Next Article in Journal
An Ensemble-Boosting Algorithm for Classifying Partial Discharge Defects in Electrical Assets
Previous Article in Journal
Do We Understand the Relationship between Affective Computing, Emotion and Context-Awareness?
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Survivability Analysis on a Cyber-Physical System

School of Science, East China University of Science and Technology, Shanghai 200237, China
*
Author to whom correspondence should be addressed.
Machines 2017, 5(3), 17; https://doi.org/10.3390/machines5030017
Submission received: 27 May 2017 / Revised: 14 July 2017 / Accepted: 28 July 2017 / Published: 1 August 2017
(This article belongs to the Special Issue Cyber-Physical System Cybersecurity)

Abstract

:
A cyber-physical system (CPS) is composed of interdependent physical-resource and cyber-resource networks that are tightly coupled. The malfunction of nodes in a network may trigger failures to the other network and further cause cascading failures, which would potentially lead to the complete collapse of the entire system. The number and communication of operating nodes at stable state are closely related to the initial failure nodes and the topology of the network system. To address this issue, this paper studies the survivability of CPS in the presence of initial failure nodes, proposes (m, k)survivability, which is defined as the probability that at least k nodes are still working in CPS after m nodes are attacked, and discusses the problem of cascading failure based on reliability (CFR). Further, we propose an algorithm to calculate (m, k)survivability and find that the minimum survivability of system with regular allocation strategy decreases with k for a fixed m, and the proportion of initial failure node groups that cause the system to completely fragment increases with m. The simulation shows the properties and the result of CFR of the system with 12 nodes.

1. Introduction

A CPS consists of a physical network and a cyber network that are tightly coupled together and has been widely applied in many fields. Smart grid is a typical application of CPS. A power grid is covered on the computer network to realize the automation of the power grid and improve efficiency. The most striking feature of CPS is interdependency. Although interdependent networks make the system more intelligent and complex, Vespignani [1] showed that the system has greater vulnerability than a single network when facing attacks, failures, and natural disasters. A random removal of a small fraction of nodes from one network can cause an iterative cascade of failures in interdependent network and further lead to a disastrous impact on the overall cyber-physical system, such as 2003 blackout in the Northeastern United States and Southeastern Canada [2], and the electrical blackout that cause many losses in Italy on 28 September 2003 [3]. The cascading effect is one of the important characteristics of CPS. In the case of initial random node failures, cascading failures sometimes may not trigger complete collapse of CPS, resulting in several surviving nodes at steady state, such as micro grids. The network performance of surviving nodes is also an important issue to be addressed. In engineering, survivability is the quantified ability of a system, subsystem, equipment, process, or procedure to continue to function during and after a natural or man-made disturbance [4]. For CPS, the steady state is absolutely a subsystem of CPS and obtained after disturbance, i.e., random node failures. Survivability is consistent with the issue we address. Further, we focus on the communication ability of surviving nodes at steady state. Fortunately, reliability is an effective parameter to evaluate network performance and has been utilized in CPS [5]. In this article, we study the survivability of CPS based on reliability. For convenience, some definitions are listed as follows:
Definition 1 [6].
Suppose the edges of graph G never fail and the nodes fail independently with probability 1 − p, then the reliability of graph G is
R ( G ) = r = 1 n S r ( G ) P r ( 1 p ) n - r
where Sr(G) is the number of connected induced subgraphs of graph G that contain exactly r nodes.
All-terminal reliability with node failures describes the connectivity of all nodes in one network. Based on all-terminal reliability theory, Zhang et al. [5] gave k-reliability (denoted by Rk) which was defined as the probability that at least k surviving nodes of set V span an operating subgraph and defined cascading failures on reliability (CFR).
Definition 2 [5].
CFR, given constants k and R0, if the number of surviving nodes at steady state in the case of random node failures is smaller than k or the k-reliability of steady state Rk < R0, then random node failures have caused CFR of the CPS.
The definition is based on all-terminal reliability with node failures. For interdependence, cascading failures may occur after some nodes are attacked. All-terminal reliability with node failures can describe the connectivity of two networks. Therefore, it can represent the ability that the system can meet the required level of service when a certain number of nodes fail.
Based on these definitions, we propose (m, k)—survivability, which is defined as the probability that at least k nodes are still working in CPS after m nodes are attacked, and discuss the problem of cascading failure based on reliability. The proposed (m, k)—survivability reflects the connectivity of nodes in networks and illustrates the probability that the system meets the service requirements. Further, we propose an algorithm to calculate (m, k)—survivability and find that the minimum survivability of the system with a regular allocation strategy decreases with k for a fixed m, and the proportion of initial failure node groups that cause a system to fragment increases with m.
The rest of this paper is organized as follows. Section 2 shows background and related work. In Section 3, we introduce the definition of (m, k)—survivability and analyze cascading failures. Section 4 gives simulation and experiment to survivability of a CPS. The analysis and conclusion appear in Section 5 and Section 6, respectively.

