1. Introduction
Informatization warfares are systematic combats based on information systems, and information has increasingly become the dominant factor in combat. In actual operations, one or several nodes in the combat network may fail due to combat attacks or random failures. The service processing load of these failed nodes will be transmitted through the information flow and cause secondary failures in other nodes. A larger-scale chain effect caused by the load reallocation can eventually lead to partial failure or even complete collapse of the network. In the current situation, the components and structural relations of the modern combat network are increasingly complex, and information interactions are becoming increasingly frequent. Therefore, studying the characteristics and laws of cascading failure of the combat network through reasonable models is of great importance, which is also beneficial to reducing the risk of cascading failure and making the combat network more robust.
Scholars have proposed many models to study network cascading failure in recent years. For example, for the modeling and analysis of cascading failure, Kinney et al. [
1] proposed a cascading failure model based on efficiency analysis for the power grid, considering the situation that the node does not disappear after failure. Wang et al. [
2] proposed a stochastic Markov model, which is able to capture the progression of cascading failures by a flow redistribution model. Geng et al. [
3] investigated the edge-removal attack’s influence on the robustness of complex networks considering load and cascading failure.
With regard to the load redistribution, one of the classical cascading failure models is the “capacity and load” model presented by Motter and Lai [
4]. From the way the load is redistributed in this model, Duan et al. [
5] proposed a complex network cascading failure model with an adjustable load redistribution range considering the load redistribution heterogeneity, and analyzed the cascading failure conditions on a scale-free network. Yin et al. [
6] also proposed the cascading failure model based on the characteristics of the changeable load and the fixed capacity of the node in the scale-free network.
The above modeling and load redistribution methods are all based on single-layer networks. With regard to multilayer networks and their robustness, Yuan [
7] introduced a cascading failure model for the complex network with a hierarchical structure. The redistribution method of the model takes the hierarchy and heterogeneity into consideration, of which the network tends to redistribute extra load to intact nodes of the same or higher hierarchies. Ben-Haim [
8] studied the hierarchical network with unity of command and discussed how to design the network to manage cascading failures adequately. Multilayer networks are usually characterized by dependencies. Inspired by this, Buldyrev et al. [
9] first proposed the cascading failure model of interdependent networks. Adnan et al. [
10] reported a hybrid probabilistic modeling method to balance load flow and an assessment algorithm to describe the transient stability in multiple interdependent power grid cascading failures. Zakariya [
11] discussed the interdependent power networks’ cascading failure models in terms of features, limitations, and computational speed. Peng et al. [
12] proposed a model of double-layer network structure with simplicial complexes and discussed the higher-order interactions between the networks. To mitigate cascading failures, Smolyak et al. [
13] proposed an intuitive and simple method of protecting the critical nodes, and similar approaches were proposed by Wang et al. [
14] and Shen et al. [
15]. These robustness and cascading failure studies of multilayer networks take little account of the functional heterogeneity of the nodes.
With regard to the research on combat networks, Guo et al. [
16] constructed a cascading failure model in command and control networks and analyzed the influence of load parameters, capacity parameters, and evolution step size on cascading failure invulnerability. Zhang et al. [
17] investigated the dynamic load redistribution strategy based on the node’s local load rate with respect to the cascading failure transmission of the equipment support network. These works are more focused on cascading failures in single-layer combat networks, similar to complex networks in general; there are also more complex relations among different types of combat networks and the coupled networks are well worth investigating. Hence, Yang et al. [
18] firstly explored the cascading failure characteristics and laws of information flowing in combat systems by abstracting network structure in a hierarchical way. Wang et al. [
19] proposed the model of the military information systems of systems based on function dependency and analyzed the center of gravity. These works only consider the robustness of the combat network under cascading failures in terms of topology structure but rarely address the functionality of the combat network.
According to the above analysis, although existing research has deepened the theoretical understanding of cascading failures in combat networks, there are still some deficiencies that need to be addressed: (1) The common research mainly focuses on the single-layer network, and there are few kinds of research on the cascading failure model of the combat network with hierarchical structure and coupling characteristics. (2) The research on hierarchical structure modeling and dependent failure of combat networks needs to be further explored as well as the heterogeneity of combat networks. (3) The method of load redistribution needs to consider the actual situation, as the load is not simply distributed equally among all neighboring nodes. To address these problems, we establish a heterogeneous dependent network model with a double-layer structure according to the actual situation of the combat network, design the rules of dependent failure and overload cascading failure, and discuss the robustness of the combat network through simulation experiments. The aforementioned contributions can provide a more comprehensive and realistic perspective to the study of the robustness of combat networks.
This paper is organized as follows. In
Section 2, the double-layer combat network model with group-dependent characteristics is established based on real situations at first. In
Section 3, the failure model combing conditional group-dependent failure model and cascading failure model is proposed. Attack modes are also classified according to different objects and intentions. In
Section 4, some experiments based on the simulated combat networks are carried out to analyze the influence of different parameters and attack modes on system robustness. The conclusions and the future work follow in
Section 5.
2. Double-Layer Group-Dependent Combat Network
For the convenience of reading, a glossary of the notations used in this paper is presented in
Table 1.
To be as real as possible, the combat network is modeled from two aspects. One is the communication net in terms of physical combat equipment, and the other is the functional net in terms of logic. For the combat communication net, each piece of equipment is deployed in a dispersed manner in physical locations and undertakes the task of energy and material transmission dominated by information flow. Therefore, combat equipment is the basis for communication and information interaction. An information grid network that achieves high data sharing, efficient information interaction, dynamic port access, and flexible combination requirements is the result of the deep fusion of all types of equipment. The definition of the communication net is given as follows:
Definition 1. Suppose is the communication net of combat system-of-system (CSOS), in which the node set is , represents the combat equipment with communication function in the communication net, and is the number of nodes. represents the attributes of the node, including its initial load and bearable capacity. The set of edges is , where represents the communication relations among different nodes, and is the number of edges. The existence of edge is mainly determined by infrastructure deployment, affiliation, and mission requirements. It is relatively fixed in general and will be flexible and changeable when carrying out missions. is the attribute of the communication edge, such as bandwidth and delay.
For simplicity, it is assumed that the communication net is fixed and undirected and , so the initial perturbation of the network topology and the performance on edges will not be considered. We denote the node of the communication net as node C.
With regard to functional net, the combat units and relations among them in CSOS are usually abstracted into the nodes and edges of the complex network, namely, “O, P, D, A” nodes and the corresponding edges [
20]. The “O, P, D, A” nodes represent the intelligence obtaining unit, intelligence processing unit, decision and command unit, and attack or damage unit, respectively, and more details on structural abstraction can be found in [
20]. There are complex interaction relations among different units, forming a network structure of heterogeneous components, multipoint interaction, multidomain fusion, and dynamic evolution, so the heterogeneous information network is used for modeling. The functional net of CSOS with heterogeneous information is defined as follows:
Definition 2. Suppose is the functional net of CSOS, where the node set is , and is the number of nodes. represents the service attributes of the functional node, including the service category, processing load, and affordable capacity undertaken by the node. is the edge set, in which is the number of edges. is an attribute of the edge, indicating the interaction strength of service information. Both nodes and edges have characteristics of type. The type set of nodes is , and there is a mapping function that satisfies , while type set of edges is with mapping function satisfying . If or , then the functional net of CSOS is called heterogeneous combat functional net (HCFN).
Similarly, for the sake of simplicity, this paper assumes that the service interaction strength of the edge of the HCFN is within the acceptable range, so the attribute characteristics of the edge will not be considered. In addition, the type set of nodes is O, P, D, A}, and the type set of directed edge is O–O, O–P, P–P, P–D, D–D, D–A}.
