This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

\marginsize

2cm2cm2cm2cm

Robustness of the public transport network against attacks on its routes

Tomás Cicchini CONICET-Universidad de Buenos Aires, Facultad de Ciencias Exactas y Naturales, Instituto de Cálculo (IC) Universidad de Buenos Aires, Facultad de Ciencias Exactas y Naturales, Departamento de Física Inés Caridi CONICET-Universidad de Buenos Aires, Facultad de Ciencias Exactas y Naturales, Instituto de Cálculo (IC) CONICET Leonardo Ermann Dto FT, GIyA, Comisión Nacional de Energía Atómica CONICET
Abstract

We investigate the robustness of Public Transport Networks (PTNs) when subjected to route attacks, focusing specifically on public bus lines. Such attacks, mirroring real-world scenarios, offer insight into the multifaceted dynamics of cities. Our study delves into the consequences of systematically removing entire routes based on strategies that use centrality measures. We evaluate the network’s robustness by analyzing the sizes of fragmented networks, focusing on the largest components and derived metrics. To assess the efficacy of various attack strategies, we employ them on both a synthetic PTN model and a real-world example, specifically the Buenos Aires Metropolitan Area in Argentina. We examine these strategies and contrast them with random, and one-step most and least harmful procedures. Our findings indicate that betweenness-based attacks and the one-step most (maximal) harmful procedure emerge as the most effective attack strategies. Remarkably, the betweenness strategy partitions the network into components of similar sizes, whereas alternative approaches yield one dominant and several minor components.

1 Introduction

During the last decades, there has been a growing focus on central aspects of urban infrastructure and its functioning within the framework of a nascent science of cities [21]. This surge in interest has been propelled by the utilization of spatial networks and the accessibility of public data alongside Geographical Information System (GIS) tools. Moreover, the perspective of considering cities as complex systems, as their overall properties are emergent and are not simple summations of their parts, is increasingly relevant [24]. Thus, many efforts seek to understand the social aspects underlying the dynamic change of cities driven by human mobility [29, 30], design innovative solutions for city services [28], and plan improvements that impact the mobility of inhabitants [27, 26, 19].

An essential infrastructure facilitating the daily movement of people within a city is the public transportation system, which comprises various routes or lines of different modes such as buses, trains, metros, and other public conveyance means. The Public Transport Network (PTN) integrates data from the public transportation system with spatial information about cities [17, 16, 25]. However, there is no singular method for representing the PTN solely based on information regarding a specific mode, such as buses. Instead, various representations exist to depict public transportation information within specific networks, including 𝕃\mathbb{L}-space, 𝕃\mathbb{L^{\prime}}-space, \mathbb{C}-space, and \mathbb{P}-space [14, 13]. Each of these representations is tailored to serve distinct analytical purposes or to study particular processes of interest in the transportation system, providing insights into different facets of transportation operations. In this study, our focus lies on examining the impact of route removal on the connectivity of the transportation system.

Each route, such as a bus line, consists of a sequential arrangement of stations spanning from an originating station to a terminal one. Passengers have the option to board or disembark at each station along the route. Our motivation in this study is to analyze scenarios wherein an entire bus line discontinues operation either due to a failure or attack, or based on a particular decision of the line’s company management or a strike by its employees, disrupting then the route as a whole.

In many interconnected complex systems across various domains such as biological, social, economic, and technological realms, public transportation networks can experience both intentional and unintentional failures, impacting individual system elements as well as the system as a whole [4]. Unintentional shortcomings typically manifest as minor random disruptions within the network, such as stations or lines being temporarily disabled. Sometimes, these failures are part of the dynamics of networks, making the study of cascading system crashes essential for understanding systems evolution, as discussed in [3, 2]. On the other hand, intentional failures, often termed attacks, aim to disrupt the entire network’s operation. These attacks commonly target nodes, links, or sets of nodes with the most significant potential to destabilize the network. The exploration of how diverse networks amplify failures at the systemic level, along with their stability and recovery, traverses numerous disciplines and has been investigated in networks beyond transportation, including biological, ecological, financial, and social networks [6]. This subject matter is closely related to the robustness and resilience of networks and systems [4], garnering considerable attention due to its significance in identifying and mitigating problems. Various solutions have been proposed, such as interventions to mitigate wildfires and extreme events [7], the development of early warning systems for different disruptive scenarios, the identification of critical and vulnerable elements within the system [6, 47, 48], and the proposal of improved networks to prevent future failures [49].

In the context of PTN, failures can potentially disrupt the daily lives of passengers and all city residents, leading to travel delays for passengers and impacting the city’s broader transportation system. Hence, it is crucial to understand the susceptibility of PTN to failures or attacks to anticipate critical collapses [5], plan future improvements in the city’s transportation infrastructure, and effectively respond to eventual collapses following a failure. The robustness of PTN has been examined across various cities, considering different attack strategies targeting nodes and links [38, 41, 42].

The central question guiding this research is to understand which type of failure or attack on the bus public transportation network yields the most significant impact on the city. It is worth noting that this approach differs from previous studies, which primarily focused on directed attacks targeting specific nodes or links within the network [17, 39, 37]. We operate under the assumption that each transport line, like a bus line, functions as a cohesive unit integrating a set of employees, a fixed organization, and logistical arrangements. As a result, the interruption extends from the starting station to the end station along the route. This paper compares and analyzes the effects of various strategies for selecting the removed line from the PTN based on network topological properties. Our objective is to evaluate which route attack strategy inflicts more significant damage to the network and quantify its impact. The proposed methodology aligns with the broader theory of bond (or edge) percolation. For instance, in the realm of PTN analysis, prior works such as [35, 36, 40] concentrate on attacking edges based on their centrality measures and delineate the effects of such attacks. However, when a route is attacked, instead of removing a single edge at each step from 𝕃\mathbb{L}-space, all its set of consecutive edges are eliminated from the 𝕃\mathbb{L^{\prime}}-space. Indeed, although there exist several works investigating the impact of removing straight rigid rods [45, 44] or k2k^{2}-mers [43] within the framework of regular lattices, the exploration of removing complex paths in real networks remains relatively unexplored.

To analyze general cities and compute statistics of PTN, we will generate a synthetic PTN based on the model proposed in [17]. These synthetic networks emulate topological properties similar to those observed in large cities [16], incorporating a random component to allow for multiple realizations.

Moreover, we will conduct a similar analysis on the PTN network of a Latin American city, specifically focusing on public bus transportation. To do so, we will utilize open data from [32] to examine 489 bus lines within the Metropolitan Area of Buenos Aires (AMBA), Argentina. This region spans approximately 13,285 square kilometers [33] and serves around four million people daily [34].

The paper’s organization is structured as follows: Section 2 outlines the PTN methodology, details the route removal strategies for implementing attacks, discusses the metrics used to quantify the impacts of the attacks, and provides a description of the synthetic PTN employed. Section 3 presents the results of the attacks on the synthetic PTN. In Section 4, the same methodology is applied to the city of Buenos Aires. Section 5 covers the discussion and future research directions.

2 Methodology

2.1 Public transport network and its representations

In this study, our goal is to examine the robustness of Public Transport Networks (PTNs) within metropolitan areas. We define a PTN as the entire public transport system, encompassing the infrastructure (stops, stations, and rails, where applicable) as well as the routes of various bus, subway, and train lines that serve the mobility needs of inhabitants. As established in the literature [14], several methods exist to represent such a structure as a network.

The simplest and most common representation is known as the 𝕃\mathbb{L}-space, where nodes correspond to stops and stations, and an edge exists between two nodes if they are consecutive stops on at least one route. A variation of this approach, known as the 𝕃\mathbb{L^{\prime}}-space, employs a distinct edge type for each route connecting consecutive nodes. While the 𝕃\mathbb{L}-space is a simple network, the 𝕃\mathbb{L^{\prime}}-space is a multi-edge network; however, both are considered spatial networks due to the geographical embedding of the nodes.

Alternatively, we can consider a network where nodes represent the different routes of the PTN, and edges indicate that two routes share at least one station. This representation is called the \mathbb{C}-space and is a non-spatial simple network.

Furthermore, the size of PTN is denoted by NN in 𝕃\mathbb{L} and 𝕃\mathbb{L^{\prime}} spaces, and RR in \mathbb{C}-space. It’s important to note that in tt sequential route attacks, NN remains constant, while the fraction of attacked routes t/R=Φ[0,1]t/R=\Phi\in[0,1] defines the size of the \mathbb{C}-space as Rt=R(1Φ)R-t=R(1-\Phi). Figure 1 shows an example of a PTN in 𝕃\mathbb{L}-space, 𝕃\mathbb{L}’-space and \mathbb{C}-space.

Refer to caption
Figure 1: Example of a PTN and their three different representations, 𝕃\mathbb{L}, 𝕃\mathbb{L}’ and \mathbb{C}-spaces.

2.2 Robustness metrics

To quantify and measure the robustness of the PTN against sequential removal of routes in 𝕃\mathbb{L}-space and 𝕃\mathbb{L}’-space, we focus primarily on S1S_{1}, which represents the size of the largest connected component, also known as the giant component. This metric is widely employed to analyze percolation phenomena and network damage [4, 10]. However, as routes are successively removed from the PTN, additional isolated and connected components may emerge.

In order to comprehensively understand and quantify how the absence of routes impacts the PTN, we also investigate the sizes of the other connected components. Here, SiS_{i} denotes the size of the ii-th component, with ii ranging from 11 to ΩS\Omega_{S}. Therefore, ΩS\Omega_{S} represents the total number of components, satisfying the condition NS1S2SΩS1N\geq S_{1}\geq S_{2}\geq\ldots\geq S_{\Omega_{S}}\geq 1, with i=1ΩSSi=N\sum_{i=1}^{\Omega_{S}}S_{i}=N.

To gain insight into the distribution of the number of nodes in each component, it is beneficial to define the normalized entropy of components size distribution ΣS\Sigma_{S} as follows:

ΣS={0ifΩS=11logΩSi=1ΩSpilog(pi)ifΩS>1\Sigma_{S}=\left\{\begin{array}[]{crr}0&\text{if}&\Omega_{S}=1\\ -\frac{1}{\log\Omega_{S}}\sum_{i=1}^{\Omega_{S}}p_{i}\log(p_{i})&\text{if}&\Omega_{S}>1\end{array}\right. (1)

where pip_{i} is the fraction of nodes in the ii-th component pi=Si/Np_{i}=S_{i}/N and then resulting 0ΣS10\leq\Sigma_{S}\leq 1.