2. Background and Related Work

The fragility of interdependent networks and designation of robust networks have been hot spots for CPS. Buldrev et al. [3] put forward a “one-to-one correspondence” model for interdependent networks and studied its robustness. They found that a random removal of a small fraction of nodes from one network can cause cascading failures and even complete fragmentation of interdependent networks. In order to estimate the robustness of the system, they calculated the size of functioning parts for each stage of cascading failures. Moreover, they presented a critical threshold pc and showed that if the fraction of node failures 1 − p in one network satisfies pcp, the two networks will completely fragment. Some literature [3] has received widespread attention and has aroused the interest of researchers in interdependent networks. Further research appears in different directions [7,8,9]. For instance, Buldyrev et al. [7] also considered the model in the case of “one-to-one correspondence,” but the difference from [3] is that mutually dependent nodes are assumed to have the same intraedges in their own networks. Shao et al. [9] considered multiple support-dependence relations between two coupled networks. They used a model where there existed some autonomously nodes in one network, meaning that these nodes can operate without supporting nodes from the other network. Furthermore, Yagan et al. [10] described the dynamic characteristics of cascading failures in the system where the topology of each individual network is unknown and showed that the regular allocation strategy has better robustness compared with all possible strategies. The above literature considers different CPS models and studies the robustness of CPS.
In engineering, survivability concepts appear in many other networks or research areas. For example, Neumann et al. [11] proposed the survivability definition of the network system for the first time. In a communication system, survivability is seen as the probability that its service is still available when the system is damaged or fails. Deutsh et al. [12] defined survivability in the context of software engineering, even if some parts of the system do not work and the basic services are reachable. Ellison et al. [13] discussed that survivability is the ability of the system to complete the task in time facing attacks, failures, and contingencies. Moitra et al. [14] argued that survivability is the ability of the system to resist the attack and to provide certain services after being attacked. In a wireless network, Panirahi [15] defined survivability as the ability of the system to complete its tasks in time for attacks, failures, and contingencies. Levitin et al. [16] argued that the survivability of information systems is the ability to maintain a working state when a fault event occurs. In the above article, the authors give different descriptive definitions of survivability. On the other hand, the study of survivability varies with researchers’ fields. Liang et al. [17] studied the survivability of time-varying networks and proposed a new survivability framework for time-varying networks. Wan et al. [18] researched the node survivability of a sensor network and considered how to schedule each sensor between active and sleep modes to maximize the network lifetime while meeting survival requirements. Petridou et al. [19] put forward a quantitative analysis for evaluating survivability of wireless sensor networks and defined four measures of network survivability: the frequency of failures, the data loss, the delay, and the compromised data under three different type of failures, namely, link, node, attack failures.
In the model of network reliability, K-terminal network reliability is the probability that Gk is connected, where Gk is a subgraph with specified k nodes [20]. Two nodes are connected to each other if there is a path between them in the network [21]. The following literature provides results ideal for calculating network reliability. Moskowitz [22] investigated a network model where nodes never fail, but each edge fails independently with probability. A factoring algorithm is put forward to calculate the reliability of network. On the basis of this result, Carlier et al. [23] applied a factoring algorithm and reductions to the network model in which vertices and edges may fail. As the calculation of network reliability is an NP-hard problem, the method of network reduction may reduce computation time. On the other hand, many studies have concentrated on approximating reliability. A discrete and dynamic model is defined to evaluate the reliability of telecommunication networks [24] and in this case, the set of terminals K of network is specified arbitrarily. Three methods were presented and they showed that failures have negative impact on service quality offered by network. Ayoub et al. [25] developed an algorithm that uses Monte–Carlo simulation and Breadth–First search to calculate the reliability of telecommunication networks. An exact reliability estimate was found by them in feasible and practical time after a sufficient number of simulations. The above researches on network reliability do not restrict the length of the path. Petingi et al. [26] proposed a polynomial-time algorithm for detecting and deleting irrelevant edges that make no difference to the source-to-terminal diameter constrained network reliability. They integrated this algorithm within an exact recursive factorization approach based upon Moskowitz’s edge decomposition, conducted on different real-world topologies and confirmed a substantial computational gain.