It is notable that the functional net is unidirectionally dependent on the communication net to achieve combat utility. Although the obtained and processed intelligence information and command orders are all circulated in the functional net, the information exchanges among the nodes are all based on communication units in practice. Apart from the communication net and the functional net, there is another important network called the dependent net. To build the dependent relation between CSOS, the following two assumptions need to be specified:
(1) The node in CSOS only has a single function, that is, node C of the communication net can only perform information transmission, node O of the functional net can only perform information acquisition, node P can only perform information processing, node D can only perform commands and decisions, and node A can only perform combat attack.
(2) Although the communication net is abstracted from the actual equipment, it is assumed that the constraints of space and time are neglected when it undertakes communication missions. Therefore, the connection conditions will not be taken into consideration for how the functional net depends on the communication net.
On the basis of the above assumptions, we can construct a double-layer heterogeneous dependent combat network (DHDCN) of CSOS when the functional net is relying on the communication net, which is defined as follows:
Definition 3. Assuming that the communication net of CSOS is , the corresponding functional net of is . The coupling relation between two networks is , which means that the functional net relies on the communication net. When the dependency node , let (for the convenience of calculation, is also equal to 1
). The dependency nodes and edges form a dependent net as . All networks above together constitute the DHDCN of CSOS, which is denoted as The adjacency matrix of DHDCN is expressed aswhere represents the adjacency matrix of the functional net; correspondingly, and are the adjacency matrices of the communication net and interdependent net. It is worth noting that the abovementioned dependencies between heterogeneous coupling networks can be the type of one-to-one, one-to-many, and many-to-one [
21]. A form of one-to-many dependency is called group dependency; therefore, a DHDCN with a one-to-many dependency is referred to as a double-layer group-dependent combat network (DGCN).
Example 1. According to the network model described in Definition 3, the network structure of the DGCN for CSOS is given for a certain combat scenario, as shown in Figure 1. In the figure, the functional net is composed of nodes and edges corresponding to four combat units including O, P, D, and A, and the communication net is composed of nodes corresponding to different communication support units. Based on the dependent net, the functional net and the communication net form asymmetric coupling relations. The widely studied combat cycle model takes the loop composed of the target node T, search node S, decision node D, and influence node I as a measure of combat capability [
22]. Inspired by this work, the functional net of CSOS in this paper also presents the flow of information when relying on the communication net’s communication nodes. The information flow model based on communication nodes is shown in
Figure 2. As we can see from the figure, the red solid lines represent the entire information flow of combat links, and the gray dotted lines indicate the information transmission through the communication net. According to the dependency rule, the information flow of the most typical combat link “O → P → D → A” will be transformed into “O → C → P → C → D → C → A”, and other types of combat link can also be obtained similarly. The typical combat link’s dynamics follow the rule of ”information obtain–intelligence processing–command and decision–combat response (attack)” to form a kill link, and the more concrete concept of it is described in
Section 4.1. Once the communication node in
Figure 2 is broken, the combat link will be destroyed and CSOS will lose its combat capability. Therefore, the coupling relation between the functional subnet and communication subnet is tighter and more important in the DGCN of CSOS.
3. Cascading Failure Model for DGCN
Most common interdependence network models are based on a one-to-one dependent pattern, which has no feedback characteristics and is convenient for analysis [
9]. Quite a lot of studies on the robustness of interdependent networks are also based on this pattern [
23,
24,
25,
26], but such strict dependencies often do not exist in practice. The situation of one-to-many dependency is relatively common, namely, the aforementioned group dependency [
27]. If any one of the depended nodes (communication net nodes) fails, the dependent nodes (functional net nodes) fail according to the traditional analysis method. Therefore, group dependency greatly affects the robustness of the interdependent network. As long as a small number of nodes are attacked, the entire interdependent network may collapse, but the network in real life is not so fragile [
28,
29]. In addition to wired communication, there are many other communication methods for the communication net of DGCN, such as short-wave communication, ultra-short-wave communication, and satellite communication. Therefore, when the functional net depends on the communication net, as long as a certain percentage of the depended nodes are still working well, the dependent functional nodes will not fail. To build the cascading failure model of DGCN, the failure analyses are as follows:
3.1. Asymmetric Dependent Failure
An asymmetric dependent network is a one-way dependent network. According to the classical dependent failure model [
30], the asymmetric dependent failure rules for complex networks are given: For a node that depends on the other subnet, when all its dependent nodes fail or it is not in the maximal component, the node fails; for a node of the relied subnet, when it is not in the maximal component, the node fails.
Figure 3 shows a schematic diagram of the asymmetric dependent failure process of a DGCN of CSOS.
The relied communication net node is initially attacked and then fails. All edges connected to are removed. So the failed nodes are grayed out and the corresponding connecting edges are dashed while the original dependencies are still represented in solid arrows. In the second failure, the functional net nodes and that depend on fail due to the previous failure. Node also fails because it is not in the maximal component. In the third failure, nodes and fail because of the disconnection with and and they are no longer in the maximal component of the functional network. Node will stay normal although its connection with node is interrupted. Since there are no more nodes that meet the failure rules, the failure process stops and a stable state is reached.
3.2. Conditional Group-Dependent Failure
There is a default rule in asymmetric dependent failure, that is, the dependent failure will not happen as long as the dependent relation of nodes is maintained, such as node
in
Figure 3. Based on this, a conditional group-dependent failure model is proposed. This model can tolerate the partial dependent failure of nodes, which is shown in
Figure 4.
a and
b are two nodes in network A which depend on network B, the solid lines are the edges still alive, and the dashed lines are the edges that are about to fail.
As we can see in the figure, network A is unidirectionally dependent on network B, and the scale of the dependency can be different. If the node
x has depended on a number
n communication nodes, the capacity of the node
is
, the capacity of the depended node is
, and the communication connectivity index of node
x is expressed as follows:
When the depended communication nodes fail, the sum elements of
will decrease correspondingly while
n will remain the same. If we set the upper limit of the communication connectivity index as
, then the normalized connectivity index is
. In our conditional group-dependent failure model, the communication connectivity index will decrease as the depended communication nodes are destroyed. When the index is lower than a threshold
, the communication network cannot ensure that the functional nodes complete the flow of information (the default threshold is
). Therefore, the functional node will conditionally fail. For the node
a in
Figure 4, its dependent nodes reserve
, and the connectivity index is
, so
a still remains normal, while node
b will fail as it only has
dependent nodes left and the connectivity index is
.
3.3. Overload Failure Model
Apart from the dependent failure, it is necessary to consider other problems caused by the internal operating mechanism of DGCN. For the communication net, the communication node has its inherent capacity limit. When the load exceeds the tolerable range, it will lead to cascading failure. The same situation occurs on the functional net when the service processing is overloaded. Motter and Lai proposed the “M-L” model [
4,
30] to describe this phenomenon. Based on this, Peng et al. [
31] presented a cascading failure model considering the load and combined it with the dependent failure model. Hao et al. [
32] proposed a cascading failure model considering the overload state when facing a traffic jam. Inspired by these, we establish a cascading failure model considering the overload state for the communication net and functional net, respectively, and then integrate it with the dependent failure model. The specific process of overload cascading failure is as follows: Each node has an initial load at the beginning; when a node fails due to an attack or other reasons, the load of this node will be redistributed according to certain rules. The load-obtained node will fail with a certain probability. If the node fails, a new round of load redistribution and node failure will be triggered. For the communication net, the load is redistributed among the nodes in the entire network, while the load redistribution is limited to nodes of the same type as to the functional net.
3.3.1. Initial Load
The simplest initial load can be defined as the exponential power of the node degree. However, from the perspective of information interaction, a more reasonable definition of the initial load is the function of the information path, that is, the betweenness of the node [
4]. Since betweenness is the global topology information, for large-scale networks, if the structure is not completely known, it is not easy to obtain the initial load, and the complexity of betweenness calculation is very high, which may not be suitable for situations with high real-time requirements. From the perspective of “local definition and local allocation”, Wang et al. [
33] presented a method for calculating initial loads based on local information, and it was proved that the proposed initial load which uses the function of the product of the node degree
and the degree of neighbors
is positively correlated with betweenness. According to the above idea, the initial load of the DGCN is defined separately based on the communication net and the functional net.
The initial load of the communication net node is
where
is the adjustment parameter, which is used to control the initial load distribution of communication nodes;
is the subscript set of neighbors of node
.
The initial processing load of the functional net node is
where
is the adjustment parameter, which is used to adjust the initial load distribution of functional nodes;
is the subscript set of neighbors of node
.
3.3.2. Node Capacity
Due to the cost constraints, there is an upper limit of node capacity in a load-induced network. The usual way to define the node capacity is to assume that it is proportional to its initial load. However, in most real networks, a node with a smaller capacity usually has a larger remaining capacity. The relation between node capacity and load is more likely to be a nonlinear model [
34,
35]. In the DGCN of CSOS, if the initial load of the node is large, it indicates that the node is essential. The more important the node is, the more frequently it interacts with other nodes in information or service processing. Therefore, the corresponding residual capacity of the node is small. On the contrary, the load of the less important node is smaller, and there will be more free capacity [
18]. Here, we adopt the nonlinear model to define the node capacity based on Kim’s work [
34].
The node capacity of the communication net is
where
and
are the adjustment parameters.
The node capacity of the functional net is
where
and
are the adjustment parameters.
Figure 5 presents the relation between the initial load and capacity in nonlinear and linear forms. It can be seen from the figure that the nonlinear model in this paper conforms to the actual situation analyzed above. Especially, the nonlinear model degenerates into a linear model when
, which shows that it is more general.
3.3.3. Redistribution Strategy of Load
After a node fails, the current load will propagate in a certain way. The common redistribution methods such as local redistribution [
36], global redistribution [
37], and average distribution [
38] have different effects on the robustness of the network when facing cascading failures. For the communication net, the communication transmissions are generally addressed according to the principle of the minimum number of hops, so local distribution is more inclined to be adopted. In this paper, we propose a load redistribution strategy from the perspective of the initial static load and subsequent dynamic remaining capacity, which is as follows:
The static allocation ratio for neighbor node
of failed node
at time 0 is
As for the dynamic allocation at time
t, we use the ratio based on the dynamic remaining capacity and it is represented as
Therefore, the synthetic allocation ratio is as follows:
where
is the proportion parameter of two redistribution methods. Then, the new obtained load of neighbor node
is expressed as
And we can update the load of the communication net’s nodes by the following expression:
In the same way, the processing load distribution method of the functional net is easy to obtain. However, it should be noted that the redistribution only occurs among the same type of functional nodes. The node load after a new round of failure is shown as follows:
3.3.4. Failure Status Judgment
In the classical “M-L” model [
4], a node has only two states, namely, the normal state and the failed state. Hao et al. [
32] proposed a cascading failure model of complex networks considering overloaded nodes. When the load exceeds the capacity of a node, the node will fail with a certain probability in the certain bearing range
. This state is called the critical state. When the load exceeds the above range, the node fails directly. Motivated by this, the specific rules for judging the failure situation after the node obtains the reallocated load are as follows:
(1) If , the node does not fail.
(2) If
, the node
is in the critical failure state. Although the load exceeds the capacity of a node, it is still within the affordable range. The more the node is overloaded, the greater the probability of node failure and the failure probability is
When is greater than a random number, the node fails.
(3) if , the node fails immediately.
In summary, taking the cascading failure of the communication net as an example, the failure probability of node
is presented as
For the cascading failure of the functional net, the processing load can only be spread among nodes of the same type. Once a functional node fails, the processing load of it will redistribute among neighbor nodes according to the same information transmission or service transactions. If the processing load of the current node has been updated, the probability of whether this node fails is similar to Equation (
15), and will not be repeated.
3.4. Attack Mode
In combat confrontation, attacks on combat networks are generally divided into random attacks and intended attacks [
39]. The random attack is to randomly select several nodes to make them invalid, while the intended attack is to make nodes invalid according to a certain order of node importance. Since DGCN is a double-layer network, there are different attack modes for different networks. For example, in different combat phases, the enemy may select specific functional net nodes to attack or destroy the nodes of the communication net randomly. According to the attack object of the combat network and the attack intention, the attack mode can be divided into the following six types:
(1) Random single communication network attack (RSCA): Randomly select nodes with a ratio f from the communication net to attack and let these nodes fail.
(2) Intended single communication network attack (ISCA): Select nodes with a ratio f from the communication net according to the descending node degree, and let them fail by attacking.
(3) Random single functional network attack (RSFA): Randomly select nodes with a ratio f from the communication net to attack and let these nodes fail.
(4) Intended single functional network attack (ISFA): Select nodes with a ratio f from the functional net according to the descending node degree, and let them fail by attacking.
(5) Random double networks attack (RDA): Randomly select nodes with a ratio , respectively, from the communication and functional net to attack, and let these nodes fail.
(6) Intended double networks attack (IDA): Select nodes with a ratio , respectively, from the communication net and functional net according to the descending node degree, and let them fail by attacking.
Different attack modes may have different effects on robustness. Combining the asymmetric dependent failure model and overload cascading failure model, the failure process of the DGCN of CSOS can be represented as
Figure 6, in which the dashed boxes of three different colors represent different attacked objects. These nodes in a double-layer network will suffer random attacks or intended attacks. As can be seen from the figure, the failure process of the communication net always leads to the failure of the functional net, so the functional net is more fragile. Any disturbance in the network may cause serious consequences of “failure, disconnection and paralysis”.
5. Conclusions
The phenomenon of cascading failure in the DGCN of CSOS will lead to a complete collapse of the system in the face of a relatively small proportion of damage, resulting in the loss of combat effectiveness. Therefore, finding out the reasons that affect the robustness of the combat network and improving the system’s capability to further stop the collapse are of great significance. In this paper, we contribute some results as follows:
(1) We established a more realistic combat network model of the DGCN of CSOS.
(2) We designed the cascading failure model of the DGCN by combining the asymmetric dependent failure, conditional group-dependent failure, and overload failure together. We also designed the load reallocation strategy and a more practical robustness index.
(3) We investigated the robustness of the combat network with six different attack modes and different model parameters. The simulation results show that the robustness of the combat network can be effectively improved by improving the tolerance limit of one-way dependency of the functional net, the node capacity of the functional net, and the tolerance of the overload state. When the attack intensity remains steady, the combat network’s ability to deal with deliberate attacks is weaker than that with random attacks, and for different attack methods, different model networks perform inconsistently. It is necessary to design a reasonable network structure to enhance the antidestruction ability of the combat network.
The model established in this paper is more real, and the laws concluded from the simulation experiments have certain reference significance for optimizing the structure of the combat network and improving the robustness of CSOS. The merits and demerits of our method compared with other methods are listed in
Table A1. However, there are still some limitations to our study. For one thing, combat networks are modeled statically and only a single type is considered in the overall combat network; for another, there is a lack of data on real combat networks for reasons of secrecy. Therefore, we are going to conduct more research work in the future:
(1) Investigate the impact of collocation of different model networks on robustness;
(2) Obtain the real combat network data in some special situations and verify the effectiveness of the model on real data.