths of attackers in the physical protection system (PPS), with reference to the descriptions in Figure 6 and Section 4.2, we enumerate 12 intrusion paths from perimeter layers to restricted zones and 2 protection chains in Table 6:
The FPR propositions obtained accordingly and their correspondence with the FPN Places are shown in Table 7:
The inferential relationship between propositions is as shown in Table 8:
This leads to the FPN model shown in Figure 7:
Based on Equations (1), (2), and (7), the weights of the libraries in the FPN are computed, and the results are presented in Table 9:
Using Appendix A Table A1 and Equation (8), the value of the input place is derived, as presented in Table 10:
After the FPN calculation, the truth degree obtained for Places p22–p36 is shown in Table 11:
Comparative analysis of Table 4, Table 5, Table 6, Table 7 and Table 11 yields three critical inferences:
(1)
The system exhibits moderate vulnerability (m36 = 0.406), necessitating scheduled risk mitigation measures.
(2)
Among all protection chains, c2 (associated with the data center) demonstrates the highest vulnerability, surpassing c1 (critical room). Data centers should be better protected.
(3)
Intrusion path r10 presents the most critical risk among 12 identified paths, warranting prioritized reinforcement of its constituent components.
(4)
Node n4 exhibits the highest vulnerability score of 0.575, approaching high vulnerability, which indicates insufficient protective capabilities in the parking lot. The PPS network diagram reveals that half of all intrusion paths include node n4, demonstrating its high importance within the overall PPS. Given the parking lot’s high importance and vulnerability, priority should be given to enhancing its security facilities and means of protection.

5.2. Simulation Validation

For model validation purposes, an organization’s PPS was selected and simulated in AnyLogic 8.8.6 environment, with our vulnerability assessment framework examined specifically through intrusion path analysis. First, we evaluated the PPS using our proposed method, then simulated the intrusion processes, with model validation achieved through a comparative analysis of the assessment and simulation results. The PPS layout is shown in Figure 8a, a 3D simulation view in Figure 8b, and the intrusion behavior workflow in Figure 8c. The PPS’s complex network diagram is shown in Figure 9, where dotted lines indicate underpasses. Appendix B Table A2 presents the node/edge configurations, intrusion paths, and protection chains within the complex network. The PPS vulnerability assessment results are provided in Appendix C Table A3.
We conducted 1000 simulated intrusions for each of the system’s 41 routes and documented the results. The assessment results obtained using our proposed method are presented in Appendix B Table A2, while the software simulation results are shown in Appendix D Table A4 (route/edge simulations) and A5 (intrusion path simulations). The simulation results showed weaker interception probabilities for nodes n10, n12, n16, n20, n23, and n27, as well as for edges e8, e9, e23, e43, e44, and e48, which were consistent with their vulnerability rankings in our assessment model. The five paths with the lowest interception probabilities (r39, r38, r11, r18, r10) reflect inadequate protection, corresponding to the top five most vulnerable locations in protection route failures, as indicated in Appendix C from our assessment method.

6. Conclusions

This study proposes a vulnerability assessment method for physical protection systems (PPSs) that integrates complex network theory and fuzzy Petri net (FPN). Through multidimensional modeling and dynamic propagation simulation, it addresses the limitations of conventional methods in component correlation analysis, uncertainty handling, and dynamic adaptability. The results demonstrate that this method effectively evaluates the overall vulnerability level of PPS and identifies high-risk assets and key system vulnerabilities. The assessment outcomes provide reliable guidance for the construction of PPSs. The methodological innovation not only enhances the accuracy of the assessment but also establishes a new theoretical paradigm and technical approach for PPS vulnerability research.
Specifically, complex network theory models the global logical structure and inter-regional relationships of PPSs, FPR formalize the causal relationships in vulnerability propagation, while FPN simulate the cumulative effects of vulnerability propagation through dynamic algorithms—collectively establishing a systematic framework for the complex assessment of PPS vulnerability.
We demonstrate the complete assessment process through a case study of a classical PPS. Future work will focus on refining the methodology to enhance its applicability to atypical PPS with distinctive features, such as those that incorporate unique topographic characteristics, such as cliffs and coastlines.

Author Contributions

Methodology, S.C., H.J. and Z.W.; Validation, X.T.; Writing—review & editing, S.C. and B.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by “Security Engineering Double First-Class Special Project of People’s Public Security University of China” NO. 2023SYL08 and “Theoretical and Practical Research on Virtual Reality Technology in Public Safety Education and Training” No. 20230086.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

No data were used for the research described in the article.

