基于网络不脆弱性熵的指挥控制网络不脆弱性测度

Yun-ming Wang, Duoping Zhang, Chengsheng Pan, Bo Chen
{"title":"基于网络不脆弱性熵的指挥控制网络不脆弱性测度","authors":"Yun-ming Wang, Duoping Zhang, Chengsheng Pan, Bo Chen","doi":"10.1109/CCSSE.2016.7784363","DOIUrl":null,"url":null,"abstract":"The factors such as hardware malfunction and invasion, can lead to the nodes and edges failure of Command and Control (C2) network, which divide the original connected network topology, even result in global network damage. To assess the invulnerability of the C2 network dynamically, this study has proposed a measurement of invulnerability for C2 network based on network invulnerability entropy, established an invulnerability entropy model based on the degree of network invulnerability, and put forward node criticality based on Level Flow Betweenness (LFB) and edge criticality based on information transfer efficiency, respectively. Simulation results showed that this measurement of invulnerability is highly sensitive and accurate, able to better reflects the invulnerability and provide a theoretical basis for design and optimization the structure of C2 network.","PeriodicalId":136809,"journal":{"name":"2016 2nd International Conference on Control Science and Systems Engineering (ICCSSE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Measure of invulnerability for command and control network based on network invulnerability entropy\",\"authors\":\"Yun-ming Wang, Duoping Zhang, Chengsheng Pan, Bo Chen\",\"doi\":\"10.1109/CCSSE.2016.7784363\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The factors such as hardware malfunction and invasion, can lead to the nodes and edges failure of Command and Control (C2) network, which divide the original connected network topology, even result in global network damage. To assess the invulnerability of the C2 network dynamically, this study has proposed a measurement of invulnerability for C2 network based on network invulnerability entropy, established an invulnerability entropy model based on the degree of network invulnerability, and put forward node criticality based on Level Flow Betweenness (LFB) and edge criticality based on information transfer efficiency, respectively. Simulation results showed that this measurement of invulnerability is highly sensitive and accurate, able to better reflects the invulnerability and provide a theoretical basis for design and optimization the structure of C2 network.\",\"PeriodicalId\":136809,\"journal\":{\"name\":\"2016 2nd International Conference on Control Science and Systems Engineering (ICCSSE)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd International Conference on Control Science and Systems Engineering (ICCSSE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCSSE.2016.7784363\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd International Conference on Control Science and Systems Engineering (ICCSSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCSSE.2016.7784363","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

硬件故障、入侵等因素会导致C2网络的节点和边缘失效,使原有的连通网络拓扑结构发生分裂,甚至造成全局网络破坏。为动态评估C2网络的不脆弱性,本文提出了基于网络不脆弱性熵的C2网络不脆弱性度量方法,建立了基于网络不脆弱性程度的不脆弱性熵模型,并分别提出了基于水平流间度(Level Flow betweness, LFB)的节点临界性和基于信息传递效率的边缘临界性。仿真结果表明,该测量方法具有较高的灵敏度和准确性,能够较好地反映网络的抗毁性,为C2网络结构的设计和优化提供理论依据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Measure of invulnerability for command and control network based on network invulnerability entropy
The factors such as hardware malfunction and invasion, can lead to the nodes and edges failure of Command and Control (C2) network, which divide the original connected network topology, even result in global network damage. To assess the invulnerability of the C2 network dynamically, this study has proposed a measurement of invulnerability for C2 network based on network invulnerability entropy, established an invulnerability entropy model based on the degree of network invulnerability, and put forward node criticality based on Level Flow Betweenness (LFB) and edge criticality based on information transfer efficiency, respectively. Simulation results showed that this measurement of invulnerability is highly sensitive and accurate, able to better reflects the invulnerability and provide a theoretical basis for design and optimization the structure of C2 network.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Fuzzy logic controller design for intelligent air-conditioning system Design of multi-point wireless multifunction monitoring system based on Android Link weights-based ANT colony routing algorithm for wireless sensor networks Study on control method of activated sludge sewage treatment system Adaptive sliding mode control for a vehicle steer-by-wire system
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1