Article | Open

Spatio-temporal propagation of cascading overload failures in spatially embedded networks

  • Nature Communications 7, Article number: 10094 (2016)
  • doi:10.1038/ncomms10094
  • Download Citation
Received:
Accepted:
Published online:

Abstract

Different from the direct contact in epidemics spread, overload failures propagate through hidden functional dependencies. Many studies focused on the critical conditions and catastrophic consequences of cascading failures. However, to understand the network vulnerability and mitigate the cascading overload failures, the knowledge of how the failures propagate in time and space is essential but still missing. Here we study the spatio-temporal propagation behaviour of cascading overload failures analytically and numerically on spatially embedded networks. The cascading overload failures are found to spread radially from the centre of the initial failure with an approximately constant velocity. The propagation velocity decreases with increasing tolerance, and can be well predicted by our theoretical framework with one single correction for all the tolerance values. This propagation velocity is found similar in various model networks and real network structures. Our findings may help to predict the dynamics of cascading overload failures in realistic systems.

Introduction

Resilience of individual components in networks is determined not only by their own intrinsic properties, but also by their functional interactions with other components. For example, a failure of one component in a network may lead to overloads and failures of other components. Starting with a localized failure, such interactions between components can ignite a domino-like cascading failure, which may result in catastrophes such as those observed in many realistic networks1,2,3,4,5. The devastating consequences of these cascading failures have stimulated extensive studies6,7,8,9.

Many studies provided deep insight on the conditions and outcome of cascading failures10,11,12,13,14,15,16,17, which may help to evaluate the system resilience. However, to predict and mitigate the failure spreading in a network, understanding their spatio-temporal propagation properties is essential but still missing. Different from structural cascading failures caused by direct causal dependencies18,19,20, overload failures21,22,23,24 usually propagate through invisible paths as a result of cooperative interactions in the system. Actually, a fundamental question has rarely been posed: how overload failures propagate with time in space during the cascading process? Indeed, predicting the spatio-temporal propagation of cascading failures could determine the timing and resource allocation of an effective mitigation strategy in corresponding self-healing technologies.

In this paper, we aim to understand the spatio-temporal propagation of the cascading overload failures in spatially embedded systems25. We define two basic quantities to describe the spatio-temporal propagation properties of cascading failures. The first quantity, rc(t), is the average Euclidean distance of the failures appearing at cascading step t from the centre of the initial failure. The second quantity, Fr(t), is the number of node failures that occur at cascading step t. While rc can help system regulators to set a ‘firewall’ at suitable locations before the failure arrives, Fr can suggest the ‘height’ of the firewall. In our current study, the propagation of cascading overloads is found to follow an approximately constant velocity. This propagation velocity decreases as the system tolerance increases, which can be well predicted by our theoretical analysis with one single constant correction. The propagation velocity is also found here to be similar in various model networks and real network structures.

Results

Propagation properties of cascading overload failures

In this study, we focus on the cascading overloads on spatially embedded networks caused by localized attacks, which are common in natural disaster and malicious attacks26,27. In Fig. 1, we show snapshots of the simulated cascading failures, where the failures spread almost radially from the initial attack region and finally spread over the whole system. As can be seen from Fig. 1, the nodes with spatial location closer to the initial failure begin to fail first and form approximately a ‘ring of failures’. The ring begins to grow and expand with time until it reaches the system’s boundary.

Figure 1: The propagation of the overload failures in the network.
Figure 1

We demonstrate step 1, 3, 5 and 7 of the cascading failures on a 200 × 200 lattice with periodic boundary conditions and a Gaussian distribution of weights. The disorder is σ=0.01, the initial attack size (in red) is 6 × 6 and the tolerance of system is set to α=0.5. In each figure, the deep blue dots stands for the overloaded nodes in the current step, while the black ones are the nodes failed in the previous steps. The cyan dots are the functional nodes that did not fail. (a) t=1, (b) t=3, (c) t=5 and (d) t=7.

Considering the ring shape of the cascading overload failures (originating from the initial location), it is reasonable to quantify rc(t) and Fr(t) at cascading step t. Figure 2a shows that the propagation radius of cascading failures is increasing almost linearly with time for different system sizes. This means that the failures spread during the cascade process with an almost constant speed (slope of rc(t)). It can be seen that as the system linear size L increases, the propagation velocity of overload failures increases. The propagation radius of failures is increasing with time and becomes saturated near the boundary. The propagation size of failure Fr (number of new failures at each instant) increases until a certain time step and then decreases (Fig. 2b). The behaviour at large t is due to the finite size of the system, when rc(t) reaches the order of L the amount of damage can only decrease. Note that for different system sizes, the propagation size of failure Fr reaches the maximum at similar instants, which results from the higher velocity in larger system sizes.

Figure 2: Spatio-temporal propagation of cascading overload failures in simulations.
Figure 2

(a,b) are the spreading radius rc(t) of failures and amount of failures at each step, Fr(t), as a function of time for α=0.25, σ=0.1 and l=6. (c,d) are the results of rc and Fr scaled by the system size, including L=70 (triangle), L=80 (square), L=90 (circle) and L=100 (diamond), respectively. The results are obtained by averaging over fifty realizations. Note that simulations are limited by the computational complexity of the most efficient algorithm for calculating node betweenness, which is O(NM+N2logN) for weighted networks, where N is the system size and M is the number of edges (NM is the order of N2 for sparse network).

To further understand the effect of system size and tolerance α on failure propagation rc(t), we rescale it in Fig. 2c by the system linear size L. We find that the curves of rescaled rc collapse into a single curve for different system sizes at a given tolerance α, suggesting that failures spread in the same relative velocities for different system sizes. When the size of failures, Fr(t), is rescaled by the system size, L × L, the different curves of Fr(t)/L2 also collapse into a single curve (Fig. 2d). It can be seen that the spreading time needed to reach the maximum Fr(t)/L2 is determined by the tolerance α, which implies that large tolerance can postpone the collapse of the system.

In contrast to the dynamics such as epidemics28 that propagate owing to nearest-neighboring interactions such as contact infection, cascading overloads propagate as a result of the global interaction between all the flows contributed by the whole system. Surprisingly, although the interactions are global, the propagation dynamics in the model network and realistic networks (see Supplementary Figs 1–6 and Supplementary Notes 1 and 2 for more examples) are found rather local. Here the local propagation means that there is a finite characteristic distance (Δ(rc)) between the successive overloads. This characteristic distance is the value of propagation velocity, which increases non-linearly with decreasing tolerance. The nearest-neighbor propagation of overloads usually assumed in some complex network models only corresponds to the limiting case of this local propagation (Δ(rc)=1).

Propagation results based on theoretical analysis

To further explore these propagation behaviours of cascading failures found in simulations and their relations with tolerance, we develop the theory (see Fig. 3, Methods section and Supplementary Methods for more details) to describe the cascading overloads.

Figure 3: Theory for overload propagation.
Figure 3

The network is embedded in a two-dimensional circular plate centred at O with a radius of 1 unit and the initial failure is located at the centre of the network within a circle of radius a<<1. The ring centred at O and between a and b (b>a) is defined as the adjacent ring. A is a random node in the network, whose distance to O is r1 (here we assume r>b, the case of rb can be found in Supplementary Methods). AF is the original path starting from A to a random node F on the system border. Since r>b, the intersection points between AF and the circle with radius b are B and E. AF also intersects the border of the failure area at C and D. AJ is a straight line tangent to the failure area and the tangent point is G. We also define another path AI, which starts from A to a border node I by passing through the plate centre O. Note that a realistic road network is embedded behind the circular plate for demonstration.

As can be seen in Fig. 4, our theoretical analysis reproduces well the spatio-temporal propagation features of cascading overloads found in the simulations (Fig. 2). Specifically, as shown in Fig. 4a,c, the velocity of the failure propagation is almost constant in most of the time t, and decreases with increasing tolerance or decreasing system size. As shown in Fig. 4b,d, the number of failures increases with time and then begins to drop after reaching the peak, which is reduced by increasing the tolerance α. The instant for the maximal failure size is independent of the system size, but increases with the system tolerance. Moreover, similar to simulation results, both the radius and size of failures in the cascades can also be rescaled with system size (L and L2, respectively) as seen in Fig. 4c,d, where the different curves for different system sizes collapse into a single curve at a given α. Note that both rc(t) and Fr(t) demonstrate a small slope in the few initial steps, which is caused by the extremely small initial failure considered in the theory. As shown in Supplementary Fig. 7, if the initial size of attack is large, both quantities show a higher slope also in the few initial cascading steps.

Figure 4: Theoretical results of overloads propagation.
Figure 4

In a and b, the results from theory with unit distance resolution 1/R (L=2R is the system linear size) are reported for rc and Fr, where α=0.01. In c and d, different symbols stand for different resolutions, including 1/200 (triangle), 1/300 (square), 1/400 (circle) and 1/500 (diamond), respectively. Here the absolute radius of the initial damage is set to 3 units. As can be seen from the figure, our theory can predict well the propagation behaviours of cascading overloads in the model simulation. Meanwhile, the numerical calculation of our theory is much less expensive than that of the simulation, which can be applied in the prediction of cascading overloads in large spatially embedded systems.

As seen in Supplementary Fig. 8 (see Supplementary Note 3 for more details), there exists a critical value of α, αc, above which no spreading occurs. Moreover, we find the theoretical relation (Supplementary Fig. 9) between the system tolerance and the critical initial failure size, where the system can sustain a larger size of initial failure for a larger α.

Comparison between simulation and theory

To test our theory, we perform a quantitative comparison between the simulation and the theoretical model. As shown in Fig. 5a, the propagation velocity in different model networks and real networks can be well predicted by the theory with the same constant correction for all the values of tolerances. This constant correction, close to 2π, is a result of the anisotropic propagation of overloads in the simulation, which is assumed isotropic in the theory. These good agreements between theory and simulations support the validity of our proposed theoretical framework for cascading overloads.

Figure 5: Comparison between theory and simulation.
Figure 5

(a) Relative velocity as a function of tolerance in the theory, models as well as in real structures. The relative velocity is calculated in the linear regime of rc(t), Δ(rc)/L, which decreases with α. The velocity in the theory is multiplied by a constant 2π. We find that the velocity is similar in different model networks (lattice, circular lattice, planar graph and circular plate) and real networks (road networks in Oldenburg and California). (b) The average overload as a function of relative distance from the initial attack. The overload in the weighted lattice (circle symbol) and theory (dashed line) after the initial damage is shown. The results are both shifted by the linear size of the initial damage , which makes two results comparable from the initial attack. We also multiplied the x axis of theory by 2π, which is consistent with the velocity difference shown in a.

The local propagation found in the simulation and theory is due to the mechanism of overload redistribution. In the simulation of the Motter–Lai model in Fig. 5b, the overloads propagate rather locally (with a characteristic distance) after an initial damage due to the redistribution of optimal paths between existing pairs of nodes. The optimal paths that passed through the previous damaged area will now mainly be redistributed close to this area, leading to the local overloads in spite of global interactions. Similar to our findings in the Motter–Lai model, the overloads in the theory (as shown in Fig. 5b and Supplementary Fig. 10) are found here mainly distributed close to the previous damage area, which causes the local propagation of failures (also as shown in Supplementary Fig. 11 and Supplementary Note 4). Note the agreement in Fig. 5b between theory and simulations (with the same constant correction of 2π, due to the anisotropic nature of the failure spreading, which is assumed isotropic in the theory). The excellent agreement between simulations and theory of the overload (Fig. 5b) as a function of distance from the original failure also supports our theoretical approach.

It is worth noting that the analysis of our theoretical framework is not limited by the computational complexity of calculating optimal paths. This is in contrast to simulations based on betweenness (number of optimal paths passing through a node), which require heavy computations and therefore are limited to relatively small systems. Our theoretical framework thus provides an efficient way to explore and understand the cascading behaviour of failures for any system size.

Universality of propagation velocity

To explore the possibility of universal feature in overload propagation, here we analyse the propagation of cascading overload failures on different network models and realistic networks. Besides the model networks including lattice, circular lattice, planar graph and circular plate, we also study the overload propagation on the realistic road networks29. We initiate a local attack in the geographical centre of these spatially embedded networks and analyse the spatio-temporal evolution of rc and Fr. As shown in Fig. 5a (see Supplementary Figs 1–6 for more examples), we find that propagation velocity of overloads is similar in various model and real network structures, which can be well predicted by our theory. The propagation velocity is independent of detailed network structures, which makes our findings more applicable. This universal propagation of overloads can be attributed to the common mechanism of overload redistribution in different networks, independent of structure difference between these networks. Furthermore, both theory and simulations suggest that for a given system size and a given tolerance, the size of initial failure does not influence the spreading velocity (Supplementary Figs 12 and 13 and Supplementary Notes 5 and 6).

Discussion

Cascading failures represent the manifestation of non-linear butterfly effect in infrastructure networks, which can cause catastrophic damages due to a small local disturbance. The Motter–Lai-type overload cascade models are an important class of cascading failure dynamics, characterized by the nonlocal—in contrast to epidemic spreading-type local cascade models—interactions, and have been studied extensively for the last decade. Given the inherent global interactions in the mechanism of overload formation, it is of interest that the overloads spread rather locally from the initial attack region, at velocity that increases non-linearly with decreasing tolerance. Here the local propagation means that there is a finite characteristic distance between the successive overloads, which is the value of propagation velocity. The nearest-neighboring propagation of overloads usually assumed in some complex network models only corresponds to the limiting case of this local propagation (characteristic distance is 1).

For different model and realistic networks, our results suggest the existence of universal propagation features of cascading overloads, which are characterized by a finite linear propagation velocity. This velocity can be predicted by our theory with the same constant correction for all the values of tolerances. This constant correction, close to 2π, is a result of the anisotropic propagation of overloads in the simulation, which is assumed isotropic in the theory. This universal behaviour comes from the common global mechanisms of overload redistributions in different networks. When certain extreme heterogeneous networks like embedded scale free networks are considered, a revision of the theoretical framework may be needed. While the focus of this manuscript is on the spatio-temporal propagation of the cascading overload failures in spatially embedded systems, the overloads may spread very fast in general non-spatially embedded sparse network due to its small diameter.

The present study may help to bridge the longstanding gap between the overload model16,22 and the model of dependency links proposed by Buldyrev et al.13 and Parshani et al.18, in particular the lattice version of the model19,20 where dependency links can have a characteristic length r. Indeed, as can be seen in Figs 2 and 4, overload failures propagate in a nearly constant speed, which suggests a characteristic dependency distance, between successive overload failures. Furthermore, this speed or characteristic distance is found to increase with decreasing tolerance. This suggests a possible mapping between systems with overload failures and networks with dependency links, where networks with different characteristic length of dependency links can serve as a suitable model to describe cascading overload failures. This mapping can be useful since overload models usually require heavy computations and are therefore limited to small systems, while dependency models require significantly less computations, and large systems can be easily analysed.

When a disturbance is detected in networks, the knowledge of spatio-temporal propagation properties of cascading failures is essential for predicting and mitigating the cascading failures. Meanwhile, realistic cascading failures are usually the result of the collective interactions between different processes including overloads and other system operation procedures30,31,32. The universal features of overload propagation found here across different spatially embedded networks may help to better mitigate realistic cascading failure, if combined with the detailed knowledge of other processes including system operations and planning procedures.

Methods

Simulation of model

To study the propagation properties of cascading overload failures, we model the spatially embedded network as a randomly weighted L × L lattice with periodic boundaries, where L is the linear length of the lattice. The weight of each link is taken from a Gaussian distribution N(μ, σ2) with mean weight μ and the disorder is represented by the standard deviation σ. In this model22, the load on a node i, Li, represents the number of optimal paths between all pairs of nodes passing through this node. A node i will fail when its load Li is more than (1) times its original load, where α represents the system tolerance to overloads. A randomly localized region of the system is initially removed to trigger the cascading overloads. This kind of initial failure is motivated by the fact that natural disasters (like earthquake or floods) or malicious attacks (like electromagnetic pulse (EMP)) usually occur in specific geographical locations and destroy initially localized regions of the network. The initial failure is located in a randomly selected square of l × l nodes (l<<L), which are removed initially. In addition to being realistic, since failures are usually localized, this configuration can also help us to follow and analyse the spatio-temporal propagation pathway of the cascading failures. This local failure may trigger failures of other nodes if their load value exceeds the tolerance threshold due to the load redistribution across the entire network. Given the periodic boundary conditions, we can position the initial attack region at the centre of the lattice.

Theoretical analysis

Cascading overload failures due to an initial local failure are produced by the redistribution of loads in the network. From the observations of simulations on weighted network, we find (Fig. 1) that failures spread in a ring shape from the centre of the initial damage. This inspires us to assume in our theory that the network is embedded in a two-dimensional circular plate (Fig. 3), the initial failure is within a (red) circle of radius a, and the main overload due to traffic after the initial failure is located in the (cyan) ring adjacent to the initial failure (see the cyan ring in Fig. 3), whose size will be determined by the theory. The overload is reflected by the increase of the number and lengths of shortest paths passing through this ring. If the overload exceeds the capacity tolerance of a node ((1) times its original load) within the adjacent ring, the node will fail in the next step, causing the cascading failure to propagate forward. Owing to the initial failed area, shortest paths from a given node A to destinations located in the shadow area s (the dotted area in Fig. 3) would be affected and become longer, since they now have to surround the failed area. Specifically, the shortest paths from A to nodes in s (for example, AF) across the failed area can be separated into two parts in the adjacent ring (for example, BC and DE). For the first part, its length within the ring changes from BC to KG. As for the second part, its overload on the ring can be calculated from symmetry by switching A and F (source and target). Finally, the integration from r=a to r=1 covers all the overloads added to the adjacent ring (cyan) due to the initial failure, can be written as

where the length of KG is for r>b and for rb, s(a, r) is the area of s, that is, the number of A’s destinations in the shadow and v(a, b, r) is the average length of the first part of shortest paths (within the adjacent ring) before the failure. Similarly, we can obtain the initial load of nodes located within the circle centred at O with radius b as Lini(b) (Supplementary Methods). Then, for a node on the circle centred O with radius b, the overload produced by the failure is

and its initial load is

For each functional node in the network, the critical condition for failure can be written as αL/L0. Specifically, if α≥ΔL/L0, it survives, otherwise it fails. More details for the solution of the theoretical model can be found in Supplementary Figs 14–19 and Supplementary Methods.

Additional information

How to cite this article: Jichang, Z. et al. Spatio-temporal propagation of cascading overload failures in spatially embedded networks. Nat. Commun. 7:10094 doi: 10.1038/ncomms10094 (2016).

References

  1. 1.

    Globally networked risks and how to respond. Nature 497, 51–59 (2013) .

  2. 2.

    , , & Complex systems analysis of series of blackouts: cascading failure, critical points, and self-organization. Chaos 17, 026103 (2007) .

  3. 3.

    & Network dynamics: jamming is limited in scale-free systems. Nature 428, 716 (2004) .

  4. 4.

    , , , & Reconstructing a credit network. Nat. Phys. 9, 125–126 (2013) .

  5. 5.

    , , & Trophic cascades in a formerly cod-dominated ecosystem. Science 5728, 1621–1623 (2005) .

  6. 6.

    & Statistical mechanics of complex networks. Rev. Mod. Phys. 74, 47–97 (2002) .

  7. 7.

    , , , & Complex networks: Structure and dynamics. Phys. Rep. 424, 175–308 (2006) .

  8. 8.

    , & Dynamical Processes on Complex Networks Cambridge University Press (2008) .

  9. 9.

    & Complex Networks: Structure, Robustness and Function Cambridge University Press (2010) .

  10. 10.

    A simple model of global cascades on random networks. Proc. Natl Acad. Sci. 99, 5766–5771 (2002) .

  11. 11.

    , & Systemic risk in a unifying framework for cascading processes on networks. Eur. Phys. J. B 71, 441–460 (2009) .

  12. 12.

    , , & Tricritical point in explosive percolation. Phys. Rev. Lett. 106, 095703 (2011) .

  13. 13.

    , , , & Catastrophic cascade of failures in interdependent networks. Nature 464, 1025–1028 (2010) .

  14. 14.

    , & Inducing effect on the percolation transition in complex networks. Nat. Commun. 4, 2412 (2013) .

  15. 15.

    & Abrupt transition in the structural formation of interconnected networks. Nat. Phys. 9, 717–720 (2013) .

  16. 16.

    Cascade control and defense in complex networks. Phys. Rev. Lett. 93, 098701 (2004) .

  17. 17.

    , , , & Transient dynamics increasing network vulnerability to cascading failures. Phys. Rev. Lett. 100, 218701 (2008) .

  18. 18.

    , & Critical effect of dependency groups on the function of networks. Proc. Natl Acad. Sci. USA 108, 1007–1010 (2011) .

  19. 19.

    , , , & Cascading failures in interdependent lattice networks: the critical role of the length of dependency links. Phys. Rev. Lett. 108, 228702 (2012) .

  20. 20.

    , , & The extreme vulnerability of interdependent spatially embedded networks. Nat. Phys. 9, 667–672 (2013) .

  21. 21.

    , & Universal behavior of load distribution in scale-free networks. Phys. Rev. Lett. 87, 278701 (2001) .

  22. 22.

    & Cascade-based attacks on complex networks. Phys. Rev. E 66, 065102 (2002) .

  23. 23.

    , & Model for cascading failures in complex networks. Phys. Rev. E 69, 045104 (2004) .

  24. 24.

    , , & Spatial correlation analysis of cascading failures: congestions and blackouts. Sci. Rep. 4, 5381 (2014) .

  25. 25.

    , , & Dimension of spatially embedded networks. Nat. Phys. 7, 481–484 (2011) .

  26. 26.

    , , & Assessing the vulnerability of the fiber infrastructure to disasters. IEEE/ACM Trans. Netw. 19, 1610–1623 (2011) .

  27. 27.

    , , , & Power Grid Vulnerability to Geographically Correlated Failures - Analysis and Control Implications Columbia University, Electrical Engineering , Technical Report (2011) .

  28. 28.

    & Epidemic spreading in scale-free networks. Phys. Rev. Lett. 86, 3200 (2001) .

  29. 29.

    Real Datasets for Spatial Databases: Road Networks and Points of Interest. (2013) .

  30. 30.

    , , & How dead ends undermine power grid stability. Nat. Commun. 5, 3969 (2014) .

  31. 31.

    , & Realistic control of network dynamics. Nat. Commun. 4, 1942 (2013) .

  32. 32.

    , & Cascading dynamics and mitigation assessment in power system disturbances via a hidden failure model. Int. J. Electr. Power Energy Syst. 27, 318–326 (2005) .

Download references

Acknowledgements

We thank the support from Collaborative Innovation Center for industrial Cyber-Physical System. D.L. is also supported by the National Natural Science Foundation of China (Grant 61104144) and the National Basic Research Program of China (2012CB725404). S.H. thanks DTRA, ONR, the LINC and the Multiplex (No. 317532) EU projects, the DFG, and the Israel Science Foundation for support. J.Z. was partially supported by NSFC (Grant Nos 71501005 and 71531001) and 863 Program (Grant No. SS2014AA012303).

Author information

Affiliations

  1. School of Economics and Management, Beihang University, Beijing 100191, China

    • Jichang Zhao
  2. School of Reliability and Systems Engineering, Beihang University, Beijing 100191, China

    • Daqing Li
  3. Science and Technology on Reliability and Environmental Engineering Laboratory, Beijing 100191, China

    • Daqing Li
  4. Department of Physics, Bar-Ilan University, Ramat Gan 5290002, Israel

    • Hillel Sanhedrai
    •  & Shlomo Havlin
  5. Department of Mathematics, Bar-Ilan University, Ramat Gan 5290002, Israel

    • Reuven Cohen

Authors

  1. Search for Jichang Zhao in:

  2. Search for Daqing Li in:

  3. Search for Hillel Sanhedrai in:

  4. Search for Reuven Cohen in:

  5. Search for Shlomo Havlin in:

Contributions

All authors contributed to all aspects of this work.

Competing interests

The authors declare no competing financial interests.

Corresponding author

Correspondence to Daqing Li.

Supplementary information

PDF files

  1. 1.

    Supplementary Information

    Supplementary Figures 1-19, Supplementary Notes 1-6, Supplementary Methods and Supplementary References

Comments

By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.

Creative Commons BYThis work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/