When the system-of-systems (SoS) carries out its missions, it faces various risks of destruction, interference or threat from outside and inside. SoS flow vulnerability is expressed as the degree of impact of mission execution efficiency when a risk event occurs on the SoS flow. In this paper, a method for SoS flow vulnerability analysis based on information entropy is proposed. Firstly, for the risk events and flow structure characteristics, a vulnerability analysis process model is established. Secondly, the SoS flow is transformed into a directed graph model, and a vulnerability calculation model of node in the SoS flow is put forward based on information entropy. Thirdly, the directed graph model of complex SoS flow is decomposed and further simplified to three basic structures:series structure, parallel structure and combination structure, and vulnerability calculation models of these basic structures are also built. Finally, the SoS flow vulnerability can be calculated through the above process. A case study demonstrates the effectiveness of the proposed method.
WEI Zhengxian
,
SONG Min
,
TONG Pengpeng
,
WANG Hongbin
. A method for SoS flow vulnerability analysis based on information entropy[J]. Science & Technology Review, 2019
, 37(13)
: 40
-46
.
DOI: 10.3981/j.issn.1000-7857.2019.13.005
[1] Lane J A, Valerdi R. Synthesizing SoS concepts for use in cost modeling[J]. Systems Engineering, 2007, 10(4):297-308.
[2] Manthorpe Jr W H. The emerging joint system of systems:A systems engineering challenge and opportunity for APL[J]. John Hopkins APL Technical Digest, 1996, 17(3):305-313.
[3] Pei R S. Systems-of-systems integration (SoSI)-A smart way of acquiring army C4I2WS systems[C]//Proceedings of the Summer Computer Simulation Conference. New York:ACM, 2000:574-579.
[4] Sage A P, Cuppan C D. On the systems engineering and management of systems-of-systems and federations of systems[J]. Information, Knowledge, Systems Management, 2001, 2(4):325-345.
[5] Maier M W. Architecting principles for systems-of-systems[J]. System Engineering, 1998, 1(4):267-284.
[6] Sullivan M J, Oppenheim J, Ahearn M, et al. Defense acquisitions:DoD management approach and processes not-well suited to supports development of global information grid:GAO-06-211[R]. Washington DC:Government Accountability Office, 2006.
[7] 邢栩嘉, 林闯, 蒋屹新. 计算机系统脆弱性评估研究[J]. 计算机学报, 2004, 27(1):1-11. Xing Xujia, Lin Chuang, Jiang Yixin. A survey of computer vulnerability assessment[J]. Chinese Journal of Computers, 2004, 27(1):1-11.
[8] 程正刚, 房鑫炎, 俞国勤, 等. 电力应急体系的脆弱性评价研究[J]. 电力系统保护与控制, 2010, 38(19):51-54. Cheng Zhenggang, Fang Xinyan, Yu Guoqin, et al. Research of vulnerability assessment of power emergency system[J]. Power System Protection and Control, 2010, 38(19):51-54.
[9] 唐士晟, 李小平. 铁路交通事故应急救援体系脆弱性评价方法研究[J]. 铁道学报, 2013, 35(7):14-20. Tang Shisheng, Li Xiaoping. Study on method for assessment of vulnerability of railway emergency rescue system[J]. Journal of The China Railway Society, 2013, 35(7):14-20.
[10] 丁明, 过羿, 张晶晶, 等. 基于效用风险熵权模糊综合评判的复杂电网节点脆弱性评估[J]. 电工技术学报, 2015, 30(3):214-223. Ding Ming, Guo Yi, Zhang Jingjing, et al. Node vulnerability assessment for complex power grids based on effect risk entropy-weighted fuzzy comprehensive evaluation[J]. Transactions of China Electrotechnical Society, 2015, 30(3):214-223.
[11] 张桦, 魏本刚, 李可军, 等. 基于变压器马尔可夫状态评估模型和熵权模糊评价方法的风险评估技术研究[J]. 电力系统保护与控制, 2016, 44(5):134-140. Zhang Hua, Wei Bengang, Li Kejun, et al. Research on risk assessment technology based on Markov state evaluation model for power transformer and entropy-weighted fuzzy comprehensive evaluation[J]. Power System Protection and Control, 2016, 44(5):134-140.
[12] 宁淑婷. 基于二级模糊综合评判的建筑物和桥梁打击效果评估研究[D]. 西安:西安电子科技大学, 2012. Ning Shuting. Battle damage assessment of building and bridges based on two-level fuzzy comprehensive evaluation[D]. Xi'an:Xidian University, 2012.