China Safety Science Journal ›› 2023, Vol. 33 ›› Issue (8): 164-172.doi: 10.16265/j.cnki.issn1003-3033.2023.08.0098

• Public safety • Previous Articles     Next Articles

Vulnerability analysis of metro network from perspective of multi-layer network

MA Zhuanglin1(), SHAO Yiheng1, SHU Lan1, YIN Yifan1, LI Haoqiang2   

  1. 1 College of Transportation Engineering, Chang'an University, Xi'an Shaanxi 710064, China
    2 Xi'an Transportation Development Research Center, Xi'an Shaanxi 710082, China
  • Received:2023-02-16 Revised:2023-05-20 Online:2023-10-08 Published:2024-02-28

Abstract:

In order to assess the impact of station failure on metro network structure and service quality and to study the vulnerability of multi-layer network under different attack strategies, considering the characteristics of different lines and heterogeneity among different lines and transfer channels, a multi-layer directed time-weighted metro network model was constructed from the perspective of multi-layer network. The time-weighted edge was calculated by the train interval running time, train stopping time at stations, passenger transfer walking time and passenger waiting time for trains. A double load distribution mechanism of inter-layer and intra-layer stations was proposed, and a comprehensive vulnerability assessment index was proposed. Based on station importance, sequential and simultaneous attack strategies were used to assess the vulnerability of metro network after station failure. Finally, the Xi'an metro network in 2021 was taken as an example to verify the validity. The results show that the multi-layer metro network model is more practical than the single-layer metro network. In the sequential attack strategy, the optimal values of station capacity adjusted parameters a and b are 0.3 and 0.8, respectively. Compared with the strategy of attacking a single station sequentially, simultaneously attacking strategy leads to worse network vulnerabilities.

Key words: multi-layer metro network, network vulnerability, load distribution, cascading failure, loss rate of network comprehensive efficiency, attack strategies