Computer Science ›› 2018, Vol. 45 ›› Issue (4): 117-121, 136.doi: 10.11896/j.issn.1002-137X.2018.04.018

Previous Articles     Next Articles

Resilience Analysis Model of Networked Command Information System Based on Node Repairability

CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li   

  • Online:2018-04-15 Published:2018-05-11

Abstract: A resilience analysis model of networked command information system based on node repairability was proposed.Firstly,the meaning of networked command information system resilience was confirmed,a network model was constructed,as well as the cascading failures and recovery process were described.Then,based on constructing the load distribution model and the node repairability model, according to the resilience process,a resilience measurement model was constructed.Lastly,the resilience under different model parameters was analyzed.The analytic results show that the recovery probability and mean repairability time of node can affect resilience distinctly,which may provide a gui-dance for improving the resilience of networked command information system.

Key words: Node repairability,Networked command information system,Complex network,Resilience

[1] ZHANG J Y,YI K,WANG H.Dynamic robustness measuremethod considering cascading failure for C4ISR system structure[J].System Engineering and Electronics,2016,8(9):2072-2079.(in Chinese) 张杰勇,易侃,王珩.考虑级联失效的C4ISR系统结构动态鲁棒性度量方法[J].系统工程与电子技术,2016,8(9):2072-2079.
[2] ZHAO H L,YANG H T,FU Y.Analysis method of resilience in networked command and control information system[J].Journal of Command and Control,2015,1(1):14-19.(in Chinese) 赵洪利,杨海涛,付芸.网络化指控信息系统弹性分析方法研究[J].指挥与控制学报,2015,1(1):14-19.
[3] 蓝羽石,毛少杰,王珩.指挥信息系统结构理论与优化方法[M].北京:国防工业出版社,2015.
[4] TIAN X G,ZHU Y C,LUO K,et al.Adaptive reconstruction model for command and control system under information age based on complex network theory[J].System Engineering and Electronics,2013,5(1):91-96.(in Chinese) 田旭光,朱元昌,罗坤,等.基于复杂网络理论的指挥控制系统自适应重构模型[J].系统工程与电子技术,2013,5(1):91-96.
[5] YU L.Evaluation and analysis of military command information systems brittleness risk[D].Harbin:Harbin University of Science and Technology,2014.(in Chinese) 于林.军队指挥信息系统脆性风险的评判与分析[D].哈尔滨:哈尔滨理工大学,2014.
[6] HOSSEINI S,BARKER K,RAMIREZ-MARQUEZ J E.A review of definitions and measures of system resilience [J].Reliability Engineering and System Safety,2016(145):47-61.
[7] ALBERTS D S,TILLMAN M E.NEC2 Effectiveness and Agility:Analysis Methodology,Metrics,and Experimental Results [R].Alexandria:Institute for Defense Analysis,2012.
[8] 金伟新.体系对抗复杂网络建模与仿真[M].北京:电子工业出版社,2010.
[9] MOTTER A E,LAI Y C.Cascade-based attacks on complex networks[J].Plysical Review E,2002,6(6):065102.
[10] WANG W X,CHEN G R.Universal robustness characteristic of weighted networks against cascading failure[J].Physical Review E,2008,7(2):026101.
[11] LI T,PEI W J,WANG S P.Optimal traffic routing strategy on scale-free complex networks[J].Acta Phys.Sin.,2009,8(9):5903-5910.(in Chinese) 李涛,裴文江,王少平.无标度复杂网络负载传输优化策略[J].物理学报,2009,8(9):5903-5910.
[12] LI C D,DENG Y,YUAN Z F,et al.Dynamic information-based load reallocation strategy for cascading failure networks[J].Journal of South China University of Technology(Natural Science Edition),2016,4(5):22-28.(in Chinese) 李从东,邓原,原智峰,等.基于动态信息的级联失效负载重分配策略[J].华南理工大学学报,2016,4(5):22-28.
[13] DING L,ZHANG S Y.Cascading failures-oriented weightingstrategies on complex networks[J].Control and Decision,2013,8(9):1399-1408.(in Chinese) 丁琳,张嗣瀛.面向级联失效的复杂网络加权策略[J].控制与决策,2013,8(9):1399-1408.
[14] LI Z,GUO Y H,XU G A,et al.Analysis of cascading dynamics in complex networks with an emergency recovery mechanism[J].Acta Phys.Sin.,2014,3(15):158901.(in Chinese) 李钊,郭燕慧,徐国爱,等.复杂网络中带有应急恢复机理的级联动力学分析[J].物理学报,2014,3(15):158901.
[15] TRAN H T,BALCHANOS M,DOMERCAN J C,et al.Aframework for the quantitative assessment of performance-based system resilience[J].Reliability Engineering and System Safety,2017(158):73-84.
[16] GOH K I,KAHNG V,KIM D.Universal behavior of load distribution in scale-free network[J].Physical Review Letters,2001,7(27):278701.

No related articles found!
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .