DOI QR코드

DOI QR Code

Robustness Evaluation of Tactical Network based on SNA

  • Park, Ji-Hye (Dept. of Computer Science, Korea National Defense University) ;
  • Yoon, Soung-woong (Dept. of Computer Science, Korea National Defense University) ;
  • Lee, Sang-Hoon (Dept. of Computer Science, Korea National Defense University)
  • Received : 2019.08.07
  • Accepted : 2019.09.16
  • Published : 2019.10.31

Abstract

Network robustness is one of the most important characteristics needed as the network. Over the military tactical communication network, robustness is a key function for maintaining attack phase constantly. Tactical Information Communication Network, called TICN, has mixed characteristics of lattice- and tree-type network topology, which looks somewhat weak in the viewpoint of network robustness. In this paper, we search articulation points and bridges in a current Tactical Information Communication Network using graph theory. To improve the weak points empirically searched, we try to add links to create the concrete network and then observe the change of network-based verification values through diminishing nodes. With these themes, we evaluate the generated networks through SNA techniques. Experimental results show that the generated networks' robustness is improved compared with current network structure.

네트워크 강건성은 네트워크의 가장 중요한 요구특성 중 하나이다. 전술 통신 네트워크에서 강건성은 공격 단계를 지속적으로 유지하는 핵심 기능이다. TICN이라고 하는 육군의 전술 통신 네트워크는 격자형과 트리형 네트워크 토폴로지가 혼합되어 있으며, 트리형 구조는 네트워크 강건성에서 다소 약하다. 따라서 본 논문에서는 그래프 이론을 적용하여 현재 전술 통신 네트워크의 취약점인 단절점과 브리지를 탐색하고 이 부분을 개선하기 위해 기존 네트워크에 링크를 추가하여 네트워크를 생성한다. 이후 SNA 기반 네트워크 강건성 평가를 위해 핵심 노드를 단절하여 각 네트워크의 지표 변화를 관찰한다. 실험 결과, 보완된 네트워크의 강건성이 기존 운용개념 하의 네트워크 구조보다 개선되었음을 보여준다.

Keywords

References

  1. ROK ARMY Information Communication School, "Description for Operational Concepts of TICN", 2007.
  2. K.T Kim, J.M Song, "Robustness Assessment of the Road Network in Seoul Using Changes in Average Path Time", Seoul city Research, Vol. 18, No. 2, pp.81-93, 2017. 6
  3. D.S Kim, G.W Park, S.H Lee "An Algorithm for Evaluating Effects of the C4I System Network based on SNA", Journal of KISS, Vol. 40, No. 4, pp. 243-250, 2013.
  4. ROK Army Headquarter, "TICN", July. 2017
  5. H. Dekker, D. Colbert, "Network Robustness and Gragh Topology," 27th Australasian Computer Science Conference, Volume 26. pp. 359-368, 2004.
  6. Jing LIU , Mingxing ZHOU, Shuai WANG, Penghui LIU, "A comparative study of network robustness measures", Springer-Verlag Berlin Heidelberg, May, 2017.
  7. Li Li, Qing-Shan Jia, Xiaohong Guan and Hengtao Wang, "Enhancing the Robustness and Efficiency of scale-free Network with Limited Link Addition," Journal of KSII, vol.6, no.5, May. 2012.
  8. Y. Jeong "Design and Implementation of Articulation Node Search System for the Improvement of Network Weak Point" Sungkyunkwan University, 2011.
  9. Cyram Inc, "Netminer Module Reference", Ver.4.3, 2017.
  10. Y. H. Kim, "Social Network Analysis", PARKYOUNGSA, 2011.
  11. S.S. Lee, Social Network Analysis Methods, Seoul : NonHyeong, 2012.
  12. A.H Dekker, C4ISR Architectures, Social Network Analysis and the FINC Methodology: An Experiment in Military Organisational Structure, Inter report, 2002.
  13. J.T Jeon, G.W Park, S.H Lee, "C2 System Visualization based on Social Network Analysis Method", Journal of the Korea Society of Computer and Information, Volume 37, No.1, pp 94-48, 2010. 6
  14. J.H Won, G.W Park, S.H. Lee, "Arms Value Algorithm: Identifying Core Node using Social Network Analysis in C2 System", pp 569-573, KIISE, 2011.
  15. S. B. Kim, "Search of Network Theory of World Politics", Korean Journal of International Studies, volume 48, No.4, pp.35-61, 2008.
  16. Harary, F. " Graph Theory". Reading, MA, Addison-Wesley. p. 43, 1969.
  17. S.J. Lee, H.S. Kim, "A Study on the Robustness of the Bitcoin Lightning Network", Korea Institute of Information Security and Cryptology, Volume 28, No.4, pp 1,009-1,019, 2018. 8
  18. C.K Jeong, C.G Han, S.H Lee, "Analysis of the network robustness based on the centrality of vertices in the graph", Journal of the Korea Society of Computer and Information, Volume 22, No.3, pp 61-67, 2017. 3 https://doi.org/10.9708/jksci.2017.22.03.061