3. Survivability of Cyber-Physical Systems

A cyber-physical system is made up of two interacting networks, say, Networks A and B, both with N nodes, so the total number of nodes is n = 2N. We denote the node sets of A and B by 1, 2, , N and N + 1, N + 2, , n respectively. We call edges that connect different networks as interedges and those in the same network as intraedges. A node is functioning only if there is at least one interedge and one intraedge. We are concerned with whetheer the system exists functioning giant component [10] or completely separated when cascading failures occur.
Definition 3.
If m nodes are attacked, the probability that at least k nodes still operate is called (m, k)—survivability, denoted by S (m, k).
Discussion: Definition 3 does not indicate where the m nodes are located and thus imply the best-case and worst-case survivability. The parameter m is the number of failed nodes in the system, and the parameter k indexes the communication quality of surviving nodes with node failures. Actually, S (m, k) with all possible m and k is a matrix.
For any 1 ≤ kn, 1 ≤ mn,
S ( m , k ) : = [ S 11 S 12 S 13 S 1 , n 1 S 1 n S 21 S 22 S 23 S 2 , n 1 S 2 n S 31 S 32 S 33 S 3 , n 1 S 3 n S n 1 , 1 S n 1 , 2 S n 1 , 3 S n 1 , n 1 S n 1 , n S n 1 S n 2 S n 3 S n , n 1 S n n ]
where Sij denotes the probability that there has at least j nodes are still working after i nodes are attacked. Obviously, the locations of node failures may cause different steady state. Thus, Sij is a vector where the elements denote the survivability after i nodes in different positions are invalidated. That is, Sij = {Sx (i, j) | 1 ≤ xCni}. The survivability Sx (i, j) is stated mathematically as follows:
S x ( i , j ) = r = j | V x | S r ( G ) P r ( 1 p ) | V x | r
where 1 ≤ xCni, Sx (i, j) is the survivability of system after the xth combination of i nodes are invalidated. |Vx| is the number of nodes in the steady state.
We propose an Algorithm 1 based on network reliability method in the presence of initial node failures.
Algorithm 1: (m, k)—survivability in G = (V, E)
Input: A connected graph G = (V, E) with the node set V, edge set E, and node probability p require the number of normal work k and failure nodes m.
Output: (m, k)—survivability S (m, k) of G = (V, E).
Step 0. Let M = ∅.
Step 1. Choose all the endpoint groups with m numbers, and store them into the collection M.
Step 2. For each group v M, obtain the adjacency matrix A of steady state.
Step 3. Let s = 0, r = k, S = ∅, Sr = 0.
Step 4. calculate the node number of steady state n1 for each terminal nodes groups, find all the connected endpoint sets of r, and stored in the collection S.
Step 5. Sr = |S|.
Step 6. R = R + Sr * pr * (1 − p )n1-r.
Step 7. r = r + 1, S = ∅, go to Step 4.
The complexity of computation: First step, choosing all groups is based on permutation and combination theory and belongs to the NP-hard problem. That is, for a given m, we need to choose ( n m ) = n ! ( n m ) ! m ! groups of nodes. For example, in Figure 1, i = 1 and j = 2.
Then, S (1,2) = {Sx (1,2) | 1 ≤ x≤ 8}. According to Equation (2), we can obtain
S (1,2) = {0.9898, 0.9950, 0.9979, 0.9973, 0.9877, 0.9877, 0.9869, 0.9885}.
Especially, if the indices i and j satisfy i + j > n, then the corresponding elements of the matrix are zero, and the actual situation means no surviving nodes. Therefore, the matrix can be written as
S ( m , k ) = [ S 11 S 12 S 13 S 1 , n 1 0 S 21 S 22 S 23 0 0 S 31 S 32 S 33 0 0 S n 1 , 1 0 0 0 0 0 0 0 0 0 ] .
In order to explore the survivability of CPS, we analyze the nonzero elements in the matrix.
For any i and j, Sij is a vector of length Cni. We use S ij to denote the average of Sij. The corresponding matrix is
S m k = [ S 11 S 12 S 13 S 1 , n 1 0 S 21 S 22 S 23 0 0 S 31 S 32 S 33 0 0 S n 1 , 1 0 0 0 0 0 0 0 0 0 ]
An average is a measure of the trend in a set of data sets. Through the above matrix, we can get the average survival level of the system for different m- and k-values. If the average value is large, it shows that the system has strong survivability when m nodes are attacked. Otherwise, it has weak survivability.
For the interdependent network, whether the system is still to provide a certain service after some nodes are attacked is concerned problem. Thus, we give the following definition.
Definition 4.
Given a constant R0, S (m, k) is associated with a pair of (m, k), 1 ≤ i ≤ Cnm,
(1)
If max Si (m, k) < R0, we say the cyber-physical system is not (m, k)—survivable and has occurred cascading failures, denoted by (m, k)—CF.
(2)
If min Si (m, k) > R0, the cyber-physical system is robust (m, k)—survivable, denoted by (m, k)—RS.
