Font Size: a A A

Research On Invulnerability For Command And Control Network Based On Complex Network

Posted on:2017-05-22Degree:MasterType:Thesis
Country:ChinaCandidate:Q Y WangFull Text:PDF
GTID:2180330482493346Subject:Control Science and Engineering
Abstract/Summary:PDF Full Text Request
Command and Control(C2) network, under Informationization, is the different non-linear logical relationship formed by the connection via the physical communications network, network structure have the complex network character of non-linear, hierarchical and adaptability. Rapidly changing Complex Battlefield Environments raises higher standard for strengthens invulnerability of the C2 network, and related study also has been paid much more attention. We define Invulnerability of the C2 network as the ability network still has to execute the C2 task when C2 network under deliberate attacks or random attacks(fault).The anti-attack capability of C2 network have a direct impact on result of war, so, the research on invulnerability of C2 network has strong practical significance and practical value. The attack strategies, C2 network under, were divided into two kinds, including deliberate or random attacks, are differently corresponding with the capabilities of Networks Fault Tolerance and anti-attack, Many researchers have indicated that C2 network has scale-free property, it makes network has the character of high fault tolerance. However, networks are fragile when confronted with deliberate attacks, especially, when the key nodes of C2 network removed, causes the paralysis of entire network easily. The research on invulnerability of C2 network includes: how to recognizing key nodes and some important measures will be taken to protect, how to evaluate the invulnerability of C2, and what strategies to improve invulnerability. Because of all this, the paper carried out the studies of invulnerability of C2 networks based on complex network, include several parts:Firstly, this paper made a deep study of the correlation theory of C2 network based on complex network, it includes the statistic characteristic of complex network, complex network model and other fundamental theory; analyses the model and characteristic of C2 network based on complex network.Secondly, this paper brings out the algorithm of the key nodes identification of C2 network based on complex network. The traditional algorithm of the key nodes identification have the problem of high complexities, lower accuracy and limited adaptability; So, carried out the method of the key nodes identification of C2 network based on Level Flow Betweenness(LFB). Definition of LFB is given out, and proposed the method of the key nodes identification based on LFB, the complexity of this method is proved theoretically. The experiments demonstrated that, this method reduced the complexity of computation; precision of its recognition is improved, more reasonable and practicable.Again, this paper also raised invulnerability metric of C2 network based on network invulnerability entropy. To solve the problem of structure is simplex and lower accuracy of existing methods, this paper also raised invulnerability metric of C2 network based on network invulnerability entropy, it accounts simultaneously for the node importance and the edge importance, then gives mapping approach from the node importance to the edge importance, and defines Network survivability coefficient, set up the model of invulnerability entropy. The simulation and experiment show that, this Metric can accurate measure the invulnerability degree of C2 network, it may provide experience for studying invulnerability C2 network.
Keywords/Search Tags:Command and Control network, Complex network, Key nodes, Level Flow Betweenness, Invulnerability entropy of network
PDF Full Text Request
Related items