Next Article in Journal
Kinematics and Dynamics of Turbulent Bands at Low Reynolds Numbers in Channel Flow
Previous Article in Journal
Thermo-Economic Evaluation of Aqua-Ammonia Solar Absorption Air Conditioning System Integrated with Various Collector Types
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robustness of Internet of Battlefield Things (IoBT): A Directed Network Perspective

College of Intelligence Science and Technology, National University of Defense Technology, Changsha 410073, China
*
Author to whom correspondence should be addressed.
Submission received: 19 September 2020 / Revised: 10 October 2020 / Accepted: 13 October 2020 / Published: 16 October 2020
(This article belongs to the Section Statistical Physics)

Abstract

:
Through the combination of various intelligent devices and the Internet to form a large-scale network, the Internet of Things (IoT) realizes real-time information exchange and communication between devices. IoT technology is expected to play an essential role in improving the combat effectiveness and situation awareness ability of armies. The interconnection between combat equipment and other battlefield resources is referred to as the Internet of Battlefield Things (IoBT). Battlefield real-time data sharing and the cooperative decision-making among commanders are highly dependent on the connectivity between different combat units in the network. However, due to the wireless characteristics of communication, a large number of communication links are directly exposed in the complex battlefield environment, and various cyber or physical attacks threaten network connectivity. Therefore, the ability to maintain network connectivity under adversary attacks is a critical property for the IoBT. In this work, we propose a directed network model and connectivity measurement of the IoBT network. Then, we develop an optimal attack strategy optimization model to simulate the optimal attack behavior of the enemy. By comparing with the disintegration effect of some benchmark strategies, we verify the optimality of the model solution and find that the robustness of the IoBT network decreases rapidly with an increase of the unidirectional communication links in the network. The results show that the adversary will change the attack mode according to the parameter settings of attack resources and network communication link density. In order to enhance the network robustness, we need to adjust the defense strategy in time to deal with this change. Finally, we validated the model and theoretical analysis proposed in this paper through experiments on a real military network.

1. Introduction

The Internet of Things (IoT) provides a new way for massive deployment of smart devices, such as heterogeneous machines, sensors, and actuators [1,2]. Through ubiquitous connections, devices can exchange data and leverage each other’s information, which enables the Internet of Things to have a high degree of situational awareness [3]. Since the combat efficiency and coordinated decision-making of a modern army depend highly on the ability to have real-time situation awareness on the battlefield and the smooth dissemination of combat information [4,5], the Internet of Things has a promising application in the context of modern warfare. IoT technology used for the interconnection between combat equipment and other battlefield resources is referred to as the Internet of Battlefield Things (IoBT) [6,7]. The collection of real-time data and information dissemination rely on the connectivity of the network, which is vital in allowing the IoBT network to unleash its full potential [8]. However, most of the connections within the IoBT are wireless in nature [9,10,11]. Attackers can selectively destroy specific channels and data packets, causing communication links in IoBT networks to be removed [1,12]. Therefore, considering the presence of malicious attacks by the enemy, the robustness of the IoBT network is crucial to maintaining the combat capability and situational awareness of troops on the battlefield.
Chen et al. studied a two-layer secure network formation problem for IoT networks in which the network designer aims to design a network that can resist different number of link failures with the least resources [1]. Leveraging the theories of stochastic geometry and mathematical epidemiology, Farooq et al. presented a generic framework for secure and reconfigurable design of IoBT networks, which can reconfigure the network according to the changing mission requirements [8]. Farooq et al. also proposed a cognitive connectivity framework, which can cognitively adapt to the changes in the network to interconnect spatially dispersed smart devices thus making it possible to remotely deploy mobile Internet of Things [3]. In order to model and analyze malware infection in wireless IoT networks, Farooq and Zhu proposed a variation of the mean field population process model based on a customized state space that allows us to analyze the formation of botnets in wireless IoT networks and helps in making corresponding network defense decisions [9]. Most of the aforementioned studies are carried out from the perspective of network security design, and there is no research to analyze the robustness of the Internet of Battlefield Things under the optimal attack strategy from the opponent (namely, the ability of the network to maintain connectivity in the worst case).
The network disintegration model in complex network theory has been successfully applied to the modeling and analysis of traditional infrastructure network robustness problems [13,14,15,16,17,18]. By randomly or intentionally removing nodes or edges from the network to simulate random failures or malicious attacks, these models accurately capture the key nodes or edges in the network [19,20,21,22,23]. These research findings will not only be helpful in guiding different protection strategies, but will also be useful in the design of high-robustness and low-cost infrastructure networks [13]. Although the research on the robustness of infrastructure networks has achieved rich results, previous studies did not take the direction of communications between nodes in the network and the optimal attack strategy of the adversary into account, and hence cannot give meaningful insights for the IoBT network. The directionality of communications is an important feature that is not ignorable for IoBT networks. For example, the command and control node will receive data from the sensing node, generate the operation command, and send it to the fire strike node [5,24,25,26]. In this process, the information can only propagate between nodes along the sending direction or receiving direction. For systems with directional connections, the directed network is a network model that naturally describes this communication mode, and the edges in the network have directionality [27,28,29]. Another vital feature of IoBT networks is to make the network connectivity resistant to edge removal attacks by anticipating the worst attack behaviors [1]. From the perspective of attackers, some scholars convert the network disintegration problem into a combinatorial optimization-based problem by introducing some meta-heuristic algorithms to identify the optimal attack strategy [30,31,32,33], which provides an effective method to predict the worst attack behavior of attackers.
In this paper, aiming at the security requirements of the Internet of Battlefield Things, we first use the directed network to model the wireless communication characteristics of the IoBT network. Then, based on the concept of the largest strongly connected component (LSCC) in the directed network, the connectivity of the IoBT network is quantitatively described. Furthermore, we establish an optimization model to simulate the optimal attack strategy of the enemy and verify the optimality of the model solution by comparing it with the disintegration effect of some benchmark strategies. The experimental results show that the network robustness decreases with an increase of the proportion of unidirectional edges in the IoBT network, which means that the number of nodes that can maintain mutual access will decrease rapidly when the IoBT network is attacked maliciously. Furthermore, we also found that under different attack resources of opponents and with changes to the communication link density of the IoBT network, the optimal attack mode of the adversary will change significantly, which enlightens us to adjust the edge protection strategy to deal with the change of adversary attack mode.
The remainder of this paper is organized as follows. In Section 2, we propose a network model and connectivity measurement of the Internet of Battlefield Things. In Section 3, we construct an optimal attack strategy optimization model to simulate the attack behaviour of the enemy. In Section 4, the robustness of the IoBT network under the optimal attack strategy is investigated through experiments on the synthetic networks and real military networks, and give the network defense strategies under different parameter settings. Finally, the conclusions are given in Section 5.

