China Safety Science Journal ›› 2023, Vol. 33 ›› Issue (3): 167-173.doi: 10.16265/j.cnki.issn1003-3033.2023.03.1424

Previous Articles     Next Articles

Research on vulnerability of rail transit network under coordinated attack of associated stations

CUI Xin1(), LU Qingchang1,**(), ZHANG Lei2, XU Biao1, QIN Han1, LIU Peng1   

  1. 1 School of Electronics and Control Engineering, Chang'an University, Xi'an Shaanxi 710064, China
    2 School of Highway and Railway Engineering, Shaanxi College of Communications Technology, Xi'an Shaanxi 710018, China
  • Received:2022-10-14 Revised:2023-01-11 Online:2023-03-28 Published:2023-11-28

Abstract:

In order to explore the vulnerability of the rail transit network after multiple associated stations were deliberately attacked and the differences in the impact of different attacks, the correlation between multiple stationswas measured and analyzed, and the vulnerability quantification method of the rail transit network under the coordinated attack of the associated stations was given. An attack model aiming at maximizing vulnerability was proposed, and the model was solved by immune algorithm to obtain the optimal attack strategy. Taking Shanghai metro network as an example, the vulnerability of rail transit networks under multi stations coordinated attack was studied. The results show that the vulnerability of rail transit networks under multi stations deliberate attack depends not only on the importance of each station, but also on the correlation between different stations, especially the spatial location correlation and passenger travel correlation. Multiple transfer stations located on different lines and with large passenger flow have the highest vulnerability to coordinated attacks. After multiple stations accounting for 3.56% of the total number of network stations are attacked at the same time, the rail transit network performance loss can reach up to 63.61%.

Key words: associated stations, coordinated attack, rail transit network, vulnerability, correlation, immune algorithm