1. Introduction
With the rapid growth of merging Information and Communication Technology (ICT) with Critical Infrastructures (CIs) such as Energy and Transportation systems, the complexity of CIs drastically increased and Cyber–Physical Systems (CPSs) have been formed. CPSs are the result of integrating the computing, communication, and control capabilities, with physical processes which were developed to facilitate the monitoring and controlling of system components in the physical world [
1]. Although this progress enhanced the efficiency and service coverage of CIs, it significantly increased the connections among the system components as well as the interdependencies between different sectors of CIs, such as the dependency between the transportation system and the power and telecommunication systems.
These intricate dependencies make systems more vulnerable because in this way any failure of critical infrastructure will have a considerable impact not only on the infrastructure itself but also on the other dependent infrastructures. As an example, in 2001 an electric power disruption in California, caused a cascading failure and affected oil and natural gas production, refinery operations, gasoline transportation, key industries and the water and agriculture sectors, which led to major financial loss [
2]. Two years later the blackouts in the USA–Canada and Southern Sweden and Eastern Denmark revealed the possibility of international cascading effects. In general, recent blackouts [
3] and studies on their impact [
4] clearly showed this strong dependency between the electrical infrastructure as an individual CPS and other CIs and the consequences of this dependency.
Meanwhile, the frequency and impact of recent blackouts, particularly in Europe and North America, are progressively growing; this could also be interpreted as a remarkable warning for all CIs [
5,
6]. The vulnerability of the electrical infrastructure by itself mainly stems from the heterogeneity of connections and dependencies among the system components. This vulnerability has grown after the merging of the electrical infrastructure with information and communication systems and turned electrical infrastructure into an attractive target for cyber attacks. In electrical infrastructure, like other CIs, any individual part and facet of a system has its special characteristics; this affects the behaviour of the entire system when it encounters an unexpected situation such as a cyber or a cyber physical attack [
7]. Therefore, detecting the chain of dependency and studying the relationships among components of CIs, particularly inside the electrical infrastructure as vital cyber physical systems, are of great importance for the maintenance of key processes which substantially impact on the economy and societal well being.
Modelling and simulation methods are highly suggested as proper tools to study CPSs. With the main goal of enhancing the resilience and security of complex systems, valuable researches have been conducted for modelling the dependencies of and in such systems; these include Complex Networks Theory/Graph Theory, Petri-Nets [
8], Well-Formed Nets (SWN) [
9], Input-Output Models [
10], Bayesian Networks [
11], Matrix representations, Boolean logic Driven Markov Processes (BDMP), Agent-Based Models and Multi-Agent Modelling [
12]. Most of the aforementioned studies focus on qualitative or semi-qualitative analyses. Unfortunately, such approaches provide inadequate knowledge to system designers and decision-makers with the responsibility to mitigate negative impacts and to manage risks arising from dependencies inside a system, since operators not only need to know about the connectivity and dependencies, but their magnitude and characteristics as well [
13,
14].
Despite significant efforts in recent years, analysis and modelling of CPSs is still a challenging problem in basic research on complex systems; because in this context, CPSs are not analysed as discrete assets or services within particular sectors. Instead, a holistic system-of-systems view is followed, in which all the connections between different subsystems and sub-layers of a CPS are considered [
15]. Even though Graph Theory-based methods were known as the most common and effective approaches to reveal the hidden dependencies [
16], reviews of recent studies show that utilizing Graph Theory to study large scale systems such as electrical infrastructures will result in massive complicated diagrams that cannot be easily understood and cannot assist in distinguishing the impact of dependencies [
17]. Nevertheless, graphical models developed based on Graph Theory such as Network Analysis and Design Structure Matrix (DSM) have addressed these issues to some extent and represented promising results to evaluate the characteristics of connections in CPSs. DSM has been mainly developed to extract the interrelationships exist between the activities of a complex design problem to break them down into smaller sub-problems. More precisely, in the DSM, the connectivity between the elements of a system should be represented in the form of a matrix first and then different methods such as clustering will be applied to find probable dependencies or structural patterns that might exist. However, due to the fact that this model requires to analyse of all the system connections to extract probable dependencies, DSM could not be an efficient method to study characteristics of connections in large scale CPSs. To tackle this challenge, we propose MDSM, a modified version of DSM in which the searching based algorithms in the analysis phase of the DSM are replaced with a lightweight and deterministic approach. Indeed, MDSM not only has lower computational complexity but also extracts the characteristics of connections for all the system components and represent the result in a predefined systematic structure, unlike DSM. Moreover, to facilitate the quantitative analysis of dependencies of complex systems, the inter-dependency and the intra-dependency are located in predefined and separate parts in the MDSM.
Indeed, applying a graphical model to represent the interconnections between different subsystems of a large-scale CPS effectively enhances the knowledge about the connectivity within the systems and presents more details on the behaviour of different subsystems while working as a whole, in particular on their interdependencies. Therefore, this paper first attempts to develop a simple yet useful graphical method to represent coupled critical infrastructures to facilitate the identification of dependencies within CIs and then proposes quantitative parameters to evaluate the characteristics of dependencies inside large scale systems in order to enhance the security and robustness. Our main contributions are as follows:
We propose MDSM as a graphical model to extract characteristics of connections inside a cyber-physical system to facilitate studying the behaviour of dependent components of large scale systems including, both intra-dependency and inter-dependency.
We propose four quantitative dependency parameters, namely the Impact of Dependency (IoD), the Susceptibility of Dependency (SoD), the Weight of Dependency (WoD) and the Criticality of Dependency (CoD) to measure the characteristics of dependencies.
We propose a method to aggregate quantitative dependency parameters of the higher order of dependency to evaluate the characteristics of multi-order dependencies in CPSs.
We illustrate the application of the proposed method to a reduced scale network from a real French Distribution Network with 14 power-bus.
The rest of the paper is organized as follows: In
Section 2, we review the related work on modelling dependencies in CIs.
Section 3 describes the proposed method, while
Section 4 explains the concept of the higher order of dependency in system-of-systems. A case study is presented in
Section 5 to evaluate the applicability of the proposed method and application of dependency analysis is expounded in
Section 6. Finally,
Section 7 summarizes our conclusions and indicates directions for future work.
2. Related Work
As discussed earlier, critical infrastructures depend on each other to operate properly and these expanding connections among them, be they tangible or intangible, have increased the vulnerabilities of CIs. The term dependency refers to a connection or linkage between two components, through which the state of one component influences the state of the other. While interdependency is a two-way dependency, a mutual dependency, between two components such that the state of each component influences or is correlated to the state of the other one.
Exploiting the six dimensions of interdependencies proposed by Rinaldi et al. [
2] namely, type of failure, infrastructure characteristics, state of operation, environment, coupling and response behaviour and types of interdependencies, facilitates the identification of interdependencies inside CIs. Each dependency between two components may be represented by modelling the connection between them, which is one of the following types:
Input, Mutual, Shared, Exclusive, Co-located [
18];
Physical, Cyber, Geographic, Logical [
2];
Functional, Physical, Budgetary, Market and economic [
19];
Physical, Geospatial, Policy, Informational [
20].
Ouyang et al. [
21] developed ten different scenarios to evaluate these types of dependencies in CIs and concluded that utilising the type of interdependencies proposed by [
2] provides better results in terms of covering a variety of scenarios. Nieuwenhuijs et al. [
22] asserted that the geographical interdependencies are the result of a common mode failure rather than a type of dependency that was mentioned in [
2]. Rinaldi et al. [
2] proposed Cascading failure, Escalating failure and Common cause failure as three different types of dependency-related failures as a dimension of dependency. Later, the result of an empirical study indicated that dependency-related failures in systems could be categorized into either cascade-initiating or cascade-resulting [
23]. In general, analysing dependencies through this dimension increases the system resilience as it facilitates the identification of failures that might occur in CIs. Such failures can disturb the functionality of systems, thus affecting their reliability. Modelling dependencies of CIs in order to understand the behaviour of complex systems encountered with failures that may be caused by adversaries is a common approach towards enhancing the reliability of systems [
24,
25]. In general, modelling CIs in terms of their interdependencies provides an insightful view of inter-system and intra-system causal relationships, response behaviour, failure types, state of operation, and risks that arise due to the dependency-related failures in systems [
26,
27]. Accordingly, significant efforts have been made to develop appropriate models to map out the interdependencies of complex systems. Even though several researchers attempted to model dependencies between all the critical infrastructures [
28,
29,
30], the majority focused on limited numbers of critical infrastructures [
31,
32], particularly on the power and ICT infrastructures [
33,
34].
In fact, large scale blackouts and the ongoing transition towards smart grids and the idea of developing smart cities across the globe decisively highlighted the impact of the power systems on the reliability of all CIs in different sectors [
35]. An empirical study on different CIs showed that energy and telecommunications are the main cascading-initiating sectors [
23]. As a result, significant efforts have been made in the last few years to study and model the interdependencies of power systems combined with ICT systems, viewed as complex cyber-physical systems, to improve defensive and protective strategies in the cyber and physical layers of power systems [
33,
34,
35,
36,
37].
Researchers in many domains attempt to identify suitable methods to model real systems, considering the relations and dependencies between the systems’ components. Satumtira et al. [
38] surveyed 162 papers on interdependency modelling, among which the Graph Theory/Complex Network Theory (at 22% of the studies) was the most common method to study interdependencies in CIs. Input-output models were next, followed by agent-based models that were used in 11% of the studies. Each of these methods has its own advantages and weaknesses in modelling CIs in terms of different dimensions of interdependency. For instance, the input-output model, that is inherently a method to study the economic flow, has been applied recently to calculate economic losses that result from the unavailability of different sectors in CIs and their interdependencies. This model has also been modified in a way that could evaluate the spread of risk among system components [
39,
40]. Nevertheless, input-output modelling may not be used in holistic approaches to capture both functional and geographic interdependencies [
41].
Torres [
42] suggested six different objectives namely Scalability, CPU time, Usability, Tools accessibility, Dynamic simulation and Large systems modeling to evaluate different methods including Agent-based Model, Petri Nets, Bayesian Networks, BDMP and Complex Network Theory/Graph Theory for modelling CIs. Comparing those methods by the author revealed that the Complex Network Theory with the highest value in four out of six different objectives has the best results, which confirmed the applicability of this method to model CIs [
42]. Indeed, the Complex Network Theory is developed based on the Graph Theory to study real networks in social and computer science, biology, telecommunication, transport, electronics, electrical engineering, and other domains with complex systems [
43].
According to Graph Theory, topological analysis allows us to describe the connectivity of complex systems and to model the relationships between system components and their characteristics with less data. The topology-based method facilitates vulnerability assessment and can provide a clear view of the role and importance of each component and connection in the systems, as well as to fully cover all types of interdependencies; no other model has this ability [
21,
44,
45]. Therefore, this method is a suitable choice for analysing complex systems, since it explicitly includes the interactions and dependencies within/between systems and provides a simple yet powerful means to evaluate and manage complex systems architectures [
35].
Likewise, derivatives of Graph Theory in the context of the topological analysis, such as matrix-based system modelling representation (Adjacency matrix) and Network Analysis and Design Structure Matrix (DSM) visualize the system components and interactions as graphical nodes and lines [
46,
47]. This intuitive model reduces the complexity of the analysis process and contributes to improving the understanding of operators [
48]. DSM is known as a highly flexible and straightforward modelling technique, which provides valuable insights for engineers and managers in a wide range of fields. This method was initially developed to decompose a complex design problem into sub-problems by displaying the interrelationships between the activities in the form of a matrix. Recently, DSM has been utilized in different fields to study interdependencies; as a result, it is currently referred to as Dependency Structure Matrix Analysis [
49]. Eppinger et al. presented the application of DSM in different industries and sectors through 44 practical cases [
50]. The growing dependency-related failures within CIs, and the significant impact of CIs on the economy and the quality of life, intensify the necessity of developing modelling methods to study the dependencies and characteristics of complex systems, in particular, for modelling large scale CIs such as power and ICT systems.
DSM represents the interaction among the elements of a system in a square matrix with the inputs in rows and outputs in columns (
Figure 1b). Then, based on the type of the system and its application, different analytical methods such as the clustering and sequencing analysis can be applied to extract the relations among the desired elements of the system (
Figure 1c). In other words, DSM first documents the relationships among the elements of a system and then utilizes clustering analysis and rearranges the system’s elements in order to find structural patterns that might exist in the system, such as an interdependency.
We propose the modified DSM in
Section 3 to turn the DSM into a predefined systematic structure for representing interactions between two subsystems without the need for those analytical methods. In this way, not only the computational complexity will decrease, but MDSM will also assist in extracting the characteristics of connections for all the system components, unlike the DSM. In MDSM the direction of connections between components is clearly distinguishable and inter-dependency and intra-dependency are placed in predefined and separate parts; this greatly facilitates further analysis and calculations. We also introduce four dependency parameters to evaluate and analyse the weight, impact and criticality of each dependency relationship between components in a quantitative manner.