2. The Construction of Network Model

In this section, we first use the directed network model to describe the wireless communication characteristics of the IoBT network. Then, based on the concept of the largest strongly connected component (LSCC) in the directed network, the connectivity between devices in the IoBT network is quantitatively described. Figure 1 illustrates a typical battlefield environment comprised of airborne warning aircraft, armed helicopters, armored vehicles, and soldiers, whose communications are threatened by physical or cyber attacks. The enemy can destroy specific channels and data packets, resulting in some equipment being unable to send real-time data or unable to receive the latest operational command, which dramatically reduces the situation awareness ability and combat efficiency of the Internet of Battlefield Things.

2.1. Directed Network Model

Systems with asymmetric or unidirectional connections can be described as a directed network, which is represented by a simple directed graph G = V , E , and there are no loops and multiple edges in the network. V = v 1 , v 2 , , v N is the set of nodes and E = e 1 , e 2 , , e W is the set of directed edges. Let N = | V | be the number of nodes and W = | E | be the number of edges, respectively. Any edge in the network corresponds to a pair of nodes e x = v i , v j , where node v i is the starting point and node v j is the end point. Denote by A G = a i j N × N the adjacency matrix of G, in which a i j = 1 if there is a directed edge from v i to v j , and a i j = 0 otherwise. It should be noted that, unlike undirected networks, the adjacency matrix of directed networks is generally asymmetric. Let k i o u t = j = 1 N A i j and k i i n = j = 1 N A j i be the out-degree and in-degree of node v i , respectively.
In this study, we only consider attacks against edges. We define the edge type between any two nodes in the directed network, including no edge, bidirectional edge, and unidirectional edge. The specific definitions are shown in Figure 2. Obviously, three edge types correspond to three possible communication modes between two nodes. If there is no direct communication between the two nodes, such as when affected by geographical factors, it can be represented as no edge. If two nodes send information to each other, it can be represented by a bidirectional edge. A unidirectional edge means that one node can only send or receive information.

2.2. Network Connectivity Evaluation Index

In this article, to visually observe the impact of edge attack behaviors on IoBT network connectivity, we use the proportion of nodes in the largest strongly connected component (LSCC) as the measure function of network connectivity. For the IoBT network, there is at least one reachable communication path between any pair of combat units in the LSCC. We assume that the larger the LSCC of the IoBT network is, the better the robustness of the network. In Figure 3, we use a simple example to illustrate the change of LSCC after the network is attacked.

3. Optimization Model for Edge Attack Strategy in Directed Networks

In this section, we model the optimal attack launched by the enemy on our IoBT network in the battlefield environment. We first define the edges attacked in directed networks. Then, we construct the optimal edge attack strategy optimization model in directed networks and obtain the optimal attack strategy of the enemy by solving the model.
Each edge attack removes an existing edge in the network. If one edge from node v i to node v j is removed, then a i j = 0 , which means that the edge type may be converted from a bidirectional edge to a unidirectional edge, or from a unidirectional edge to no edge. Denote by E ^ E the set of directed edges that are removed and denote by G ^ = V ^ , E E ^ the network after the edge removal. Denote by m = E ^ the attack strength parameter. If m = W , all edges of network G are removed. We define an edge attack strategy as X ^ = x 1 , x 2 , , x W , where x i = 0 if x i E ^ , otherwise x i = 1 . Therefore, a constraint of the edge attack strategy can be obtained as follows:
m = W i = 1 W x i .
Our goal is to find the optimal edge attack strategy to minimize network performance. The measure function of network performance is denoted by Φ G ^ . The problem of solving the optimal edge attack strategy in a directed network could be formulated as follows:
s . t . i = 1 W x i = W m , 0 m W x i = 0 o r 1 , i = 1 , 2 , , W
For a directed network with W edges, the size of the solution space of this problem is W m , which increases sharply with the size of the network. It is almost impossible to traverse all possible combinations of edges if the directed network’s size is large. Fortunately, the tabu search algorithm has been successfully applied to solve the optimal node attack strategy in undirected networks [30]. The tabu search algorithm, which is one of the meta-heuristic algorithms, is a powerful tool for solving combinatorial optimization problems. It employs a move mechanism and a tabu list to prevent subsequent iterations from falling into a sub-optimal solutions and proposes an aspiration criterion to release some of the better solutions that are currently in the tabu list, thereby ensuring the possibility of an efficient global search. At the same time, we have also noticed that, as a kind of meta-heuristic algorithm, the genetic algorithm is also applied to solve the optimal edge attack strategy in an undirected network [33]. The genetic algorithm has strong global search capabilities, but a simple genetic algorithm not only easily converges prematurely, but also makes it difficult to obtain the global optimal solution [34].
In this work, we compare the disintegration effects of the optimal solutions found by the Tabu Search Algorithm (TS) and Genetic Algorithm (GA). Please refer to these works of literature [30,31,32,33] for the detailed steps and algorithm diagram of the TS algorithm and GA algorithm.