Acknowledgments

The authors wish to express their appreciation to Chen for her valuable experience and advice.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. Indicator system.
Table A1. Indicator system.
Zone (Primary Indicators)Components (Secondary Indicators)Points
Personnel Access Points
(10 points)
Visitor and personnel identification2
Contraband detection for individuals1.5
Security checkpoint screening2
Physical delay mechanisms1.5
Guard response capability1.5
Guard communication effectiveness1.5
Vehicle Access Points
(10 points)
Vehicle identification1.5
Occupant verification1.5
Vehicular contraband inspection1.5
Security personnel detection proficiency1
Physical delay mechanisms1.5
Guard response capability1.5
Guard communication effectiveness1.5
Perimeter Fencing/Walls
(10 points)
Outdoor sensor performance3
Perimeter barrier delay efficiency2
Patrol team intervention latency2.5
Perimeter communication network integrity2.5
Parking lots
(10 points)
Parking lot video surveillance2
Security patrol monitoring2
Vehicle movement control2
Guard force deployment density2
Guard communication effectiveness2
Public Gathering Zones
(10 points)
Crowd area video analytics2
Security patrol frequency2
Physical access control measures2
Comprehensive guard competency2
Guard communication effectiveness2
Building Exterior Security Zone
(10 points)
Visitor-Personnel Identity Correlation2
Intrusion detection performance2
Exterior patrol effectiveness1.5
Structural delay mechanisms1.5
Perimeter guard capability1.5
Guard communication effectiveness1.5
Critical Rooms
(10 points)
Indoor sensor detection accuracy2
Room-specific video monitoring1.5
Guard patrol verification1.5
Compartmentalized delay systems1.5
Configuration of guards2
communications capability1.5
Outdoor Pathways
(10 points)
Outdoor Pathway Video Surveillance2
Route patrol intensity2
Pathway obstruction effectiveness2
Guard post placement2
Guard communication effectiveness2
Indoor Pathways
(10 points)
Indoor pathway video surveillance2
Route patrol intensity2
Physical delay mechanisms2
Guard post placement2
Communication response reliability2

Appendix B

Table A2. Complex network composition.
Table A2. Complex network composition.
NumberDescriptionNumberDescription
n1South Gater8n2 → e6 → n11 → e30 → n18 → e44 → n29
n2West Gate 1r9n2 → e6 → n11 → e31 → n19 → e45 → n30
n3West Gate 2r10n3 → e7 → n12 → e32 → n25 → e51 → n36
n4North Gater11n3 → e8 → n13 → e33 → n22 → e48 → n33
n5East Gater12n3 → e9 → n15 → e38 → n24 → e50 → n35
n6Perimeter Fencer13n4 → e10 → n14 → e34 → n22 → e48 → n33
n7Holding Point Ar14n4 → e10 → n14 → e35 → n23 → e49 → n34
n8Holding Point Br15n4 → e10 → n14 → e36 → n25 → e51 → n36
n9Holding Point Cr16n4 → e10 → n14 → e37 → n26 → e52 → n37
n10Parking Lot Ar17n5 → e11 → n16 → e39 → n24 → e50 → n35
n11Parking Lot Br18n5 → e11 → n16 → e40 → n27 → e53 → n38
n12Holding Point Dr19n5 → e11 → n16 → e41 → n28 → e54 → n39
n13Holding Point Er20n5 → e12 → n17 → e42 → n20 → e46 → n31
n14Cafeteriar21n5 → e12 → n17 → e43 → n21 → e47 → n32
n15Holding Point Fr22n6_5 → e13 → n7 → e24 → n18 → e44 → n29
n16Holding Point Gr23n6_5 → e13 → n7 → e25 → n19 → e45 → n30
n17Holding Point Hr24n6_6 → e14 → n8 → e26 → n19 → e45 → n30
n18Building Ar25n6_6 → e14 → n8 → e27 → n20 → e46 → n31
n19Building Br26n6_4 → e15 → n9 → e28 → n18 → e44 → n29
n20Building Cr27n6_7 → e16 → n10 → e29 → n21 → e47 → n32
n21Building Dr28n6_3 → e17 → n11 → e30 → n18 → e44 → n29
n22Workshop 1r29n6_3 → e17 → n11 → e31 → n19 → e45 → n30
n23Workshop 2r30n6_2 → e18 → n12 → e32 → n25 → e51 → n36
n24Workshop 3r31n6_1 → e19 → n13 → e33 → n22 → e48 → n33
n25Workshop 4r32n6_11 → e20 → n14 → e34 → n22 → e48 → n33
n26Workshop 5r33n6_11 → e20 → n14 → e35 → n23 → e49 → n34
n27Workshop 6r34n6_11 → e20 → n14 → e36 → n25 → e51 → n36
n28Workshop 7r35n6_11 → e20 → n14 → e37 → n26 → e52 → n37
n29Building A Roomr36n6_10 → e21 → n15 → e38 → n24 → e50 → n35
n30Building B Roomr37n6_9 → e22 → n16 → e39 → n24 → e50 → n35
n31Building C Roomr38n6_9 → e22 → n16 → e40 → n27 → e53 → n38
n32Building D Roomr39n6_9 → e22 → n16 → e41 → n28 → e54 → n39
n33Workshop 1 Roomr40n6_8 → e23 → n17 → e42 → n20 → e46 → n31
n34Workshop 2 Roomr41n6_8 → e23 → n17 → e43 → n21 → e47 → n32
n35Workshop 3 Roomc1r1, r8, r5, r22, r26, r28
n36Workshop 4 Roomc2r2, r3, r9, r23, r24, r29
n37Workshop 5 Roomc3r4, r20, r25, r40
n38Workshop 6 Roomc4r6, r7, r21, r27, r41
n39Workshop 7 Roomc5r11, r13, r31, r32
e1-e54Interregional pathwaysc6r14, r33
r1n1 → e1 → n7 → e24 → n18 → e44 → n29c7r12, r17, r36, r37
r2n1 → e1 → n7 → e25 → n19 → e45 → n30c8r10, r15, r30, r34
r3n1 → e2 → n8 → e26 → n19 → e45 → n30c9r16, r35
r4n1 → e2 → n8 → e27 → n20 → e46 → n31c10r18, r38
r5n1 → e3 → n9 → e28 → n18 → e44 → n29c11r19, r39
r6n1 → e4 → n10 → e29 → n21 → e47 → n32PPSc1, c2, c3, c4, c5, c6, c7, c8, c9, c10, c11
r7n2 → e5 → n10 → e29 → n21 → e47 → n32

Appendix C

Table A3. Vulnerability Distribution of PPS.
Table A3. Vulnerability Distribution of PPS.
NumberValueNumberValueNumberValueNumberValue
n10.4n380.2e360.4r190.608
n20.6n390.4e370.8r200.526
n30.7e10.4e380.7r210.484
n40.5e20.4e390.4r220.532
n50.5e30.5e400.5r230.477
n60.5e40.5e410.7r240.502
n70.6e50.6e420.6r250.585
n80.5e60.5e430.7r260.546
n90.6e70.4e440.5r270.515
n100.5e80.5e450.6r280.498
n110.4e90.4e460.7r290.446
n120.3e100.5e470.4r300.559
n130.7e110.6e480.5r310.476
n140.8e120.5e490.3r320.504
n150.8e130.4e500.4r330.505
n160.5e140.3e510.3r340.477
n170.5e150.4e520.5r350.507
n180.5e160.5e530.6r360.453
n190.6e170.4e540.5r370.547
n200.5e180.4r10.520r380.620
n210.6e190.6r20.457r390.624
n220.4e200.7r30.493r400.584
n230.5e210.8r40.589r410.551
n240.5e220.6r50.535c10.546
n250.7e230.4r60.524c20.502
n260.5e240.8r70.548c30.589
n270.3e250.6r80.498c40.551
n280.8e260.5r90.433c50.535
n290.7e270.8r100.615c60.505
n300.6e280.3r110.535c70.547
n310.4e290.7r120.524c80.615
n320.4e300.7r130.481c90.507
n330.5e310.8r140.480c100.62
n340.8e320.6r150.443c110.624
n350.6e330.8r160.482PPS0.624
n360.6e340.4r170.509
n370.3e350.5r180.603

Appendix D

Table A4. Node/Edge simulation results.
Table A4. Node/Edge simulation results.
Node/
Edge
Successful IntrusionsFailed IntrusionsInterception ProbabilityNode
/Edge
Successful IntrusionsFailed IntrusionsInterception Probability
n1368823120.385 e43133190.505
n221278730.291 e52344740.669
n320639370.312 e64729470.667
n4225917410.435 e74482540.362
n5340515950.319 e85261600.233
n6_16563440.344 e95201550.230
n6_26363640.364 e10109111680.517
n6_312767240.362 e1111019330.459
n6_46733270.327 e126267450.543
n6_512917090.355 e133639280.719
n6_612647360.368 e146046600.522
n6_76683320.332 e153693040.452
n6_812737270.364 e162194490.672
n6_9195510450.348 e175747020.550
n6_106573430.343 e183343020.475
n6_11258214180.355 e192863700.564
n74264120.492 e20137112110.469
n87643950.341 e213053520.536
n94852180.310 e2212736820.349
n105971690.221 e23127300.000
n117672790.267 e241221080.470
n125871950.249 e25551410.719
n135582540.313 e261861780.489
n1417147480.304 e272331670.418
n155982270.275 e281293560.734
n16237400.000 e291354620.774
n179209790.516 e30972710.736
n181861620.466 e31993000.752
n192151250.368 e323432440.416
n203691120.233 e331584000.717
n212971630.354 e341103070.736
n22182860.321 e351163140.730
n2311600.000 e3634170.993
n242121600.430 e371243230.723
n252241220.353 e381564420.739
n2682420.339 e392165780.728
n273561120.239 e404683140.402
n283081620.345 e414703280.411
n29101850.457 e422482480.500
n3043320.427 e43325990.233
n3197750.436 e4418600.000
n3224100.294 e45751400.651
n3378690.469 e461721970.534
n3443210.328 e47342630.886
n3550290.367 e48147350.192
n3667540.446 e4964520.448
n3716270.628 e50791330.627
n38110550.333 e511211030.460
n39111540.327 e5243390.476
e14757500.612 e531651910.537
e25556670.546 e541651430.464
e33342750.452
Table A5. Intrusion Path simulation results.
Table A5. Intrusion Path simulation results.
Node
/Edge
Successful IntrusionsFailed IntrusionsInterception ProbabilityNode
/Edge
Successful IntrusionsFailed IntrusionsInterception
Probability
r1249760.976r22209800.98
r289920.992r2389920.992
r3149860.986r24209800.98
r4159850.985r25309700.97
r5229780.978r26329680.968
r649960.996r2729980.998
r779930.993r28239770.977
r8189820.982r29179830.983
r9159850.985r30329680.968
r10379630.963r31309700.97
r11529480.948r32239770.977
r12169840.984r33189820.982
r13179830.983r3439970.997
r14189820.982r35239770.977
r1549960.996r3679930.993
r16159850.985r37139870.987
r17109900.99r38599410.941
r18389620.962r39639370.937
r19349660.966r40229780.978
r20269740.974r41209800.98
r21139870.987

References

  1. Zhang, J.; Liu, J.; Liu, Y.; Wang, Z.; Chen, H.; Wang, B.; Liu, X. Using 3D model and simulation to support the force-on-force test of physical protection system. IEEE Access 2021, 9, 63833–63840. [Google Scholar] [CrossRef]
  2. Zeng, T.; Yang, X.; Wan, Y.; Mao, Y.; Liu, Z. Effectiveness assessment of improvement measures in physical protection system monitoring center. Kerntechnik 2021, 86, 33–38. [Google Scholar] [CrossRef]
  3. Garcia, M.L. Vulnerability Assessment of Physical Protection Systems; Elsevier: Amsterdam, The Netherlands, 2005. [Google Scholar]
  4. Garcia, M.L. Design and Evaluation of Physical Protection Systems; Elsevier: Amsterdam, The Netherlands, 2007. [Google Scholar]
  5. Vintr, Z.; Vintr, M.; Malach, J. Evaluation of physical protection system effectiveness. In Proceedings of the 2012 IEEE International Carnahan Conference on Security Technology (ICCST), Newton, MA, USA, 15–18 October 2012; pp. 15–21. [Google Scholar]
  6. Drago, A.; Marrone, S.; Mazzocca, N.; Nardone, R.; Tedesco, A.; Vittorini, V. A model-driven approach for vulnerability evaluation of modern physical protection systems. Softw. Syst. Model. 2019, 18, 523–556. [Google Scholar] [CrossRef]
  7. Čakija, D.; Ban, Ž.; Golub, M.; Čakija, D. Optimizing physical protection system using domain experienced exploration method. Autom. Časopis Autom. Mjer. Elektron. Računarstvo Komun. 2020, 61, 207–218. [Google Scholar] [CrossRef]
  8. Moo, J.H.; Chirayath, S.S.; Cho, S.G. Physical protection system vulnerability assessment of a small nuclear research reactor due to TNT-shaped charge impact on its reinforced concrete wall. Nucl. Eng. Technol. 2022, 54, 2135–2146. [Google Scholar] [CrossRef]
  9. Gregoire, O. The application of defence in depth in nuclear security. In Proceedings of the 42nd Annual CNS Conference and 47th CNS/CNA Student Conference: Shifting the Paradigm of Thought, Saint John, NB, Canada, 4–7 June 2023; Canadian Nuclear Society: Toronto, ON, Canada, 2023; pp. 4–8. [Google Scholar]
  10. Kapusta, J.; Bauer, W.; Baranowski, J. Evaluation of the Effectiveness Of Physical Protection Systems with Consideration of its Cyber-Resilience. In Proceedings of the 2023 27th International Conference on Methods and Models in Automation and Robotics (MMAR), Międzyzdroje, Poland, 22–25 August 2023; pp. 457–461. [Google Scholar]
  11. Yaseen, A.T.; Jarry, A.M. Designing a Physical Protection System for a Nuclear or Radiological Site or Facility (Threat Analysis and Evaluation). In Proceedings of the 16th Arab Conference on the Peaceful Uses of Atomic Energy, Amman, Jordan, 15–19 December 2024. [Google Scholar]
  12. Winblad, A.E. The SAVI vulnerability assessment model. Nucl. Mater. Manag. 1987, 16, 24–28. [Google Scholar]
  13. Snell, M.K. Multipath Very-Simplified Estimate of Adversary Sequence Interruption v. 2.1; No. MP VEASI; 005477IBMPC00; Sandia National Lab.(SNL-NM): Albuquerque, NM, USA, 2017.
  14. O’Connor, S.L.; Whitehead, D.W.; Potter, C.S., III. Nuclear Power Plant Security Assessment Technical Manual; No. SAND2007-5591; Sandia National Laboratories (SNL): Albuquerque, NM, USA; Livermore, CA, USA, 2007.
  15. Andiwijayakusuma, D.; Mardhi, A.; Asmoro, T.; Setiadipura, T.; Purqon, A.; Su’ud, Z. Physical protection system effectiveness calculation in nuclear reactor facility using EASI code: Case study sabotage scenario. J. Phys. Conf. Ser. 2021, 2072, 012010. [Google Scholar] [CrossRef]
  16. Zou, B.; Yang, M.; Zhang, Y.; Benjamin, E.R.; Tan, K.; Wu, W.; Yoshikawa, H. Evaluation of vulnerable path: Using heuristic path-finding algorithm in physical protection system of nuclear power plant. Int. J. Crit. Infrastruct. Prot. 2018, 23, 90–99. [Google Scholar] [CrossRef]
  17. Yang, J.; Wang, J.; Wei, G.; Yang, M.; Lu, H. An adaptive probabilistic mapping matrix search algorithm for vulnerability analysis of PPS. Ann. Nucl. Energy 2019, 131, 433–442. [Google Scholar] [CrossRef]
  18. Jiwei, Z.; Shunlong, J.; Jian, L.; Zhang, L.; Huaping, C.; Xiaofeng, L. Optimization of communication probability in effectiveness evaluation of physical protection system. IEEE Access 2020, 8, 228199–228205. [Google Scholar] [CrossRef]
  19. Wadoud, A.A.; Alhawsawi, A.M.; Ghandourah, E.; Abdel-Rahman, M.A. A detection and defense security system design for nuclear waste storage against stealth terrorists attack. Kerntechnik 2024, 89, 426–437. [Google Scholar] [CrossRef]
  20. Wadoud, A.A.; Saleh, A.A.; Abdel-Rahman, M.A. Risk analysis and protection in case of intrusion of nuclear facilities. Kerntechnik 2025, 90, 217–230. [Google Scholar] [CrossRef]
  21. Li, A.; Deng, Y. A 3D most vulnerable path search method for physical protection systems based on the EASI model. IEEE Access 2025, 13, 37457–37466. [Google Scholar] [CrossRef]
  22. Artime, O.; Grassia, M.; De Domenico, M.; Gleeson, J.P.; Makse, H.A.; Mangioni, G.; Perc, M.; Radicchi, F. Robustness and resilience of complex networks. Nat. Rev. Phys. 2024, 6, 114–131. [Google Scholar] [CrossRef]
  23. Yu, X.; Wu, Y.; Meng, F.; Zhou, X.; Liu, S.; Huang, Y.; Wu, X. A review of graph and complex network theory in water distribution networks: Mathematical foundation, application and prospects. Water Res. 2024, 253, 121238. [Google Scholar] [CrossRef] [PubMed]
  24. Tang, Y.; Dai, G.; Zhou, Y.; Huang, Y.; Zhou, D. Conflicting evidence fusion using a correlation coefficient-based approach in complex network. Chaos Solitons Fractals 2023, 176, 114087. [Google Scholar] [CrossRef]
  25. Lü, J.; Wen, G.; Lu, R.; Wang, Y.; Zhang, S. Networked knowledge and complex networks: An engineering view. IEEE/CAA J. Autom. Sin. 2022, 9, 1366–1383. [Google Scholar] [CrossRef]
  26. Lin, J.; Ban, Y. Complex network topology of transportation systems. Transp. Rev. 2013, 33, 658–685. [Google Scholar] [CrossRef]
  27. Porta, S.; Latora, V.; Crucitti, P. The network analysis of urban streets: A primal approach. In Environment and Planning; SAGE Publications Ltd.: London, UK, 2012; pp. 247–276. [Google Scholar]
  28. Li, J.J. Research on Construction Method and Application of Complex Public Transport Network Model. Master’s Thesis, Dalian Maritime University, Dalian, China, 2023. [Google Scholar] [CrossRef]
  29. Börner, K.; Sanyal, S.; Vespignani, A. Network science. Annu. Rev. Inf. Sci. Technol. 2007, 41, 537–607. [Google Scholar] [CrossRef]
  30. Duan, J.Y.; Zheng, H.D. Vulnerability analysis method for complex networks based on node importance. Control Eng. China 2020, 4, 692–696. [Google Scholar] [CrossRef]
  31. Kabir, S.; Papadopoulos, Y. Applications of Bayesian networks and Petri nets in safety, reliability, and risk assessments: A review. Saf. Sci. 2019, 115, 154–175. [Google Scholar] [CrossRef]
  32. Guo, Y.; Meng, X.; Wang, D.; Meng, T.; Liu, S.; He, R. Comprehensive risk evaluation of long-distance oil and gas transportation pipelines using a fuzzy Petri net model. J. Nat. Gas. Sci. Eng. 2016, 33, 18–29. [Google Scholar] [CrossRef]
  33. Zhou, J.; Reniers, G.; Zhang, L. A weighted fuzzy Petri-net based approach for security risk assessment in the chemical industry. Chem. Eng. Sci. 2017, 174, 136–145. [Google Scholar] [CrossRef]
  34. Wang, X.; Lu, F.; Zhou, M.; Zeng, Q. A synergy-effect-incorporated fuzzy Petri net modeling paradigm with application in risk assessment. Expert. Syst. Appl. 2022, 199, 117037. [Google Scholar] [CrossRef]
  35. Lin, J.; Li, Q.; Wang, Y. Comprehensive evaluation of intrinsic safety of railway facilities and equipment based on improved cloud model-fuzzy Petri net. Proc. Inst. Mech. Eng. Part O J. Risk Reliab. 2025, 239, 298–309. [Google Scholar] [CrossRef]
  36. Yang, B.; Zhang, X.; Liu, Y.; Gao, Z.; Ye, M. Airspace Safety Assessment and Risk Estimation based on the Fuzzy Petri Net Model with Multi-Risk Factor Analysis. Transp. Res. Rec. 2024, 2679, 718–732. [Google Scholar] [CrossRef]
  37. Liu, H.C.; Liu, L.; Lin, Q.L.; Liu, N. Knowledge acquisition and representation using fuzzy evidential reasoning and dynamic adaptive fuzzy Petri nets. IEEE Trans. Cybern. 2012, 43, 1059–1072. [Google Scholar] [CrossRef]
  38. Jiang, W.; Zhou, K.Q.; Sarkheyli-Hägele, A.; Zain, A.M. Modeling, reasoning, and application of fuzzy Petri net model: A survey. Artif. Intell. Rev. 2022, 55, 6567–6605. [Google Scholar] [CrossRef]
  39. Xu, X.G.; Shi, H.; Xu, D.H.; Liu, H.C. Picture fuzzy Petri nets for knowledge representation and acquisition in considering conflicting opinions. Appl. Sci. 2019, 9, 983. [Google Scholar] [CrossRef]
  40. GB 50348-2018; Technical Standard for Security Engineering. State Administration for Market Regulation, Standardization Administration of China: Beijing, China, 2018.
  41. GJB 7674-2012; Guide for Inspection of Physical Protection of Military Nuclear Materials. Equipment Development Department of the Central Military Commission: Beijing, China, 2012.
  42. GJB 6118-2007; Guide for Access Control of Physical Protection System of Military Nuclear Material. Equipment Development Department of the Central Military Commission: Beijing, China, 2007.
  43. GAT 1093-2013; Technical Requirements for Face Recognition System For Access Control. Ministry of Public Security of the People’s Republic of China: Beijing, China, 2013.
  44. GAT 1399.1-2017; Video and Image Analysis System for Public Security—Part 1: General Technical Requirements. Ministry of Public Security of the People’s Republic of China: Beijing, China, 2017.
  45. GAT 1399.2-2017; Video and Image Analysis System for Public Security—Part 2: Technical Specifications for Analysis and Description of Video and Image Content. Ministry of Public Security of the People’s Republic of China: Beijing, China, 2017.
  46. GAT 992-2012; Technical Requirements for Access Control Devices in Parking Lots. Ministry of Public Security of the People’s Republic of China: Beijing, China, 2012.
Figure 1. Example of physical protection system modeling under Space L rule. (a) shows a schematic diagram of a physical protection system (PPS), where red lines indicate inter-zone connecting paths. As illustrated in (a), nodes n1 and n2 represent vehicle and pedestrian access points on the perimeter, providing access to n3 (an outdoor area within the PPS) and, subsequently, to n4 (internal building passageways), ultimately leading to zones n5 and n6 (rooms housing critical assets). (b) demonstrates its complex network representation, where directional edges encode reachability relationships between zones.
Figure 1. Example of physical protection system modeling under Space L rule. (a) shows a schematic diagram of a physical protection system (PPS), where red lines indicate inter-zone connecting paths. As illustrated in (a), nodes n1 and n2 represent vehicle and pedestrian access points on the perimeter, providing access to n3 (an outdoor area within the PPS) and, subsequently, to n4 (internal building passageways), ultimately leading to zones n5 and n6 (rooms housing critical assets). (b) demonstrates its complex network representation, where directional edges encode reachability relationships between zones.
Applsci 15 07062 g001
Figure 3. FPN model of OR fuzzy production rule.
Figure 3. FPN model of OR fuzzy production rule.
Applsci 15 07062 g003
Figure 4. Evaluation Flowchart.
Figure 4. Evaluation Flowchart.
Applsci 15 07062 g004
Figure 5. FPN corresponding to the FPR shown in Section 4.2.
Figure 5. FPN corresponding to the FPR shown in Section 4.2.
Applsci 15 07062 g005
Figure 6. Complex network diagram.
Figure 6. Complex network diagram.
Applsci 15 07062 g006
Figure 7. FPN model diagram for security system.
Figure 7. FPN model diagram for security system.
Applsci 15 07062 g007
Figure 8. Structure of an organization’s PPS. The PPS layout is shown in (a), a 3D simulation view in (b), and the intrusion behavior workflow in (c).
Figure 8. Structure of an organization’s PPS. The PPS layout is shown in (a), a 3D simulation view in (b), and the intrusion behavior workflow in (c).
Applsci 15 07062 g008
Figure 9. Complex network diagram of an organization’s PPS. The PPS’s complex network diagram is shown in Figure 9, where dotted lines indicate underpasses.
Figure 9. Complex network diagram of an organization’s PPS. The PPS’s complex network diagram is shown in Figure 9, where dotted lines indicate underpasses.
Applsci 15 07062 g009
Table 1. Intrusion path and protection chain of the PPS in Figure 1.
Table 1. Intrusion path and protection chain of the PPS in Figure 1.
Protection LevelNumberContents
intrusion pathr1n1 → e1 → n3 → e3 → n4 → e4 → n5
r2n1 → e1 → n3 → e3 → n4 → e5 → n6
r3n2 → e2 → n3 → e3 → n4 → e4 → n5
r4n2 → e2 → n3 → e3 → n4 → e5 → n6
protection chainc1r1, r3
c2r2, r4
Table 2. Correspondence between places and propositions of the PPS in Figure 1.
Table 2. Correspondence between places and propositions of the PPS in Figure 1.
p/dPropositionp/dProposition
p 1 / d 1 Node n1 failure p 10 / d 10 Edge e4 failure
p 2 / d 2 Node n2 failure p 11 / d 11 Edge e5 failure
p 3 / d 3 Node n3 failure p 12 / d 12 Path r1 failure
p 4 / d 4 Node n4 failure p 13 / d 13 Path r2 failure
p 5 / d 5 Node n5 failure p 14 / d 14 Path r3 failure
p 6 / d 6 Node n6 failure p 15 / d 15 Path r4 failure
p 7 / d 7 Edge e1 failure p 16 / d 16 Chain c1 failure
p 8 / d 8 Edge e2 failure p 17 / d 17 Chain c2 failure
p 9 / d 9 Edge e3 failure p 18 / d 18 System failure
Table 3. Inference process of the PPS in Figure 1.
Table 3. Inference process of the PPS in Figure 1.
Level of InferenceContents
Node/Edge → PathIF d1 and d7 and d3 and d9 and d4 and d10 and d5 Then d12
IF d1 and d7 and d3 and d9 and d4 and d11 and d6 Then d13
IF d2 and d8 and d3 and d9 and d4 and d10 and d5 Then d14
IF d2 and d8 and d3 and d9 and d4 and d11 and d6 Then d15
Path → ChainIF d12 or d14 Then d16
IF d13 or d15 Then d17
Chain → SystemIF d16 and d17 Then d18
Table 4. Vulnerability ratings.
Table 4. Vulnerability ratings.
mnVulnerabilityRecommended Action
[0, 0.2)LowMaintain operations
[0.2, 0.4)Moderate-LowImplement risk mitigation
[0.4, 0.6)MediumSchedule urgent mitigation
[0.6, 0.8)HighImmediate remediation required
[0.8, 1]CriticalCease operations; emergency response
Table 5. Component areas of the example PPS.
Table 5. Component areas of the example PPS.
NumberZoneNumberZone
n1Personnel access pointn6Building A
n2Vehicle passagen7Building B
n3Perimeter fencen8Archive room
n4Parking lotn9Data center
n5Open plaza
Table 6. Intrusion path and protection chain of the example PPS.
Table 6. Intrusion path and protection chain of the example PPS.
NumberPath/Protection ChainNumberPath/Protection Chain
r1n1 → e1 → n4 → e7 → n6 → e11 → n8r8n2 → e4 → n5 → e10 → n7 → e12 → n9
r2n1 → e1 → n4 → e8 → n7 → e12 → n9r9n3 → e5 → n4 → e7 → n6 → e11 → n8
r3n1 → e2 → n5 → e9 → n6 → e11 → n8r10n3 → e5 → n4 → e8 → n7 → e12 → n9
r4n1 → e2 → n5 → e10 → n7 → e12 → n9r11n3 → e6 → n5 → e9 → n6 → e11 → n8
r5n2 → e3 → n4 → e7 → n6 → e11 → n8r12n3 → e6 → n5 → e10 → n7 → e12 → n9
r6n2 → e3 → n4 → e8 → n7 → e12 → n9c1r1, r3, r5, r7, r9, r11
r7n2 → e4 → n5 → e9 → n6 → e11 → n8c2r2, r4, r6, r8, r10, r12
Table 7. Places and vulnerability propositions.
Table 7. Places and vulnerability propositions.
p/dPropositionp/dProposition
p 1 / d 1 Node n 1 failure p 19 / d 19 Edge   e 9 failure
p 2 / d 2 Node   n 2 failure p 20 / d 20 Edge   e 10 failure
p 3 / d 3 Node   n 3 failure p 21 / d 21 Edge   e 11 failure
p 4 / d 4 Node   n 4 failure p 22 / d 22 Path   r 1 failure
p 5 / d 5 Node   n 5 failure p 23 / d 23 Path   r 2 failure
p 6 / d 6 Node   n 6 failure p 24 / d 24 Path   r 3 failure
p 7 / d 7 Node   n 7 failure p 25 / d 25 Path   r 4 failure
p 8 / d 8 Node   n 8 failure p 26 / d 26 Path   r 5 failure
p 9 / d 9 Node   n 9 failure p 27 / d 27 Path   r 6 failure
p 10 / d 10 Edge   e 1 failure p 28 / d 28 Path   r 7 failure
p 11 / d 11 Edge   e 2 failure p 29 / d 29 Path   r 8 failure
p 12 / d 12 Edge   e 3 failure p 30 / d 30 Path   r 9 failure
p 13 / d 13 Edge   e 4 failure p 31 / d 31 Path   r 10 failure
p 14 / d 14 Edge   e 5 failure p 32 / d 32 Path   r 11 failure
p 15 / d 15 Edge   e 6 failure p 33 / d 33 Path   r 12 failure
p 16 / d 16 Edge   e 7 failure p 34 / d 34 Chain   c 1 failure
p 17 / d 17 Edge   e 8 failure p 35 / d 35 Chain   c 2 failure
p 18 / d 18 Edge   e 9 failure p 36 / d 36 System failure
Table 8. Inference process of the example PPS.
Table 8. Inference process of the example PPS.
Level of InferenceContents
Node/Edge → PathIF d1 and d10 and d4 and d16 and d6 and d20 and d8 then d22
IF d1 and d10 and d4 and d17 and d7 and d21 and d9 then d23
IF d1 and d11 and d5 and d18 and d6 and d20 and d8 then d24
IF d1 and d11 and d5 and d19 and d7 and d21 and d9 then d25
IF d2 and d12 and d4 and d16 and d6 and d20 and d8 then d26
IF d2 and d12 and d4 and d17 and d7 and d21 and d9 then d27
IF d2 and d13 and d5 and d18 and d6 and d20 and d8 then d28
IF d2 and d13 and d5 and d19 and d7 and d21 and d9 then d29
IF d3 and d14 and d4 and d16 and d6 and d20 and d8 then d30
IF d3 and d14 and d4 and d17 and d7 and d21 and d9 then d31
IF d3 and d15 and d5 and d18 and d6 and d20 and d8 then d32
IF d3 and d15 and d5 and d19 and d7 and d21 and d9 then d33
Path → ChainIF d22 or d24 or d26 or d28 or d30 or d32 then d34
IF d23 or d25 or d27 or d29 or d31 or d33 then d35
Chain → SystemIF d34 or d35 then d36
Table 9. Weighting of the route protection failure input place.
Table 9. Weighting of the route protection failure input place.
w i j Value w i j Value w i j Value
w 1,1 0.111 w 2,5 0.111 w 3,9 0.111
w 4,1 0.171 w 4,5 0.171 w 4,9 0.171
w 6,1 0.152 w 6,5 0.152 w 6,9 0.152
w 8,1 0.124 w 8,5 0.124 w 8,9 0.124
w 10,1 0.141 w 12,5 0.141 w 14,9 0.141
w 16,1 0.162 w 16,5 0.162 w 16,9 0.162
w 20,1 0.138 w 20,5 0.138 w 20,9 0.138
w 1,2 0.111 w 2,6 0.111 w 3,10 0.111
w 4,2 0.171 w 4,6 0.171 w 4,10 0.171
w 7,2 0.152 w 7,6 0.152 w 7,10 0.152
w 9,2 0.124 w 9,6 0.124 w 9,10 0.124
w 10,2 0.141 w 12,6 0.141 w 14,10 0.141
w 17,2 0.162 w 17,6 0.162 w 17,10 0.162
w 21,2 0.138 w 21,6 0.138 w 21,10 0.138
w 1,3 0.111 w 2,7 0.111 w 3,11 0.111
w 5,3 0.171 w 5,7 0.171 w 5,11 0.171
w 6,3 0.152 w 6,7 0.152 w 6,11 0.152
w 8,3 0.124 w 8,7 0.124 w 8,11 0.124
w 11,3 0.141 w 13,7 0.141 w 15,11 0.141
w 18,3 0.162 w 18,7 0.162 w 18,11 0.162
w 20,3 0.138 w 20,7 0.138 w 20,11 0.138
w 1,4 0.111 w 2,8 0.111 w 3,12 0.111
w 5,4 0.171 w 5,8 0.171 w 5,12 0.171
w 7,4 0.152 w 7,8 0.152 w 7,12 0.152
w 9,4 0.124 w 9,8 0.124 w 9,12 0.124
w 11,4 0.141 w 13,8 0.141 w 15,12 0.141
w 19,4 0.162 w 19,8 0.162 w 19,12 0.162
w 21,4 0.138 w 21,8 0.138 w 21,12 0.138
Table 10. Truth degree of input places.
Table 10. Truth degree of input places.
PlaceTruth DegreePlaceTruth DegreePlaceTruth Degree
p 1 0.40 p 8 0.15 p 15 0.55
p 2 0.35 p 9 0.20 p 16 0.45
p 3 0.45 p 10 0.575 p 17 0.40
p 4 0.575 p 11 0.55 p 18 0.375
p 5 0.50 p 12 0.55 p 19 0.425
p 6 0.30 p 13 0.60 p 20 0.325
p 7 0.35 p 14 0.575 p 21 0.40
Table 11. Truth degree of places p22–p36.
Table 11. Truth degree of places p22–p36.
PlaceTruth DegreePlaceTruth DegreePlaceTruth Degree
p 22 0.386 p 27 0.393 p 32 0.364
p 23 0.401 p 28 0.360 p 33 0.395
p 24 0.359 p 29 0.391 p 34 0.391
p 25 0.389 p 30 0.391 p 35 0.406
p 26 0.377 p 31 0.406 p 36 0.406
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, S.; Wang, Z.; Jin, B.; Tong, X.; Jin, H. Vulnerability Assessment Framework for Physical Protection Systems Integrating Complex Networks and Fuzzy Petri Nets. Appl. Sci. 2025, 15, 7062. https://doi.org/10.3390/app15137062

AMA Style

Chen S, Wang Z, Jin B, Tong X, Jin H. Vulnerability Assessment Framework for Physical Protection Systems Integrating Complex Networks and Fuzzy Petri Nets. Applied Sciences. 2025; 15(13):7062. https://doi.org/10.3390/app15137062

Chicago/Turabian Style

Chen, Si, Ziming Wang, Bo Jin, Xin Tong, and Hua Jin. 2025. "Vulnerability Assessment Framework for Physical Protection Systems Integrating Complex Networks and Fuzzy Petri Nets" Applied Sciences 15, no. 13: 7062. https://doi.org/10.3390/app15137062

APA Style

Chen, S., Wang, Z., Jin, B., Tong, X., & Jin, H. (2025). Vulnerability Assessment Framework for Physical Protection Systems Integrating Complex Networks and Fuzzy Petri Nets. Applied Sciences, 15(13), 7062. https://doi.org/10.3390/app15137062

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop