• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

战场物联网(IoBT)的稳健性:基于有向网络的视角

Robustness of Internet of Battlefield Things (IoBT): A Directed Network Perspective.

作者信息

Feng Yuan, Li Menglin, Zeng Chengyi, Liu Hongfu

机构信息

College of Intelligence Science and Technology, National University of Defense Technology, Changsha 410073, China.

出版信息

Entropy (Basel). 2020 Oct 16;22(10):1166. doi: 10.3390/e22101166.

DOI:10.3390/e22101166
PMID:33286935
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7597337/
Abstract

Through the combination of various intelligent devices and the Internet to form a large-scale network, the Internet of Things (IoT) realizes real-time information exchange and communication between devices. IoT technology is expected to play an essential role in improving the combat effectiveness and situation awareness ability of armies. The interconnection between combat equipment and other battlefield resources is referred to as the Internet of Battlefield Things (IoBT). Battlefield real-time data sharing and the cooperative decision-making among commanders are highly dependent on the connectivity between different combat units in the network. However, due to the wireless characteristics of communication, a large number of communication links are directly exposed in the complex battlefield environment, and various cyber or physical attacks threaten network connectivity. Therefore, the ability to maintain network connectivity under adversary attacks is a critical property for the IoBT. In this work, we propose a directed network model and connectivity measurement of the IoBT network. Then, we develop an optimal attack strategy optimization model to simulate the optimal attack behavior of the enemy. By comparing with the disintegration effect of some benchmark strategies, we verify the optimality of the model solution and find that the robustness of the IoBT network decreases rapidly with an increase of the unidirectional communication links in the network. The results show that the adversary will change the attack mode according to the parameter settings of attack resources and network communication link density. In order to enhance the network robustness, we need to adjust the defense strategy in time to deal with this change. Finally, we validated the model and theoretical analysis proposed in this paper through experiments on a real military network.

摘要

通过各种智能设备与互联网相结合形成大规模网络,物联网(IoT)实现了设备之间的实时信息交换与通信。预计物联网技术在提高军队战斗力和态势感知能力方面将发挥重要作用。作战装备与其他战场资源之间的互联被称为战场物联网(IoBT)。战场实时数据共享以及指挥官之间的协同决策高度依赖于网络中不同作战单元之间的连通性。然而,由于通信的无线特性,大量通信链路直接暴露在复杂的战场环境中,各种网络或物理攻击威胁着网络连通性。因此,在敌方攻击下维持网络连通性的能力是战场物联网的一项关键属性。在这项工作中,我们提出了一种战场物联网网络的有向网络模型和连通性度量。然后,我们开发了一个最优攻击策略优化模型来模拟敌方的最优攻击行为。通过与一些基准策略的瓦解效果进行比较,我们验证了模型解的最优性,并发现随着网络中单向通信链路数量的增加,战场物联网网络的鲁棒性迅速下降。结果表明,敌方会根据攻击资源的参数设置和网络通信链路密度改变攻击模式。为了增强网络鲁棒性,我们需要及时调整防御策略以应对这种变化。最后,我们通过在真实军事网络上进行实验验证了本文提出的模型和理论分析。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/771b/7597337/d3563169d52a/entropy-22-01166-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/771b/7597337/e7b7db119cc7/entropy-22-01166-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/771b/7597337/e5003a3d3e78/entropy-22-01166-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/771b/7597337/fa5419a9b3b7/entropy-22-01166-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/771b/7597337/b124ef919a47/entropy-22-01166-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/771b/7597337/8b8af07dbdc7/entropy-22-01166-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/771b/7597337/1a41ecffea2f/entropy-22-01166-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/771b/7597337/d3563169d52a/entropy-22-01166-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/771b/7597337/e7b7db119cc7/entropy-22-01166-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/771b/7597337/e5003a3d3e78/entropy-22-01166-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/771b/7597337/fa5419a9b3b7/entropy-22-01166-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/771b/7597337/b124ef919a47/entropy-22-01166-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/771b/7597337/8b8af07dbdc7/entropy-22-01166-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/771b/7597337/1a41ecffea2f/entropy-22-01166-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/771b/7597337/d3563169d52a/entropy-22-01166-g007.jpg

相似文献

1
Robustness of Internet of Battlefield Things (IoBT): A Directed Network Perspective.战场物联网(IoBT)的稳健性:基于有向网络的视角
Entropy (Basel). 2020 Oct 16;22(10):1166. doi: 10.3390/e22101166.
2
Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques.基于欺骗技术的 IoBT 网络位置隐私保护方案。
Sensors (Basel). 2023 Mar 15;23(6):3142. doi: 10.3390/s23063142.
3
Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things.迈向基于深度学习驱动的物联网入侵检测
Sensors (Basel). 2019 Apr 27;19(9):1977. doi: 10.3390/s19091977.
4
Securing Bio-Cyber Interface for the Internet of Bio-Nano Things using Particle Swarm Optimization and Artificial Neural Networks based parameter profiling.利用粒子群优化和基于人工神经网络的参数分析技术,为生物纳米事物互联网保障生物-网络接口安全。
Comput Biol Med. 2021 Sep;136:104707. doi: 10.1016/j.compbiomed.2021.104707. Epub 2021 Jul 31.
5
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks.一种面向服务质量感知的物联网网络安全通信方案。
Sensors (Basel). 2019 Oct 6;19(19):4321. doi: 10.3390/s19194321.
6
A Multi-Hop Clustering Mechanism for Scalable IoT Networks.一种用于可扩展物联网网络的多跳聚类机制。
Sensors (Basel). 2018 Mar 23;18(4):961. doi: 10.3390/s18040961.
7
A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications.用于物联网应用的异构无线传感器网络中恶意数据注入攻击检测的随机水印技术
Sensors (Basel). 2018 Dec 9;18(12):4346. doi: 10.3390/s18124346.
8
Development of Virtual Resource Based IoT Proxy for Bridging Heterogeneous Web Services in IoT Networks.基于虚拟资源的物联网代理的开发,用于弥合物联网网络中异构 Web 服务之间的差距。
Sensors (Basel). 2018 May 26;18(6):1721. doi: 10.3390/s18061721.
9
Drawing Inspiration from Human Brain Networks: Construction of Interconnected Virtual Networks.从人类大脑网络中汲取灵感:构建互联的虚拟网络。
Sensors (Basel). 2018 Apr 8;18(4):1133. doi: 10.3390/s18041133.
10
Systematic Analysis of a Military Wearable Device Based on a Multi-Level Fusion Framework: Research Directions.基于多层次融合框架的军用可穿戴设备系统分析:研究方向。
Sensors (Basel). 2019 Jun 12;19(12):2651. doi: 10.3390/s19122651.

引用本文的文献

1
Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions.基于虫洞后行为的无线自组织网络中虫洞节点的检测与隔离
Sci Rep. 2024 Feb 10;14(1):3428. doi: 10.1038/s41598-024-53938-9.

本文引用的文献

1
Optimal disintegration strategy in multiplex networks.多重网络中的最优解体策略
Chaos. 2018 Dec;28(12):121104. doi: 10.1063/1.5078449.
2
Attack vulnerability of complex networks.复杂网络的攻击脆弱性。
Phys Rev E Stat Nonlin Soft Matter Phys. 2002 May;65(5 Pt 2):056109. doi: 10.1103/PhysRevE.65.056109. Epub 2002 May 7.