Measure of invulnerability for command and control network based on mission link

Abstract In Command and Control (C2) network, the measure of invulnerability mainly focuses on structural characteristics of the network, where the operational mission has not been adequately considered. As a result, it becomes difficult to assess the invulnerability of C2 network in a dynamical manner. In this paper, the operational entities and heterogeneous relationships among combat entities are analyzed, where the operational C2 network model is constructed based on the combat theory of OODA and the super network. Subsequently, the mission link is defined, which can be used to characterize the combat network. Finally, a new measure of invulnerability for C2 networks is proposed based on the efficiency and entropy of the mission link. In particular, this measure can desirably represent the efficiency of information transmission and robustness of network structures, respectively. The simulation results have demonstrated that the proposed invulnerability measure is highly sensitive and accurate. More specifically, the proposed measure could more accurately reveal the invulnerability of C2 network, where theoretical basis for designing and optimizing the structure of C2 networks can be also provided.

[1]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[2]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[3]  Haipeng Peng,et al.  Robustness of Interrelated Traffic Networks to Cascading Failures , 2014, Scientific Reports.

[4]  Shengwei Mei,et al.  Invulnerability of power grids based on maximum flow theory , 2016 .

[5]  Shuming Liu,et al.  Design for the Emergency Command Information System Architecture of Ocean Oil Spill , 2015 .

[6]  Fang Mu-yun,et al.  Research on the Diameter and Average Diameter of Undirected Double-loop Networks , 2010, 2010 Ninth International Conference on Grid and Cloud Computing.

[7]  Oriol Lordan,et al.  Robustness of airline alliance route networks , 2015, Commun. Nonlinear Sci. Numer. Simul..

[8]  Kang Rui,et al.  Spatial correlation analysis of cascading failures: Congestions and Blackouts , 2014, Scientific Reports.

[9]  Wen Shi,et al.  Multi-level tolerance opinion dynamics in military command and control networks , 2015 .

[10]  Yi Lin,et al.  Vulnerability of complex networks under three-level-tree attacks , 2016 .

[11]  Tomoya Enokido,et al.  Purpose-Based Information Flow Control for Cyber Engineering , 2011, IEEE Transactions on Industrial Electronics.

[12]  Zhang Feiyun Entropy Optimization of Scale-free Networks Robustness to Targeted Attack , 2013 .

[13]  Duanbing Chen,et al.  Vital nodes identification in complex networks , 2016, ArXiv.

[14]  Dongchao Guo,et al.  ENHANCING NETWORK PERFORMANCE BY EDGE ADDITION , 2011 .

[15]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[16]  Wu Yu-ying Affects of Production Adjustment Strategy between Manufactures on Supply Chain Stability , 2012 .

[17]  Damien R. Farine,et al.  Measuring the robustness of network community structure using assortativity , 2016, Animal Behaviour.

[18]  Wang Shuang,et al.  Measuring the Network Efficiency and the Component Importance for Multiclass Transportation Network , 2015, 2015 2nd International Conference on Information Science and Control Engineering.

[19]  Sankaran Mahadevan,et al.  A new structure entropy of complex networks based on Tsallis nonextensive statistical mechanics , 2014, ArXiv.

[20]  Zhe-ming Lu,et al.  The dynamic correlation between degree and betweenness of complex network under attack , 2016 .

[21]  Sui Yi Research of Multi-Subnet Composited Complex Network and Its Operation , 2012 .

[22]  Guoai Xu,et al.  Analysis of diffusion and trapping efficiency for random walks on non-fractal scale-free trees , 2013, 1312.7038.

[23]  Jun Wu,et al.  Spectral measure of robustness for Internet topology , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[24]  Andreas Tolk,et al.  Applying the Information Age Combat Model: Quantitative Analysis of Network Centric Operations , 2009 .

[25]  Hao Liu,et al.  Network performance reliability evaluation based on network reduction , 2014, 2014 Reliability and Maintainability Symposium.

[26]  Xingyuan Wang,et al.  Study of Robustness in Functionally Identical Coupled Networks against Cascading Failures , 2016, PloS one.

[27]  Andreas Tolk,et al.  13. Organizing for Improved Effectiveness in Networked Operations , 2016 .

[28]  Haijun Huang,et al.  Dynamic activity-travel assignment in multi-state supernetworks under transport and location capacity constraints , 2015 .

[29]  Michael Scheutzow,et al.  Survivability Analysis of Next-Generation Passive Optical Networks and Fiber-Wireless Access Networks , 2011, IEEE Transactions on Reliability.

[30]  Hu Xiaofen,et al.  A Methodology for Investigating the Capabilities of Command and Coordination for System of Systems Operation Based on Complex Network Theory , 2015 .

[31]  J. Liu,et al.  Robustness of single and interdependent scale-free interaction networks with various parameters , 2016 .

[32]  David S Alberts Agility Quotient (AQ) , 2014 .

[33]  Ming-Syan Chen,et al.  An Efficient Approach to Updating Closeness Centrality and Average Path Length in Dynamic Networks , 2013, 2013 IEEE 13th International Conference on Data Mining.

[34]  Changjian Deng The Robustness Analysis of Wireless Sensor Networks under Uncertain Interference , 2013, TheScientificWorldJournal.

[35]  Heng Wang,et al.  Adaptive evolvement of information age C4ISR structure , 2015 .

[36]  Zhe-Ming Lu,et al.  Attack Vulnerability of Network Controllability , 2016, PloS one.