Journal of Safety Science and Resilience (Sep 2024)

Cascade failure modeling and resilience analysis of mine cyber physical systems under deliberate attacks

  • Xinping Wang,
  • Jialin Zhu,
  • Chang Su,
  • Xinyue Zhen

Journal volume & issue
Vol. 5, no. 3
pp. 266 – 280

Abstract

Read online

Guided by the intelligent construction of coal mines and integrating the concept of the Cyber-Physical System (CPS), a novel approach to a coal mine information-physical fusion system is proposed. This concept emerges from the advancement of intelligent mines and the growing need for enhanced safety in coal mine operations. From a system safety perspective, this approach aims to effectively evaluate security issues by better integrating the informational and physical layers of intelligent mines. Currently, research in areas such as power grids and water networks has widely adopted concepts of cascade failures and robustness. It is suggested that the CPS framework be adapted to the mining sector. Considering the critical role of coal mines in China's energy security and their vulnerability to cyber attacks, a mine-specific CPS system is designed. This system incorporates a model of mine information-physical fusion, including networks for mine operations, management, and control, tailored to the unique conditions of mine shafts and underground settings. Utilizing Markov process theory, the paper delves into the theoretical study of the cascade failure process under deliberate attack strategies. This analysis is essential to effectively assess the safety issues within the information-physical system, providing vital support for fault prediction and safety analysis. The model of cascading failures in the mine information-physical system is developed, and based on an analysis of resilience and robustness, the study identifies key factors influencing the security of mine information-physical systems. Critical factors affecting the reliability of these systems include the number of system nodes, node coupling, edge count, and the interconnection methods of the dual-layer dependency network. The paper concludes by discussing the challenges in analyzing the security of information-physical systems and suggesting directions for future research.

Keywords