{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:05:58Z","timestamp":1771459558425,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:00:00Z","timestamp":1752537600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:00:00Z","timestamp":1752537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"HUN-REN Centre for Energy Research"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Netw Sci"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>In this paper we analyse the long-term structural evolution of an electric distribution network, using topological data from four periods over a 20-year long timespan. Despite continuous expansion of the network, we hypothesise that key topological measures remain stable, leading to persistent vulnerabilities. To test this, a complex network analysis was conducted and probability functions of degree, closeness and betweenness centrality were examined. To understand how these inherent vulnerabilities are perceived from the distribution system operator\u2019s perspective, the network efficiency was assessed under normal conditions and after the removal of critical nodes and edges. The results provide insight into whether the expansion of network infrastructure inherently enhances resilience or if fundamental weaknesses can be identified.<\/jats:p>","DOI":"10.1007\/s41109-025-00724-9","type":"journal-article","created":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T15:11:47Z","timestamp":1752592307000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Inherent structural vulnerabilities in power distribution networks: a longitudinal complex network analysis"],"prefix":"10.1007","volume":"10","author":[{"given":"B\u00e1lint","family":"Hartmann","sequence":"first","affiliation":[]},{"given":"Tam\u00e1s","family":"Soha","sequence":"additional","affiliation":[]},{"given":"Michelle T.","family":"Cirunay","sequence":"additional","affiliation":[]},{"given":"T\u00edmea","family":"Erdei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,15]]},"reference":[{"key":"724_CR1","doi-asserted-by":"publisher","DOI":"10.1063\/1.3077229","volume":"19","author":"S Arianos","year":"2009","unstructured":"Arianos S et al (2009) Power grid vulnerability: a complex network approach. Chaos 19:013119","journal-title":"Chaos"},{"key":"724_CR2","unstructured":"Baardman R (2023) Understanding the evolution of electricity networks\u2014Modeling a century of Dutch and Hungarian transmission grid growth, MSc Thesis, Utrecht University"},{"key":"724_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.ijcip.2009.02.002","volume":"2","author":"E Bompard","year":"2009","unstructured":"Bompard E et al (2009) Analysis of structural vulnerabilities in power transmission grids. Int J Crit Infrastruct Prot 2:5\u201312","journal-title":"Int J Crit Infrastruct Prot"},{"key":"724_CR4","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1504\/IJCIS.2009.022850","volume":"5","author":"L Buzna","year":"2009","unstructured":"Buzna L et al (2009) The evolution of the topology of high-voltage electricity networks. Int J Crit Infrastruct 5:72\u201385","journal-title":"Int J Crit Infrastruct"},{"key":"724_CR5","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.ijcip.2015.12.001","volume":"12","author":"P Chopade","year":"2016","unstructured":"Chopade P, Bikdash M (2016) New centrality measures for assessing smart grid vulnerabilities and predicting brownouts and blackouts. Int J Crit Infrastruct Prot 12:29\u201345","journal-title":"Int J Crit Infrastruct Prot"},{"key":"724_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2023.128629","volume":"617","author":"MT Cirunay","year":"2023","unstructured":"Cirunay MT, Batac RC (2023) Evolution of the periphery of a self-organized road network. Phys A Stat Mech Appl 617:128629","journal-title":"Phys A Stat Mech Appl"},{"key":"724_CR7","doi-asserted-by":"publisher","DOI":"10.1088\/2632-072X\/ab7f4e","volume":"1","author":"MT Cirunay","year":"2020","unstructured":"Cirunay MT et al (2020) Preserved layout features embedded in road network development. J Phys Complex 1:015004","journal-title":"J Phys Complex"},{"key":"724_CR8","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.physa.2004.02.029","volume":"338","author":"P Crucitti","year":"2004","unstructured":"Crucitti P et al (2004a) A topological analysis of the Italian electric power grid. Phys A Stat Mech Appl 338:92\u201397","journal-title":"Phys A Stat Mech Appl"},{"key":"724_CR9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.045104","volume":"69","author":"P Crucitti","year":"2004","unstructured":"Crucitti P et al (2004b) Model for cascading failures in complex networks. Phys Rev E 69:045104","journal-title":"Phys Rev E"},{"key":"724_CR10","doi-asserted-by":"publisher","first-page":"9211","DOI":"10.3390\/en8099211","volume":"8","author":"L Cuadra","year":"2015","unstructured":"Cuadra L et al (2015) A critical review of robustness in power grids using complex networks concepts. Energies 8:9211\u20139265","journal-title":"Energies"},{"key":"724_CR11","doi-asserted-by":"crossref","unstructured":"Dwivedi A et al. (2009) Identifying vulnerable lines in a power network using complex network theory. In: Proceedings IEEE ISIE 2009, p 18\u201323","DOI":"10.1109\/ISIE.2009.5214082"},{"key":"724_CR12","doi-asserted-by":"crossref","unstructured":"Dwivedi A et al. (2010) Analyzing power network vulnerability with maximum flow based centrality approach. In: Proceedings 8th IEEE international conference on industrial informatics, pp 336\u2013341","DOI":"10.1109\/INDIN.2010.5549398"},{"key":"724_CR13","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.simpat.2012.11.008","volume":"31","author":"X Fang","year":"2013","unstructured":"Fang X et al (2013) Topological characterization and modeling of dynamic evolving power distribution networks. Simul Model Pract Theory 31:186\u2013196","journal-title":"Simul Model Pract Theory"},{"key":"724_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2019.106743","volume":"196","author":"G Galvan","year":"2020","unstructured":"Galvan G, Agarwal J (2020) Assessing the vulnerability of infrastructure networks based on distribution measures. Reliab Eng Syst Saf 196:106743","journal-title":"Reliab Eng Syst Saf"},{"key":"724_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2021.107478","volume":"200","author":"B Hartmann","year":"2021","unstructured":"Hartmann B (2021) How does the vulnerability of an evolving power grid change? Electr Power Syst Res 200:107478","journal-title":"Electr Power Syst Res"},{"key":"724_CR16","doi-asserted-by":"publisher","first-page":"6575","DOI":"10.1038\/s41598-021-86103-7","volume":"11","author":"B Hartmann","year":"2021","unstructured":"Hartmann B, Sug\u00e1r V (2021) Searching for small-world and scale-free behaviour in long-term historical data of a real-world power grid. Sci Rep 11:6575","journal-title":"Sci Rep"},{"key":"724_CR17","unstructured":"Hartmann B, Soha T (2024), Topological and topographical network data of the South Transdanubian medium-voltage distribution network in Hungary between 1950\u20131965, ARP, V1"},{"key":"724_CR18","unstructured":"Horv\u00e1th T, Jeszenszky S (2000) A magyar elektrotechnika t\u00f6rt\u00e9nete, Hungarian Electrotechnical Association"},{"key":"724_CR19","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1140\/epjb\/e2005-00237-9","volume":"46","author":"R Kinney","year":"2005","unstructured":"Kinney R et al (2005) Modeling cascading failures in the North American power grid. Eur Phys J B 46:101\u2013107","journal-title":"Eur Phys J B"},{"key":"724_CR20","doi-asserted-by":"publisher","first-page":"2501","DOI":"10.1038\/s41467-018-04978-z","volume":"9","author":"A Kirkley","year":"2018","unstructured":"Kirkley A et al (2018) From the betweenness centrality in street networks to structural invariants in random planar graphs. Nat Commun 9:2501","journal-title":"Nat Commun"},{"key":"724_CR21","first-page":"346","volume":"65","author":"B Liu","year":"2018","unstructured":"Liu B et al (2018) Recognition and vulnerability analysis of key nodes in power grid based on complex network centrality. IEEE Trans Circuits Syst II Express Briefs 65:346\u2013350","journal-title":"IEEE Trans Circuits Syst II Express Briefs"},{"key":"724_CR22","unstructured":"MAVIR Hungarian TSO, The first 60 years: a history of transmission system operation in Hungary, MAVIR Zrt. (2009)"},{"key":"724_CR23","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1504\/IJCIS.2015.067394","volume":"11","author":"GA Pagani","year":"2015","unstructured":"Pagani GA, Aiello M (2015) A complex network approach for identifying vulnerabilities of the medium and low voltage grid. Int J Cricital Infrastruct 11:36\u201361","journal-title":"Int J Cricital Infrastruct"},{"key":"724_CR24","volume":"30","author":"P Paniraghi","year":"2020","unstructured":"Paniraghi P, Maity S (2020) Structural vulnerability analysis in small-world power grid networks based on weighted topological model. Int Trans Electr Energy Syst 30:e12401","journal-title":"Int Trans Electr Energy Syst"},{"key":"724_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41109-021-00404-4","volume":"6","author":"C Robson","year":"2021","unstructured":"Robson C et al (2021) The structure and behaviour of hierarchical infrastructure networks. Appl Netw Sci 6:1\u201325","journal-title":"Appl Netw Sci"},{"key":"724_CR26","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1504\/IJCIS.2015.067399","volume":"11","author":"M Rosas-Casals","year":"2015","unstructured":"Rosas-Casals M et al (2015) Knowing power grids and understanding complexity science. Int J Crit Infrastruct 11:4\u201314","journal-title":"Int J Crit Infrastruct"},{"key":"724_CR27","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.epsr.2005.05.013","volume":"77","author":"V Rosato","year":"2007","unstructured":"Rosato V et al (2007) Topological properties of high-voltage electrical transmission networks. Electr Power Syst Res 77:99\u2013105","journal-title":"Electr Power Syst Res"},{"key":"724_CR28","unstructured":"Szab\u00f3 A (1994) 100 \u00e9ves az \u00e1ramszolg\u00e1ltat\u00e1s a D\u00e9l-Dun\u00e1nt\u00falon, D\u00c9D\u00c1SZ Rt."},{"key":"724_CR29","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1504\/IJCIS.2015.067398","volume":"11","author":"T Verma","year":"2015","unstructured":"Verma T et al (2015) Context-independent centrality measures underestimate the vulnerability of power grids. Int J Crit Infrastruct 11:62\u201381","journal-title":"Int J Crit Infrastruct"},{"key":"724_CR30","doi-asserted-by":"crossref","unstructured":"Wang Z et al. (2010) Electrical centrality measures for electric power grid vulnerability analysis. In: Proceedings 49th IEEE conference on decision and control (CDC), pp 5792\u20135797","DOI":"10.1109\/CDC.2010.5717964"}],"container-title":["Applied Network Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-025-00724-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41109-025-00724-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41109-025-00724-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T10:59:40Z","timestamp":1757242780000},"score":1,"resource":{"primary":{"URL":"https:\/\/appliednetsci.springeropen.com\/articles\/10.1007\/s41109-025-00724-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,15]]},"references-count":30,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["724"],"URL":"https:\/\/doi.org\/10.1007\/s41109-025-00724-9","relation":{},"ISSN":["2364-8228"],"issn-type":[{"value":"2364-8228","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,15]]},"assertion":[{"value":"31 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"31"}}