To quantify the global robustness in a single metric, we track the component sizes throughout the entire sequence of route attacks (attack strategy). The global robustness of each component is defined as follows:

i=1NRt=0RSi(Φ)\mathcal{R}_{i}=\frac{1}{NR}\sum_{t=0}^{R}S_{i}(\Phi) (2)

where Φ=t/R\Phi=t/R, Φ\Phi represents the ratio of attacked lines (tt) to the initial number of lines (RR). Here, i\mathcal{R}_{i} denotes the area below the curve Si(Φ)S_{i}(\Phi) between 0 and 1, which converges to the integral 01Si(Φ)𝑑Φ/N\int_{0}^{1}S_{i}(\Phi)d\Phi/N for very large number of routes RR. By definition, i\mathcal{R}_{i} falls within the interval [0,1], and i>j\mathcal{R}_{i}>\mathcal{R}_{j} for i<ji<j. A similar definition to 1\mathcal{R}_{1} for node attacks, was introduced in [10] as the ”Unique Robustness Measure” for studying robustness under node attacks. We will analyze the cases of 1\mathcal{R}_{1} and 2\mathcal{R}_{2}, which measure the global robustness of the giant and the second component, respectively. The global robustness of the giant component, 1\mathcal{R}_{1}, can be interpreted as follows: when 10\mathcal{R}_{1}\approx 0, the network is highly vulnerable to the attack. Even a small fraction of routes removed (Φ0\Phi\approx 0) leads to the collapse of the giant component to zero. Conversely, in the case of 11\mathcal{R}_{1}\approx 1, it means a network highly resilient against such attacks. This implies that almost all existing routes (Φ1\Phi\approx 1) must be removed for the giant component to decrease in size. It is worth mentioning that we will compute all metrics in 𝕃\mathbb{L}’-space for convenience, but they are the same as those computed in 𝕃\mathbb{L}-space since metrics are derived from the component sizes. Therefore, the analysis and interpretation of the global robustness metrics hold true for both 𝕃\mathbb{L}-space and 𝕃\mathbb{L}’-space.

2.3 Attack strategies

This work aims to investigate the robustness of the PTN under various sequential attacks, based on \mathbb{C}-space. The order in which each route is removed is crucial and can be regarded as an attack strategy or procedure.

We employ well-known standard centrality measures in complex networks [9] to define sequential removal strategies, including: degree, closeness, PageRank, and betweenness (for more details, see 2.4). The removal procedure given by the largest centrality route in \mathbb{C}-space is dynamically updated as follows:

  1. 1.

    target route selection: define the route to attack based on the centrality measures in \mathbb{C}-space.

  2. 2.

    attack: remove the selected route and recalculate both 𝕃\mathbb{L}^{\prime}-space and \mathbb{C}-space.

  3. 3.

    metric calculations: calculate metrics over 𝕃\mathbb{L}^{\prime}-space.

  4. 4.

    Repeat steps 1, 2 and 3 until the RR routes are removed (Φ=1\Phi=1).

This procedure is illustrated in Figure 2 for degree centrality in an example of PTN with N=25N=25 and R=5R=5. The blue route has the highest degree centrality value in \mathbb{C}-space and is then removed. Before the removal of the blue route, the giant component has a size of S1=21S_{1}=21, which decreases to S1=12S_{1}=12 after removal. The number of components changes from ΩS=2\Omega_{S}=2 to ΩS=5\Omega_{S}=5, with S2=4S_{2}=4 before removal to S2=7S_{2}=7, S3=4S_{3}=4, S4=S5=1S_{4}=S_{5}=1 after removal. Therefore, the normalized entropy changes from ΣS0.63\Sigma_{S}\simeq 0.63 to ΣS0.78\Sigma_{S}\simeq 0.78.

Refer to caption
Figure 2: Schematic representation of the removal procedure following the strategy of degree centrality measure for N=25N=25 and R=5R=5. Given a certain PTN, a centrality measurement is performed and the most important route is attacked, i.e., all its edge are removed from 𝕃\mathbb{L}’-space and the node is removed from the \mathbb{C}-space.

In addition to the four different PTN attack procedures mentioned, we will also analyze the random removal of routes (representing unintentional failures), as well as two new strategies referred to as the maximal and minimal strategies.

The maximal and minimal procedures are defined as follows: starting from a 𝕃\mathbb{L^{\prime}}-space, we compute which route causes the maximum and minimum damage to the giant component size S1S_{1}, respectively. For instance, in the network of the left panel of Figure 2, the giant component size (S1S_{1}) decreases by 0, 22, 55, 66, and 99 when we remove the yellow, green, red, dark gray, and blue routes, respectively. Therefore, in the maximal and minimal strategies, the blue and yellow routes will be removed, respectively. These procedures are repeated at each step, similar to centrality measures.

Despite previous global analysis, such as the one in [1], it is important to notice that these strategies compute the impact of only one removed route in each step. Therefore, applying the maximal (or minimal) strategy twice does not guarantee that these two attacked routes will maximize (or minimize) the decrease of S1S_{1}. In this sense, we cataloged the minimal and maximal attacks as one-step strategies, while in [1] the optimal attack is found globally. For more details of the proposed strategies, see 2.4.

2.4 Centrality measures

As mentioned, we select the most central route at each step based on various topological measures to determine which route in the \mathbb{C}-space should be removed. The simplest measure we use is the degree centrality kik_{i}, which characterizes the number of neighbors of node ii. In the \mathbb{C}-space, kik_{i} represents the number of other routes that share at least one stop with route ii.

Another centrality measure we utilize is the closeness centrality. This measure is defined by considering the distance over the network between nodes ii and jj, denoted by dijd_{ij}, which is the number of edges between them. The closeness centrality cic_{i} of a node ii is then given by:

ci=ji1dijc_{i}=\sum_{j\neq i}\frac{1}{d_{ij}} (3)

where dijd_{ij}\to\infty when there is no path between nodes ii and jj. Essentially, this measure quantifies the proximity of a node to all other nodes in the network. In the context of the PTN, closeness centrality can be interpreted as a proxy for the average number of transfers a passenger would need to make from line ii to the other lines in the system.

