{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:16:25Z","timestamp":1760238985987,"version":"build-2065373602"},"reference-count":37,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T00:00:00Z","timestamp":1599523200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Beijing Municipal Commission of Education Social Science Foundation","award":["SM201810005002"],"award-info":[{"award-number":["SM201810005002"]}]},{"name":"National Key Research and Development Plan","award":["2018YFB1201601-12"],"award-info":[{"award-number":["2018YFB1201601-12"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Communication-based train control systems (CBTCs) have been widely used as crucial systems in urban rail transit networks. CBTCs typically utizes different levels of symmetry structure according to different geographic deployments. While, in practice, CBTCs crashes have destroyed the transportation systems of the whole city level for many times. Based on the extended object-oriented Petri net (EOOPN), this paper proposes a vulnerability model and an evaluation procedure, which are capable of considering the vulnerability factors in both inner system level and equipment level. On the system level, it establishes a complex dynamic communication structure model among the distributed subsystems, while on the equipment level, it details the equipment changing state during train operation. The searching algorithm of EOOPN depicts possible failed paths of CBTCs via the token transition among train\u00ac\u2013ground communication EOOPN subnets. The vulnerability calculation is applied to the metro company\u2019s in situ CBTCs to illustrate the effectiveness of the approach.<\/jats:p>","DOI":"10.3390\/sym12091474","type":"journal-article","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T09:03:48Z","timestamp":1599555828000},"page":"1474","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An Extended Object-Oriented Petri Net Model for Vulnerability Evaluation of Communication-Based Train Control System"],"prefix":"10.3390","volume":"12","author":[{"given":"Ye","family":"Zhang","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Traffic Engineering, Beijing University of Technology, No.100 Pingle Yuan, Chaoyang District, Beijing 100124, China"}]},{"given":"Yatao","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, No.3 Shang Yuan Cun, Haidian District, Beijing 100044, China"}]},{"given":"Lin","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, No.3 Shang Yuan Cun, Haidian District, Beijing 100044, China"}]},{"given":"Guoqiang","family":"Cai","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, No.3 Shang Yuan Cun, Haidian District, Beijing 100044, China"}]}],"member":"1968","published-online":{"date-parts":[[2020,9,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.ssci.2018.07.004","article-title":"Keeping track of railway safety and the mechanisms for risk","volume":"110","author":"Crawford","year":"2018","journal-title":"Saf. Sci."},{"key":"ref_2","unstructured":"Gol\u2019Dshtein, V., Koganov, G.A., and Surdutovich, G.I. (2004). Vulnerability and hierarchy of complex networks. arXiv."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1111\/j.1539-6924.2006.00755.x","article-title":"On the definition of vulnerabilities in measuring risks to infrastructures","volume":"26","author":"Haimes","year":"2006","journal-title":"Risk Anal."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.ress.2013.06.040","article-title":"Review on modeling and simulatio of interdependent critical infrastructure systems","volume":"121","author":"Ouyang","year":"2014","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1051\/lhb\/2014016","article-title":"Railway vulnerability in case of extremes floods. Knowledge and risk management","volume":"2","author":"Chazelle","year":"2014","journal-title":"Houille Blanche"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"5634181","DOI":"10.1155\/2018\/5634181","article-title":"A framework for vulnerability detection in european train control railway communications","volume":"2018","author":"Arsuaga","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1007\/s12469-017-0170-2","article-title":"Vulnerability analysis of urban rail transit based on complex network theory: A case study of Shanghai Metro","volume":"9","author":"Xing","year":"2017","journal-title":"Public Transp."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1007","DOI":"10.1142\/S0217984907013493","article-title":"Attack vulnerability of complex networks based on local information","volume":"21","author":"Wu","year":"2007","journal-title":"Mod. Phys. Lett. B"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1016\/j.ress.2015.05.013","article-title":"Vulnerability analysis of complementary transportation systems with applications to railway and airline systems in China","volume":"142","author":"Ouyang","year":"2015","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.tra.2016.04.004","article-title":"Indicators of reliability and vulnerability: Similarities and differences in ranking links of a complex road system","volume":"88","author":"Eduardo","year":"2016","journal-title":"Transp. Res. Part A Policy Pract."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1016\/j.jtrangeo.2014.01.008","article-title":"Measuring the vulnerability of public transport networks","volume":"35","author":"Palomares","year":"2014","journal-title":"J. Transp. Geogr."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/j.jtrangeo.2014.06.025","article-title":"Measuring vulnerability of road network considering the extent of serviceability of critical road links in urban areas","volume":"39","author":"Balijepalli","year":"2014","journal-title":"J. Transp. Geogr."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1016\/j.tra.2015.05.002","article-title":"A framework to analyze the vulnerability of European road networks due to Sea-Level Rise (SLR) and sea storm surges","volume":"81","author":"Demirel","year":"2015","journal-title":"Transp. Res. Part A Policy Pract."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1016\/j.tra.2005.11.003","article-title":"Importance and exposure in road network vulnerability analysis","volume":"40","author":"Jenelius","year":"2006","journal-title":"Transp. Res. Part A Policy Pract."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1002\/cplx.20388","article-title":"Image characterization and classification by physical complexity","volume":"17","author":"Zenil","year":"2011","journal-title":"Complexity"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.ress.2016.02.009","article-title":"Challenges in the vulnerability and risk analysis of critical infrastructures","volume":"152","author":"Zio","year":"2016","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/S0967-070X(02)00011-2","article-title":"An introduction to road vulnerability: What has been done, is done and should be done","volume":"9","author":"Berdica","year":"2002","journal-title":"Transp. Policy"},{"key":"ref_18","first-page":"6","article-title":"Cloud matter-element comprehensive evaluation on vulnerability of urban road traffic network","volume":"38","author":"Liu","year":"2019","journal-title":"J. Chongqing Jiaotong Univ. (Nat. Sci.)"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Jenelius, E., and Mattsson, L.G. (2006). Developing a Methodology for Road Network Vulnerability Analysis, Royal Institute of Technology.","DOI":"10.1016\/j.tra.2005.11.003"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1016\/j.envsoft.2005.04.006","article-title":"Modeling the vulnerability of complex territorial systems: An application to hydrological risk","volume":"21","author":"Minciardi","year":"2006","journal-title":"Environ. Model. Softw."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1016\/S0377-2217(03)00135-8","article-title":"A cutting plane algorithm for computing k-edge survivability of a network","volume":"156","author":"Myung","year":"2004","journal-title":"Eur. J. Oper. Res."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Feng, C., Zhu, Q., Yu, B., and Zhang, Y. (2017, January 26\u201328). Complexity and vulnerability of high-speed rail network in China. Proceedings of the 2017 36th Chinese Control Conference (CCC), Dalian, China.","DOI":"10.23919\/ChiCC.2017.8028958"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1016\/j.ssci.2018.04.026","article-title":"A security vulnerability analysis model for dangerous goods transportation by rail\u2014Case study: Chlorine transportation in Texas-Illinois","volume":"110","author":"Khanmohamadi","year":"2018","journal-title":"Saf. Sci."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/0304-3975(81)90112-2","article-title":"Petri nets, event structures and domains, part I","volume":"13","author":"Nielsen","year":"1981","journal-title":"Theor. Comput. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Best, E., Devillers, R., and Koutny, M. (2001). Petri Net Algebra, Springer.","DOI":"10.1007\/978-3-662-04457-5"},{"key":"ref_26","unstructured":"Bl\u00e4tke, M.A., Heiner, M., and Marwan, W. (2011). Tutorial: Petri Nets in Systems Biology, Otto-von-Guericke University."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/5.24143","article-title":"Petri nets: Properties, analysis and applications","volume":"77","author":"Murata","year":"1989","journal-title":"Proc. IEEE"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Malakar, B., and Roy, B. (2014, January 27\u201328). Railway fail-safe signalization and interlocking design based on automation Petri Net. Proceedings of the International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, India.","DOI":"10.1109\/ICICES.2014.7034154"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Shen, J.J., and Feng, D.Q. (2014, January 20\u201322). Vulnerability analysis of clock synchronization protocol using stochastic Petri Net. Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, Paris, France.","DOI":"10.1109\/HPCC.2014.115"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Berthomieu, B., Ribet, P.O., and Vernadat, F. (2004). The tool TINA\u2014Construction of abstract state spaces for petri nets and time petri nets. Int. J. Prod. Res., 14\u201316.","DOI":"10.1080\/00207540412331312688"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Giglio, D., and Sacco, N. (2016, January 1\u20134). A Petri net model for analysis, optimisation, and control of railway networks and train schedules. Proceedings of the 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, Brazil.","DOI":"10.1109\/ITSC.2016.7795949"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"3045","DOI":"10.1109\/TITS.2016.2535418","article-title":"Scenario-based modeling of the on-board of a satellite-based train control system with colored petri nets","volume":"17","author":"Wu","year":"2016","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/s11432-018-9562-y","article-title":"A novel matrix approach for the stability and stabilization analysis of colored Petri nets","volume":"62","author":"Zhao","year":"2019","journal-title":"Sci. China Inf. Sci."},{"key":"ref_34","unstructured":"Boudi, Z., Koursi, E., Collard-Dutilleul, M.E., and Khaddour, M. (October, January 30). High Level Petri Net Modeling For Railway Safety Critical Scenarios. Proceedings of the 10th FORMS-FORMAT Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems, Braunschweig, Germany."},{"key":"ref_35","first-page":"8","article-title":"A novel object-oriented petri nets and its applications","volume":"24","author":"Hua","year":"2005","journal-title":"Mech. Sci. Technol."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"191","DOI":"10.2478\/AMNS.2019.1.00025","article-title":"Analysis of fractional factor system for data transmission in SDN","volume":"4","author":"Wu","year":"2019","journal-title":"Appl. Math. Nonlinear Sci."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"47","DOI":"10.2478\/amns.2020.1.00005","article-title":"Solution to chance constrained programming problem in swap trailer transport organisation based on improved simulated annealing algorithm","volume":"5","author":"Li","year":"2020","journal-title":"Appl. Math. Nonlinear Sci."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/9\/1474\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:08:00Z","timestamp":1760177280000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/12\/9\/1474"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,8]]},"references-count":37,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2020,9]]}},"alternative-id":["sym12091474"],"URL":"https:\/\/doi.org\/10.3390\/sym12091474","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2020,9,8]]}}}