skip to main content
10.1145/3672919.3672970acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaideConference Proceedingsconference-collections
research-article

Research on the Optimization Strategy of Command and Control System Based on Complex Network Theory

Published: 24 July 2024 Publication History

Abstract

To deeply analyze the characterization and destruction resistance of the command and control (C2) system, based on the complex network theory, a model of the C2 system is established. The network model of the C2 system is attacked using the method of real-time attack, and it is found that the network is more sensitive to the deliberate attack method and performs poorly. The node-degree based edge-adding method is proposed to enhance the destructibility of the network, and it is found that the policy of low-degree edge-adding method can effectively increase the destructibility of the C2 network system to a certain extent.

References

[1]
Mu Ch P, Gong P and Zhang R H. Military communication network technology. 2016. Beijing: Beijing Institute of Technology Press.
[2]
Hu X F. Overview of warfare complexity network research. Complex Systems and Complexity Science, 2010. (7): 27-28.
[3]
Papakostas D, Basaras P, Katsaros D and Tassiulas L. Backbone formation in military multi-layer ad hoc networks using complex network concepts. 2016. Military Communications Conference. IEEE, 842-848.
[4]
Blaser H, Hoge G and Pugin B. 2010.The Application of Complex Network Theory in the Military Domain. National Defense Science & Technology.
[5]
Zheng Y, Liu X Y, Liang J Q, Qiu Y J and Shi B Z. Research on new system combat accusation system. 2022. Chinese Command and Control Society. Proceedings of the Tenth China Command and Control Conference (Previous Book). Weapon Industry Press, 306-311.
[6]
Ai X. Node Importance Ranking of Complex Networks with Entropy Variation. 2017. Entropy, 19(7):303.
[7]
Run-Nian M A, Wang B, Wang G, Guo X C and Liu W B. 2017. Evaluation Method for Node Importance in Communication Network Based on Mutual Information. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 45(3):747-752.
[8]
Guo, Sh Z, Lu and Zh M. Fundamental theory of complex networks. 2012. Beijing: Science Press.
[9]
Watts D and Strogatz S. Collective dynamics of 'small-world' networks (see comments). 1998. Nature, 393(6684): 440-442.
[10]
Guo Z, Hao M, Yu B and Yao B Zl. Detecting delay propagation in regional air transport systems using convergent cross mapping and complex network theory. 2022. Transportation Research Part E: Logistics and Transportation Review, 157.
[11]
Xu F, Zhu JF and Miao JJ. Robustness study of air-iron composite networks based on complex networks. 2015. Complex Systems and Complexity Science, 12(01):40-45.
[12]
Wu T. Analysis of connectivity reliability of urban rail transit network based on complex network. 2019. Nanjing University of Science and Technology.
[13]
Shen J and Huang S. Copper cross-market volatility transition based on a coupled hidden Markov model and the complex network method. Resources Policy, 2022, 75:102518.
[14]
Zhi Y, Ouyang H and Xue M. 2022. A research on driver nodes identification in Chinese interbank networks: based on the controllability theory of complex network. Applied Economics Letters, 29.
[15]
Colin F, Vaquero-Sedas M I, MD Cubiles, Michael Thompson, Alejandro Vega-Vaquero, Matteo Pellegrini and Miguel A Vega-Palas. 2022. A complex network of interactions governs DNA methylation at telomeric regions. Nucleic Acids Research, (3):3.
[16]
Wang T, Li H and Huang Y. 2021.The complex ecological network's resilience of the Wuhan metropolitan area. Ecological Indicators, 130(1): 108101.
[17]
Zhang W, Pei W and Guo T. An efficient method of robustness analysis for power grid under cascading failure. Safety Science, 2014, 64: 121-126.
[18]
Sun C Y, Shen M X, Sheng H and Xiao J K. 2017.Optimization design of structure invulnerability for air defense multiple sensor network. Journal on Communications, 38(06):118-126.
[19]
Gang J X, Xiong-Bing Y E and Wang W. 2019. Hypernetwork modeling research on carrier formation Figurehting SoS. Ship Science and Technology,41(09):6-11.
[20]
Lei C, Kou Y X and Wu C. 2018. Empirical research on complex networks modeling of combat SoS based on data from real war-game, Part I: Statistical characteristics. Physica, A. Statistical mechanics and its applications, 490: 754-773.
[21]
Liu T L, Yang Zh R, Zhang, H, Teng X Y and Liu J. Modeling and performance analysis of military communication networks based on complex networks. Systems Engineering and Electronics Technology, 2020, 42(12):2892-2898.
[22]
Yang G, Zhang W, Xiu B, Liu Z and H J C. 2014. Key potential-oriented criticality analysis for complex military organization based on FINC-E model. Computational & Mathematical Organization Theory, 20(3):278-301.
[23]
J. Chen, C. Touati and Q. Zhu. Optimal secure two-layer IoT network design. 2019. IEEE Transactions on Control of Network Systems. 7(1) :398–409.
[24]
Lan Y S, Deng K B, Mao Sh J, Wang H, Yi K and Lei M. 2015. Adaptive evolvement of information age C4ISR structure. Journal of Systems Engineering and Electronics, 26(02),301-316.

Index Terms

  1. Research on the Optimization Strategy of Command and Control System Based on Complex Network Theory

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSAIDE '24: Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy
    March 2024
    676 pages
    ISBN:9798400718212
    DOI:10.1145/3672919
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 July 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CSAIDE 2024

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 23
      Total Downloads
    • Downloads (Last 12 months)23
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media