计算机科学 ›› 2021, Vol. 48 ›› Issue (10): 351-358.doi: 10.11896/jsjkx.200900144

• 交叉&前沿 • 上一篇    

多层供应链网络中欠载失效和过载级联失效的协同演化研究

李姝1, 杨华1, 宋波2   

  1. 1南京邮电大学电子与光学工程学院微电子学院 南京210046
    2 南京邮电大学现代邮政学院 南京210003
  • 收稿日期:2020-09-20 修回日期:2021-02-16 出版日期:2021-10-15 发布日期:2021-10-18
  • 通讯作者: 杨华(yangh@njupt.edu.cn)
  • 作者简介:lishunjupt@163.com
  • 基金资助:
    国家自然科学基金项目(61971240,61401226);湖南省自然科学基金项目(2019JJ60024)

Study on Co-evolution of Underload Failure and Overload Cascading Failure in Multi-layer Supply Chain Network

LI Shu1, YANG Hua1, SONG Bo2   

  1. 1 School of Electronic and Optical Engineering,School of Microelectronics,Nanjing University of Posts and Telecommunications,Nanjing 210046,China
    2 School of Modern Posts,Nanjing University of Posts and Telecommunications,Nanjing 210003,China
  • Received:2020-09-20 Revised:2021-02-16 Online:2021-10-15 Published:2021-10-18
  • About author:LI Shu,born in 1996,postgraduate.Her main research interests include supply chain network analysis and so on.
    YANG Hua,born in 1982,Ph.D,asso-ciate professor.Her main research inte-rests include complex networks and chaos communications.
  • Supported by:
    National Natural Science Foundation of China(61971240,61401226) and Natural Science Foundation of Hunan Province(2019JJ60024).

摘要: 供应链网络与我们的生活密切相关,而供应链网络的级联失效问题一直是研究的重点。文中提出了一种多层供应链网络混合失效模型,更好地模拟了真实供应链网络欠载失效和过载级联失效的过程,为预防供应链网络崩溃提供了参考。首先,建立了上层供应商网络过载级联失效模型和下层零售商网络欠载失效模型,它们共同构成了上下层网络混合的供应链网络模型;然后,通过采用不同的攻击方式攻击上下层网络,分析了供应链网络的失效迭代过程和脆弱性。在初始攻击比例一定的情况下,上层供应商网络相较于下层零售商网络有更强的鲁棒性,初始攻击节点为上层供应商网络节点时,网络崩溃的阈值更低,更容易使供应链网络发生全面崩溃。仿真结果验证了模型的有效性,为预防供应链网络崩溃提供了新的研究模型。

关键词: 脆弱性, 多层供应链网络, 过载失效, 级联失效, 欠载失效

Abstract: The supply chain network is closely related to our lives,and the cascading failure of the supply chain network has always been a hot research topic.This paper proposes a multi-layer supply chain network mixed failure model,which can better simulate the process of real supply chain network collapse and provide a reference for preventing supply chain network collapse.By establishing the supply chain network model of upper-level supplier network overload cascade failure and lower-level retailer network underload failure,the vulnerability of the supply chain network is studied when the upper and lower networks are attacked through different attack strategies.In the case of a certain initial attack ratio,the upper-layer supplier network is more robust than the lower-layer retailer network.Under the same attack ratio,the scale of the network crash when deliberately attacking network nodes is larger than that of random attacks.When the upper-layer supplier network node is initially attacked,the thresholdof network collapse is lower,which is more prone to collapse.This paper verifies the validity of the model and provides a new research model for preventing the collapse of the supply chain network.

Key words: Cascading failure, Multi-layer supply chain network, Overload failure, Underload failure, Vulnerability

中图分类号: 