4. Experimental Analysis

In this section, we analyze the optimal edge attack strategy based on the optimization model introduced above. On the one hand, we focus on the disintegration effect of the optimal edge attack strategy on the synthetic directed networks. In order to verify that the attack strategy solved by the model can simulate the optimal edge attack behavior, namely, the solution is an approximate optimal solution, we introduce some existing edge attack strategies as benchmarks for comparison. On the other hand, considering the constraint of communication cost on the proportion of bidirectional edges, by setting a certain proportion of bidirectional edges as unidirectional edges at random, we simulate the IoBT network with different communication link densities and study the impact of the change in the proportion of unidirectional edges on the network robustness.

4.1. Synthetic Directed Networks

Due to the ubiquity of random connections and power-law characteristics in the real world, in this paper we attempt to employ the directed scale-free network and directed random network as the fundamental network model of the IoBT network. We first generate an undirected scale-free network with a power-law degree distribution p k = λ 1 m λ 1 k λ . We then randomly select q proportion bidirectional edges from this initial network and set them as unidirectional edges to obtain a directed scale-free network. In particular, by defining E q as the total number of directed edges in the directed network under the parameter q, it can be derived that E q = 1 q / 2 · E . If q = 0 , then E q = E , and the edges in the network are all bidirectional. Additionally, if q = 1 , then E q = E / 2 , and the edges in the network are all unidirectional. Therefore, the directed scale-free network model is denoted by S F E q , N , m , λ , q . Similarly, the directed random network can be generated by determining the number of nodes N and the probability p of connecting edges between any two nodes, which can be indicated by E R E q , N , p , q .

4.2. The Existing Edge Attack Strategies

In order to verify the disintegration effect of the optimal attack strategy obtained by solving the optimization model, as a comparison, we introduce two common methods, namely, Edge-Degree (based on local information) and Edge Betweenness Centrality (based on global information), as benchmarks.

4.2.1. Edge Attack Strategy Based on Edge-Degree

In undirected networks, determining the importance of edges based on the information of two endpoints has been proven to be an effective method in disrupting networks [35]. The degree is a classic local index to measure the importance of nodes. The importance of edges can be defined by the sum or product of the degrees of two endpoints. In this work, according to the concepts of out-degree and in-degree, we define three attack strategies: removing edges in decreasing order of the sum of out-degree (SOD), the sum of in-degree (SID), and the sum of out-degree and in-degree (SOID). These definitions are given by Equation (3).
S O D e = k i o u t + k j o u t S I D e = k i i n + k j i n S O I D = S O D e + S I D e ,
where k i o u t and k j i n are the out-degree of endpoint i and the in-degree of endpoint j, respectively. We collectively refer to the definitions in Equation (3) as Edge-Degree. Following the definition of Edge-Degree, the edges that connect the in-hubs or the out-hubs will be attacked preferentially.

4.2.2. Edge Attack Strategy Based on Edge Betweenness Centrality

The Edge Betweenness Centrality quantifies the role of edges in maintaining interconnections between components in the network by reflecting the ratio of the number of shortest paths between nodes i and j to the total number of shortest paths between all pairs of nodes. Extending this concept directly to directed networks, we define the attack strategy based on Edge Betweenness Centrality (EBC), which removes edges in descending order of betweenness centrality. The definition is given by Equation (4).
E B C e = i j σ i j E σ i j ,
where σ i j is the number of shortest paths from node i to node j, and σ i j E is the number of shortest paths from i to j that pass through edge E.

