Skip to main content

Identifying Vulnerable Nodes to Cascading Failures: Centrality to the Rescue

  • Conference paper
  • First Online:
  • 3094 Accesses

Part of the book series: Studies in Computational Intelligence ((SCI,volume 812))

Abstract

We study the problem of identifying nodes that are more likely to trigger cascading failures in complex systems, which we call vulnerable nodes. We show that there is a close relation between the likelihood of a node setting off cascading failures (which we call the cascading failure probability) and its non-backtracking centrality; when every failed node is equally likely to cause the failure of each neighbor, the cascading failure probability and non-backtracking centrality of a node are proportional to each other. Based on this observation, we propose a new approach to finding vulnerable nodes and study its performance using numerical studies.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    These dependence relations are not necessarily the physical links in a network. For example, in a power system, an overload failure in one part of power grid can cause a failure in another part that is not geographically close or without direct physical connection to the former.

  2. 2.

    It is shown that the degree distribution of many real networks can be approximated using a power law [1].

References

  1. Albert, R., Jeong, H., Barabasi, A.L.: Error and attack tolerance of complex networks. Nature 406, 378–382 (2000)

    Google Scholar 

  2. Bollobas, B., Riordan, O.: The diameter of a scale-free random graph. Combinatorica 24(1), 5–34 (2004)

    Google Scholar 

  3. Krzakala, F., et al.: Spectral redemption: clustering sparse networks. Proc. Natl. Acad. Sci. 110(52), 20935–20940 (2013)

    Google Scholar 

  4. La, R.J.: Cascading failures in interdependent systems: impact of degree variability and dependence. IEEE Trans. Netw. Sci. Eng. 5(2), 127–140 (2018)

    Google Scholar 

  5. La, R.J.: Cascading failures in interdependent systems: impact of degree variability and dependence. IEEE Trans. Netw. Sci. Eng. (2018). https://doi.org/10.1109/TNSE.20189.2805720

  6. Martin, T., Zhang, X., Newman, M.E.J.: Localization and centrality in networks. Phys. Rev. E 90(052808) (2014)

    Google Scholar 

  7. Molloy, M., Reed, B.: A critical point for random graphs with a given degree sequence. Random Struct. Algorithms 6(2–3), 161–180 (1995)

    Google Scholar 

  8. Molloy, M., Reed, B.: The size of the largest component of a random graph on a fixed degree sequence. Comb. Probab. Comput. 7(3), 295–305 (1998)

    Google Scholar 

  9. Newman, M.E.J.: Assortative mixing in networks. Phys. Rev. Lett. 89(208701) (2002)

    Google Scholar 

  10. Newman, M.E.J.: Mixing patterns in networks. Phys. Rev. E 67(026126) (2003)

    Google Scholar 

  11. Newman, M.E.J.: The structure and function of complex networks. SIAM Rev. 45(2), 167–256 (2003)

    Google Scholar 

  12. Pastor-Satorras, R., Castellano, C.: Eigenvector localization in real networks and its implications for epidemic spreading. J. Stat. Phys. 1–14 (2018). https://doi.org/10.1007/s10955-018-1970-8

  13. Yang, Y., Nishikawa, T., Motter, A.E.: Small vulnerable sets determine large network cascades in power grids. Science 358(6365) (2017)

    Google Scholar 

Download references

Acknowledgement

This work was supported in part by contract 70NANB16H024 from National Institute of Standards and Technology (NIST).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Richard J. La .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

La, R.J. (2019). Identifying Vulnerable Nodes to Cascading Failures: Centrality to the Rescue. In: Aiello, L., Cherifi, C., Cherifi, H., Lambiotte, R., Lió, P., Rocha, L. (eds) Complex Networks and Their Applications VII. COMPLEX NETWORKS 2018. Studies in Computational Intelligence, vol 812. Springer, Cham. https://doi.org/10.1007/978-3-030-05411-3_69

Download citation

Publish with us

Policies and ethics