4. Higher Order of Dependency in System-of-Systems
As discussed earlier, coupling different systems and infrastructures might increase the vulnerability, as one failure in a system could lead to another failure in the other system and this process could continue back and forth until all connected components, and subsystems fail. Recent blackouts in the US [
2], and Italy [
60] and their severe impacts are concrete examples of such a cross-sectoral cascading failure in the interconnected infrastructures. These power outages and similar crises in recent years have raised many questions regarding the effect of different types of connections, and the impact of systems rewiring in improving the resilience of the interdependent infrastructures.
In
Section 3, four parameters were introduced to extract different characteristics of connections in CPSs. Nevertheless, evaluation of the multi-order of dependency in such interconnected systems could provide a more precise picture of interactions, dependencies, and cascading effects. For these reasons, we define the Higher order dependency (HoD) as a parameter to analyse a system not only based on the direct interactions, but also by considering the chain of dependencies, the impact of the structure of systems, and the effect of all the components in complex systems. To further improve the depth of analysis, HoD could be applied along with the other parameters of dependency. To define the concept of higher order dependency we use the terminology of Graph Theory in [
61]. In the directed graph
D, for all integer
p,
denotes the pth out-neighbourhood node
. For instance, if node
has a direct connection with nodes
, then the first out-neighbourhood
is defined as
. Furthermore, if node
is connected to
, the second out-neighbourhood node
will be
. Indeed, the pth out-neighbourhood of one node represents the pth order of dependency for that node. The higher order of dependency for node
is determined as follows:
(First Order)
(Second Order)
where the first order of the chain of dependency for includes two nodes and the second order only has one node .
The Breadth-First Search (BFS) is an algorithm that could be applied to extract the higher order of dependency. The BFS explores and extracts all the neighbour nodes of each node in a system. In the worst-case, the time complexity of this algorithm is
and the required space for saving the result is
[
61]. Based on the level we wish to explore the order of dependency in a system, the time complexity of applying this algorithm to extract the chain of dependencies varies, but in the worst case will be
. Note that
V and
A are the numbers of nodes and links in a system, respectively.
One approach to compute the value of the HoD is to add together the value of each order. In this case, each order of dependency in the chain of dependency with the length
n has the same impact. However, the effect of dependencies in a system tends to decrease with an increase in distance [
26]. This will be further explained with the case study in
Section 5.
Kotzanikolaou et al. [
26] utilized multi-order dependencies to investigate the effect of disruption to interconnected infrastructures. They proposed an equation to compute the cumulative dependency risk based on likelihood and impact considering the chain of dependency among different systems. Here we modify their equation to compute the nth-order of dependency without considering the concept of risk. Let
be a chain of dependency of length
n. Then, according to [
26], the nth-order of outgoing dependency of
, denoted as
, is computed by:
where
is a link between two elements,
and
. For example, based on Equation (
13), the 3rd-order of outgoing dependency of
is computed as:
. Here, the term
denotes that
is connected to
through the two links
and
. Therefore, considering the Equation (
13), multi-order dependencies for each element comprise
n times of the first order of dependency,
times of the second order of dependency and so on. For simplicity, we can rewrite Equation (
13) as follows:
Here,
n defines the order of dependency. Equation (
14) can be applied in different cases to measure the risk, impact and susceptibility by considering the chain of dependency. Unlike [
26], all the feedback loops between two subsystems are considered in our study as those are part of the system structure. We will apply the higher order dependency and will discuss the result in
Section 5.
5. Case Study
In this section, we analyse the proposed dependency parameters based on the micro-distribution network that was developed on the basis of a real French distribution network with 14 power-bus, called G2ELAB 14-Bus. This system includes both Electric Power System (EPS) and the ICT system (see
Figure 7), and has been broadly used in related studies [
33,
62,
63]. Although the advantages of MDSM as a graphical model could be recognized better in large scale systems, this system has been chosen for educational purposes and for allowing the comparison of our results with those in previous works.
In the test system, the EPS (first subsystem) includes 14 power buses, 7 distributed generation sources, 17 lines, 9 loads, and 3 transformers HV/MV and the ICT system (second subsystem) consists of 1 Wimax BS, 5 multiplexers, 3 routers [
33,
62]. For the sake of simplicity, the digraph of this system is shown in
Figure 8, where red circles represent the electrical nodes that belong to the physical part (first subsystem) and nodes of the cyber part (second subsystem) are depicted in blue colour.
Sanchez et al. [
62] modelled this system as undirected and directed graphs and measured the Betweenness Centrality and Efficiency of nodes for both perspectives to identify the system vulnerabilities. Later, Milanovic et al. [
33] followed the same approach and modelled the system as unidirectional and bidirectional graphs to compute the Node Degree and Efficiency of different types of connections (see Equations (1)–(4) in
Section 3) by utilizing complex numbers. The authors also proposed a three-dimensional interconnected model to represent the connections between interconnected ICT and EPS. However, to show the interaction between the two interconnected systems, their model needs two separate matrices. Besides, they asserted that owing to assigning different values such as 1, i, and 1 + i to each type of connections in the system, the computational complexity of the method is relatively high. On the contrary, our proposed MDSM can be applied to modelling unidirectional graphs, bidirectional graphs as well as complex systems with hybrid graphs. Moreover, the usage of complex numbers in MDSM is quite different from previous works. In a nutshell, all of those linkages
, either inter-dependency or intra-dependency, which originated from the second subsystem are shown with i, while different types of dependency are recognized based on their predefined position in MDSM.
Based on the topological data of the system, we first construct the MDSM and utilize its dependency part to compute the dependency parameters. The digraph of the dependency part is also depicted in
Figure 9 to facilitate the understanding of the interdependency and of the closed-loops that exist between the two subsystems.
Milanovic et al. [
33] argued that the importance of each node in a system can be measured by means of the node degree. Therefore, they computed the node degree of the ICT and EPS components of the test system and concluded that nodes
are the most important ones. Unlike previous works, the degree distribution of each node in our proposed method is divided into four distinct parts,
, which helps to identify the characteristics of each connection and the role of the corresponding nodes in a system. In our method, the total SoD (i.e.,
) and the total IoD (i.e.,
) of each node indicates the total number of its inbound and outbound links. Adding these two parameters, the total SoD and the total IoD is equal to the node degree.
Figure 10 shows the node degree of each node in the test system.
Nodes 2 and 19 were identified as remarkable nodes in terms of node degree by the authors in [
33], which complies with the values shown in
Figure 10. However, referring to the values of
in
Figure 10, nodes 2 and 19 are mainly important nodes in their own subsystems, not in the interaction between two subsystems. To make it more clear,
Figure 11 depicts
and
of the test system and reveals that indeed nodes
play significant roles in the interaction between two subsystems. In contrast to previous works, our proposed parameters can be applied to distinguish between the attributes of dependencies within a complex system, and between the subsystems of a complex system to identify hidden impacts and vulnerabilities.
The values of
and
of the test system provide more details of the system connectivity. For instance, for all nodes
in
Figure 11, the value of
is equal to the value of
. In other words, the number of inbound and outbound links of each of those nodes is the same. This might be a sign of closed-loop/interdependency in the system, as we know that for interdependency between two nodes, if those nodes are isolated, each node has the same number of inbound and outbound links. However, in complex systems, one cannot simply rely on the value of
and
to identify the interdependencies or closed-loops; one would need more information on the properties of connections.
As explained in
Section 3, WoD can be applied to measure and to reflect on the properties of dependencies. To this end, the corresponding value of each link based on its type of dependency is taken into account to compute the values of
and
of each node. The Weight of Dependency of
and
of the test system is computed and illustrated in
Figure 12. Based on
Figure 12, measured values of the WoD confirm that each of the nodes
is part of a closed-loop. Furthermore, to be more specific, these are the end users in closed-loops, which means that these nodes have no other incoming or outgoing links connected. As an example, based on
Figure 11 node 7 has two links, and the WoD of each link in
Figure 12 is equal to 2, which clearly shows that node 7 has an interdependency.
Apart from interdependencies, the values of the
,
and the corresponding WoD of each node can be applied to extract the properties of the system connections. For instance, suppose that we wish to analyse the type of dependency of node 22, in the interaction between two subsystems. According to
Figure 11,
and
, and
Figure 12 shows that
and
. Referring to
Section 3, we showed that the value of WoD for an interdependency is equal to 2. Here the weight of dependency for one single link
is equal to 2, which confirms that this link is part of a mutual dependency, i.e., an interdependency. For this reason, node 22 has one interdependency that consists of one
and one
, and two dependency links, i.e.,
because the WoD of these two links is equal to 2:
The results obtained from the analysis of WoD,
and
are consistent with
Figure 9. Therefore, the values of
,
, and the corresponding WoD of each node can be used to extract the properties of systems’ connections. These features were not studied in previous works.
In
Section 3, we also argued that higher order of dependency (HoD) can provide a deeper understanding of interactions between the system components. To evaluate that, the third order of dependency for
and
of the test system is measured based on Equation (
14), in which n = 3; the result is depicted in
Figure 13. To date, based on the measured values shown in
Figure 11 and
Figure 12, we showed that nodes
are the end-users of the closed-loops that exist in the test system.
Notably,
Figure 13 shows that even in the third order of dependency, the values of the
and
of nodes
are still equal. This means that nodes
form an isolated closed-loop in the system, in which both of these nodes are the end-users.
In addition, the nodes
in
Figure 11 have either the value of SoD or the value of IoD. Due to the fact that the values of the
of nodes
are equal to zero in
Figure 13, these nodes are absolute receiver nodes in the interdependent part of the system. Likewise, given that the value of
in
Figure 13, node 23 is only a sender. If any of the absolute receiver nodes
in one subsystem fails, the other subsystem will not be affected (see
Figure 9). To make it more clear, we remove each node of the test system and calculate the number of nodes that will be influenced by this removal. The result is depicted in
Figure 14. In summary,
Figure 14 highlights that removing the nodes with
will cause no change in the interdependent part of the system while removing nodes with the higher value of
has a major impact on the connectivity of other nodes.
Taking the higher order of dependency into consideration helps us to better understand the importance of links, and the role of nodes between two subsystems; this is of high value for risk management in complex systems.
The last parameter to investigate on the test system is the Criticality of Dependency (CoD). Based on the betweenness centrality and efficiency, Sanchez et al. [
62] stated that nodes
are vital nodes within this test system. In a follow-up paper [
33], the authors expanded the study and introduced
as critical nodes based on the Node Degree and weighted Efficiency. Aligned with these papers, a recent study conducted on this system ranked the criticality of each node based on the aggregation of three metrics that measure the importance of each node and its connected links in the entire system [
63].
All these recent studies attempt to identify critical components in a complex system, while our purpose here is to determine the critical dependencies between two subsystems. The CoD in a system-of-systems assesses how close one node in a subsystem is to the critical nodes of the other subsystem; this allows us to identify potential vulnerable areas for further investigation. Indeed, once the CoD of a system-of-systems is measured, then we can concentrate on the analysis of other features such as the susceptibility or the impact of those dependencies that have a higher value of CoD in the system, and consequently take proper action to control the consequences, and reduce the risk based on that information.
To compute the Criticality of Dependency (CoD) of the test system, we utilize the ranking presented in [
63], as it covers all the nodes of the system.
Figure 15 displays the criticality of each node, the CoD, and the third order of dependency for the CoD.
Regarding
Figure 15, identified critical components in a system are not necessarily those components that have the main role in connecting two subsystems. It should be noticed that when two well-designed and secure systems are merged, the outcome is a system-of-systems in which even less important components of each subsystem might turn to critical components, because of the new linkages. For example, in
Figure 15 although node 14 has been not identified as a highly critical node in the test system, its value of CoD indicates that node 14 has a close connection with critical nodes of the system. According to
Figure 7, node 14, which is a bus in the first subsystem, is connected to node 20, the main ICT router and the most critical node in the second subsystem. Likewise,
are two other nodes with the noticeable value of CoD in
Figure 15, which are connected to the critical nodes 19 and 8 (from the other subsystem), respectively. As depicted in
Figure 9, apart from the interdependency between nodes 14 and 20, these nodes along with nodes
form a local loop; this implies the existence of a vulnerable zone in the system-of-systems. In case that an event adversely affects the functionality of a node and a higher order of dependency turns back to that node, a feedback effect forms in the system which will influence other nodes as well and will exacerbate the total impact of the initial event. Analysis of the higher order of CoD in systems helps us to identify these vulnerable local loops.
The chain of dependency for node 14 shows a direct connection between node 14 (parent) and nodes (children) as the first order of dependency, i.e., . The second order includes the connections of the children of node 14 which are and . Among the children of the second order only node 14 has further linkages. Therefore, the third order contains the connection between node 14 (as a child in the second order of dependency) and . The chain of dependency for node 14 is as follows:
The desired length for extracting the chain of dependency could be adjusted depending on the scale of the system.
In addition to the test system discussed in this section, we developed several test systems with different, large numbers of nodes, in order to evaluate the scalability of the proposed method. All the tests were performed using Matlab R2020a with an Intel Core i7 2.11 GHz processor with 16 GB RAM. To ensure the accuracy of the result, each test was iterated 20 times and both average time and the maximum time recorded.
Table 2 demonstrates the outcomes of this analysis. The run times reported in
Table 2 show that MDSM can be effectively used to extract the characteristics of dependencies in large scale Cyber–Physical systems.