4.3. Experiments in Synthetic Networks

We first conducted experiments on both a directed scale-free network and a directed random network with parameters q = 0.2 , 0.5 , 0.8 , corresponding to the three cases where the proportion of unidirectional edges in the directed network is small, half, and large, respectively.
This paper uses the relative size of the largest strongly connected component (LSCC) mentioned in Section 2 as the performance measurement function of the directed network. Denote by f = m / W the directed edge deleting fraction. As the value of f increases, the network will eventually collapse, until the relative size of the LSCC almost approaches 0.
The parameters of the optimization model for solving the optimal edge attack strategy based on tabu search were set as the following: the maximum of iterations T max = 100 , the number of candidates n c a n d i d a t e = 100 , and the tabu length L t a b u l i s t = 100 .
The parameters of the optimization model for solving the optimal edge attack strategy based on the genetic algorithm are set as the number of iterations is also set to T = 100; the selection probability is 0.5, the crossover probability is 0.5, the mutation probability is 0.5 and the initial population size is 300.
In order to eliminate the influence of randomness on the experiment as much as possible, the average value of 100 independent experiments was taken as the experimental result.
The disintegration effects Φ G as a function of the directed edge deleting fraction f with various edge attack strategies in directed scale-free networks and directed random networks are shown in Figure 4. We found that, given the directed edge deleting fraction, the disintegration effect of the optimal attack strategy solved by the optimization model in Section 3 is much better than other heuristic attack strategies. The results show that the model can simulate the optimal attack launched by the enemy on the IoBT network. In Figure 4, it can be observed that the disintegration effect of the solution obtained by the tabu search algorithm is better than the genetic algorithm, which shows that the solution obtained by tabu search algorithm is closer to the optimal solution than genetic algorithm. Therefore, in the following, only the tabu search algorithm is used to solve the optimization model. In addition, to investigate the influence of communication link density on the robustness of the IoBT network, we set up directed scale-free networks and directed random networks with q = 0.2 , 0.5 , 0.8 , corresponding to high, medium, and low communication link densities, respectively. As can be seen from Figure 4, with an increase of the proportion of unidirectional edges (namely, a decrease of communication link density), the decline curve of network connectivity becomes steeper, which means that the number of nodes in the IoBT network that can maintain mutual accessibility is rapidly decreasing. This shows that the network robustness can be improved by increasing the communication link density.
Table 1 and Table 2 respectively show the standard deviation of the results solved by the two meta-heuristic algorithms in Figure 4. In order to simplify the representation, we only reserved the parameter q in the network name as the logo in the bottom right corner.
After successfully predicting the optimal attack strategy, we need to formulate the corresponding defense strategy for our IoBT network to deal with the potential threat from the enemy. To keep the IoBT network resistant to attacks, the network defender can invest in securing its links against failures, where we refer to these specially protected communication edges as protected links [1]. A protected link can be designed by using the moving target defense (MTD) strategy, where the network defender randomly uses communication links among multiple created channels between two nodes [36]. However, considering the cost of these protected links, we can only protect part of the communication edge in the network. Thus, we need to know which possible attack modes are adopted in the optimal attack strategy of the enemy. It is easy to conclude that there are three attack modes that the enemy may take, which are defined as follows: (1) Mode 1: the unidirectional edge is attacked, and the communication between the two nodes is completely cut off; (2) Mode 2: only one unidirectional edge in the bidirectional edge is attacked, and another unidirectional edge is left to communicate between the two nodes; (3) Mode 3: both unidirectional edges in the bidirectional edge are attacked, and the communication between the two nodes is completely cut off. Note that the first two attack modes only need to attack once and remove one edge, while the third attack mode needs to attack twice and remove two edges.
Under the parameter settings of f = 0.1 , 0.2 , , 0.9 and q = 0.1 , 0.2 , , 0.9 , we counted the amounts of the three attack modes adopted by the optimal attack strategy. Figure 5 shows the change of amounts of three attack modes adopted by the optimal attack strategy in different situations.
As can be seen from Figure 5, when the enemy attack resources are limited (f value is low), and the communication link density of our IoBT network is high (q value is low), the enemy tends to use Mode 2 as the primary attack mode. There is a large amount of bidirectional communication in our network, so Mode 3 is not a cost-effective attack mode for an enemy with limited resources. However, the enemy can destroy one unidirectional edge in the bidirectional edge to reduce the proportion of bidirectional edges, which will reduce the possibility of large-scale strongly connected components in the network and thus weaken the combat effectiveness of our IoBT network. Consequently, in this case, we should focus our defense resources on the protection of bidirectional edges. When the enemy attack resources are abundant (f value is high) and the communication link density of our IoBT network is high (q value is low), the enemy tends to use Mode 3 as the primary attack mode. It is the enemy’s first concern to destroy the network connectivity as much as possible, rather than whether the attack mode is cost-effective. By cutting off the bidirectional communication between massive nodes, the enemy can cut our IoBT network into smaller connected pieces. Similarly, in this case, we should focus our defense resources on the protection of bidirectional edges. No matter whether the attack resources are limited or abundant when our IoBT network communication link density is low (q value is high), the enemy will choose Mode 1 as the primary attack mode. Due to the poor robustness of the network with a high proportion of unidirectional edges, the network connectivity will collapse quickly if the enemy attacks the unidirectional edge. Differently from the previous two cases, we should focus our defense resources on the protection of unidirectional edges if our network robustness is poor.

4.4. Experiments in Real Military Network

In this section, we use a real military organization network to verify the model and theoretical analysis proposed in this paper. The military network data come from the literature [37], which contains 89 entities, including 12 command nodes, 26 force nodes and 51 intelligence nodes, and there are 150 observable edges. The basic topological features of the military network are shown in Table 3. By setting a certain proportion of bidirectional edges as unidirectional edges at random, we study the network robustness of this military network under different communication link densities. Consistent with Figure 4, we set the unidirectional edge ratio parameters q = 0.2, 0.5, 0.8, corresponding to high, medium and low communication link densities, respectively.
The disintegration effect Φ versus the directed edge deleting fraction f with various edge attack strategies in a real military network are shown in Figure 6. Obviously, the network robustness of this military network is poor. If the enemy takes the optimal attack, then only the removal of 0.2 percent of the edges in the network can make the relative size of the LSCC drop sharply to 0.2 and below. From the perspective of network defense, the topology and number of edges in this military network should be changed to improve the network robustness in the face of possible optimal attacks.
Furthermore, we show in Figure 7 the relationship between the number of three attack modes and the directed edge deleting fraction f under the optimal attack strategy. To facilitate the reader to visually compare the number changes in the three attack modes, we use a stacked bar plot to display the results.
The results in Figure 7 are consistent with the theoretical analysis in Figure 5. As shown in Figure 7a, when the communication link density is high ( q = 0.2 ) and the enemy attack resources are limited (f value is low), the enemy will choose Mode 2 as the primary attack mode. As the attack resources increase (f value is high), Mode 3 becomes the primary attack mode. As shown in Figure 7b, when the communication link density is medium ( q = 0.5 ), with the increase in attack resources, the enemy’s primary attack mode gradually changes from Mode 2 to Mode 1 and Mode 3. As shown in Figure 7c, whether the attack resources are limited or abundant when the communication link density of the military network is low ( q = 0.8 ), the enemy will choose Mode 1 as the primary attack mode.

