1. College of Information and Navigation, Air Force Engineering University, Xi’an 710077, China 2. Unit 95816 of People’s Liberation Army, Hubei 432700, China 3. Department of Computer Science, Northwestern Polytechnical University, Xi’an 710072, China 4. Department of Software Micro-electronics, Northwestern Polytechnical University, Xi’an 710072, China
The network repair problem after the nodes in the military communication network were hit was described, and the topology of the communication network was repaired by using the network edge-adding method. An edge addition repair model was established with maximizing network invulnerability as objective function, network connection cost and network connectivity as constraints. The network connection cost model considering redundant and necessary edges was defined. A model solving method based on the discrete artificial bee colony algorithm was proposed. Through specific cases of military communication network, simulation experiments were conducted under random and deliberate attacks, respectively. In the experiment, the proposed method was compared with other edge-adding methods, such as random addition, low degree first addition and low betweenness addition. Results showed that the proposed method can improve the survivability of network and the result was better than that of other three methods.
Guan-yu CHEN,Peng SUN,Jie-yong ZHANG,Jun-sheng WU. Repair strategy of military communication network. Journal of ZheJiang University (Engineering Science), 2019, 53(8): 1536-1545.
Tab.4Connection relationship between platform and communication entity
Fig.5Pre-destruction topology structure
Fig.6Algorithm performance under random attack
Fig.7Algorithm performance under deliberate attack
Fig.8Variation of experimental results with cost under random attack
Fig.9Variation of experimental results with cost under deliberate attack
Fig.10Algorithm performance comparison under random attack
Fig.13Variation of experimental results with cost upper under deliberate attack for different algorithms
Fig.11Variation of experimental results with cost upper under random attack for different algorithms
Fig.12Algorithm performance comparison under deliberate attack
Fig.14Algorithm performance comparison of different weight coefficients under random attack
Fig.15Algorithm performance comparison of different weight coefficients under deliberate attack
[1]
LEVCGHUK G M, YU F L, PATTIPATI K R, et al. From hierarchies to heterarchies: application of network optimization to design of organization structures [C]// Command and Control Research and Technology Symposium. Monterey: Dodccrp, 2003: 1-11.
[2]
PARK C, PATTIPATI K R, AN W, et al Quantifying the impact of information and organizational structures via distributed auction algorithm: point-to-point communication structure[J]. IEEE Transactions on Systems, Man, and Cybernetics, 2012, 42 (1): 68- 85
doi: 10.1109/TSMCA.2011.2157139
[3]
JIANG Y, WANG Y B. Analysis of attack and defense strategies on complex networks[C]// International Conference on Sensor Network Security Technology and Privacy Communication System. Harbin: IEEE, 2013: 58-62.
[4]
TORLEIV M, RANDALL L Network centric military communications[J]. IEEE Communications Magazine, 2006, 46 (11): 36
[5]
CHI L P, YANG C B, CAI X Stability of random networks under evolution of attack and repair[J]. Chinese Physics Letters, 2006, 23 (1): 263- 266
doi: 10.1088/0256-307X/23/1/076
[6]
缪志敏, 丁力, 赵陆文, 等 基于拓扑信息的网络修复[J]. 计算机工程, 2008, 34 (5): 25- 27 MIAO Zhi-min, DING Li, ZHAO Lu-wen, et al Network restoration based on topological information[J]. Computer Engineering, 2008, 34 (5): 25- 27
doi: 10.3778/j.issn.1002-8331.2008.05.007
[7]
胡斌, 黎放 多种攻击策略下无标度网络修复策略[J]. 系统工程与电子技术, 2010, 32 (1): 43- 47 HU Bin, LI Fang Repair strategies of scale-free networks under multifold attack strategies[J]. Systems Engineering and Electronics, 2010, 32 (1): 43- 47
王甲生, 吴晓平, 陈泽茂, 等 修复策略下典型拓扑结构复杂网络抗毁性研究[J]. 海军工程大学学报, 2015, 27 (4): 75- 79 WANG Jia-sheng, WU Xiao-ping, CHEN Ze-mao, et al Invulnerability analysis of complex networks with typical topologies by repair strategies[J]. Journal of Naval University of Engineering, 2015, 27 (4): 75- 79
[10]
GHOSH A, BOYD A. Growing well-connected graphs [C]// 45th IEEE Conference on Decision and Control. San Diego: IEEE, 2006, 7(14): 593-599.
[11]
KIM Y Bisection algorithm of increasing algebraic connectivity by adding an edge[J]. IEEE Transactions on Automatic Control, 2010, 55 (1): 170- 174
doi: 10.1109/TAC.2009.2033763
[12]
CHEN P Y, HERO A Assessing and safeguarding network resilience to nodal attacks[J]. Communications Magazine IEEE, 2014, 52 (11): 138- 143
doi: 10.1109/MCOM.2014.6957154
[13]
JIANG Z Y, LIANG M G, GUO D C Enhancing network performance by edge addition[J]. International Journal of Modern Physics C, 2011, 22 (11): 1211- 1226
doi: 10.1142/S0129183111016841
[14]
CAO X B, HONG C, WU W B, et al Improving the network robustness against cascading failures by adding links[J]. Chaos, Solitons and Fractals, 2013, 57 (4): 35- 40
[15]
SHI C, PENG Y, ZHUO Y, et al A new way to improve the robustness of complex communication networks by allocating redundancy links[J]. Physica Scripta, 2012, 85 (3): 035803
doi: 10.1088/0031-8949/85/03/035803
[16]
ZHUO Y, PENG Y, LIU C, et al Improving the attack tolerance of scale-free networks by adding and hiding edges[J]. Physica Scripta, 2011, 83 (2): 025801
doi: 10.1088/0031-8949/83/02/025801
[17]
ZHAO K, KUMAR A, YEN J Achieving high robustness in supply distribution networks by rewiring[J]. IEEE Transactions on Engineering Management, 2011, 58 (2): 347- 362
doi: 10.1109/TEM.2010.2095503
[18]
DENG Y, WU J, TAN Y J Optimal attack strategy of complex networks based on tabu search[J]. Physica A, 2016, 442: 74- 81
doi: 10.1016/j.physa.2015.08.043
[19]
谭跃进, 吴俊, 邓宏钟 复杂网络抗毁性研究进展[J]. 上海理工大学学报, 2011, 33 (6): 653- 668 TAN Yue-jin, WU Jun, DENG Hong-zhong Progress in invulnerability of complex networks[J]. Journal of University of Shanghai for Science and Technology, 2011, 33 (6): 653- 668
doi: 10.3969/j.issn.1007-6735.2011.06.022
[20]
杨志才, 裘杭萍, 雷智朋, 等 军事通信网抗毁性研究[J]. 军事通信技术, 2014, 35 (1): 31- 36 YANG Zhi-cai, QIU hang-ping, LEI Zhi-peng, et al Survivability studies for military communication network[J]. Journal of Military Communications Technology, 2014, 35 (1): 31- 36
[21]
LEVCHUK G M, LEVCHUK Y N, MEIRINA C, et al Normative design of organizations-part III: modeling congruent, robust, and adaptive organizations[J]. IEEE Transactions on Systems, Man, and Cybernetics, 2004, 34 (3): 337- 350
doi: 10.1109/TSMCA.2003.822268
[22]
周漩, 杨帆, 张凤鸣, 等 复杂网络系统拓扑连接优化控制方法[J]. 物理学报, 2013, 62 (15): 150201 ZHOU Xuan, YANG Fan, ZHANG Feng-ming, et al Control method for complex network topological connection optimization[J]. Acta Physica Sinica, 2013, 62 (15): 150201
[23]
KARABOGA D. An idea based on honey bee swarm for numerical optimization [R]. Kayseri: Erciyes University, 2005.
[24]
KARABOGA D, AKAY B. Artificial bee colony algorithm on training artificial neural networks [C]// Signal Processing and Communications Applications. Eskisehir: IEEE, 2007: 1-4.
[25]
OZTURK C, KARABOGA D, GORKEMLI B Artificial bee colony algorithm for dynamic deployment of wireless sensor networks[J]. Turkish Journal of Electrical Engineering and Computer Sciences, 2012, 20 (2): 255- 262
[26]
ZHONG Y W, LIN J, WANG L J, et al Hybrid discrete artificial bee colony algorithm with threshold acceptance criterion for traveling salesman problem[J]. Information Sciences, 2017, 421: 70- 84
doi: 10.1016/j.ins.2017.08.067
[27]
LI X T, MA S J Multiobjective discrete artificial bee colony algorithm for multiobjective permutation flow shop scheduling problem with sequence dependent setup times[J]. IEEE Transactions on Engineering Management, 2017, 64 (2): 149- 165
[28]
OZKAN O, TURGAY B, TOLGAN O, et al Optimum assembly sequence planning system using discrete artificial bee colony algorithm[J]. Mathematical Problems in Engineering, 2018, (1): 1- 14
[29]
朱冰莲, 朱方方, 苏红宏, 等 基于逻辑运算的离散人工蜂群算法[J]. 电子学报, 2015, 43 (11): 2161- 2166 ZHU Bing-lian, ZHU Fang-fang, SU Hong-hong, et al Discrete artificial bee colony algorithm based on logic operation[J]. Acta Electronic Sinica, 2015, 43 (11): 2161- 2166
doi: 10.3969/j.issn.0372-2112.2015.11.004
[30]
孙昱, 姚佩阳, 申健, 等 基于信息流的军事通信网络抗毁性优化设计[J]. 华中科技大学学报: 自然科学版, 2016, 44 (12): 114- 120 SUN Yu, YAO Pei-yang, SHEN Jian, et al Military communication network design for invulnerability optimization based on information flow[J]. Journal of Huazhong University of Science and Technology: Natural Science Edition, 2016, 44 (12): 114- 120