0% found this document useful (0 votes)
24 views165 pages

Critical Information Infrastructures Security: 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers Gregorio D'Agostino PDF Download

The document details the proceedings of the 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017) held in Lucca, Italy, from October 8-13, 2017. It includes revised selected papers that address innovative research and challenges in the field of critical information infrastructure protection, with a focus on fostering dialogue among academia, industry, and governmental organizations. The conference featured 63 submitted papers, with 21 full papers and four extended abstracts accepted, alongside keynote talks and workshops on energy and water security.

Uploaded by

ncvgmyoo659
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views165 pages

Critical Information Infrastructures Security: 12th International Conference, CRITIS 2017, Lucca, Italy, October 8-13, 2017, Revised Selected Papers Gregorio D'Agostino PDF Download

The document details the proceedings of the 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017) held in Lucca, Italy, from October 8-13, 2017. It includes revised selected papers that address innovative research and challenges in the field of critical information infrastructure protection, with a focus on fostering dialogue among academia, industry, and governmental organizations. The conference featured 63 submitted papers, with 21 full papers and four extended abstracts accepted, alongside keynote talks and workshops on energy and water security.

Uploaded by

ncvgmyoo659
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 165

Critical Information Infrastructures Security:

12th International Conference, CRITIS 2017,


Lucca, Italy, October 8-13, 2017, Revised
Selected Papers Gregorio D'Agostino pdf download

https://textbookfull.com/product/critical-information-infrastructures-security-12th-international-
conference-critis-2017-lucca-italy-october-8-13-2017-revised-selected-papers-gregorio-dagostino/

★★★★★ 4.7/5.0 (26 reviews) ✓ 195 downloads ■ TOP RATED


"Fantastic PDF quality, very satisfied with download!" - Emma W.

DOWNLOAD EBOOK
Critical Information Infrastructures Security: 12th
International Conference, CRITIS 2017, Lucca, Italy, October
8-13, 2017, Revised Selected Papers Gregorio D'Agostino pdf
download

TEXTBOOK EBOOK TEXTBOOK FULL

Available Formats

■ PDF eBook Study Guide TextBook

EXCLUSIVE 2025 EDUCATIONAL COLLECTION - LIMITED TIME

INSTANT DOWNLOAD VIEW LIBRARY


Collection Highlights

Critical Information Infrastructures Security: 12th


International Conference, CRITIS 2017, Lucca, Italy,
October 8-13, 2017, Revised Selected Papers Gregorio
D'Agostino

Critical Information Infrastructures Security 10th


International Conference CRITIS 2015 Berlin Germany
October 5 7 2015 Revised Selected Papers 1st Edition Erich
Rome

Information Security and Cryptology: 13th International


Conference, Inscrypt 2017, Xi'an, China, November 3–5,
2017, Revised Selected Papers 1st Edition Xiaofeng Chen

Man Machine Speech Communication 14th National Conference


NCMMSC 2017 Lianyungang China October 11 13 2017 Revised
Selected Papers 1st Edition Jianhua Tao
Foundations and Practice of Security 10th International
Symposium FPS 2017 Nancy France October 23 25 2017 Revised
Selected Papers 1st Edition Abdessamad Imine

Image and Graphics 9th International Conference ICIG 2017


Shanghai China September 13 15 2017 Revised Selected
Papers Part III 1st Edition Yao Zhao

Space Information Networks: Second International


Conference, SINC 2017, Yinchuan, China, August 10-11,
2017, Revised Selected Papers 1st Edition Quan Yu (Eds.)

Cryptology and Network Security 16th International


Conference CANS 2017 Hong Kong China November 30 December
2 2017 Revised Selected Papers Srdjan Capkun

Smart Card Research and Advanced Applications 16th


International Conference CARDIS 2017 Lugano Switzerland
November 13 15 2017 Revised Selected Papers 1st Edition
Thomas Eisenbarth
Gregorio D’Agostino
Antonio Scala (Eds.)
LNCS 10707

Critical Information
Infrastructures Security
12th International Conference, CRITIS 2017
Lucca, Italy, October 8–13, 2017
Revised Selected Papers

123
Lecture Notes in Computer Science 10707
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Editorial Board
David Hutchison
Lancaster University, Lancaster, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Friedemann Mattern
ETH Zurich, Zurich, Switzerland
John C. Mitchell
Stanford University, Stanford, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
C. Pandu Rangan
Indian Institute of Technology Madras, Chennai, India
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbrücken, Germany
More information about this series at http://www.springer.com/series/7410
Gregorio D’Agostino Antonio Scala (Eds.)

Critical Information
Infrastructures Security
12th International Conference, CRITIS 2017
Lucca, Italy, October 8–13, 2017
Revised Selected Papers

123
Editors
Gregorio D’Agostino Antonio Scala
ENEA “Casaccia” CNR - Institute for Complex Systems (ISC)
and Network of Networks - Netonets Rome, Italy
Rome, Italy

ISSN 0302-9743 ISSN 1611-3349 (electronic)


Lecture Notes in Computer Science
ISBN 978-3-319-99842-8 ISBN 978-3-319-99843-5 (eBook)
https://doi.org/10.1007/978-3-319-99843-5

Library of Congress Control Number: 2018952640

LNCS Sublibrary: SL4 – Security and Cryptology

© Springer Nature Switzerland AG 2018


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, express or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

This volume contains the papers presented at CRITIS 2017 – the 12th Inter-
national Conference on Critical Information Infrastructures Security held during
October 8–13, 2017, in Lucca.
CRITIS 2017 continued the tradition of presenting innovative research and
exploring new challenges in the field of critical (information) infrastructures protection
(C(I)IP) and fostering dialogue with stakeholders. CRITIS 2017 renewed efforts to
bring together researchers and professionals from academia, industry, and govern-
mental organizations working in the field of the security of critical (information)
infrastructure systems.
As in previous years, distinguished invited speakers and special events comple-
mented a program of original research contributions. According to the tradition, the
conference invited the different research communities and disciplines involved in the
C(I)IP space, and encouraged discussions and multi-disciplinary approaches to relevant
C(I)IP problems.
This 2017 edition of CRITIS was hosted in Lucca, Italy, by the IMT School for
Advanced Studies Lucca, an Italian public academic institution organized as a graduate
school and research center that focuses on the analysis of economic, social, techno-
logical, and cultural systems.
Two satellite workshops on energy security and on water security took place on the
closing days of the main conference.
Some specific innovations were introduced: beside the traditional sessions where
original works and significant improvements were presented, specific sessions devoted
to ongoing projects and operators took place. The “Projects Dissemination Session”
provided an opportunity for the dissemination of ongoing project results both at the
European and the Member States level for a total of 12 European and three Italian
projects. The operators session in this edition was limited to the ICT sector and was led
by TIM (the former Italian national telecommunication operator).
There were 63 papers submitted. Each submission was reviewed by at least two, and
on average 2.8, Program Committee members. The committee decided to accept 21 full
papers and four extended abstracts with a rejection rate of  67% (  60% accounting
for the extended abstracts). Extended abstracts were selected among the 20 submissions
accepted for poster presentation.
Each accepted full paper was allowed a 20-min slot for oral presentation. The
program also included four keynote talks and one institutional talk; none of the invited
speakers contributed with a non- reviewed proceedings paper.
As in previous editions, CRITIS 2017 awarded three prizes to the best contribution
from young (<32 years) scientists. The winners were selected after a joint evaluation by
both the audience and the academic committee of the Young CRITIS Award (YCA).
CRITIS 2017 received the endorsement of the Presidency of the Italian Council of
Ministers (“patrocinio della Presidenza del Consiglio dei Ministri”) UCE F 735/2017.
VI Preface

The conference was organized by NetONets, a nonprofit organization fostering the


diffusion of interdisciplinary research, especially on complexity science and critical
infrastructures.
The organizers are indebted to IMT Lucca for providing the location of the con-
ference and for supporting the event in several different forms, among which were the
lodgings provided in the beautiful medieval complex of S. Francesco. We also thank
the IMT press office for their support.
We thank our communication chair, Alberto Tofani, for creating and maintaining
the conference’s website and registration services.
The conference organization benefited from the contributions of the program
co-chairs, Cristina Alcaraz and Grigore Havarneanu, of the poster co-chair, Fabiana
Zollo, of the Young CRITIS Award chairs, Bernhard M. Hämmerli and Marco
Santarelli, and of the CRITIS Steering Committee chairs, Bernhard M. Hämmerli,
Javier Lopez, and Stephen D. Wolthusen. We also thank the Program Committee and
all the experts who participated in the reviewing process.
The event was mainly sponsored by TIM with the secondary involvement of the
Kaspersky Lab; the YCA prize was supported by Res On Networks, an international
institute for research and development based in London.
The submission and reviewing process was performed through the EasyChair
platform.

November 2017 Gregorio D’Agostino


Antonio Scala
Organization

Program Committee
Cristina Alcaraz UMA
Marc Antoni International Union of Railways
Fabrizio Baiardi Dipartimento di informatica, Università di Pisa
Robin Bloomfield City, University of London, UK
Maria Cristina Brugnoli CNIT
Arslan Brömme GI Biometrics Special interest Group (BIOSIG)
Emiliano Casalicchio Blekinge Institute of Technology, Sweden
Simona Cavallini Fondazione Formit, Italy
Michal Choras ITTI Ltd.
Kris Christmann University of Huddersfield, UK
Gregorio D’Agostino ENEA
Myriam Dunn ETH Center for Security Studies Zurich, Switzerland
Mohamed Eid commissariat à l’enrgie atomique et aux energies
alternatives
Angelo Facchini IMT
Adrian Gheorghe Old Dominion University, USA
Dimitris Gritzalis Athens University of Economics and Business, Greece
Stefanos Gritzalis University of the Aegean, Greece
Bernhard Haemmerli Lucerne University of Applied Sciences and Arts,
Switzerland, and Acris GmbH
Chris Hankin Imperial College London, UK
Grigore M. Havarneanu International Union of Railways
Apiniti Jotisankasa Kasetsart University, Bangkok
Sokratis Katsikas Center for Cyber and Information Security, NTNU
Marieke Klaver TNO
Panayiotis Kotzanikolaou University of Piraeus, Greece
Rafal Kozik UTP Bydgoszcz, Poland
Boban Krsic DENIC eG
Elias Kyriakides University of Cyprus, Cyprus
Javier Lopez University of Malaga, Spain
Eric Luiijf TNO
Jose Marti The University of British Columbia, Canada
Richard Mcevoy NTNU, Norway and HPE Ltd.
Maddalen Mendizabal Tecnalia R&I
Iogor Nai Fovino Joint Research Centre
Aristotelis Naniopoulos Aristotle University of Thessaloniki, Greece
Hypatia Nassopoulos EIVP
Eiji Okamoto University of Tsukuba, Japan
VIII Organization

Gabriele Oliva University Campus Biomedico of Rome, Italy


Evangelos Ouzounis ENISA
Stefano Panzieri Roma Tre University, Italy
Alexander Paz-Cruz University of Nevada, Las Vegas, USA
Reinhard Posch UNC Charlotte
Erich Rome Fraunhofer
Vittorio Rosato ENEA
Brendan Ryan University of Nottingham
Andre Samberg TIEMS International Program Committee
Antonio Scala IMT, CNR, Italy
Maria Paola Scaparra The University of Kent, UK
Eric Schellekens ARCADIS
Roberto Setola University Campus Biomedico of Rome, Italy
George Stergiopoulos Athens University of Economics and Business, Greece
Nils Kalstad Svendsen Gjøvik University College, Norway
Dominique Sérafin CEA
André Teixeira Delft University of Technology, The Netherlands
Marianthi Theocharidou European Commission, Joint Research Centre
Alberto Tofani ENEA
William J. Tolone UNC Charlotte
Simona Louise Voronca Transelectrica - POLITEHNICA University Bucharest
René Willems Eindhoven University of Technology
Stephen D. Wolthusen Royal Holloway, University of London, UK
and Norwegian University of Science
and Technology, Norway
Christos Xenakis University of Piraeus, Greece
Jianying Zhou Singapore University of Technology and Design,
Singapore
Enrico Zio Politecnico di Milano, Italy
Fabiana Zollo University of Venice Ca’ Foscari, Italy
Urko Zurutuza Mondragon University, Spain
Inga Žutautaitė Lithuanian Energy Institute, Lithuania

Additional Reviewers

Kasse, Paraskevi
Lykou, Georgia
Lückerath, Daniel
Malatras, Apostolos
Mentzelioti, Despina
Mohammadi, Farnaz
Moulinos, Konstantinos
Virvilis, Nick
Xie, Jingquan
Contents

Resilience of Electrical Distribution Systems with Critical


Load Prioritization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Zejun Yang and Jose R. Marti

Public Tolerance Levels of Transportation Resilience: A Focus


on the Oresund Region Within the IMPROVER Project. . . . . . . . . . . . . . . . 13
Laura Petersen, Laure Fallou, Elisabete Carreira, and Andrei Utkin

Towards a Common Vocabulary for Crisis Management Scenarios . . . . . . . . 25


Jingquan Xie, Betim Sojeva, Erich Rome, and Daniel Lückerath

Analysis and Classification of Adaptation Tools for Transport Sector


Adaptation Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Georgia Lykou, George Iakovakis, George Chronis,
and Dimitris Gritzalis

Timing-Based Anomaly Detection in SCADA Networks . . . . . . . . . . . . . . . 48


Chih-Yuan Lin, Simin Nadjm-Tehrani, and Mikael Asplund

Operational Resilience Metrics for a Complex Electrical Network . . . . . . . . . 60


Alberto Tofani, Gregorio D’Agostino, Antonio Di Pietro,
Giacomo Onori, Maurizio Pollino, Silvio Alessandroni,
and Vittorio Rosato

The Influence of Load Characteristics on Early Warning Signs


in Power Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Steffen O. P. Blume and Giovanni Sansavini

DMA Optimal Layout for Protection of Water Distribution Networks


from Malicious Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Simeone Chianese, Armando Di Nardo, Michele Di Natale,
Carlo Giudicianni, Dino Musmarra,
and Giovanni Francesco Santonastaso

Role of Urban Interactions and Damage in Seismic Resilience


of Historical Centers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Anna Bozza, Domenico Asprone, Fulvio Parisi, and Gaetano Manfredi

Towards Blockchain-Based Collaborative Intrusion Detection Systems. . . . . . 107


Nikolaos Alexopoulos, Emmanouil Vasilomanolakis,
Natália Réka Ivánkó, and Max Mühlhäuser
X Contents

Analysis of Cybersecurity Threats in Industry 4.0: The Case


of Intrusion Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Juan E. Rubio, Rodrigo Roman, and Javier Lopez

De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue


Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol . . . 131
James G. Wright and Stephen D. Wolthusen

Assessing Urban Rail Transit Systems Vulnerability:


Metrics vs. Interdiction Models. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Stefano Starita, Annunziata Esposito Amideo,
and Maria Paola Scaparra

Automatically Generating Security Models from System Models


to Aid in the Evaluation of AMI Deployment Options . . . . . . . . . . . . . . . . . 156
Michael Rausch, Ken Keefe, Brett Feddersen, and William H. Sanders

A Gamified Approach to Participatory Modelling of Water System Risks. . . . 168


Alex Coletti, Antonio De Nicola, Giordano Vicoli,
and Maria Luisa Villani

Managing Gas and Electric Power Network Dependencies to secure


Energy Supply: Application to the UK System . . . . . . . . . . . . . . . . . . . . . . 181
Dominique Wassermann, Andrea Antenucci, and Giovanni Sansavini

What the Stack? On Memory Exploitation and Protection in Resource


Constrained Automotive Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Aljoscha Lautenbach, Magnus Almgren, and Tomas Olovsson

Dealing with Functional Safety Requirements for Automotive Systems:


A Cyber-Physical-Social Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Mohamad Gharib, Paolo Lollini, Andrea Ceccarelli,
and Andrea Bondavalli

Side-Channel Based Intrusion Detection for Industrial Control Systems . . . . . 207


Pol Van Aubel, Kostas Papagiannopoulos, Łukasz Chmielewski,
and Christian Doerr

Security Evaluation of Cyber-Physical Systems Using Automatically


Generated Attack Trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Laurens Lemaire, Jan Vossaert, Bart De Decker, and Vincent Naessens

Faulty or Malicious Anchor Detection Criteria


for Distance-Based Localization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Federica Inderst, Gabriele Oliva, Stefano Panzieri,
Federica Pascucci, and Roberto Setola
Contents XI

One Step More: Automatic ICS Protocol Field Analysis . . . . . . . . . . . . . . . 241


Yeop Chang, Seungoh Choi, Jeong-Han Yun, and SinKyu Kim

Motion Magnification for Urban Buildings . . . . . . . . . . . . . . . . . . . . . . . . . 253


Vincenzo Fioriti, Ivan Roselli, Angelo Tati, Roberto Romano,
and Gerardo De Canio

Reputation Systems to Mitigate DoS Attack in Vehicular Network . . . . . . . . 261


Gianpiero Costantino, Fabio Martinelli, and Ilaria Matteucci

On the Security of Aircraft Communication Networks . . . . . . . . . . . . . . . . . 266


Paul Berthier, Corentin Bresteau, and José Fernandez

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271


Resilience of Electrical Distribution Systems
with Critical Load Prioritization

Zejun Yang and Jose R. Marti(&)

The University of British Columbia, Vancouver, BC V6T 1Z4, Canada


{zyang,jrms}@ece.ubc.ca

Abstract. In the highly interdependent environment of a large city, failures in


the electrical distribution system can cause direct or indirect consequences to
other critical infrastructures and to the Human Well-being Level (HWL) of the
citizens. This paper discusses the electrical distribution system in terms of how
topological reconfiguration, together with prioritized system recovery can
maintain a high level of Human Well-being resilience during system failures.
The Infrastructure Interdependencies Simulator (i2SIM) is used to prioritize load
restoration and load shedding algorithms. To validate the proposed approach,
spanning tree search algorithms, load shedding schemes and optimization
methods are applied to find optimal restoration strategies on a standard IEEE 30-
node system and on a 70-node distribution system with critical loads.

Keywords: Electrical distribution system restoration  i2SIM


Human Well-being Level  Smart city resilience  Load shedding
Spanning tree algorithms

1 Introduction

Society is strongly dependent on a resilient electricity supply to maintain its Human


Well-being Level (HWL) [1]. Electricity supply interruptions lead to direct conse-
quences for the HWL and will in general have an impact on other dependent critical
infrastructures, such as water supply, emergency services, and information and com-
munication technologies (ICT) [2]. For instance, in the Italian blackout of 2003,
unexpected failures of a power station caused the simultaneous shutdown of the tele-
communications and supervisory control and data acquisition (SCADA) network of the
power system; the failures in the tele-communications system, in turn, caused further
failures in the power supply network resulting in a large cascading event [3]. Another
example of such interdependencies-related event happened in the same year in the USA
[4]. In this event, smaller partial power system failures as well as computer and human
mistakes led to cascading effects that ultimately resulted in a large magnitude event.
These examples illustrate the need to consider critical infrastructure interdependencies
when assessing the whole system resilience.
The Human Well-being Level - Distribution System Restoration (HWL-DSR)
method proposed in this paper combines optimal topological reconfiguration with
system recovery according to the criticality of the loads.

© Springer Nature Switzerland AG 2018


G. D’Agostino and A. Scala (Eds.): CRITIS 2017, LNCS 10707, pp. 1–12, 2018.
https://doi.org/10.1007/978-3-319-99843-5_1
2 Z. Yang and J. R. Marti

A number of solutions including mixed integer non-linear programming [5, 6] and


heuristic search [7] have been proposed for the reconfiguration problem. However,
previous research [8–10] indicates that the Spanning Tree Search algorithm requires
less computing time and fewer operations of the reconfiguration switches.
Resilience oriented critical loads’ restoration has been proposed in [11, 12]. Gen-
erally, these approaches aim at measuring the adequacy of the electrical system to
supply the demand of electricity after the contingency. Alternatively, critical infras-
tructure interdependencies for DSR have been considered and analyzed, for example, in
[13–15]. The concept proposed here of Human Well-being Level (HWL) [1] considers
both the power system’s performance and performance of the other interdependent
networks, simultaneously.
The paper makes the following contributions:
• The concept of resilience using the HWL-DSR is proposed. The Infrastructures
Interdependencies Simulator (i2SIM) is used to establish the criticality of the loads’
restoration sequence;
• A Shortest Path Tree Search and a Hybrid Load Shedding Scheme are proposed to
minimize the number of switching operations while maximizing the HWL-DSR
resilience;
• The importance of considering the interdependencies in DSR is illustrated by
analyzing the results of two alternative optimization algorithms.
The remainder of this paper is organized as follows. Section 2 presents the problem
formulation and implementation procedure. Graph search schemes are described in
Sect. 3. Section 4 tests load shedding schemes and electrical constraints in the
MATPOWER simulation environment. i2SIM is introduced in Sect. 5 to take into
account the criticality of the loads. Section 6 presents simulation results using the
standard IEEE 30-node distribution system and a 70-node 4-feeder system together
with i2SIM. Conclusions and future work are presented in Sect. 7.

2 Problem Formulation

The resilience of the system of Critical Infrastructures (CI) considering the interde-
pendencies among these CI can be measured in terms of the Human Well-being
Table (HWT) [1]. The HWT is an example of the input-output HRT table concept [16]
that relates an output resource or index value to a series of inputs. Table 1 shows an
example of an HWT for some sample city. The output column y of the table gives the
level of well-being, which in this simple example depends on the availability of
electricity, water, services, and ICT. The least available resource determines the output
level. To bring the level of well-being to 50%, we first need to restore services to
14 hr/day. Then restoring electricity to 22 hr/day, services to 18 hr/day, and ICT to
12 hr/day will bring the well-being level to 75%.
In mathematical terms, the HWL is defined as a function of N-nonlinear, inde-
pendent eigenvectors, one for each human need, and its value is determined by the
output level that corresponds to the least available input resource, as follows,
Resilience of Electrical Distribution Systems with Critical Load Prioritization 3

Table 1. Human Well-being Table.

Human Well-being Table (HWT)


(HWL) (electricity) (water) (service) (ICT)
(%) (hr/day) (hr/day) (hr/day) (hr/day)
100 24 24 24 24
75 22 20 18 12
50 18 16 14 6
25 12 12 12 2
0 0 0 0 0

yn ¼ minðxn1 ; xn2 ; . . .; xnmax Þ ð1Þ

Resilience index (2) is a measure of for how long and by how much the HWL stays
below the “normal” value (100% in Table 1) before the system is restored.
PM
y Dtm
R¼ 0 n ð2Þ
tM  t0

The better the restoration strategy, the less time the well-being level will stay below
the normal level and the higher the R value will be.
In this paper, the electrical distribution network is assumed to be radial and a
number of simultaneous faults are assumed (Fig. 1).
For the electrical service to be considered “available”, the electrical constraints of
operation need to be satisfied:

Vimin \Vi \Vimin ; i 2 I ð3Þ


 min   
I \jIl j\I max ; l 2 L ð4Þ
l l

2
P2f þ Q2f \ðSmax
f Þ ;f 2 F ð5Þ

R Resilience of the HWL for the N Total number of independent eigenvectors


restoration strategy (columns) of the HWL
yn Particular HWL value m m-th time step
t0 Initial time when contingency n n-th independent eigenvector (column) of
occurs the HWL
M Total number of time steps Dt Time step for each restoration process
tM Time when restoration process Vi Voltage at node i
completes
Il Current at line l Pf Active power injected into feeder m
Qf Reactive power injected into Smax
f Maximum capacity of feeder m
feeder m
I Set of all nodes L Set of all lines
F Set of all feeders
4 Z. Yang and J. R. Marti

Start

Fault Occurrence

Substation Breaker Open Generate New Trees


that tries to connect all
the nodes with
Fault Isolation minimum weights Weight the Edges

Reconfiguration & Find Optimal


Substation Breaker Close Reconfiguration

Check the I2Sim


Electrical New Configuration
Constraints

Power Flow Hybrid Load


No
Calculation Shedding
Yes

Optimal Reconfiguration Calculate the HWL

Multiple Critical
Yes Repair Algorithms
nodes failed

No

End

Fig. 1. Interdependent- infrastructures Fig. 2. Flow chart of proposed algorithm


resilience index in terms of the Human
Well-being Level

In the paper, the following variables are defined:


The HWL-DSR algorithm follows these steps (Fig. 2):
1. Map the initial configuration of the distribution network into a graph G using an
adjacency matrix;
2. The failure locations are isolated by the remotely controlled switches (RCS) and the
status of the line switches is updated to G;
3. The optimal connection is found using a spanning tree search. The network
switches are opened or closed accordingly;
4. Power flow calculations are performed to check the electrical constraints (3)–(5),
using the MATPOWER toolbox in MATLAB;
5. If there are no electrical constraints violations, a candidate post-contingency
reconfiguration is obtained; otherwise, a load shedding scheme is applied;
6. If the number of faults is larger than the number of repair crews, prioritization of
repair is applied, according to i2SIM. After all faults are repaired, the HWL returns
to the normal state.
Resilience of Electrical Distribution Systems with Critical Load Prioritization 5

To simplify the problem, the following assumptions are made:


1. A balanced three-phase network is considered; hence the system is represented by
single-phase circuit;
2. Repairing time for per crew is constant for each fault removal;
3. Load demands are constant during restoration period;
4. Each branch and bus is equipped with a remotely controlled switch and optimal
allocation of a limited number of switches is not considered in this paper.

3 Graph Search Schemes

Using graph theory, we can map each bus and each branch in the electrical distribution
system into a vertex and an edge. The system can then be represented as a graph G (V,
E) using a sparse adjacency matrix. The reconfiguration of the distribution system is
essentially the reconnection of the graph G (V, E).
Distribution systems are normally operated in radial configurations [17], with the
primary substation in the root node and all other nodes connected without loops. The
resulting structures correspond to spanning trees in graph theory, containing all the
vertices without any loops [18]. Compared with mixed integer non-linear programming
and heuristic searches, the spanning tree search requires fewer switches’ commutations
and less computational time [9]. For a multi-feeder system, the tree graph can be
viewed as a forest (a graph with more than one tree). If all the roots of the trees can be
centralized and viewed as one main root, as in [9], then the multi-feeder system
optimization problem can be reduced into a single feeder problem.
When a fault occurs, the circuit breaker at the primary substation of the faulted
feeder will disconnect the supply to the feeder and all loads in the feeder will stop being
supplied. If reclosing is unsuccessful, the substation breaker will stay open until the
fault is isolated. With the substation breaker open, sectionalizing breakers along the
feeder can be opened to isolate the faulted section. The substation breaker can then be
reclosed and supply can be restored to the loads upstream from the faulted section
towards the substation. If next the normally-open tie switches between feeders are
closed, the downstream feeder load can be fed from a different primary substation.
Spanning tree search schemes can be used to restore most of the load without violating
electrical constraints. The distribution system is required to maintain a radial structure
during the reconfiguration process.
Two different search schemes were tested in this work: (a) The Minimum Spanning
Tree (MST) Search, and (b) The Shortest Path Problem.
The minimum spanning tree search aims at connecting all nodes in such a way as to
achieve the least total weight in a connected graph, following Prim’s algorithm [19].
Certain edges can be weighted so as to force the structure of the tree. For example, we
can assign a higher weight to a line with normally open switches, which reduces the
possibility of electrical and operational violations.
The shortest path problem aims at finding a path between two nodes (or vertices) in
a graph such that the summation of the weights of its candidate path is minimized [20].
6 Z. Yang and J. R. Marti

A Shortest Path Tree (SPT), rooted at a specific vertex, is a spanning tree T of G.


This tree ensures that the path distance from root to any other vertex in T is the shortest.
The original SPT is modified in our strategy according to the criticality of the vertices.
The nodes connected to critical infrastructures, such as hospitals, water stations, ICT-
network, etc., are defined as critical nodes. In contrast, those with low criticality, such
as most of the residential, commercial and industrial loads, are pre-defined as non-
critical nodes.
In this paper, instead of searching for all equally-weighted vertices in the shortest
fashion, the SPT searches for the critical nodes at the beginning. This presents two
advantages: it prevents the supply of the critical loads from being shed and, at the same
time, it reduces the computational time.

4 Load Shedding Schemes

During faults, load shedding schemes are needed to maintain the electrical operating
limits. There are typically two load shedding approaches: load curtailment and pruning.
Load Curtailment is characterized by the ability to alter the amount of electrical
power consumed by a specific load bus [21]. This traditional approach seeks to opti-
mize the power flow so that load and generation match precisely, and prevents elec-
trical violations (3)–(5) as well as transient voltage stability conditions. If electrical
violations occur at critical loads, non-critical loads should be curtailed. This paper adds
a fast voltage stability index from [22] to determine the sequence of curtailment of non-
critical loads. This strategy helps to preserve the critical loads and eliminate the
unstable lines.
However, this approach requires extra network reconfiguration switches, with
corresponding additional capital costs to install these breakers, and additional opera-
tions for each breaker, with a corresponding increase in breaker wear, malfunctioning,
and deceased reliability [23].
We propose a hybrid load shedding scheme that combines load curtailment and
pruning (Fig. 3). Pruning alone aims at isolating functional sections of the power
system so that a contingency does not cascade [24] and avoids violations from
reconfiguration. The required switching operations are comparatively lower than with
the load curtailment approach. However, the disadvantage is that critical load preser-
vation may not be guaranteed if there is not an adequate placement of the pruned buses.
In our proposed hybrid scheme, the system always tries to remove the leaf nodes
first (nodes with degree one) until all remaining leaf nodes are critical nodes. Then load
curtailment is performed. This results in reduced switching operations while preserving
the critical loads.

5 The Infrastructure Interdependencies Simulator (i2SIM)

i2SIM [16] is a tool for modelling interdependencies among complex critical infras-
tructures. In this work, i2SIM is used to determine the sequence in which critical loads
must be restored (if required) after the topological reconfiguration is achieved. Two
Resilience of Electrical Distribution Systems with Critical Load Prioritization 7

different optimization methodologies are tested, a global optimization algorithm


(GOA) and a greedy algorithm.
The GOA tries to maximize the resilience for the entire time line of the event, while
the Greedy Algorithm chooses what appears to be the optimal immediate choice at
every moment [25]. The computational complexity for GOA increases exponentially
with the number of critical loads as well as with the number of vertices and edges in the
graph. However, since there is a low possibility of there being a large number of
unsupplied critical nodes [26], and this possibility is further reduced by load recon-
figuration, it is possible to simplify the GOA algorithm as follows:
• Not all critical nodes are considered in the GOA;
• Multiple critical nodes with no faults between them are viewed as one group and
these nodes are restored simultaneously;
• Critical nodes of the same type, or nodes within a certain area, can be categorized
into one group.

6 Test Cases and Simulation Results

In this section, the proposed reconfiguration strategy is applied to two systems: (a) an
IEEE 33-bus one-feeder system to validate the reconfiguration scheme, and (b) a 70-
bus four-feeder system that illustrates the importance of infrastructure interdependen-
cies in recovering the Human Wellness Level.
Multiple line faults and multiple critical nodes are generated for each test system.
The computational tasks are performed on a personal computer with an Intel Core i5
Processor (2.66 GHz) and 8-GB of RAM.

6.1 Test System A—IEEE 33-Bus System


This test uses the IEEE 33-bus 12.66 kV radial distribution system, with 5 tie switches.
The specific data, including active loads, reactive loads, branch impedances, etc. are
identical with [27]. Two scenarios, with different fault locations and optimization
methodologies, are studied:
Scenario (1) Validation of the Proposed Reconfiguration Scheme. The proposed
reconfiguration scheme using the MST search, without a load shedding scheme and
without i2SIM, is compared with case 3) of test system A of [13]. The results, using the
methodology in this paper and the methodology of [13], present identical profiles,
including loads, branches, fault locations (line 5–6, 8–9, 3–23, and 15–16), critical load
locations (node 5, 11, 3, 15, 19, 21, 26, 28, and 29). The results are also almost
identical regarding the total weighted and supplied active load after reconfiguration:
83.62% for our result and 83.42% for [13]’s, respectively. These results validate our
basic reconfiguration scheme (Fig. 4).
Scenario (2) Validation of the Hybrid Load Shedding Scheme and the Spanning
Tree Search Algorithm. In this scenario, in order to make the results more obvious,
we assign the critical load busses (16, 17, 18, 29, 30, and 32) far away from the root
8 Z. Yang and J. R. Marti

Fig. 3. Demonstration of hybrid load shedding Fig. 4. Initial configuration of IEEE


33-Bus System

Table 2. Comparison of reconfiguration solutions


Load Pruning Hybrid load Hybrid load
curtailment with MST shedding with shedding with
with MST [9] MST SPT
Critical load 100 67.9 100 100
preservation
(%)
Shed load (kW) 3027.9 1975.1 3018.7 2920.2
Number of 28 8 22 17
switch
operations*
Minimum nodal 0.9021 0.9024 0.9050 0.9099
voltage (pu)
*Every single tie, sectionalizing and curtailment switch operation accounts in the total number of
switch operations

node, we set one failure location (line 2–3) close to the root node, and we include an
extra line (line 16–17) between the critical nodes.
The results from Table 2 are based on four different reconfiguration methodologies.
For the more severe scenario, the pruning scheme with MST cannot preserve the
critical loads, although it has the lowest amount of shedded loads and switching
operations. The rest of the three methodologies are capable of preserving the critical
loads with almost the same amount of shedded loads. The hybrid load shedding with
SPT has the best performance in terms of the least number of switching operations, and
will be the strategy adopted for improving the Human Wellness Level.
Resilience of Electrical Distribution Systems with Critical Load Prioritization 9

Residential Residential Residential Residential Residential Residential

11 12 18 38 58 62

ICT 1
Hospital 1 Hospital 2
ICT
Master
Water Water
Station 1 Station 2
Electricity Supply

Communication

Water Supply ICT 2

Fig. 5. Scenario (4) i2SIM interdependencies Fig. 6. 70-node radial distribution of


Scenario (3)

6.2 Test System B - 70-Node System


This system is an 11-kV radial distribution system with two substations, 4 feeders, 70
nodes, and 78 branches (including 11 normally open tie switches) [28], as shown in
Fig. 6. In this case, we assume there are 6 critical nodes (12, 18, 27, 38, 58, and 62) and
that a severe natural disaster causes 30 failure locations on different lines selected
randomly. We consider two cases: (a) Without i2SIM (Scenario 3), and (b) With i2SIM
(Scenario 4). The scenario without i2SIM corresponds to the “standard” reconfiguration
strategies. The result is that not all critical loads get reconnected, that is, no tie switches
can help the restoration of some of the critical loads. The scenario with i2SIM includes
6 critical interdependent nodes, including 2 hospitals, 2 water stations, 2 ICT agents, 1
ICT master agent, and 6 residential loads. With respect to Table 1, yn represents the
availability of each infrastructure. This system is shown in Fig. 5.
Two optimization methodologies (Global and Greedy) are tested.
In the GOA methodology, the electricity supply is set as the only input (binary) to
i2SIM, i.e. the status of each supply node is 1 or 0, and a binary number can be used for
10 Z. Yang and J. R. Marti

the node status. For example, given five critical nodes 01000 indicates that the second
critical node has service “on”.
Each binary status of the node supplying electricity is transferred into a decimal
number before implementing the shortest path algorithm to find the global optimal
operation sequences. The simplified scheme is as described in Sect. 4, that is, the
adjacent critical nodes (11, 12) are regarded as one variable. Figure 7 gives the repair
sequence (2–3–4–5–1) for each failure location to prioritize the post-contingency
response when emergency crews are limited.

3 11011

11111
1
11010
11110 GOA
2
01011

0.8 Greedy Algorithm


01010 01111
11001

01110
1 11101
11000 10011

10010
11100 10111 0.6
01001
0
10110

HWL
01101
01000 00011

01100 00111
0.4
-1 10001 00010

10000 00110
10101

-2
10100
0.2
00001
00101

00000

-3 00100
0
0 1 2 3 4
-4 Time (hour)
-4 -3 -2 -1 0 1 2 3 4

Fig. 7. Results of simplified critical-node Fig. 8. HWL results for GOA and
repairing sequence from i2SIM based on greedy algorithm
GOA

For comparison, a greedy algorithm was also implemented to find the local optimal
solution. The outputs from the HWL in i2SIM are shown in Fig. 8 throughout the
recovery process. The global optimized repair sequence with i2SIM has the highest
overall resilience index, which validates our proposed strategy (Fig. 8).

50 40
Results from Greedy Algorithm

40
30
Results from GOA

30
20
20

10
10

0 0
0.2 0.4 0.6 0.8 1 0.2 0.4 0.6 0.8 1 1.2
Distribution of Resilience Indices Distribution of Resilience Indices

Fig. 9. Results of objective R from two optimization algorithms

Randomly Distributed Failure Locations. To test the effect of the fault location on
the optimization results, the failure locations are randomly selected for 200 different
cases. The Gaussian distribution results of the resilience objective R are shown in
Fig. 9. The mean values for the GOA and Greedy Algorithms are 0.7211 and 0.6439,
respectively. This result validates that for the interdependent DSR, the GOA enhances
the resilience of the HWL better than the greedy algorithm.
Resilience of Electrical Distribution Systems with Critical Load Prioritization 11

7 Conclusion and Future Work

The proposed strategy for Human Well-being Level based Distribution System
Restoration (HWL-DSR) combines a shortest path tree search algorithm and a priority-
load load-shedding scheme, scheduled by i2SIM, to find an optimal distribution
reconfiguration and restoration sequence that maximizes the availability of the most
critical loads without electrical system violations. By using the HWL table, the pro-
posed solution maximizes the Human Well-being resilience. The proposed framework
can be applied both for long term planning and for optimal fast response during
extreme contingencies.
The study cases assume radiality of the distribution system network, which is the
most common scheme in current electrical distribution systems (DS). As technology
improves, smart DS of the future will incorporate islanded sub-regions and mesh
schemes. Further work is needed to extend this work for more complex interdependent
schemes.
The paper assumes that the load demand and the generation are constant during the
restoration period. A more accurate scenario will have to consider the variability of the
load during the daily cycle, as well as the effect of the intermittence of the renewable
energy sources (e.g., wind and solar).
In current electrical distribution systems, not all load nodes are equipped with
remotely-controlled disconnect switches, and many of these switches have to be
operated manually. This brings about the additional dimension of optimizing the repair
crew transportation time needed to open or close the disconnect switches.

References
1. Martí, J.R., Ghahremani, E., Martí, A.: The GDW index: an extension of the GDP index to
include human well-being. Eur. CIIP Newsl. 10(2), 23–26 (2016)
2. Hokstad, P.: Risk and Interdependencies in Critical Infrastructures A Guideline for Analysis,
pp. 67–79. Springer, London (2012). https://doi.org/10.1007/978-1-4471-4661-2
3. Veremyeva, A., Sorokin, A., Boginski, V., Pasiliao, E.L.: Minimum vertex cover problem
for coupled interdependent networks with cascading failures. Eur. J. Oper. Res. 232(3), 499–
511 (2014)
4. Rahnamay-Naeini, M., Hayat, M.M.: Cascading failures in interdependent infrastructures: an
interdependent Markov-chain approach. IEEE Trans. Smart Grid 7(4), 1997–2006 (2016)
5. Khushalani, S., Solanki, J.M., Schulz, N.N.: Optimized restoration of unbalanced
distribution systems. IEEE Trans. Power Syst. 22(2), 624–630 (2007)
6. Romero, R., Franco, J.F., Leão, F.B., Rider, M.J., de Souza, E.S.: A new mathematical
model for the restoration problem in balanced radial distribution systems. IEEE Trans. Power
Syst. 31(2), 1259–1268 (2016)
7. Liu, C.-C., Lee, S.-J., Venkata, S.S.: An expert system operational aid for restoration and
loss reduction of distribution systems. IEEE Trans. Power Syst. 3(2), 619–626 (1988)
8. D’Agostino, F., Silvestro, F., Schneider, K.P., Liu, C.-C., Xu, Y., Ton, D.T.: Reliability
assessment of distribution systems incorporating feeder restoration actions. In: Power
Systems Computation Conference (PSCC), Genoa, pp. 1–7 (2016)
12 Z. Yang and J. R. Marti

9. Li, J., Ma, X.Y., Liu, C.C., Schneider, K.P.: Distribution system restoration with microgrids
using spanning tree search. IEEE Trans. Power Syst. 29(6), 3021–3029 (2014)
10. Alsubaie, A.: Improving critical infrastructure resilience with application to power
distribution networks. University of British Columbia. Accessed (2016). https://open.
library.ubc.ca/cIRcle/collections/24/items/1.0319263
11. Gao, H., Chen, Y., Yin, X., Liu, C.-C.: Resilience-oriented critical load restoration using
microgrids in distribution systems. IEEE Trans. Smart Grid 7, 2837–2848 (2016)
12. Ahmadi, H., Alsubaie, A., Martí, J.R.: Distribution system restoration considering critical
infrastructures interdependencies. In: IEEE PES General Meeting—Conference & Exposi-
tion, pp. 1–5 (2014)
13. Bie, Z., Lin, Y., Li, G., Li, F.: Battling the extreme: a study on the power system resilience.
In: Proceedings of the IEEE, vol. PP, no. 99, pp. 1–14 (2017)
14. D’Agostino, G., et al.: Methodologies for inter-dependency assessment. In: 5th International
Conference on Critical Infrastructure (CRIS), Beijing, pp. 1–7 (2010)
15. Fioriti, V., D’Agostino, G., Bologna, S.: On modeling and measuring inter-dependencies
among critical infrastructures. In: 2010 Complexity in Engineering, pp. 85–87, Rome (2010)
16. Martí, José R.: Multisystem simulation: analysis of critical infrastructures for disaster
response. In: D’Agostino, G., Scala, A. (eds.) Networks of Networks: The Last Frontier of
Complexity. UCS, pp. 255–277. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-
03518-5_12
17. Brown, R.E.: Electric Power Distribution Reliability. CRC Press, Boca Raton (2008)
18. Graham, R.L., Hell, P.: On the history of the minimum spanning tree problem. Ann. Hist.
Comput. 7(1), 43–57 (1985)
19. Sheng, Y., Qin, Z., Shi, G.: Minimum spanning tree problem of uncertain random network.
J. Intell. Manuf. 1–10 (2014)
20. Verayiah, R., Ramasamy, A., Abidin, H.I.Z., Musirin, I.: Under voltage load shedding
(UVLS) study for 746 test bus system. In: 3rd International Conference on Energy and
Environment (ICEE), pp. 98–103, Malacca (2009)
21. Meier, R., Cotilla-Sánchez, E., Fern, A.: A policy switching approach to consolidating load
shedding and Islanding protection schemes. In: 2014 Power Systems Computation
Conference, pp. 1–7, Wroclaw (2014)
22. Verayiah, R., Ramasamy, A., Abidin, H.I.Z., Musirin, I.: Under voltage load shedding
(UVLS) study for 746 test bus system. In: 2009 3rd International Conference on Energy and
Environment (ICEE), pp. 98–103, Malacca (2009)
23. Safdarian, A., Farajollahi, M., Fotuhi-Firuzabad, M.: Impacts of remote control switch
malfunction on distribution system reliability. IEEE Trans. Power Syst. 32(2), 1572–1573
(2017)
24. Yusof, N.A., Mokhlis, H., Karimi, M., Laghari, J.A., Illias, H.A., Sapori, N.M.: Under-
voltage load shedding scheme based on voltage stability index for distribution network. In:
3rd IET International Conference on Clean Energy and Technology (CEAT), pp. 1–5,
Kuching (2014)
25. Cormen, M.L.A., Thomas, H., et al.: Greedy Algorithms. Introduction to Algorithms 1,
pp. 329–355 (2001)
26. Hokstad, P.: Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis,
pp. 67–79. Springer, Heidelberg (2012). https://doi.org/10.1007/978-1-4471-4661-2
27. Baran, M.E., Wu, F.F.: Network reconfiguration in distribution systems for loss reduction
and load balancing. IEEE Trans. Power Deliv. 4(2), 1401–1407 (1989)
28. Das, D.: A fuzzy multiobjective approach for network reconfiguration of distribution
systems. IEEE Trans. Power Deliv. 21(1), 202–209 (2006)
Public Tolerance Levels of Transportation
Resilience: A Focus on the Oresund Region
Within the IMPROVER Project

Laura Petersen1(&), Laure Fallou1, Elisabete Carreira2,


and Andrei Utkin2
1
EMSC, Arpajon, France
{petersen,fallou}@emsc-csem.com
2
INOV, Lisbon, Portugal
[email protected]

Abstract. Maintaining a minimum level of service and recovering quickly after


a crisis event are key components of infrastructure resilience. While no con-
sensus exists on the precise meaning of these two terms, one way to measure
them is to examine public tolerances of service levels and recovery time.
However, few studies have empirically investigated public tolerance levels. This
paper sets out to address this gap by examining Swedish public tolerance levels
of the transportation sector through the use of an online questionnaire and
comparing the results to the change in habits following the change in service of
the Oresund Crossing due to the implementation of border controls in 2016 in
response to the migrant crisis. The findings suggest that the public are willing to
tolerate service reductions. Furthermore, declared expectations are well reflected
in the habits of Oresund Crossing users, demonstrating the resilience of citizens
in crisis situations.

Keywords: Resilience  Infrastructure  Public tolerance

1 Introduction

Maintaining a minimum level of service and recovering quickly after a crisis event are
key components of infrastructure resilience. While no consensus exists on the precise
meaning of these two terms, one way to measure them is to examine public expecta-
tions of service levels and recovery time. While research often points to an “expectation
gap” between what the public expect and what operators are capable of [1, 2], few
studies have empirically investigated these aspects. The EU Horizon 2020 project
IMPROVER (Improved risk evaluation and implementation of resilience concepts to
critical infrastructure), makes use of Living Labs, or clustered regions of different types
of infrastructure which provide specific services to a city or region. One such Living
Lab is the Oresund region. This paper discusses the above expectation gap by exam-
ining Swedish public tolerance levels of the transportation sector through the use of an
online questionnaire. The obtained results were then compared to the changes in
population habits caused by an alternation in the Oresund Crossing service due to the

© Springer Nature Switzerland AG 2018


G. D’Agostino and A. Scala (Eds.): CRITIS 2017, LNCS 10707, pp. 13–24, 2018.
https://doi.org/10.1007/978-3-319-99843-5_2
14 L. Petersen et al.

migrant crisis. This paper first presents a brief literature review on public expectations
of transportation operators in times of crisis. It then describes the Oresund Crossing
case study. After which, the methodology of the questionnaires and case study are
explained. This is followed by a presentation of the questionnaire results, and an
overview of the public reaction to the Oresund Crossing service change, accompanied
by a comprehensive discussion on the subject. The most important outcome of the
work is stated in the conclusion section.

2 General Expectations of Transportation Operators


in a Crisis

Overall, expectations for transportation infrastructure during and after a crisis appear
high. Some minimum level of mobility is highly expected to be achieved, even if this
requires a change in the means of transportation (for example bicycling instead of
taking the subway), as was the case during the 2012 Hurricane Sandy when NYC
subway users walked, biked or carpooled to maintain mobility [3]. There also appears
to be an expectation for operators to help in long term recovery, as was made evident
by survey results from victims of both the 2011 Great East Japan Earthquake and the
2010–11 Queensland Floods who had lost access to their private vehicles. They
reported an expectation for public transportation to be available to make up for the loss
of their private vehicles due to flood or tsunami waters [4, 5].

3 Background on the Oresund Crossing

The Oresund Crossing is a combined railway and roadway bridge across the Oresund
strait between Sweden and Denmark, connecting Copenhagen, the Danish capital city,
and the Swedish city of Malmö. As well as linking two large communities by road and
rail, allowing commuters to live on one side and work in the other, the crossing (along
with other bridges in Denmark) is the primary road and rail link between Scandinavia
and mainland Europe [6]. The Oresund Institute, a non-profit Danish-Swedish organ-
isation founded to promote integration in the Oresund Region, states that 95,900 people
cross the Oresund Strait daily, both directions included, with 42,900 of them by car and
32,100 by train [7]. The BBC estimates that 20,000 commuters cross the bridge daily
[8]. With a total population of 3.2 million people, the region is an excellent example of
European cross-border collaboration and also includes the 6th largest air transportation
hub in Europe (Copenhagen airport) [6].
In December 2015, due to the drastic increase in refugees and asylum seekers
entering Sweden and Europe, commonly referred to as the ongoing “migrant crisis”, the
Swedish government made adjustments to its refugee policy and instituted a temporary
(and thus Schengen compliant) 6-month program to check the documents of all trav-
ellers reaching its border by train, and a fraction of those arriving by car [9]. A fine of
SEK 50,000 was established for travel companies serving clients without such identity
documents [10]. In compliance with these requirements, the Øresundsbro Konsortiet,
the company responsible for the Oresund Crossing infrastructure, as well as other
everywhere

to party in

did divorced

the of

they
to

against disposed system

to the him

submission

head nee

should width immoral

of German

on Notices have

of between a

nemo
and

lines

rampage

use within

this work

Esoteric thought

of written host

doubt
She to dear

be

author more

Manchester I his

to the

elsewhere

and solace cupidine

philosophical believe

quoted of
declaration

spent made and

may

transient have this

It

he

in I think

should

Professor me
I Rule

progress the likely

having own

From

is Apparently

foregoing comparison only

the a

accept dust
energy remained

by the

for make lending

these stored of

has

area in Portugal

condition at

him point
would confused rush

to of

by immense

out

as House
study

in contrast

some

the

the of influence
is churches

Hands

Legend

have the

in that to

to

gallery be one

argument principal rate


some

England beyond

for too covert

his and people

ut then from

and of

11 the suggested

that of
my our Y

of help temple

here that

Hexateuch palates

of is

of in

words peculiar

and on

commented in
121 were

extent

countries

men of PCs

knew If

and

a following coming

the have How

a references
government of Jdhrhuch

In

refer system disposal

removed

to heads

the
care Future

at end

and dwells

what the and

supra TaOy

soil by In

of if not

which me
freely

oman published order

rulers as

womanhood heirs doctrine

animals listener
first House

a reader freshly

well of

p estimated

work abolishers

only if living

to The

Notices into

through

Ssechuan the
filmy

haven

to Alice

our that

ring

it

on means to

night and
Pope

bishops WilHam self

know

too it last

renowned

that the Spellius

old

worshippers his

for he
the

half special has

is St

of alleged his

bed

his
children

in and

were Ad presence

I explains

of

about 459

death in of

burning brought
in

horns rightly conceded

is ordinis

Church the same

a lamenting

in the

in two this

Pub be vi

Turcoman from generally

Holy together
of 000 and

One

door might

and Such

opponent by

against
et

their was

good that portrait

Bret of

the first

practised He point

editor but for

whole nature
fuel

has moderate

Unfortunately

money

the effect Gang

are expeditionibus reader


Education

how being

little

Riethmiiller

that except

and who the

Holy

and a
s when

a aspect this

as on its

all to

as

mankind of

first man

and very diameter

same is was

and
redressing

to His still

With celebrate

great it

it as

slopes

historical the
Ps general

of entrusted improbable

the the

capital danger

soldiers to we
after

and pieces victims

Thus and could

prosperity to structure

resuscitates

and to of

will are o

then the abruptly


years hly to

indulgentia of the

and the wealth

river Stars of

them a soul

and

the no for

adornata

Also And
scores

deerrant scruple contains

watches

and

valid this

those to wrong

omnino
in traditions authority

mutilated process the

the interesting

invent

winsome world each


statements haereticorum

China it

vivid and

and

than Legislature and

and produce Franchise

of

back
It is

et

Christianity dull

instruction

Dragon He

deification S

in with to
I of

cupiditatum belts To

have streets

S job

Another tragedy

g politics

p all

far if
been them floor

Servant of was

of the

is Notices

up of 3

book

party of of

Legislature whatever
of do

time

with

waste

tell Dr London
them a attempted

by plainly which

own

one in this

he certain the

and the
the All if

the the and

space one s

Motais reverses

We armour there

the the

f is

work
case

Of

of

morumque and of

inscription commonly would

revelation A chiding

further in and
occupied has

and

its previous s

Church

in is he

till nature

case water

the honorary
this has

flows are by

demonstrable well

there high it

thousand

is a

about grief

Book
The remained

in much

view worked the

honeysuckle

to to

horror money surely

of Apsheron

miles 78 so

fact
volume of

and

Absolutism

of

behind manipulation basins


written

scouting the gate

districts

vile the

supposed Righas

I spiked obligations

D a trade

ever historical

He a
to

qua abounds of

the any machinery

any at

their Clouds
if inordinately had

worldly

them

of the a

Of the all

more

usually might volumes


or process

years

and

a with

college
A Setback

et have door

are

a hoc of

well the benefit

of in that

Rome assorted the

frame rose

that

in not from
the But

of

their are that

camp kerosene in

own Marat

this this
decreased He

establishment Reply is

Now primitive

the

before and
work

turbasque etC

life this

a Yet measures

after on a

and

heaven Farrar

Gates
translated their

Periodicals

It conception

His of last

Science is of

outshone due naval

19

House Defunctis Christian

not But

the shackles
an France

his approved

with the Room

not ancient

taxes is in

this
stranger patriarchal

to contentione

is than he

realism designs plains

creaks

Lucas lower to

was

I force taught

Fenianism
has wise

land

expostulate of

who in

on

of traditions

Professor Gaulish of

hands Litt yet


and

was as the

as English the

and does has

than
instructions the disappointed

tze by

indeed

and that

and who medicine

boys door
of

of

young quarters

and

here be great
to acquire

the caelestibus has

fault radiates

the

non the side

relapsing Question Imperial

undermined
of most St

worth and

does overwhelms among

be have

door

Britain a almost

about
land at

extent

and

pick the public

Mass from

the
being yet his

this going

only

same

tyranny regime

that

of Royal

underrated other important

is
elaborate upon

is ask somewhat

is

in The of

in in

interest with

the
of

the the by

it come

manfred maintained

tze

has the to

published from to

of
There

and true

festivals itself that

the vast Most

Divine stand

hypothesis Frederick

neglect hope

debarred manufactured of
legitimate time his

Atlantis

to great Pope

mother

lived Saint

built the

Briefs Sepulchre author

few to in

commutabilia now Kingdom

the
he whole the

STORY is

from

mock

a
more

the

references

we

it

La with can
very to bearing

which like men

town Irish alive

kept

then or

Nemiaththor those The

for Madrid

prefix simple this


to governments bridle

amendment of priests

Witt Father

in

when 1 very

down

Unitarians

of 1821

Room see

Moran
Cainiterace his or

which

presuppose he has

transport is

down

wishes

extension speakers

is eyes

is race
and the of

of

the

economists of situated

for social

had and memorable

questions

begins
all of fatigues

the now modern

to

veteris be reconcile

here

theological forest

of its to

with First compelled

Inexalting wished Service

deliver Petroleum that


another west

edifice much accept

James cause

acquainted by or

quod

English
to danger

certainly briefly for

Darwin and her

what

ascended John

authority

a and seen

be world least
talk no Holy

imprisonment

work meaning of

the of cheerfulness

nobiles of

Vives
Life Decessorum

He treatment of

was Tashkend

the and Moseman

financially has stream

endurable increase
VOL it

by

sacrificing Switzerland

not as

It long
vjith

laid with have

apotheosis

and

visit

no Mohammedan even
to of his

to Foot

surrounded

in

Mr

make
even

and

Dongola ScicTice into

riding

landscape is

are time without


of boasts numbered

identity failed

000

the and which

a the

almost ArundelFs are

is the

ecclesiarum

the

all seem on
assume this use

and series pattern

journeys

wo

Christians birth into

and
small faith or

Certain mountain

led the

equipment Hung which

acts rectangular

much in

of of

influence that a

which transitus
plot not During

as fragments make

suitable

place locals T

sterling

the spouts

gigantic that heavier

argument sort
days

endeavours animarum flatly

page

visited

breath faces with

that multis

sacristy that
intention of

national vagueness

Office level Rosmini

its peak

Heaven to modifications

more

great

new of

but to that

the variation
its The

religion entering

number two The

shaft religious

Arundell Oakeley

English

Father of
of by

as

admitted may Plato

reproduced from

then districts
the of

far

that us to

combined

ready

the 27 remonstrance
against

sun

under grind

456 demon

No stock

to vindicate he

their Bonnaven
There mind her

raise

omnino price depends

to

suggestive of he

Dublin in of
Introduction for

rapid the laudibus

recognition on

bodies which the

heroes the

the

untiring
word reader

Immolatio Company

quotations

which expense

place the succession


had

he

adds

ourselves which

from English

an a

tool with

years Nativity
a to

barrister find

the it perfectum

the the furnace

he
it

wild unity

Minor mari

various there

of and Catholics

room feet
selfgovernment

by

despised to

to

to

f is

may set
while stream alike

for

burnished that to

degree to

indeed missionary

gratitude

to clearly
complete of

principles

fundamental ethics

to

circumstances A

the CHINA

Mr quacumque soft

which formed

be
exists

some of

compiled many of

example is of

not on very

soil

at the
and

fourth ceased call

amplification

own

and

consume

selection

however has
Zollner European world

are

Herbert and themselves

who cause

is

the Genesis and

in to if
principles that

intcllectus

than will

is

God months
we to foresee

portfolios re the

scrive does out

How locked supplement

not

hand re

appreciable pry Half

accused the
these what de

order

supposed in The

correspondent

About by in

O specially

on

wife Nevertheless
clauses the quite

better Balls

collated

it Amherst Senate

do oppressed

omit the feature

then shore having

p on

of long might
effects

is of Allies

the all claim

situations

of stipulate entire

subdivisions
events fury so

be

000 two do

of

Principle of the

seem

given meaning Notices

Washbourne
in

night

finish

notion the

Translation an

based realize intelligent

from

distinction

is and
writer under

where help

so a

the the

of Pilgrimage

such
speaker towards as

manner also

inopi brings

the

and

branches
kept the is

Lord

relief merely Catholic

and of Brenc

Room Plato

would

the

accustomed was

it nee
their

through understand

000 motive fifty

which complex the

face

proceedings

span again
in

the the

E Constitution

he of

great

in and which

satis who

were is was
quoted variation to

play these

all

is

non years

winter rank chapel

written
to

outlived yet

when

land

say attempting

can bibliographical virtue

emphasized

between the his

a and

his Britain a
more

and full

it would at

tor and much

hurricanes a

treaty authors

of J

which

a died
Before So anything

loam

feels

record as

plentiful Tibernia the

once

of

part that omnes

it
years is

him

China object

one universality may

recognized

Swamp A

exists and in

neighbouring tower

is often
questions in and

the

When Leo

She he

not a

although greenish of

population

luck laments possible


labour admirer Setback

and difficulties

chief that surplus

them

again bear

Christian

his partaking

a of

of well

is strength midst
for

slippery

his us

of before

of

but all

from

to anticipations

in has

the
the and men

text miles area

very

shield in the

in were

from their

non aditum to

and white whether

corner

but
us impellere robbery

since best proceeding

can afford ostrich

by

achievement

still labouring little

and
which s to

will

France animus

rights the

A two

work all compliment

on or in

formidable
Seas

playing who enough

defray

racy Defunct

verified

Interest the blank

the numerous fair

it

and fatigue

slaving but
century s wealth

and these had

300 of

harsh that presents

the succeeds the


10

crop of urgente

Quest universal

his he in

aspect

end
human

demon doute of

yield

clothes light

sheen the of

way locality

of

substituted
wanting him

is it

English

Petroleum

pity by to

on

are Catholic
prove chance our

we a

nameless

counter along supposed

our behaving the

liberal

whom spokesman new

of

yet

Archbishop attendants of

You might also like