  • TP311
[1]LIAO Z D,ZHENG G H.Research on the evolution of supply chain considering the characteristics of different node behavior elements[J].Application Research of Computers,2020,37(6):1679-1682,1692.
[2]TANG L,JING K,HE J,et al.Robustness of assembly supply chain networks by considering risk propagation and cascading failure[J].Physica A:Statistical Mechanics and Its Applications,2016,459:129-139.
[3]ZHAO Z G,ZHOU G G,LI H X.Research on the Attack Stra-tegy and Robustness of Complex Weighted Supply Chain Network[J].Computer Science,2019,46(8):138-144.
[4]LI Z,GUO Y H,XU G A,et al.Dynamic analysis of cascade with emergency recovery mechanism in complex network[J].Acta Physica Sinica,2014,63(15):417-428.
[5]DUI H Y,MENG X Y,HUI X,et al.Analysis of the cascading failure for scale-free networks based on a multi-strategy evolutionary game[J].Reliability Engineering and System Safety,2020,199:106919.
[6]SUN J Y,TANG J M,FU W P,et al.Construction of a multi-echelon supply chain complex network evolution model and robustness analysis of cascading failure[J].Computers & Industrial Engineering,2020,144:106457.
[7]LIU H,ZHOU G G,FU P H.Research on Local EvolutionModel of Hierarchical Supply Chain Complex Network[J].Computer Science,2013,40(2):270-273.
[8]ZHONG J L,SANHEDRAI H,ZHANG F M,et al.Networkendurance against cascading overload failure[J].Reliability Engineering and System Safety,2020,201:106916.
[9]BELLINGERI M,CASSI D.Robutness of weighted networks[J].Physica A:Statistical Mechanics and Its Applications,2018,489:47-55.
[10]LI H L,CHEN W H.The impact of the new crown epidemic on the global manufacturing supply chain and countermeasures[J].Price Theory and Practice,2020,40(5):272-275.
[11]FENG G Z,SUN Y Y.The impact of the new crown pneumonia epidemic on the economy and society from the perspective of supply chain[J].Journal of Xi'an Jiaotong University (Social Science Edition),2020,40(4):42-49.
[12]UNCTAD.Impact of COVID-19 pandemic on global FDI andGVCs updated analysis[R].New York:UNCTAD,2020.
[13]ZHU W X,ZHANG P,LI P F,et al.The plight of small,me-dium and micro enterprises and the improvement of policy efficiency under the impact of the epidemic-Based on the analysis of two national questionnaire surveys[J].Management World,2020,36(4):13-26.
[14]LI X,CHENG G R.A local-world evolving network model[J].Physica A:Statistical Mechanics and Its Applications,2003,328(1):274-286.
[15]DUAN D L,WU J,DENG H Z,et al.A cascading failure model of complex networks based on adjustable load redistribution[J].System Engineering Theory and Practice,2013,33(1):203-208.
[16]GAO J,CHEN Y Y.Analysis of supply chain network vulnerability under cascade failure[J].Logistics Engineering and Ma-nagement,2016,38(10):80-83,42.
[17]TANG L,HE J,JING K.Research on the Cascade FailureMechanism and Robustness of Related Supply Chain Networks[J].Journal of Management Science,2016,19(11):33-44,62.
[18]WANG Y C,XIAO R B.Supply chain network cascading failure modeling based on underload failure[J].Computer Integrated Manufacturing System,2020,26(5):1355-1365.
[19]JIANG W J,LIU R R,FAN T L,et al.Overview of preventionand recovery strategies for multi-layer network cascade failure[J].Acta Physica Sinica,2020,69(8):81-91.
[20]WANG H,GU T,JIN M,et al.The complexity measurement and evolution analysis of supply chain network under disruption risks[J].Chaos,Solitons & Fractals,2018,116(11):72-78.
[21]LI G,ZHAO D Z.Study on the scale-free characteristics of supply chain networks[J].Industrial Engineering,2012,15(1):28-32.
[1] 任花, 牛少彰, 王茂森, 岳桢, 任如勇.
基于奇异值分解的同态可交换脆弱零水印研究
Homomorphic and Commutative Fragile Zero-watermarking Based on SVD
计算机科学, 2022, 49(3): 70-76. https://doi.org/10.11896/jsjkx.210800015
[2] 王学光, 张爱新, 窦炳琳.
复杂网络上的非线性负载容量模型
Non-linear Load Capacity Model of Complex Networks
计算机科学, 2021, 48(6): 282-287. https://doi.org/10.11896/jsjkx.200700040
[3] 刘强,况晓辉,陈华,李响,李广轲.
一种基于程序切片相似度匹配的脆弱性发现方法
Vulnerability Discovery Approach Based on Similarity Matching of Program Slicing
计算机科学, 2019, 46(7): 126-132. https://doi.org/10.11896/j.issn.1002-137X.2019.07.020
[4] 况晓辉,李津,赵刚.
一种基于多层拓扑的大规模分布式系统结构脆弱性分析算法
Multilayer Topology Structural Vulnerability Analysis Algorithm for Large-scale Distributed System
计算机科学, 2016, 43(8): 26-29. https://doi.org/10.11896/j.issn.1002-137X.2016.08.005
[5] 姜伟伟,刘光杰,戴跃伟.
基于Snort的Modbus TCP工控协议异常数据检测规则设计
Design of Modbus TCP Industrial Control Network Protocol Abnormal Data Detection Rules Based on Snort
计算机科学, 2015, 42(11): 212-216. https://doi.org/10.11896/j.issn.1002-137X.2015.11.044
[6] 张颖淳,王淑良.
基于复杂网络理论的电力基础设施网络关键组件辨识
Critical Components Identification of Power Infrastructure Systems Based on Complex Network Theory
计算机科学, 2014, 41(5): 275-279. https://doi.org/10.11896/j.issn.1002-137X.2014.05.058
[7] 唐成华,汤申生,强保华.
DS融合知识的网络安全态势评估及验证
Assessment and Validation of Network Security Situation Based on DS and Knowledge Fusion
计算机科学, 2014, 41(4): 107-110.
[8] 柳虹,周根贵,傅培华,毛国红.
基于供应链网络的传递攻击策略研究
Research of Transferring Attack Based on Supply Chain Network
计算机科学, 2013, 40(7): 98-101.
[9] 陈加梅,陈锦富,詹永照,王环环,李青.
基于消息变异的Web服务脆弱性测试系统的设计与实现
Design and Implementation of Web Service Vulnerability Testing System Based on SOAP Messages Mutation
计算机科学, 2013, 40(7): 143-146.
[10] 况晓辉,赵刚,温研,许飞,苗青.
大规模分布式系统脆弱性分析框架研究
Research on Vulnerability Analysis Framework for Large-scale Distributed System
计算机科学, 2012, 39(6): 58-60.
[11] 李 艺,李新明,崔云飞.
软件脆弱性危险程度量化评估模型研究
Research of Evaluating Model on the Criticality of Software Vulnerability
计算机科学, 2011, 38(6): 169-172.
[12] 陈锋,毛捍东,张维明,雷长海.
攻击图技术研究进展
Survey of Attack Graph Technique
计算机科学, 2011, 38(11): 12-18.
[13] 吴耕锐,杨晓元,钮可.
一种改进的混编视频水印方案
Improved Mixed Video Watermarking Scheme
计算机科学, 2011, 38(10): 84-86.
[14] 王春雷,刘强,赵刚,戴一奇.
一种基于模型检测的二进制程序脆弱性分析框架
Vulnerability Analysis Framework for Binaries Based on Model Checking
计算机科学, 2010, 37(4): 120-.
[15] 欧阳敏 费奇 余明辉 栾恩杰.
复杂网络的功效性与脆弱性研究综述

计算机科学, 2008, 35(6): 1-4.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!