5. Conclusions

In this work, we studied the robustness of the Internet of Battlefield Things (IoBT). Since the connectivity between battlefield nodes plays an essential role in delivering real-time data and ensuring situation awareness, the ability to maintain network connectivity under adversary attacks is a critical property for the Internet of Battlefield Things. Aiming at the security requirements of the IoBT network, we first proposed the directed network model and connectivity measurement. Then, we established the optimal attack strategy optimization model and obtained the worst-case attacks by solving the model. Applying the network model, we analyzed the robustness of the IoBT network under the optimal attack strategy, which provided insights into the development of effective protection strategies to ensure the security and reliability of the IoBT network despite adversarial behaviors.
As part of our future work, we will consider the heterogeneity of devices and extend the network model to heterogeneous multi-layer networks. Although the IoBT network is modeled by directed scale-free networks and directed random networks, the structural characteristics and formation mechanism of real IoBT network are still unclear, which makes the network model in this paper unable to reflect all of the characteristics. We will carry out more works on these two directions in the future.

Author Contributions

Authors Y.F., M.L., and H.L. participated in the analysis, interpretation, and manuscript preparation. Y.F. verified the feasibility of the methods. C.Z. visualized the experimental results. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation (NNSF) of China under Grant Nos. 61603406 and 61403411.

Acknowledgments

We thank the volunteers for their participation in the study. This work is supported by the National Natural Science Foundation (NNSF) of China under Grant Nos. 61603406 and 61403411.

Conflicts of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Chen, J.; Touati, C.; Zhu, Q. Optimal secure two-layer IoT network design. IEEE Trans. Control Netw. Syst. 2019, 7, 398–409. [Google Scholar] [CrossRef] [Green Version]
  2. Evans, D. The internet of things: How the next evolution of the internet is changing everything. CISCO White Pap. 2011, 1, 1–11. [Google Scholar]
  3. Farooq, M.J.; Zhu, Q. A multi-layer feedback system approach to resilient connectivity of remotely deployed mobile Internet of Things. IEEE Trans. Cogn. Commun. Netw. 2018, 4, 422–432. [Google Scholar] [CrossRef] [Green Version]
  4. Lan, Y.; Deng, K.; Mao, S.; Wang, H.; Yi, K.; Lei, M. Adaptive evolvement of information age C4ISR structure. J. Syst. Eng. Electron. 2015, 26, 301–316. [Google Scholar] [CrossRef]
  5. Yunming, W.; Si, C.; Chengsheng, P.; Bo, C. Measure of invulnerability for command and control network based on mission link. Inf. Sci. 2018, 426, 148–159. [Google Scholar] [CrossRef]
  6. Kott, A.; Swami, A.; West, B.J. The internet of battle things. Computer 2016, 49, 70–75. [Google Scholar] [CrossRef]
  7. Radha, P.; Selvakumar, N.; Sekar, J.R.; Johnsonselva, J. Enhancing Internet of Battle Things using Ultrasonic assisted Non-Destructive Testing (Technical solution). In Proceedings of the 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Madurai, India, 13–15 December 2018; pp. 1–4. [Google Scholar]
  8. Farooq, M.J.; Zhu, Q. On the secure and reconfigurable multi-layer network design for critical information dissemination in the internet of battlefield things (IoBT). IEEE Trans. Wirel. Commun. 2018, 17, 2618–2632. [Google Scholar] [CrossRef]
  9. Farooq, M.J.; Zhu, Q. Modeling, analysis, and mitigation of dynamic botnet formation in wireless iot networks. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2412–2426. [Google Scholar] [CrossRef] [Green Version]
  10. Upreti, R.; Rauniyar, A.; Kunwar, J.; Haugerud, H.; Engelstad, P.; Yazidi, A. Adaptive pursuit learning for energy-efficient target coverage in wireless sensor networks. In Concurrency and Computation: Practice and Experience; John Wiley & Sons Ltd.: Chichester, UK, 2020; p. e5975. [Google Scholar]
  11. Kalaivanan, K.; Bhanumathi, V. Unmanned Aerial Vehicle based Reliable and Energy Efficient Data Collection from Red Alerted Area using Wireless Sensor Networks with IoT. J. Inf. Sci. Eng. 2019, 35, 521–536. [Google Scholar]
  12. Doku, R.; Rawat, D.B.; Garuba, M.; Njilla, L. Fusion of Named Data Networking and Blockchain for Resilient Internet-of-Battlefield-Things. In Proceedings of the 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 10–13 January 2020; pp. 1–6. [Google Scholar]
  13. Wang, J.W.; Rong, L.L. Robustness of the western United States power grid under edge attack strategies due to cascading failures. Saf. Sci. 2011, 49, 807–812. [Google Scholar] [CrossRef]
  14. Wang, S.; Hong, L.; Ouyang, M.; Zhang, J.; Chen, X. Vulnerability analysis of interdependent infrastructure systems under edge attack strategies. Saf. Sci. 2013, 51, 328–337. [Google Scholar] [CrossRef]
  15. Zhang, H.; Wang, J.; Shi, B.; Lu, X.; Jia, J. Exploring significant edges of public transport network under targeted attacks. Mod. Phys. Lett. B 2019, 33, 1950114. [Google Scholar] [CrossRef]
  16. Cats, O.; Krishnakumari, P. Metropolitan rail network robustness. In Physica A: Statistical Mechanics and Its Applications; Elsevier: Amsterdam, The Netherlands, 2020; p. 124317. [Google Scholar]
  17. Yassien, Y.; Ezzeldin, M.; Mohamed, M.; El-Dakhakhni, W. Air Transportation Infrastructure Robustness Assessment for Proactive Systemic Risk Management. J. Manag. Eng. 2020, 36, 04020037. [Google Scholar] [CrossRef]
  18. Dong, S.; Mostafizi, A.; Wang, H.; Gao, J.; Li, X. Measuring the topological robustness of transportation networks to disaster-induced failures: A percolation approach. J. Infrastruct. Syst. 2020, 26, 04020009. [Google Scholar] [CrossRef]
  19. Holme, P.; Kim, B.J.; Yoon, C.N.; Han, S.K. Attack vulnerability of complex networks. Phys. Rev. E 2002, 65, 056109. [Google Scholar] [CrossRef] [Green Version]
  20. Bao, Z.; Cao, Y.; Ding, L.; Wang, G. Comparison of cascading failures in small-world and scale-free networks subject to vertex and edge attacks. Phys. A Stat. Mech. Appl. 2009, 388, 4491–4498. [Google Scholar] [CrossRef]
  21. Yin, Y.; Liu, Q.; Zhang, C.; Zhou, J. Survivability analysis of weighted-edge attacks on complex networks with incomplete information. Phys. A Stat. Mech. Appl. 2019, 531, 120957. [Google Scholar] [CrossRef]
  22. Malik, H.A.M.; Abid, F.; Wahiddin, M.R.; Bhatti, Z. Robustness of dengue complex network under targeted versus random attack. Complexity 2017, 2017, 2515928. [Google Scholar] [CrossRef] [Green Version]
  23. Ruj, S.; Pal, A. Analyzing cascading failures in smart grids under random and targeted attacks. In Proceedings of the 2014 IEEE 28th International Conference on Advanced Information Networking and Applications, Victoria, BC, Canada, 13–16 May 2014; pp. 226–233. [Google Scholar]
  24. Li, J.; Jiang, J.; Yang, K.; Chen, Y. Research on functional robustness of heterogeneous combat networks. IEEE Syst. J. 2018, 13, 1487–1495. [Google Scholar] [CrossRef]
  25. Li, J.; Tan, Y.; Yang, K.; Zhang, X.; Ge, B. Structural robustness of combat networks of weapon system-of-systems based on the operation loop. Int. J. Syst. Sci. 2017, 48, 659–674. [Google Scholar] [CrossRef]
  26. Li, J.; Zhao, D.; Ge, B.; Jiang, J.; Yang, K. Disintegration of operational capability of heterogeneous combat networks under incomplete information. IEEE Trans. Syst. Man Cybern. Syst. 2018, 1–8. [Google Scholar] [CrossRef]
  27. Kohlberg, I. Spatially inhomogeneous survivable communication networks with directed and non-directed graphs. In Proceedings of the 2014 International Conference on Electromagnetics in Advanced Applications (ICEAA), Palm Beach, The Netherlands, 3–8 August 2014; pp. 304–307. [Google Scholar]
  28. Zhang, T.; Huang, Z.; Wen, H.; Bao, Z. An Efficiency Evaluation Model of Combat SoS Counterworks Based on Directed and Weighted Network. In Theory, Methodology, Tools and Applications for Modeling and Simulation of Complex Systems; Springer: Berlin/Heidelberg, Germany, 2016; pp. 413–423. [Google Scholar]
  29. Deroïan, F. Endogenous link strength in directed communication networks. Math. Soc. Sci. 2009, 57, 110–116. [Google Scholar] [CrossRef] [Green Version]
  30. Deng, Y.; Wu, J.; Tan, Y.j. Optimal attack strategy of complex networks based on tabu search. Phys. A Stat. Mech. Appl. 2016, 442, 74–81. [Google Scholar] [CrossRef]
  31. Qi, M.; Deng, Y.; Deng, H.; Wu, J. Optimal disintegration strategy in multiplex networks. Chaos Interdiscip. J. Nonlinear Sci. 2018, 28, 121104. [Google Scholar] [CrossRef] [PubMed]
  32. Yu, Y.; Deng, Y.; Tan, S.Y.; Wu, J. Efficient disintegration strategy in directed networks based on tabu search. Phys. A Stat. Mech. Appl. 2018, 507, 435–442. [Google Scholar] [CrossRef]
  33. Zhang, X.; Wu, J.; Wang, H.; Xiong, J.; Yang, K. Optimization of disintegration strategy for multi-edges complex networks. In Proceedings of the 2016 IEEE Congress on Evolutionary Computation (CEC), Vancouver, BC, Canada, 24–29 July 2016; pp. 522–528. [Google Scholar]
  34. Gong, D.; Zhou, Y.; Guo, X.; Ma, X.; Li, M. Study on an adaptive Tabu search genetic algorithm. In Proceedings of the 4th World Congress on Intelligent Control and Automation (Cat. No. 02EX527), Shanghai, China, 10–14 June 2002; Volume 4, pp. 3063–3065. [Google Scholar]
  35. Xie, F.; Cheng, S.; Chen, D.; Zhang, G. Cascade-based attack vulnerability in complex networks. J. Tsinghua Univ. Sci. Technol. 2011, 51, 1252–1257. [Google Scholar]
  36. Zhu, Q.; Başar, T. Game-theoretic approach to feedback-driven multi-stage moving target defense. In International Conference on Decision and Game Theory for Security; Springer: New York, NY, USA, 2013; Volume 8252, pp. 246–263. [Google Scholar]
  37. Fan, C.; Liu, Z.; Lu, X.; Xiu, B.; Chen, Q. An efficient link prediction index for complex military organization. Phys. A Stat. Mech. Appl. 2017, 469, 572–587. [Google Scholar]
Figure 1. A typical IoBT network with high situational awareness capability. The intelligent devices on the battlefield can exchange data and share critical information through D2D communications, and the directed edges indicate the propagation direction of data or information in the network. The enemy can selectively destroy specific channels and packets, resulting in the deletion of communication links in the network.
Figure 1. A typical IoBT network with high situational awareness capability. The intelligent devices on the battlefield can exchange data and share critical information through D2D communications, and the directed edges indicate the propagation direction of data or information in the network. The enemy can selectively destroy specific channels and packets, resulting in the deletion of communication links in the network.
Entropy 22 01166 g001
Figure 2. Three edge types between two nodes in a directed network. Node 1 and Node 2 both have edges pointing to each other, so the corresponding edge type is a bidirectional edge. There is only one edge between Node 3 and Node 4, and the corresponding edge type is a unidirectional edge. There is no edge between Node 1 and Node 3. The right side of this figure shows the adjacency matrix, which is an asymmetric matrix.
Figure 2. Three edge types between two nodes in a directed network. Node 1 and Node 2 both have edges pointing to each other, so the corresponding edge type is a bidirectional edge. There is only one edge between Node 3 and Node 4, and the corresponding edge type is a unidirectional edge. There is no edge between Node 1 and Node 3. The right side of this figure shows the adjacency matrix, which is an asymmetric matrix.
Entropy 22 01166 g002
Figure 3. Illustration of the change of the largest strongly connected component LSCC after the directed network is attacked. There is a path between any pair of nodes in the largest strongly connected component. After the two edges (3,1) and (4,1) in the initial network are removed, Node 3 and Node 4 are separated from the largest strongly connected component and become failed nodes (marked in red), while Node 1, Node 2, and Node 5 constitute the new largest strongly connected component (marked in blue).
Figure 3. Illustration of the change of the largest strongly connected component LSCC after the directed network is attacked. There is a path between any pair of nodes in the largest strongly connected component. After the two edges (3,1) and (4,1) in the initial network are removed, Node 3 and Node 4 are separated from the largest strongly connected component and become failed nodes (marked in red), while Node 1, Node 2, and Node 5 constitute the new largest strongly connected component (marked in blue).
Entropy 22 01166 g003
Figure 4. The disintegration effect Φ versus the directed edge deleting fraction f with various edge attack strategies in directed scale-free networks S F E q , N , m , λ , q and directed random network E R E q , N , p , q . Tabu, Genetic, SOD, SID, SOID and EBC represent the strategies based on tabu search, genetic algorithm, sum of out-degree, sum of in-degree, sum of out-degree and in-degree, and edge betweenness centrality respectively. To eliminate the influence of randomness on the results, each quantity is an average over 100 independent experiments. (a) The disintegration effect on SF network with q = 0.2 . (b) The disintegration effect on SF network with q = 0.5 . (c) The disintegration effect on SF network with q = 0.8 . (d) The disintegration effect on ER network with q = 0.2 . (e) The disintegration effect on ER network with q = 0.5 . (f) The disintegration effect on ER network with q = 0.8 .
Figure 4. The disintegration effect Φ versus the directed edge deleting fraction f with various edge attack strategies in directed scale-free networks S F E q , N , m , λ , q and directed random network E R E q , N , p , q . Tabu, Genetic, SOD, SID, SOID and EBC represent the strategies based on tabu search, genetic algorithm, sum of out-degree, sum of in-degree, sum of out-degree and in-degree, and edge betweenness centrality respectively. To eliminate the influence of randomness on the results, each quantity is an average over 100 independent experiments. (a) The disintegration effect on SF network with q = 0.2 . (b) The disintegration effect on SF network with q = 0.5 . (c) The disintegration effect on SF network with q = 0.8 . (d) The disintegration effect on ER network with q = 0.2 . (e) The disintegration effect on ER network with q = 0.5 . (f) The disintegration effect on ER network with q = 0.8 .
Entropy 22 01166 g004
Figure 5. Under the optimal edge attack strategy, the amounts of three typical attack modes will change with the directed edge deleting fraction f and the proportion of unidirectional edges q, which are Mode 1 (blue color bar), Mode 2 (red-brown color bar), and Mode 3 (cyan color bar). (a) Directed scale-free networks S F E q , N = 200 , m = 3 , λ = 2.8 , q and (b) directed random network E R E q , N = 200 , p = 0.03 , q .
Figure 5. Under the optimal edge attack strategy, the amounts of three typical attack modes will change with the directed edge deleting fraction f and the proportion of unidirectional edges q, which are Mode 1 (blue color bar), Mode 2 (red-brown color bar), and Mode 3 (cyan color bar). (a) Directed scale-free networks S F E q , N = 200 , m = 3 , λ = 2.8 , q and (b) directed random network E R E q , N = 200 , p = 0.03 , q .
Entropy 22 01166 g005
Figure 6. The disintegration effect Φ versus the directed edge deleting fraction f with various edge attack strategies in real military networks M i l i t a r y N e t w o r k E q , N , q . Tabu, SOD, SID, SOID and EBC represent the strategies based on tabu search, sum of out-degree, sum of in-degree, sum of out-degree and in-degree, and edge betweenness centrality, respectively. To eliminate the influence of randomness on the results, each quantity is an average over 100 independent experiments. (a) The disintegration effect on military network with q = 0.2 . (b) The disintegration effect on military network with q = 0.5 . (c) The disintegration effect on military network with q = 0.8 .
Figure 6. The disintegration effect Φ versus the directed edge deleting fraction f with various edge attack strategies in real military networks M i l i t a r y N e t w o r k E q , N , q . Tabu, SOD, SID, SOID and EBC represent the strategies based on tabu search, sum of out-degree, sum of in-degree, sum of out-degree and in-degree, and edge betweenness centrality, respectively. To eliminate the influence of randomness on the results, each quantity is an average over 100 independent experiments. (a) The disintegration effect on military network with q = 0.2 . (b) The disintegration effect on military network with q = 0.5 . (c) The disintegration effect on military network with q = 0.8 .
Entropy 22 01166 g006
Figure 7. Three attack modes versus the directed edge deleting fraction f under the optimal attack strategy in real military networks M i l i t a r y N e t w o r k E q , N , q . Mode 1 represents that the unidirectional edge is attacked. Mode 2 represents that only one unidirectional edge in the bidirectional edge is attacked. And Mode 3 represents that both unidirectional edges in the bidirectional edge are attacked. (a) Three attack modes on the military network with q = 0.2 . (b) Three attack modes on the military network with q = 0.5 . (c) Three attack modes on the military network with q = 0.8 .
Figure 7. Three attack modes versus the directed edge deleting fraction f under the optimal attack strategy in real military networks M i l i t a r y N e t w o r k E q , N , q . Mode 1 represents that the unidirectional edge is attacked. Mode 2 represents that only one unidirectional edge in the bidirectional edge is attacked. And Mode 3 represents that both unidirectional edges in the bidirectional edge are attacked. (a) Three attack modes on the military network with q = 0.2 . (b) Three attack modes on the military network with q = 0.5 . (c) Three attack modes on the military network with q = 0.8 .
Entropy 22 01166 g007
Table 1. Standard deviation of results obtained by tabu search algorithm.
Table 1. Standard deviation of results obtained by tabu search algorithm.
f = 0.1 f = 0.2 f = 0.3 f = 0.4 f = 0.5 f = 0.6 f = 0.7 f = 0.8 f = 0.9
SF q = 0.2 0.01340.01920.02350.02720.03090.031730.00530.00330.0021
SF q = 0.5 0.01350.02410.02560.03440.03560.00760.00310.00180.0024
SF q = 0.8 0.01330.02170.02790.02560.00620.00340.00190.00200.0007
ER q = 0.2 0.01230.01640.02520.03000.05700.00930.00400.00220.0022
ER q = 0.5 0.01430.02380.03400.08310.00890.00450.00250.00050.0019
ER q = 0.8 0.02100.05720.02020.00710.00400.00290.00050.00220.0005
Table 2. Standard deviation of results obtained by genetic algorithm.
Table 2. Standard deviation of results obtained by genetic algorithm.
f = 0.1 f = 0.2 f = 0.3 f = 0.4 f = 0.5 f = 0.6 f = 0.7 f = 0.8 f = 0.9
SF q = 0.2 0.00430.00340.00880.00880.01190.01420.02540.00630.0025
SF q = 0.5 0.01050.01420.01080.01130.01530.02130.03440.00120.0000
SF q = 0.8 0.01170.01350.01550.01610.01740.03130.00530.00210.0000
ER q = 0.2 0.00340.00710.00780.01060.01200.02630.01520.00000.0022
ER q = 0.5 0.00480.01190.00930.01540.02560.05120.00100.00000.0000
ER q = 0.8 0.00780.01200.02350.03240.06000.00250.00000.00180.0000
Table 3. The basic topological features of the military network. Basic topological features include the number of nodes N, the number of edges E, the average degree k , the average shortest path length d , the assortative coefficient r and the clustering coefficient C.
Table 3. The basic topological features of the military network. Basic topological features include the number of nodes N, the number of edges E, the average degree k , the average shortest path length d , the assortative coefficient r and the clustering coefficient C.
NetworkNE k d rC
Military Network891503.4838.1130.27540.094
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Feng, Y.; Li, M.; Zeng, C.; Liu, H. Robustness of Internet of Battlefield Things (IoBT): A Directed Network Perspective. Entropy 2020, 22, 1166. https://0-doi-org.brum.beds.ac.uk/10.3390/e22101166

AMA Style

Feng Y, Li M, Zeng C, Liu H. Robustness of Internet of Battlefield Things (IoBT): A Directed Network Perspective. Entropy. 2020; 22(10):1166. https://0-doi-org.brum.beds.ac.uk/10.3390/e22101166

Chicago/Turabian Style

Feng, Yuan, Menglin Li, Chengyi Zeng, and Hongfu Liu. 2020. "Robustness of Internet of Battlefield Things (IoBT): A Directed Network Perspective" Entropy 22, no. 10: 1166. https://0-doi-org.brum.beds.ac.uk/10.3390/e22101166

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop