Research on structural robustness of weapon system-of-systems based on heterogeneous network

ZHAO Danling, TAN Yuejin, LI Jichao, DOU Yajie, LI Lianchun, LIU Junyi

Systems Engineering - Theory & Practice ›› 2019, Vol. 39 ›› Issue (12) : 3197-3207.

PDF(1919 KB)
PDF(1919 KB)
Systems Engineering - Theory & Practice ›› 2019, Vol. 39 ›› Issue (12) : 3197-3207. DOI: 10.12011/1000-6788-2018-1302-11

Research on structural robustness of weapon system-of-systems based on heterogeneous network

  • ZHAO Danling1, TAN Yuejin1, LI Jichao1, DOU Yajie1, LI Lianchun2, LIU Junyi2
Author information +
History +

Abstract

Considering the complexity and heterogeneity of weapon nodes in the weapon system of systems, and the diversity of the relationship between equipments, this paper first proposes a modeling method based on heterogeneous networks. Next, by referring to the concept of observe-orient-decide-act (OODA) combat cycle theory and combining the definition of meta-path in heterogeneous networks, the number of attack link is used to evaluate the structural robustness of the weapon system of systems. Then, we do the experiments on structural robustness of weapon system-of-systems under random attack and selective attack strategy using the traditional natural connectivity index and the number of attack link. It is found that the number of attack link with actual semantic information is more effective to evaluate the structural robustness of weapon system of systems. Finally, the invulnerability of the weapon system of systems under certain background is analyzed, which provides assistant decision-making for the attacker's primary attack target and the defender's primary protection object.

Key words

weapon system-of-systems / heterogeneous network / structural robustness / number of attack link / natural connectivity

Cite this article

Download Citations
ZHAO Danling , TAN Yuejin , LI Jichao , DOU Yajie , LI Lianchun , LIU Junyi. Research on structural robustness of weapon system-of-systems based on heterogeneous network. Systems Engineering - Theory & Practice, 2019, 39(12): 3197-3207 https://doi.org/10.12011/1000-6788-2018-1302-11

References

[1] Ding J, Si G, Ma J, et al. Mission evaluation:Expert evaluation system for large-scale combat tasks of the weapon system of systems[J]. Science China (Information Sciences), 2018, 61(1):012106:1-012106:19.
[2] Li J, Tan Y, Yang K, et al. Structural robustness of combat networks of weapon system-of-systems based on the operation loop[J]. International Journal of Systems Science, 2016, 48(3):659-674.
[3] Dimitrov V. An overview of the department of defense architecture framework (DoDAF)[J]. Journal of Comparative Neurology, 2012, 24(1):31-60.
[4] Mayer N, Aubert J, Grandry E, et al. An integrated conceptual model for information system security risk management supported by enterprise architecture management[J]. Software and Systems Modeling, 2018:1-28.
[5] Zhao Q, Li S, Dou Y, et al. An approach for weapon system-of-systems scheme generation based on a supernetwork granular analysis[J]. IEEE Systems Journal, 2017, 11(99):1-12.
[6] Cares J R. An information age combat model[R]. Produced for the United States Office of the Secretary of Defense, USA, 2004.
[7] Cares J. Distributed networked operations:The foundations of network centric warfare[M]. Bloomington:Iuniverse Inc, 2006.
[8] Deller S. Applying the information age combat model:Quantitative analysis of network centric operations[J]. The International C2 Journal, 2009, 3(1):1-25.
[9] Deller S, Rabadi G, Tolk A. Organizing for improved effectiveness in networked operations[J]. Military Operations Research, 2012, 17(1):5-16.
[10] Dekker A H. Simulating network robustness:Two perspectives on reality[C]//Proceedings of SimTecT 2004 Simulation Conference. Canberra, 2004:126-131.
[11] Dekker A H. Network topology and military performance[C]//2005 International Congress on Modeling and Simulation. Modeling and Simulation Society of Australia and New Zealand, Australia, 2005:2174-2180.
[12] Dekker A H. Analyzing C2 structures and self-synchronization with simple computational models[C]//The 16th International Command and Control Research and Technology Symposium. Quebec, 2011:12-14.
[13] 谭跃进, 吕欣, 吴俊, 等.复杂网络抗毁性研究若干问题的思考[J].系统工程理论与实践, 2008, 28(S):116-120.Tan Y J, Lü X, Wu J, et al. Thoughts on several problems in the study of complex network invulnerability[J]. Systems Engineering-Theory & Practice, 2008, 28(S):116-120.
[14] 田旭光, 张成名. 不完全信息条件下的装备保障网络抗毁性模型[J]. 系统工程理论与实践, 2017, 37(3):790-798.Tian X G, Zhang C M. Equipment support network invulnerability model under incomplete information conditions[J]. Systems Engineering-Theory & Practice, 2017, 37(3):790-798.
[15] 李际超, 吴俊, 谭跃进, 等. 基于有向自然连通度的作战网络抗毁性研究[J]. 复杂系统与复杂性科学, 2015, 12(4):25-31.Li J C, Wu J, Tan Y J, et al. Research on battlefield invulnerability based on directed natural connectivity[J]. Complex Systems and Complexity Science, 2015, 12(4):25-31.
[16] 王宏宇, 吴纬, 魏艳艳. 基于超网络模型武器装备体系抗毁性分析[J]. 系统工程与电子技术, 2017, 39(8):1782-1787.Wang H Y, Wu W, Wei Y Y. Invulnerability analysis of weapon equipment system based on hyper-network model[J]. Systems Engineering and Electronics, 2017, 39(8):1782-1787.
[17] Yu C, Li R, Yao D, et al. Temporal-based ranking in heterogeneous networks[C]//IFIP International Conference on Network and Parallel Computing. Springer Berlin Heidelberg, 2016:23-34.
[18] Li C T, Lin S D. Centrality analysis, role-based clustering, and egocentric abstraction for heterogeneous social networks[C]//ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust. IEEE Computer Society, 2012:1-10.
[19] Lü L, Pan L, Zhou T, et al. Toward link predictability of complex networks[J]. Proceedings of the National Academy of Sciences, 2015, 112(8):2325-2330.
[20] Sun Y, Han J. Meta-path-based search and mining in heterogeneous information networks[J]. Journal of Tsinghua University (Science and Technology), 2013, 18(4):329-338.
[21] Sun Y, Yin H, Ren X. Recommendation in context-rich environment:An information network analysis approach[C]//Proceedings of the 26th International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 2017:941-945.
[22] Zhang J, Yu P S. Integrated anchor and social link predictions across social networks[C]//International Conference on Artificial Intelligence. AAAI Press, 2015:2125-2129.
[23] Zhang J, Chen J, Zhi S, et al. Link prediction across aligned networks with sparse and low rank matrix estimation[C]//2017 IEEE 33rd International Conference on Data Engineering (ICDE). IEEE, 2017:971-982.
[24] Zhang J, Chen J, Zhu J, et al. Link prediction with cardinality constraint[C]//Proceedings of the Tenth ACM International Conference on Web Search and Data Mining. ACM, 2017:121-130.
[25] Zhou Y, Huang J, Sun H, et al. DMSS:A robust deep meta structure based similarity measure in heterogeneous information networks[J]. arXiv preprint arXiv:1712.09008, 2017:66-75.
[26] 吴俊, 谭索怡, 谭跃进, 等. 基于自然连通度的复杂网络抗毁性分析[J]. 复杂系统与复杂性科学, 2014, 11(1):77-86.Wu J, Tan S Y, Tan Y J, et al. Invulnerability analysis of complex networks based on natural connectivity[J]. Complex Systems and Complexity Science, 2014, 11(1):77-86.

Funding

National Natural Science Foundation of China (71571185, 71690233, 71901214)
PDF(1919 KB)

905

Accesses

0

Citation

Detail

Sections
Recommended

/