(3)
If min Si (m, k) < R0 < max Si (m, k), let Ω1(m, k) denotes the set of the node groups that let Si (m, k) < R0 hold. The node groups in Ω2(m, k) satisfy Si (m, k) > R0. | Ω1(m, k) | and | Ω2(m, k) | denote the number of node groups, respectively. If | Ω1(m, k) | ≥ | Ω2(m, k) |, we say the system is (m, k)—frail, denoted by (m, k)—FR. If | Ω1(m, k) | < | Ω2(m, k) |, the system is weak (m, k)—survivable, denoted by (m, k)—WS.
We consider a critical value to determine whether node-attacks cause cascading failures. Different from [5], we require the maximum, minimum survivability, and the number of node groups that are less or more than R0. The situations where k = 0 or R0 = 1 are specifically discussed in [2], and situation k = |V| indicates the all-terminal reliability of the system. |V| denotes the number of nodes at steady state. The value of R0 is related to m and k.
For example, in Figure 1, R0 = 0.98, and min S (1,2) > R0, then the system is (1,2)—RS, max S (1,5) = 0.9743 < R0 = 0.98, so the system is (1,5)—CF. | Ω1(2,3) | = 9 < | Ω2(2,3) | = 21, so the system is (2,3)—WS. Given an R0 = 0.95, | Ω1(2,4) | = 18 > | Ω2(2,4) | = 10, so the system is (2,4)—FR.
The regular allocation strategy is to allocate the same number of bidirectional inter-links to each node of the system. We study the systems with regular allocation strategy and have the following results.
Proposition 1.
For a fixed m, the survivability of CPS decreases monotonously with k for the same locations.
Proof. 
Assume that the xth combination of m nodes are attacked, the number of nodes in steady state is |Vx|. For any 1 ≤ k ≤ |Vx|, 1 ≤ x ≤ Cnm.
S x ( m , k ) = r = k | V x | S r ( G ) p r ( 1 p ) | V x | r = r = k + 1 | V x | S r ( G ) p r ( 1 p ) | V x | r + S k ( G ) p k ( 1 p ) | V x | k S x ( m , k + 1 ) .
For example, in Figure 1a, m = 1 and 1 ≤ k ≤ 7, so
S4(1, k) = {0.9973,0.9973,0.9972,0.9953,0.9743,0.8503,0.4783}.
Therefore, the survivability of CPS decreases monotonously with k at the same position.
Proposition 2.
The survivability of a graph G = (V, E) is not less than that of its subgraphs if same locations are attacked.
Proof. 
Assume that G* = (V*, E*) is a subgraph of G = (V, E), where V* V, E* E. |V*x| and |Vx| denote the number of nodes in steady state after the xth combination of m nodes are attacked and |V*x|<|Vx|.
First, if |V*| ≤ m, then the inequality is satisfied.
If |V*| > m and k < |V*x|, Ek denotes the events that k nodes work after m nodes are attacked. Hence, the survivability of G can be calculated by
Sx(m, k) = P(EkEk+1 ∪ ⋯ ∪ E|Vx|).
The survivability of subgraph G* can be calculated by
S*x(m, k) = P(E*kE*k+1 ∪ ⋯ ∪ E*|V*x|)
where G* = (V*, E*) is a subgraph of G = (V, E), hence {Ek , …, E|Vx|} {E*k , …, E*|V*x|}.
Let {Ek , …, E|Vx|} = {Ek , …, E|V*x|, E|V*x|+1,…, E|Vx|}, where Ek E*k,…, E|V*x| E*|V*x|.
According to the probability theory, we obtain
Si(m, k) = P(EkEk+1 ∪ ⋯ ∪ E|Vx|) = P(EkEk+1 ∪ ⋯ ∪ E|V*x|E|V*x|+1 ∪ ⋯ E|Vx|)
P(E*kE*k+1 ∪ ⋯ ∪E*|V*x|)
= S*x(m, k).
For example, Figure 2b is subgraph of (a), when same nodes are attacked, steady state of (b) is subgraph of (a). Accordingly, the survivability of (a) is better than (b).
From Propositions 1 and 2, the survivability of the system is closely related to m and k. Therefore, it is meaningful to evaluate CPS by checking m and k of the survivability.
Proposition 3.
For a fixed m, the number of initial failed node groups that provide the system with minimal survivability increases monotonically as k increases.
Proof.
According to Proposition 1, the survivability of CPS decreases monotonously with k at the same position. nk and nk+1 denote the number of initial failure node groups that provide the system with minimal survivability respectively. Nk and Nk+1 denote the set of initial failure node groups that provide the system with minimal survivability respectively. Then NkNk+1, so nknk+1.
We also study the robustness of system with regular allocation strategy. Let ns denote the number of remain nodes of system at steady state. Then, for a fixed m, ns is a vector of length Cnm. We use average number of remain nodes of ns (denoted by ANRN) to describe the robustness of entire system macroscopically. And we have follow result on robustness.
Proposition 4.
The proportion of node groups that cause the system to completely fragment increases with m.
Proof. 
Vm denote the set of node groups that cause the system to completely separate for a fixed m. Therefore, VmVm+1. According to | Vm+1|≥Cn-m1 | Vm | and Cnm+1 = m + 1 n m Cnm, we can obtain | V m | C n m | V m + 1 | C n m + 1 .

4. Simulation and Examples

In this part, we choose a CPS with a regular allocation strategy to simulate and experiment. Each network has six nodes, and each node has the same interedges that are assumed to be bidirectional. Let the reliability of each node be p = 0.9. Network topology is shown in Figure 3.
According to the definition, we obtain the following (m, k)—survivability matrix:
S ( m , k ) : = [ S 11 S 12 S 13 S 1 , 11 S 1 , 12 S 21 S 22 S 23 S 2 , 11 S 2 , 12 S 31 S 32 S 33 S 3 , 11 S 3 , 12 S 11 , 1 S 11 , 2 S 11 , 3 S 11 , 11 S 11 , 12 S 12 , 1 S 12 , 2 S 12 , 3 S 11 , 12 S 12 , 12 ]
Then, in order to analyze the survivability of this system, we need to calculate each element. First, according to the above results, if i + j > 12, Sij = 0. Therefore, we get the following simplified matrix. The corresponding average matrix is
S ( m , k ) = : [ S 11 S 12 S 13 S 1 , 11 0 S 21 S 22 S 23 0 0 S 31 S 32 S 33 0 0 S 11 , 1 0 0 0 0 0 0 0 0 0 ]     S m k = : [ S 11 S 12 S 13 S 1 , 11 0 S 21 S 22 S 23 0 0 S 31 S 32 S 33 0 0 S 11 , 1 0 0 0 0 0 0 0 0 0 ]
Next, we analyze the remain elements of the matrix. The mean and minimum value of survivability for different m- and k-values are given, and we also obtain the number of initial failure node groups that provide the system with minimal survivability. The results are as follows (Table 1):
In Table 2, we give a constant R0 for different m- and k-values to estimate the survivability of the system.
In Table 3, we give the number and proportion of node groups that cause the system to fragment and average remain nodes for any m. When m > 9, the system always collapses. Therefore, we just analyze m < 9.