Closely related to the former measure, the betweenness centrality is defined as:

bi=jkiNσjkiσjkb_{i}=\sum_{j\neq k\neq i\in N}\frac{\sigma^{i}_{jk}}{\sigma_{jk}} (4)

where σjk\sigma_{jk} represents the total number of shortest paths between nodes jj and kk, while σjki\sigma_{jk}^{i} represents the total number of shortest paths between jj and kk passing through node ii. This measure quantifies whether a particular route acts as a bridge between others or if it is expendable. In other words, it indicates the extent to which a route facilitates the flow of passengers between different parts of the network.

PageRank centrality, denoted as pip_{i}, is a measure of the importance or influence of a node in a network. It is based on the concept that connections from important nodes contribute more to the importance of a node than connections from less important nodes. Mathematically, PageRank centrality can be defined as the eigenvector associated with the eigenvalue of 1 of the Google matrix GG, given by the equation:

p=Gp=[αS+(1α)E]pp=Gp=[\alpha S+(1-\alpha)E]p (5)

where SS is the adjacency matrix of the network, with 1/N1/N in the columns corresponding to dangling nodes, EE is the matrix with value 11 in all its N×NN\times N elements, and α\alpha is a damping factor typically set to α=0.85\alpha=0.85 [46].

Finally, we introduce the maximal and minimal strategies based on the change in the giant component size when a route is removed from the network. We define Δ(S1)it\Delta(S_{1})^{t}_{i} for node ii in \mathbb{C}-space as:

Δ(S1)it=S1t(S1)it+1\Delta(S_{1})_{i}^{t}=S_{1}^{t}-(S_{1})_{i}^{t+1} (6)

Here, S1tS_{1}^{t} represents the number of nodes in the giant component at step tt of the removal procedure, and (S1)it+1(S_{1})_{i}^{t+1} represents the number of remaining nodes in the giant component at step t+1t+1 if node ii is removed. Therefore, Δ(S1)it\Delta(S_{1})_{i}^{t} accounts for the importance of node ii in \mathbb{C}-space and measures the change in S1S_{1}. The maximal strategy selects the node with the highest Δ(S1)it\Delta(S_{1})_{i}^{t}, while the minimal strategy selects the node with the lowest one.

2.5 Synthetic PTN model

In this section, we explain the null model introduced in [17] for creating synthetic PTN. The model also described in [16] effectively captures many global key properties of public transport networks by growing networks of attractive self-avoiding walks (SAW).

The PTN model comprises RR routes, each featuring SS stations. It is constructed on an X×XX\times X square lattice, where the vertices (xx) and edges represent potential stations and routes, respectively. The construction of routes follows the recipe:

  1. 1.

    Construct the first route as a self-avoiding walk (SAW) of SS lattice sites.

  2. 2.

    Construct the R1R-1 subsequent routes as SAWs with the following preferential attachment rules

    1. (a)

      choose a terminal station at x0x_{0} with probability pkx0+a/X2p\sim k_{x_{0}}+a/X^{2}

    2. (b)

      choose any subsequent station xx of the route with probability pkx+bp\sim k_{x}+b

Here, kxk_{x} represents the number of times the lattice site xx has been visited before (i.e., the number of routes that pass through xx). To maintain the self-avoiding walk (SAW) property, any route that intersects itself is discarded. Figure 3 illustrates the step-by-step process of building the synthetic model for a particular set of parameters. Each new route is added in a different color.

In our study, we opt for closed boundary conditions instead of periodic boundary conditions, as the former aligns more closely with real-world metropolitan scenarios. We set the size of the lattice to X=300X=300.

In the PTN model, we fix a=0a=0 and b=5b=5 to generate networks with properties similar to those of different cities, as done in [16]. The generated network initially has only one component (SΩS=1S_{\Omega_{S}}=1 and S1=NS_{1}=N) for a=0a=0, allowing a certain degree of randomness when routes pass through nodes not visited previously. For these parameter values, we apply the proposed attack methodology for various values of RR and SS, which leads to different values of NN.

Refer to caption
Figure 3: Illustration of the progressive process of synthetic networks generation for a=0a=0, b=5b=5, S=45S=45 and X=300X=300. In panel [A] a single route is shown and, as on the whole process, it is clearly a self-avoiding path. In panels [B], [C], [D], [E] and [F] a new route is subsequently added with a different color for clarity purpose. It is important to notice that there is a single connected component because the parameter aa is set to 0.

3 Synthetic PTN attack results

We systematically analyze multiple realizations of the synthetic network to explore the robustness of PTNs against attacks using the route removal described procedure. Figure 4 illustrates the procedure for a specific realization of the synthetic PTN, elucidating the analysis through a simple example. In the figure, the 𝕃\mathbb{L}’-space of one realization of the synthetic model is depicted for R=500R=500 and S=45S=45 in the left panel (Φ=0\Phi=0). In the top row of panels, snapshots display different instances when routes are randomly removed, while in the bottom row, routes are removed with priority based on betweenness in the \mathbb{C}-space. The same number of removed routes is visualized for both processes, indicated by Φ=0.07\Phi=0.07, 0.260.26, and 0.660.66 in the left-to-right columns, respectively. Each of the first five largest components is shown in different colors, as indicated in the legend, while the rest of the components (SiS_{i} with i>5i>5) are displayed in light gray. Qualitatively, it is evident that targeted attacks following the betweenness measure are more effective in detaching nodes from the first giant component. The second component appears with a size comparable to the giant component. Intimately related to this, it is also noticeable that the network disassembly mechanism, in the case of betweenness, leads to detachments of entire network regions, illustrated by the successive emergence of different components of considerable size (bottom right panel).

Refer to caption
Figure 4: Illustration of the results of attacking a particular realization of a network generated with the synthetic model with a=0a=0, b=0.5b=0.5, R=500R=500, S=45S=45 a through a directed attack (using betweenness centrality strategy) and a random attack. The original 𝕃\mathbb{L}’-space is plotted on the panel [A]. Panels [B], [C], and [D] represent the first components resulting from different stages of the network random attack, with the corresponding fraction Φ\Phi of removed routes. Panels [E], [F], and [G] represent the results of the network- betweenness directed attack for the same Φ\Phi values. Different colors represent the first five components into which the network is disassembled. Isolated nodes are plotted in gray.

Going further, we will systematically analyze the attack following the procedures described in the previous section: four centrality measures in the \mathbb{C}-space (degree, closeness, PageRank and betweenness), the maximal and minimal removal procedure described in the previous section, and random removal. Each procedure is computed for 1010 realizations of the synthetic network model. For random removal, the number of realizations is increased to 100100, ensuring the convergence of the procedure. In this manner, we were able to reconstruct the average values of S1/NS_{1}/N, S2/NS_{2}/N, and ΣS\Sigma_{S} as a function of Φ\Phi, as shown in Figure 5, across the different realizations.

Refer to caption
Figure 5: Average fraction of nodes on the two main components S1S_{1} and S2S_{2}, and the normalized entropy ΣS\Sigma_{S} are depicted as functions of Φ\Phi in the top, middle, and bottom panels, respectively. The estimation of the averages and their corresponding errors are taken over 1010 realizations of the synthetic network. The shaded areas correspond to the errors associated with the estimation of the averages. The different proposed removal processes are represented by colored lines for the synthetic PTN network with a=0a=0, b=5b=5, S=45S=45, and R=500R=500. ”Max” and ”Min” account for maximalmaximal and minimalminimal strategies, respectively. This holds for next figures also.

For S1/NS_{1}/N, the maximal and minimal procedures serve as lower and upper bounds for a wide range of Φ\Phi. The betweenness attack emerges as the most effective among the traditional centrality measures, leading to a substantial decrease in the giant component. Its effectiveness stems from its ability to break the network into several sizable components swiftly. In contrast, the maximal metric destructs the network similarly to betweenness (or even more effectively for small Φ\Phi) based on the giant component, though without generating the emergence of a second component. When considering the entropy, the distinction becomes more evident. The maximal attack reveals its strategy: it removes routes to generate many isolated nodes, rapidly driving the entropy to high values. The disparity between random removal and classical metrics is notable. In the literature, for instance, as seen in [31], random attacks tend to be less detrimental when disassembling a network. The other three centrality measures in \mathbb{C}-space: degree, closeness and PageRank exhibit similar behavior in S1S_{1}, S2S_{2}, and ΣS\Sigma_{S}. One noticeable result is that the betweenness procedure leads to smaller values of S1S_{1} (for Φ>0.6\Phi>0.6) compared to the maximal method, which is defined to be the most effective one-step strategy.

To ensure the robustness of the observed results against parameter choices, we compute 1\mathcal{R}_{1} and 2\mathcal{R}_{2} for synthetic networks with different values of RR and SS, as illustrated in Figure 6. The behavior across different values of SS, denoted by the varying size of the circles, demonstrates minimal variations. 1\mathcal{R}_{1} and 2\mathcal{R}_{2} stabilize as functions of RR for R200R\gtrsim 200. Initially, we observe that the procedures can be ordered by decreasing value of 1\mathcal{R}_{1} as follows: minimal; followed by the group of degree, PageRank, and closeness; then random; and finally, the pair of maximal and betweenness with the lowest values. Notably, the attacks by betweenness and maximal exhibit distinct behavior from the rest, with maximal being the most effective.

Refer to caption
Figure 6: In panel [A], global robustness 1\mathcal{R}_{1} y 2\mathcal{R}_{2} as a function of the number of routes RR, with their respective errors, inferred from S1S_{1} and S2S_{2}. For each RR, four different numbers of route stops, SS, are represented by circle sizes. In addition, on panel [B], the relation between 1\mathcal{R}_{1} and 2\mathcal{R}_{2} is plotted for both the model (averaging over RR and SS) and for the real case of Section 4. Circles account for the actual network results; the average synthetic results are shown with stars and error bars represent the deviation of the average estimations, i.e. the average of the corresponding deviations.

Regarding the second component, the order in 2\mathcal{R}_{2} is as follows: betweenness has the largest value by a considerable margin, followed by the group of closeness, PageRank, maximal, and degree; then random; and finally, the minimal procedure. It is noticeable that the maximal procedure, which is the one with the best attack performance, together with betweenness, does not yield high values of 2\mathcal{R}_{2}, but quite the opposite. This emphasizes that while both attack strategies have the same impact, for the case of the maximal procedure, S1S_{1} is not broken into large S2S_{2}. The bottom panel of Figure 6 illustrates both results in the 1\mathcal{R}_{1} and 2\mathcal{R}_{2} plane.

4 Real Network Analysis

This section implements all defined attack procedures in a real PTN. In particular, we will work with the urban bus system of the Metropolitan Area of Buenos Aires (AMBA), the largest metropolitan region in Argentina (and one of the largest in Latin America).

We have obtained the information regarding the routes of the different R=489R=489 bus lines operating in the AMBA using OpenStreetMaps [32]. By utilizing the DBSCAN algorithm implemented in [20], nearby stops within an 8080 meter radius were merged, aiming to consider nearby stops as the same node. This process resulted in obtaining the 𝕃\mathbb{L}’-space, which consists of N=6016N=6016 nodes and 2269822698 links, with ΩS=1\Omega_{S}=1. As for the \mathbb{C}-space, the network comprises R=489R=489 nodes and 1920119201 links.

Refer to caption
Figure 7: Left panel [A] S1/NS_{1}/N, S2/NS_{2}/N and ΣS\Sigma_{S} as a function of Φ\Phi for the AMBA bus network. Right panel, Sankey diagrams for four different applied metrics: [B] minimal, [C] degree, [D] maximal and [E] betweenness. The flow between components at different Φ\Phi are plotted.

The same analysis as in Section 3 is conducted on the AMBA bus network. In panel [A][A] of Figure 7, S1/NS_{1}/N, S2/NS_{2}/N, and Σ𝒮\Sigma_{\mathcal{S}} are plotted for the different attack strategies.

One notable observation is the significant difference compared to the results for the synthetic networks, as all metrics except the minimal one are more effective at disrupting the network than the random strategy. This aligns with expectations from the literature and could indicate some shortcomings of the synthetic network model in mimicking real networks. In this real case, the minimal method is the least effective in damaging S1S_{1}, while the betweenness procedure emerges as the most effective for Φ>0.2\Phi>0.2, surpassing the maximal strategy. In this case, both S1S_{1} and S2S_{2} exhibit considerable jumps, indicating a significant change when one route is attacked. It’s important to note that the only way S2S_{2} can increase is by forming a new and larger second component from the giant component.

Observing the evolution of S2/NS_{2}/N reveals that betweenness succeeds in disassembling the network by generating detachments of the giant component from important sets of connected nodes. Analogously, this behavior can be seen in the flow diagrams in panels [B][B], [C][C], [D][D], and [E][E], where the flow of nodes between the first five largest components is plotted for the minimal, degree, maximal, and betweenness strategies, respectively. For example, the minimal and degree attacks disassemble the network by removing nodes that are then isolated throughout the process. The same happens, but more quickly, for the maximal case. In contrast, the betweenness strategy quickly generates the detachment of secondary components that prevail throughout the attack process.

Interestingly, when observing the normalized entropy associated with the sizes of the different components throughout the process, the minimal and maximal strategies represent the lower and upper bounds. Although betweenness is more effective in breaking the network, the distribution of components along the process exhibits a lower entropy than for the maximal case. Additionally, we again observe a discrepancy with the synthetic network: the entropy for the random case is lower than that for the classical metrics. This difference highlights a key distinction between synthetic and real networks.

To quantitatively compare the overall robustness against the different strategies and how the network is disassembled during the process, we compute 1\mathcal{R}_{1} and 2\mathcal{R}_{2} for the actual network in the bottom panel of Figure 6. Thus, betweenness stands out as the most effective strategy due to its low 1\mathcal{R}_{1}, while it has the highest 2\mathcal{R}_{2}.

The strategies applied to the AMBA PTN can be classified in the 1\mathcal{R}_{1} and 2\mathcal{R}_{2} plane, where betweenness is always located in the bottom right corner and minimal in the opposite one. The results of the real PTN (shown in circles) can be compared with the cases of synthetic modeled PTN (represented by star symbols with error bars denoting the standard deviation obtained from 1010 realizations). Although they do not perfectly coincide, there is a similar behavior between the strategies applied to the real PTN and the modeled one.

Refer to caption
Figure 8: Three stages of the directed attack process on the 𝕃\mathbb{L}’-space of the AMBA region, using the betweenness strategy. Each row accounts for a different fraction Φ\Phi of removed routes and visualizes the effect of removing central routes. On panels [A], [C], and [E], the route with the higher betweenness is highlighted in black. On panels [B], [D], and [F], the network after the removal of the targeted lines is shown. Node colors represent the component it belongs to, showing the effects of these attacks on the first five components of the network and their sizes on the plot legends.

To conclude the analysis of the real network and better understand the disassembly process of the network, we decided to study the betweenness removal strategy for different values of Φ\Phi. In particular, we wish to examine what happens when there are jumps in S2/NS_{2}/N in Figure 7[A]. For this purpose, in Figure 8, we plot the 𝕃\mathbb{L}’-space of the AMBA for 3 different values of Φ\Phi. In the upper panel, we mark the line to be removed in the next step, while in the lower panel, we observe the effect produced by such removal. The different components are plotted in different colors.

The first observation is that removing the path with the highest betweenness does not necessarily result in the appearance of a new second giant component. For instance, at Φ=0.07\Phi=0.07, S2S_{2} remains constant, while a new S3S_{3} emerges. However, what appears to be more significant is that in all three cases, the components detaching from the lattice belong to the periphery of the lattice. A similar effect is observed in the example shown in Figure 4. This suggests that the routes with higher betweenness in the \mathbb{C}-space serve as bridges between the core of the network and its expansions into the periphery.

We found that the results obtained from the model were not significantly different from those of the real network. However, to understand the differences in S1S_{1} and S2S_{2} between them, we can propose certain improvements to the model. One major simplification of the synthetic model is assuming all routes (RR) have the same number of stations (SS). However, this assumption does not hold in the real network, where routes have a varied number of stations. Therefore, by considering the same synthetic model but with a distribution of stations on the routes forced to be similar to the real one, we obtain results that are much more similar to those of the real network. For example, in cases of S1(Φ)S_{1}(\Phi), we can observe how the procedures given by the metrics in the \mathbb{C}-space (degree, closeness, and PageRank) are more harmful than the random ones in these synthetic models with ”realistic” routes. This indicates that improvements can be proposed to the synthetic model to mimic the topological and robustness properties against attacks more accurately, which goes beyond the objectives of this work.

5 Discussion

In this work, we focused on studying the robustness and sensitivity of public transport networks (PTNs) to route attacks. This novel approach allows for obtaining different results than node or link attacks on the network. We defined various network attack procedures based on centrality measures for \mathbb{C}-space, where nodes represent routes. As metrics of damage, we used measures based on the sizes of the components formed in the networks where stations are nodes (both 𝕃\mathbb{L}-space and 𝕃\mathbb{L}^{\prime}-space). Additionally, we introduced two new route attack procedures, maximal and minimal, based on the most and least harmful tactics in the network damage at the next step. All of this was studied in both synthetic PTNs, which allowed for statistical analysis, and a real network of considerable size and well-established structure in Buenos Aires. We observed how different centrality measures or strategies generated distinct outcomes. Specifically, we illustrated that degree, closeness, and PageRank metrics show similar behaviors while betweenness operates differently. The latter procedure progressively breaks down the network into several components of comparable sizes. We found that the minimal strategy inflicts the most minor damage to the network. However, following the betweenness method can either surpass or be on par with the maximal strategy in terms of damage, albeit with markedly different behavior in the second component. Finally, we propose improvements to synthetic networks by observing the differences in the behavior between the random strategy and the other three centrality measures across synthetic and real networks. These enhancements in properties may contribute to producing new synthetic models of metropolitan areas for future studies. We also believe that the analysis developed in this work can aid in enhancing and designing PTNs that are efficient and resilient to difficulties. Furthermore, we believe that continuing in this direction would make it feasible to assess the accessibility and efficiency of a PTN by utilizing actual data on residents’ mobility patterns.

Funding

We acknowledge the support of PIP 2021-2023 11220200102701CO from CONICET for their financial assistance.

Declaration of Competing Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Contributions

TC collected and analyzed the data. TC, IC and LE interpret the results and wrote the manuscript. EL and IC conceived the study. All authors read and approved the final manuscript.

References

  • [1] Deng, Y., Wu, J. & Yue-Tan Optimal attack strategy of complex networks based on tabu search. Physica A: Statistical Mechanics And Its Applications. 442 pp. 74-81 (2016)
  • [2] Yu, Y., Xiao, G., Zhou, J., Wang, Y., Wang, Z., Kurths, J. & Schellnhuber, H. System crash as dynamics of complex networks. Proceedings Of The National Academy Of Sciences. 113, 11726-11731 (2016)
  • [3] Li, J., Wang, J., Sun, S. & Xia, C. Cascading crashes induced by the individual heterogeneity in complex networks. Applied Mathematics And Computation. 323 pp. 182-192 (2018)
  • [4] Artime, O., Grassia, M., De Domenico, M., Gleeson, J., Makse, H., Mangioni, G., Perc, M. & Radicchi, F. Robustness and resilience of complex networks. Nature Reviews Physics. 6, 114-131 (2024)
  • [5] Scheffer, M., Carpenter, S., Lenton, T., Bascompte, J., Brock, W., Dakos, V., Koppel, J., Leemput, I., Levin, S., Nes, E., Pascual, M. & Vandermeer, J. Anticipating Critical Transitions. Science. 338, 344-348 (2012)
  • [6] Martinez-Pastor, B., Nogal, M., O’Connor, A. & Teixeira, R. Identifying critical and vulnerable links: A new approach using the Fisher information matrix. International Journal Of Critical Infrastructure Protection. 39 pp. 100570 (2022)
  • [7] Arango, E., Nogal, M., Sousa, H., Matos, J. & Stewart, M. GIS-based methodology for prioritization of preparedness interventions on road transport under wildfire events. International Journal Of Disaster Risk Reduction. 99 pp. 104126 (2023)
  • [8] Yang, Y., Nishikawa, T. & Adilson E. Motter Small vulnerable sets determine large network cascades in power grids. Science. 358, eaan3184 (2017)
  • [9] Newman, M. Networks. (Oxford University Press,2018)
  • [10] Schneider, C., Moreira, A., Andrade, J., Havlin, S. & Herrmann, H. Mitigation of malicious attacks on networks. Proceedings Of The National Academy Of Sciences. 108, 3838-3841 (2011)
  • [11] Latora, V. & Marchiori, M. Is the Boston subway a small-world network?. Physica A: Statistical Mechanics And Its Applications. 314, 109-113 (2002), Horizons in Complex Systems
  • [12] Sienkiewicz, J. & Hołyst, J. Statistical analysis of 22 public transport networks in Poland. Phys. Rev. E. 72, 046127 (2005)
  • [13] Pan, Y., Chang, M., Feng, S. & Hao, D. Research on the Complex Characteristics of Urban Subway Network and the Identification Method of Key Lines. Applied Sciences. 13 (2023)
  • [14] Barthélemy, M. Spatial networks. Physics Reports. 499, 1-101 (2011)
  • [15] Dong, S., Mostafizi, A., Wang, H., Gao, J. & Xiaopeng Li Measuring the Topological Robustness of Transportation Networks to Disaster-Induced Failures: A Percolation Approach. Journal Of Infrastructure Systems. 26, 04020009 (2020)
  • [16] Ferber, C., Holovatch, T., Holovatch, Y. & Palchykov, V. Public transport networks: empirical analysis and modeling. The European Physical Journal B. 68, 261-275 (2009)
  • [17] Von Ferber, C., Holovatch, T., Holovatch, Y. & Palchykov, V. Network harness: Metropolis public transport. Physica A: Statistical Mechanics And Its Applications. 380 pp. 585-591 (2007)
  • [18] González, F. & Anapolsky, S. Identificando la desigualdad en los patrones de movilidad en transporte público. Banco In. (2022)
  • [19] Cervero, R., Guerra, E. & Al, S. Beyond Mobility. (Island Press/Center for Resource Economics,2017)
  • [20] Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., Duchesnay, E. & Louppe, G. Scikit-learn: Machine Learning in Python. Journal Of Machine Learning Research. 12 (2012)
  • [21] Batty, M. The New Science of Cities. (The MIT Press,2013)
  • [22] Moustaka, V., Vakali, A. & Anthopoulos, L. A Systematic Review for Smart City Data Analytics. ACM Comput. Surv.. 51 (2018)
  • [23] Rybski, M. Cities as complex systems—Collection overview. PLOS ONE. 17, 1-6 (2022)
  • [24] Ortman Cities: Complexity, theory and history. PLOS ONE. 15, 1-24 (2020)
  • [25] Lahoorpoor, B., Sarkar, S. & Levinson, D. Evaluating the Vulnerability of the Sydney Train Network by Comparing Access-based and Network Centrality Metrics. Findings. (2023)
  • [26] Yinger, J. Black Rock City versus Manhattan: An economist’s view. PLOS ONE. 16, 1-17 (2021)
  • [27] Pérez-Méndez Modeling adaptive reversible lanes: A cellular automata approach. PLOS ONE. 16, 1-16 (2021)
  • [28] Kumar, H., Singh, M., Gupta, M. & Madaan, J. Moving towards smart cities: Solutions that lead to the Smart City Transformation Framework. Technological Forecasting And Social Change. 153 pp. 119281 (2020)
  • [29] Batty, M. The Size, Scale, and Shape of Cities. Science. 319, 769-771 (2008)
  • [30] Xu, Y., Olmos, L., Mateo, D., Hernando, A., Yang, X. & González, M. Urban dynamics through the lens of human mobility. Nature Computational Science. 3, 611-620 (2023)
  • [31] Albert, R., Jeong, H. & Barabási, A. Error and attack tolerance of complex networks. Nature. 406, 378-382 (2000)
  • [32] OpenStreetMap contributors Planet dump retrieved from https://planet.osm.org . ( https://www.openstreetmap.org ,2017)
  • [33] Gobierno de Buenos Aires¿Qué es el AMBA?. (https://shorturl.at/E0146,2020)
  • [34] Ministerio de Transporte, La circulación de pasajeros en transporte público en amba promedia el 25
  • [35] Berche, B., Ferber, C., Holovatch, T. & Holovatch, Y. Resilience of public transport networks against attacks. The European Physical Journal B. 71, 125-137 (2009)
  • [36] Berche, B., Ferber, C., Holovatch, T. & Holovatch, Y. Public Transport Networks under Random Failure and Directed Attack. Dynamics Of Socio-Economic Systems. (2010)
  • [37] Berche, B., Ferber, C., Holovatch, T. & Holovatch, Y. Transportation Network Stability: A case study of city transit. Advances In Complex Systems. 15, 1250063 (2012)
  • [38] Candelieri, A., Galuzzi, B., Giordani, I. & Archetti, F. Vulnerability of public transportation networks against directed attacks and cascading failures. Public Transport. 11, 27-49 (2019)
  • [39] Ferber, C., Berche, B., Holovatch, T. & Holovatch, Y. A tale of two cities: Vulnerabilities of the London and Paris transit networks. Journal Of Transportation Security. 5, 199-216 (2012)
  • [40] Zhang, H., Wang, J., Shi, B., Lu, X. & Jia, J. Exploring significant edges of public transport network under targeted attacks. Modern Physics Letters B. 33, 1950114 (2019)
  • [41] Rodríguez-Núñez, E. & García-Palomares, J. Measuring the vulnerability of public transport networks. Journal Of Transport Geography. 35 pp. 50-63 (2014)
  • [42] Modiri, A. Error and attack tolerance of public transportation networks: a temporal networks approach. (Aalto University, School of Science,2018)
  • [43] Ramirez, L., Centres, P. & Ramirez-Pastor, A. Percolation phase transition by removal of k²-mers from fully occupied lattices. Phys. Rev. E. 100, 032105 (2019)
  • [44] Ramirez, L., Centres, P. & Ramirez-Pastor, A. Standard and inverse bond percolation of straight rigid rods on square lattices. Physical Review E. 97 (2018)
  • [45] Ramirez, L., Centres, P. & Ramirez-Pastor, A. Inverse percolation by removing straight rigid rods from square lattices. Journal Of Statistical Mechanics: Theory And Experiment. 2015, P09003 (2015)
  • [46] Ermann, L., Frahm, K. & Shepelyansky, D. Google matrix analysis of directed networks. Reviews Of Modern Physics. 87, 1261-1310 (2015)
  • [47] Wang, S. & Tan, X. Finding robust influential seeds from networked systems against structural failures using a niching memetic algorithm. Applied Soft Computing. 136 pp. 110134 (2023)
  • [48] Wang, S. & Tan, X. A Memetic algorithm for determining robust and influential seeds against structural perturbances in competitive networks. Information Sciences. 621 pp. 389-406 (2023)
  • [49] Wang, S., Jin, Y. & Cai, M. Enhancing the Robustness of Networks Against Multiple Damage Models Using a Multifactorial Evolutionary Algorithm. IEEE Transactions On Systems, Man, And Cybernetics: Systems. 53, 4176-4188 (2023)