IDEAS home Printed from https://ideas.repec.org/a/eee/chsofr/v172y2023ics0960077923004010.html
   My bibliography  Save this article

Evaluation of vulnerability of MAV/UAV collaborative combat network based on complex network

Author

Listed:
  • Yang, Shulan
  • Hou, Zhiwei
  • Chen, Hongbo

Abstract

In recent years, the Manned/Unmanned Aerial Vehicle (MAV/UAV) collaborative combat mode has become an important mode. Therefore, it is important to assess the vulnerability of Manned/Unmanned Aerial Vehicle Collaborative Combat Networks (MUCNs). In this paper, we analyze the meaning of nodes and edges of MUCNs, propose five vulnerability indicators, and construct a vulnerability indicator system of MUCNs. In addition, the network contribution method is proposed to aggregate the vulnerability indicators of MUCNs. Finally, through simulation, the effectiveness of the network contribution method is demonstrated by comparing and analyzing with three commonly used indicator aggregation methods. This paper can provide a reference for designing MUCNs with lower vulnerability and a vulnerability evaluation method for the development of MAV/UAV collaborative combat strategies.

Suggested Citation

  • Yang, Shulan & Hou, Zhiwei & Chen, Hongbo, 2023. "Evaluation of vulnerability of MAV/UAV collaborative combat network based on complex network," Chaos, Solitons & Fractals, Elsevier, vol. 172(C).
  • Handle: RePEc:eee:chsofr:v:172:y:2023:i:c:s0960077923004010
    DOI: 10.1016/j.chaos.2023.113500
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0960077923004010
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.chaos.2023.113500?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Bellingeri, Michele & Cassi, Davide & Vincenzi, Simone, 2014. "Efficiency of attack strategies on complex model and real-world networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 414(C), pages 174-180.
    2. Aming Li & Lei Zhou & Qi Su & Sean P. Cornelius & Yang-Yu Liu & Long Wang & Simon A. Levin, 2020. "Evolution of cooperation on temporal networks," Nature Communications, Nature, vol. 11(1), pages 1-9, December.
    3. Réka Albert & Hawoong Jeong & Albert-László Barabási, 2000. "Error and attack tolerance of complex networks," Nature, Nature, vol. 406(6794), pages 378-382, July.
    4. Jichao Li & Yuejin Tan & Kewei Yang & Xiaoke Zhang & Bingfeng Ge, 2017. "Structural robustness of combat networks of weapon system-of-systems based on the operation loop," International Journal of Systems Science, Taylor & Francis Journals, vol. 48(3), pages 659-674, February.
    5. Li, Zhaoxing & Chen, Li, 2019. "Robustness of multipartite networks in face of random node failure," Chaos, Solitons & Fractals, Elsevier, vol. 121(C), pages 149-159.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Liu, Tao & Bai, Guanghan & Tao, Junyong & Zhang, Yun-An & Fang, Yining, 2024. "A Multistate Network Approach for Resilience Analysis of UAV Swarm considering Information Exchange Capacity," Reliability Engineering and System Safety, Elsevier, vol. 241(C).
    2. Huang, Chaochao & Wang, Chaoqian, 2024. "Memory-based involution dilemma on square lattices," Chaos, Solitons & Fractals, Elsevier, vol. 178(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. P.B., Divya & Lekha, Divya Sindhu & Johnson, T.P. & Balakrishnan, Kannan, 2022. "Vulnerability of link-weighted complex networks in central attacks and fallback strategy," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 590(C).
    2. Zhang, Haihong & Wu, Wenqing & Zhao, Liming, 2016. "A study of knowledge supernetworks and network robustness in different business incubators," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 447(C), pages 545-560.
    3. Xia, Ling-Ling & Song, Yu-Rong & Li, Chan-Chan & Jiang, Guo-Ping, 2018. "Improved targeted immunization strategies based on two rounds of selection," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 496(C), pages 540-547.
    4. Nie, Tingyuan & Fan, Bo & Wang, Zhenhao, 2022. "Complexity and robustness of weighted circuit network of placement," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 598(C).
    5. Yu, Yang & Deng, Ye & Tan, Suo-Yi & Wu, Jun, 2018. "Efficient disintegration strategy in directed networks based on tabu search," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 507(C), pages 435-442.
    6. Gao, Yan-Li & Chen, Shi-Ming & Nie, Sen & Ma, Fei & Guan, Jun-Jie, 2018. "Robustness analysis of interdependent networks under multiple-attacking strategies," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 496(C), pages 495-504.
    7. Lekha, Divya Sindhu & Balakrishnan, Kannan, 2020. "Central attacks in complex networks: A revisit with new fallback strategy," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 549(C).
    8. Hao, Yucheng & Jia, Limin & Wang, Yanhui, 2020. "Edge attack strategies in interdependent scale-free networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 540(C).
    9. Zhao, Peixin & Yin, Shengnan & Han, Xue & Li, Zhuyue, 2021. "Research on lean supply chain network model based on node removal," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 567(C).
    10. Jisha Mariyam John & Michele Bellingeri & Divya Sindhu Lekha & Davide Cassi & Roberto Alfieri, 2023. "Effect of Weight Thresholding on the Robustness of Real-World Complex Networks to Central Node Attacks," Mathematics, MDPI, vol. 11(16), pages 1-12, August.
    11. Wang, Zhuoyang & Chen, Guo & Hill, David J. & Dong, Zhao Yang, 2016. "A power flow based model for the analysis of vulnerability in power networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 460(C), pages 105-115.
    12. Ryan M. Hynes & Bernardo S. Buarque & Ronald B. Davies & Dieter F. Kogler, 2020. "Hops, Skip & a Jump - The Regional Uniqueness of Beer Styles," Working Papers 202013, Geary Institute, University College Dublin.
    13. Lenore Newman & Ann Dale, 2007. "Homophily and Agency: Creating Effective Sustainable Development Networks," Environment, Development and Sustainability: A Multidisciplinary Approach to the Theory and Practice of Sustainable Development, Springer, vol. 9(1), pages 79-90, February.
    14. Aybike Ulusan & Ozlem Ergun, 2018. "Restoration of services in disrupted infrastructure systems: A network science approach," PLOS ONE, Public Library of Science, vol. 13(2), pages 1-28, February.
    15. Yang, Hyeonchae & Jung, Woo-Sung, 2016. "Structural efficiency to manipulate public research institution networks," Technological Forecasting and Social Change, Elsevier, vol. 110(C), pages 21-32.
    16. Alexander Shiroky & Andrey Kalashnikov, 2021. "Mathematical Problems of Managing the Risks of Complex Systems under Targeted Attacks with Known Structures," Mathematics, MDPI, vol. 9(19), pages 1-11, October.
    17. Anand, Kartik & Gai, Prasanna & Marsili, Matteo, 2012. "Rollover risk, network structure and systemic financial crises," Journal of Economic Dynamics and Control, Elsevier, vol. 36(8), pages 1088-1100.
    18. Yao, Jialing & Sun, Bingbin & Xi, lifeng, 2019. "Fractality of evolving self-similar networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 515(C), pages 211-216.
    19. Sanjeev Goyal & Adrien Vigier, 2014. "Attack, Defence, and Contagion in Networks," Review of Economic Studies, Oxford University Press, vol. 81(4), pages 1518-1542.
    20. Britta Hoyer & Kris De Jaegher, 2023. "Network disruption and the common-enemy effect," International Journal of Game Theory, Springer;Game Theory Society, vol. 52(1), pages 117-155, March.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:chsofr:v:172:y:2023:i:c:s0960077923004010. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Thayer, Thomas R. (email available below). General contact details of provider: https://www.journals.elsevier.com/chaos-solitons-and-fractals .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.