5. Discussion

The average survivability can represent a variation trend of survivability of a system for different m- and k-values macroscopically. From Table 1, the mean survivability of the system decreases with the parameters k and m. When both m and k are small, the system has a strong survivability; i.e., when m nodes are attacked, the system has a great probability that k nodes are still working. It represents that the ability which the system satisfies the specified level of service is great. Otherwise, the system has weak survivability; i.e., the system has a small probability that k nodes are still working and the ability which the system satisfies the specified level of service is not good. Moreover, when m > 9, the mean survivability is always equal zero. It shows that the system always collapses as m > 9. For other values, some node groups cause the system to collapse, and the system has the best survivability after it is attacked by other node groups. The second parameter indicates that the minimum survivability decreases with k for a fixed m. That is, the minimum probability that k nodes are still functioning decreases with k when m nodes are attacked. We also find the number of initial failure node groups that provide the system with minimal survivability increase with k for a fixed m. Let p = n k / C n m if an intelligent adversary chooses some nodes to attack, we can know what the probability of getting the worst impact is. From Table 2, the survivability of the system changes as R0, m and k vary. R0 is a critical threshold to determine the impact that random attacks cause. Moreover, the system experiences cascading failure as m > 9 and R0 = 0. From Table 3, we can see that the average of the remain node decreases with m. The nodes groups that cause the system to fragment increases with m. The other two sets of data illustrate this point. The more nodes of failure there are, the less ability to reach the specified service the system will have.
For a clearer explanation of Propositions 1 and 3, see Figure 4, wherein the image of S1(1, k), S8(1, k) changes with k. The image of num changes with k for a fixed m in Figure 5.

6. Conclusions

We investigate the survivability problem of a cyber-physical system and define survivability of the cyber-physical system, namely (m, k)—survivability. By analyzing (m, k)—survivability, we find that the survivability of a system with a regular allocation strategy is not less than that of its subsystem for given node failures and for a fixed m, the number of initial failed node groups that provide the system with minimal survivability increases monotonically as k increases. We also find that the proportion of node groups that cause the system to completely fragment increases with m. Therefore, the survivability of a system is closely related to m and k. Our results are beneficial for network design. For example, the evaluation of survivability can be used to predict whether a designed network can meet given requirements and a certain level of communication quality. As for future work, we will research the survivability of a system with a random allocation strategy and a unidirectional interedge allocation strategy. Furthermore, we will investigate the relationship between threshold R0 and the network.

Acknowledgments

The authors are very grateful for the constructive comments by anonymous reviewers that made the article significantly improving.

Author Contributions

Ti Wang proposed the concepts of survivability, carried out the experiments, and finished writing; Zuyuan Zhang made some suggestions about revision of the paper; Fangming Shao provided the research topic, gave the experiment proposal, and confirmed the final revised version of the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Vespignani, A. Complex networks: The fragility of interdependency. Nature 2010, 464, 984–985. [Google Scholar] [CrossRef] [PubMed]
  2. Parshani, R.; Buldyrev, S.V.; Havlin, S. Interdependent networks: Reducing the coupling strength leads to a change from a first to second order percolation transition. Phys. Rev. Lett. 2010, 105, 048701. [Google Scholar] [CrossRef] [PubMed]
  3. Buldyrev, S.V.; Parshani, R.; Paul, G.; Stanley, H.E.; Havlin, S. Catastrophic cascade of failures in interdependent networks. Nature 2010, 464, 1025–1028. [Google Scholar] [CrossRef] [PubMed]
  4. Wikipedia. Available online: https://en.wikipedia.org/wiki/Survivability (accessed on 31 July 2017).
  5. Zhang, Z.Y.; An, W.; Shao, F.M. Cascading Failures on Reliability in Cyber-Physical System. IEEE Trans. Reliab. 2016, 65, 1745–1754. [Google Scholar] [CrossRef]
  6. Wang, Y.-Q. Nearly regular complete bipartite graphs are locally most reliable. Appl. Math. J. Chin. Univ. 2003, 18, 365–370. [Google Scholar]
  7. Buldyrev, S.V.; Shere, N.W.; Cwilich, G.A. Interdependent Networks with Identical Degrees of Mutually Dependent Nodes. Phys. Rev. E 2011, 83, 016112. [Google Scholar] [CrossRef] [PubMed]
  8. Cho, W.; Goh, K.I.; Kim, I.M. Correlated Couplings and Robustness of Coupled Networks. arXiv, 2010; arXiv:arXiv:1010.4971v1. [Google Scholar]
  9. Shao, J.; Buldyrev, S.V.; Havlin, S.; Stanley, H.E. Cascade of Failures in Coupled Network Systems with Multiple Support Dependent Relations. Phys. Rev. E. 2011, 83, 036116. [Google Scholar] [CrossRef] [PubMed]
  10. Yagan, O.; Qian, D.J.; Zhang, J.; Cochran, D. Optimal allocation of inter-connecting links in cyber-physical systems: Interdependence, cascading failures and robustness. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 1708–1720. [Google Scholar] [CrossRef]
  11. Neumann, P.G.; Barnes, A.H. Survivable Computer-Communication Systems: The Problem and Working Group Recommendations; Technical Report VAL-CE-TR-92-22; US Army Research Laboratory: Washington, DC, USA, 1993. [Google Scholar]
  12. Deutsch, M.S.; Willis, R.R. Software Quality Engineering: A Total Technical and Management Approach; Prentice-Hall: Englewood Cillfs, NJ, USA, 1988. [Google Scholar]
  13. Ellison, R.J.; Fisher, D.A.; Linger, C. Survivability: Protecting Your Critical Systems. IEEE Int. Comput. 1999, 3, 55–63. [Google Scholar] [CrossRef]
  14. Moitra, S.D.; Konda, S.L.A. Simulation Model for Managing Survivability of Network Information Systems; Technical Report CMU/SEI-2000-TR-020; Software Engineering Institute–Carnegie Mellon University: Pittsburgh, PA, USA, 2000. [Google Scholar]
  15. Panirahi, D. Survivable network design problems in wireless networks. In Proceedings of the Twenty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, San Francisco, CA, USA, 23–25 January 2011; pp. 1014–1027. [Google Scholar]
  16. Levitin, G.; Hausken, K.; Taboada, H.A.; Coit, D.W. Survivability vs. security in information systems. Reliab. Eng. Syst. Saf. 2012, 100, 19–27. [Google Scholar] [CrossRef]
  17. Liang, Q.; Modiano, E. Survivability in Time-varying Networks. IEEE Trans. Mob. Comput. 2016. [Google Scholar] [CrossRef]
  18. Wan, X.; Wu, J.; Shen, X. Maximal Lifetime Scheduling for Roadside Sensor Networks With Survivability k. IEEE Trans. Veh. Technol. 2015, 64, 5300–5313. [Google Scholar] [CrossRef]
  19. Petridou, S.; Basagiannis, S.; Roumeliotis, M. Survivability Analysis Using Probabilistic Model Checking: A Study on Wireless Sensor Networks. IEEE Syst. J. 2013, 7, 4–12. [Google Scholar] [CrossRef]
  20. Wood, R.K. Factoring algorithms for computing K-terminal network reliability. IEEE Trans. Reliab. 1986, R-35, 269–278. [Google Scholar] [CrossRef]
  21. Bollob´as, B. Random Graphs. Cambridge Studies in Advanced Math; Cambridge University Press: Cambridge, UK, 2001. [Google Scholar]
  22. Moskowitz, F. The analysis of redundancy networks. AIEE Trans. Commun. Electron. 1958, 39, 627–632. [Google Scholar] [CrossRef]
  23. Carlier, J.; Theologou, O. Factoring & reductions for networks with imperfect vertices. IEEE Trans. Reliab. 1991, 40, 210–217. [Google Scholar]
  24. Adjabi, S.; Bouchama, K. K-terminal reliability evaluation of a telecommunications network represented by a discret and a dynamic model. Int. J. Oper. Res. 2011, 8, 34–43. [Google Scholar]
  25. Ayoub, J.N.; Saafm, W.H.; Kahhaleh, B.Z. K-terminal reliability of communication network. In Proceedings of the 7th IEEE International Conference on Electronics, Circuits and Systems, Jounieh, Lebanon, 17–20 December 2000; Volume 1, pp. 374–377. [Google Scholar]
  26. Cancela, H.; Petingi, L.A. Polynomial-time topological reductions that preserve the diameter constrained reliability of a communication network. IEEE Trans. Reliab. 2011, 60, 845–851. [Google Scholar] [CrossRef]
Figure 1. A CPS with 8 nodes.
Figure 1. A CPS with 8 nodes.
Machines 05 00017 g001
Figure 2. (a) is a CPS with 10 nodes and (b) is its subgraph.
Figure 2. (a) is a CPS with 10 nodes and (b) is its subgraph.
Machines 05 00017 g002
Figure 3. Instance with n = 12 nodes for survivability where Networks A and B have both six nodes.
Figure 3. Instance with n = 12 nodes for survivability where Networks A and B have both six nodes.
Machines 05 00017 g003
Figure 4. The image of (a) S1(1, k); (b) S8(1, k) with different k-values.
Figure 4. The image of (a) S1(1, k); (b) S8(1, k) with different k-values.
Machines 05 00017 g004
Figure 5. The image of num with different k-values.
Figure 5. The image of num with different k-values.
Machines 05 00017 g005
Table 1. The mean and minimum value of survivability for different m- and k-values and the number of initial failure node groups that provide the system with minimal survivability. (The first parameter indicates the mean survivability. The second parameter indicates minimum survivability. The third parameter indicates the number of node groups).
Table 1. The mean and minimum value of survivability for different m- and k-values and the number of initial failure node groups that provide the system with minimal survivability. (The first parameter indicates the mean survivability. The second parameter indicates minimum survivability. The third parameter indicates the number of node groups).
k246891011
m
10.98360.98360.98310.94920.83650.58110.2354
0.95750.95740.95340.77480.387400
1111111
20.93890.90810.82040.64620.42260.1585
000000
228132136
30.79720.73360.50390.24830.0863
00000
383891132171
40.57120.49530.20620.0383
0000
204204361451
50.34290.27810.0497
000
515515731
60.16930.12820.0063
000
765765913
70.06340.0449
00
741741
80.01390.0093
00
488488
90
0
220
100
0
66
Table 2. Cascading failure evaluation for Figure 3.
Table 2. Cascading failure evaluation for Figure 3.
mkR0maxmin1|2|Survivability
120.990.99350.957575(1,2)-FR
150.950.99350.9571012(1,5)-RS
240.980.991604917(2,4)-FR
260.900.990801551(2,6)-WS
350.900.9874012496(3,5)-FR
460.70.9566040590(4,6)-FR
540.80.98480654138(5,4)-FR
640.70.9776087252(6,4)-FR
730.70.9914074151(7,3)-FR
840.50.656104887(8,4)-FR
910002200(9,1)-CF
101000660(10,1)-CF
111000120(11,1)-CF
Table 3. The number and proportion of node groups that cause the system to completely fragment and ANRN with 12 nodes.
Table 3. The number and proportion of node groups that cause the system to completely fragment and ANRN with 12 nodes.
mProportionNumberANRNmProportionNumberANRN
10010.666750.65055151.6793
20.030328.409160.82797650.7565
30.1727385.672770.93567410.2677
40.41212043.278880.98594880.0566

Share and Cite

MDPI and ACS Style

Wang, T.; Zhang, Z.; Shao, F. Survivability Analysis on a Cyber-Physical System. Machines 2017, 5, 17. https://doi.org/10.3390/machines5030017

AMA Style

Wang T, Zhang Z, Shao F. Survivability Analysis on a Cyber-Physical System. Machines. 2017; 5(3):17. https://doi.org/10.3390/machines5030017

Chicago/Turabian Style

Wang, Ti, Zuyuan Zhang, and Fangming Shao. 2017. "Survivability Analysis on a Cyber-Physical System" Machines 5, no. 3: 17. https://doi.org/10.3390/machines5030017

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop