CN112530206A - Air traffic network vulnerability analysis method - Google Patents

Air traffic network vulnerability analysis method Download PDF

Info

Publication number
CN112530206A
CN112530206A CN202011350533.4A CN202011350533A CN112530206A CN 112530206 A CN112530206 A CN 112530206A CN 202011350533 A CN202011350533 A CN 202011350533A CN 112530206 A CN112530206 A CN 112530206A
Authority
CN
China
Prior art keywords
network
node
air traffic
nodes
dependent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011350533.4A
Other languages
Chinese (zh)
Other versions
CN112530206B (en
Inventor
田文
杨九洲
尹嘉男
杨磊
胡明华
张洪海
刘皞
方琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Aeronautics and Astronautics
Original Assignee
Nanjing University of Aeronautics and Astronautics
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Aeronautics and Astronautics filed Critical Nanjing University of Aeronautics and Astronautics
Priority to CN202011350533.4A priority Critical patent/CN112530206B/en
Publication of CN112530206A publication Critical patent/CN112530206A/en
Application granted granted Critical
Publication of CN112530206B publication Critical patent/CN112530206B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G5/00Traffic control systems for aircraft, e.g. air-traffic control [ATC]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/20Design optimisation, verification or simulation

Abstract

The invention belongs to the technical field of air traffic network analysis, and particularly relates to an air traffic network vulnerability analysis method, which comprises the following steps: constructing an air traffic dependent network and acquiring the characteristics of the air traffic dependent network; and performing vulnerability analysis according to the air traffic dependent network, unifying related sub-networks (airports, air routes and control sectors) in the air traffic network, deeply exploring complex network attributes of the sub-networks, and then constructing a model analysis research network of the air traffic dependent network by means of a complex network theory according to an air traffic management rule and giving a reasonable optimization suggestion.

Description

Air traffic network vulnerability analysis method
Technical Field
The invention belongs to the technical field of air traffic network analysis, and particularly relates to an air traffic network vulnerability analysis method.
Background
The key stage is reached along with the realization of the strategic idea of 'advancing from the large country of civil aviation to the strong country of civil aviation', the airspace is gradually opened, the air route is increasingly complex, the traffic volume is continuously increased, and the flight jam is diffused to the air route from the airport, thereby causing the large-area delay of the flight. The method is based on the complex network theory, is sent from the perspective of the air traffic network, systematically studies the structural characteristics and the vulnerability of the air traffic network, is favorable for guaranteeing the stable operation of the air traffic, and improves the civil aviation service quality level.
In the past, the strategy for optimizing the air traffic system mainly relates to the perfection of sectors, route planning, flight sequencing and the like. Although the operation efficiency of a local area or a certain sector can be enhanced to a certain extent through scientific implementation of the strategies, the research range is small, and the method has certain limitations. The air traffic jam does not only exist in a certain airspace and a corresponding sector range, but also generates more jam points and even causes the jam of a plurality of airspaces. Therefore, the improvement of the air traffic operation efficiency needs to take general consideration of airports, air routes and control sectors from the whole and carry out deep analysis on the airports, the air routes and the control sectors from the system level.
In the process of researching the air traffic network, the use of a complex network theory is extremely important. When the vulnerability of the airport network is analyzed, a corresponding drop-off airport can be selected, and flight delay is reduced; when analyzing the route network, one or more points on the route which are the weakest can be obtained, so that corresponding measures are taken to eliminate the fragile nodes; when the network of the control sector is analyzed, key sectors or sectors which are about to cause influence can be managed in advance, and the adverse influence of the load redistribution strategy on the network is reduced, so that flight delay is reduced. Therefore, the research on the structure and the operation mechanism of the air traffic operation system from the perspective of a complex network improves the operation efficiency of the aircraft and scientifically optimizes flight delay and the air transportation system on the basis of ensuring aviation safety, and becomes a key issue for the development of civil aviation industry.
Therefore, a new method for analyzing the vulnerability of the air traffic network needs to be designed based on the above technical problems
Disclosure of Invention
The invention aims to provide an air traffic network vulnerability analysis method.
In order to solve the technical problem, the invention provides an air traffic network vulnerability analysis method, which comprises the following steps:
constructing an air traffic dependent network and acquiring the characteristics of the air traffic dependent network; and
and carrying out vulnerability analysis according to the air traffic dependent network.
Further, the method for constructing the air traffic dependent network and acquiring the characteristics of the air traffic dependent network comprises the following steps:
construction of air traffic dependent networks, i.e.
According to the operation relation of traffic flow among the airport network, the air route network and the control sector network, constructing an air traffic dependent network G0 which is { G, e };
wherein G is a set of an airport network, a route network and a control sector network, and G is { G1, G2, G3 }; e is the set of 3 pairs of inter-layer network edges, E ═ E12, E13, E23;
e12 is the connecting edge of the airport network and the air route network;
e13 is the connecting edge of the airport network and the control sector network;
e23 is the connection edge between the air route network and the control sector network.
Further, the method for constructing the air traffic dependent network and acquiring the characteristics of the air traffic dependent network further comprises:
obtaining characteristics of air traffic dependent networks, i.e.
And acquiring the network diameter, the maximum degree, the average shortest path length, the average degree and the average cluster coefficient according to the topological structure of the air traffic dependent network.
Further, the method for performing vulnerability analysis according to the air traffic dependent network comprises the following steps:
vulnerability attack style selection, i.e.
And selecting selective attack or random attack.
Further, the method for performing vulnerability analysis according to the air traffic dependent network further comprises the following steps:
modeling cascading failures, i.e.
According to the relation between the capacity and the load of the node i at the moment t, three states of the node are set: the node is normal, the node is partially failed, and the node is completely failed;
the node normally operates normally when the node capacity is larger than the load at the moment;
the node is partially failed, namely the node capacity is smaller than the load at the moment, and the node capacity is in an oversaturation state and cannot accept the loads from other nodes;
the complete failure of the node is that the node is out of function, and the original load of the node is redistributed to other nodes.
Further, the method for performing vulnerability analysis according to the air traffic dependent network further comprises the following steps:
partitioning cascade failure stages, i.e.
The cascade failure of the air traffic dependent network is divided into four stages:
the method comprises a network normal operation stage, a node attacked failure stage, a cascade failure propagation stage and a failure ending stage.
Further, the method for performing vulnerability analysis according to the air traffic dependent network further comprises the following steps:
air traffic dependent network vulnerability analysis based on cascading failures, i.e.
Analyzing the vulnerability of the air traffic dependent network failure process according to the network flow entropy and the traffic flow overrun ratio;
the network traffic entropy n (t) is:
Figure BDA0002801150360000031
Figure BDA0002801150360000041
wherein r isiThe ratio of the traffic flow of the node i to the total network traffic flow is node flow distribution; liA traffic flow for node i;
the traffic flow overrun ratio LR is as follows:
Figure BDA0002801150360000042
wherein t (q) is the traffic flow beyond the network when the node with the attack proportion of q is used; t (q) is the total traffic flow of the attacked node.
Further, the method for performing vulnerability analysis according to the air traffic dependent network further comprises the following steps:
analyzing the structural vulnerability of air traffic dependent networks based on network structural entropy and network efficiency, i.e.
The network structure entropy M is:
Figure RE-GDA0002852646610000043
Figure BDA0002801150360000044
where N is the number of nodes in the network under study, IiIs the importance of node i; k is a radical ofiIs the value of node i; the network efficiency F is:
Figure BDA0002801150360000045
wherein d isijIs the shortest path length from the node i to the node j, if the node i is not communicated with the node j, dijInfinity, +,; g is a set of air traffic dependent networks.
Further, the method for performing vulnerability analysis according to the air traffic dependent network further comprises the following steps:
obtaining node influence evaluation indexes to evaluate influence of nodes of the air traffic dependent network, i.e.
The influence among the nodes is H (i, j), the node i passes through a path with the length of k to the node j, the number of the passed nodes is the influence of the node i on the k-step path of the node j, and is Hk(i,j):
Figure BDA0002801150360000051
Wherein A (i, j) is the 1-step path inter-node influence of node i on node j, namely H1(i,j);
And f (i), which is the sum of the influence from the node i to all nodes in the network, and when the path length is k, the path is called as k-step path node integral influence:
Figure BDA0002801150360000052
the evaluation index of the node influence is AC (i), and the sum of the ratios of the normalized overall influence of the k-step path nodes to the path length k is marked as follows:
Figure BDA0002801150360000053
Figure BDA0002801150360000054
wherein, ufk(i) Is fk(i) The normalization processing of (1);
the higher the value of the node influence evaluation index of the node in the air traffic dependent network is, the higher the importance degree of the node is.
The invention has the advantages that the invention constructs the air traffic dependent network and obtains the characteristics of the air traffic dependent network; and performing vulnerability analysis according to the air traffic dependent network, unifying related sub-networks (airports, air routes and control sectors) in the air traffic network, deeply exploring the complex network attributes, then constructing a model analysis of the air traffic dependent network by means of a complex network theory according to the air traffic management rule, researching the vulnerability of the network and providing a reasonable optimization suggestion.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and drawings.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart of an air traffic network vulnerability analysis method in accordance with the present invention;
FIG. 2 is a schematic diagram of an airport network in east China to which the present invention relates;
FIG. 3 is a schematic diagram of a network of paths in east China according to the present invention;
FIG. 4 is a schematic diagram of a sector network in east China to which the present invention relates;
FIG. 5 is a schematic diagram of an air traffic dependent network model in accordance with the present invention;
FIG. 6 is a detailed flow chart of the method for analyzing vulnerability of air traffic dependent network according to the present invention;
FIG. 7 is a flow chart of a method for analyzing cascade failure vulnerability of an air traffic dependent network according to the present invention;
FIG. 8 is a schematic diagram of an AC algorithm in accordance with the present invention;
FIG. 9 is a schematic diagram of the variation of air traffic dependent network efficiency for attacking airport network nodes using different attack methods in accordance with the present invention;
FIG. 10 is a schematic diagram of the variation of air traffic dependent network efficiency for attacking airway network nodes using different attack methods in accordance with the present invention;
FIG. 11 is a schematic diagram of the change in air traffic dependent network efficiency for attacking a sector network node using different attack methods in accordance with the present invention;
FIG. 12 is a schematic diagram of the change of the entropy of the air traffic dependent network structure when different attack methods are used to attack airport network nodes in accordance with the present invention;
FIG. 13 is a schematic diagram of the variation of the entropy of the air traffic dependent network structure for attacking airway network nodes using different attack methods in accordance with the present invention;
FIG. 14 is a schematic diagram of the change of the entropy of the air traffic dependent network structure when different attack methods are used to attack the network nodes of the sector according to the present invention;
FIG. 15 is a schematic view of a network topology model of a portion of airports in the east China area in accordance with the present invention;
FIG. 16 is a schematic diagram of a skyheart VOR-Pudong VOR airway network topology model according to the present invention.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the scope of protection of the present invention.
Fig. 1 is a flow chart of an air traffic network vulnerability analysis method according to the present invention.
As shown in fig. 1, the present embodiment provides an air traffic network vulnerability analysis method, including: constructing an air traffic dependent network and acquiring the characteristics of the air traffic dependent network; and performing vulnerability analysis according to the air traffic dependent network, unifying related sub-networks (an airport network, a route network and a control sector network) in the air traffic network, deeply exploring complex network attributes of the networks, then constructing the air traffic dependent network by means of a complex network theory according to air traffic management rules, mainly relating to the airport, route and sector network, determining network characteristic indexes such as degree, strength, average path length, clustering coefficients and the like corresponding to the complex network and two vulnerability evaluation indexes such as network efficiency and network structure entropy, and analyzing the network cascade failure process.
FIG. 2 is a schematic diagram of an airport network in east China to which the present invention relates;
FIG. 3 is a schematic diagram of a network of paths in east China according to the present invention;
fig. 4 is a schematic diagram of a sector network in east china according to the present invention.
The airport is used as a starting point and an end point of the flight activity of the aircraft, is an important field of the flight activity, the airport is used as a network node, the airports with flight operation between the airports are connected in pairs to construct a connecting edge to form an airport network, and the position of the airport network node is the geographic coordinate of an airport reference point, namely the midpoint geographic coordinate of the central line of a main runway of the airport; in this embodiment, an airport network (as shown in fig. 2) is constructed by flight operation data in east China, the established airport network comprises 44 nodes and 246 sides in total, a circle in the airport network represents an airport node, the size of the point represents the relative size of all-year passenger throughput of an airport, a solid line represents that flight communication exists between two airports, and the airport network graph can obviously show that the airports in east China are densely distributed, densely arranged on routes and complicated in airspace, and as can be seen from the airport network graph, the value of the airport network node is related to the size of the passenger throughput, and generally speaking, the value of the airport node is larger for airports with larger all-year passenger throughput.
The air route is an air channel which is uniformly defined by the country, has ground navigation facilities and has a certain width; taking the ground navigation stations as corresponding route network nodes, wherein corresponding route sections among different navigation stations are actually connecting edges in the network, and thus, a corresponding route network is created; in order to facilitate the construction and analysis of the network, the node coordinates are projected into a two-dimensional plane without considering the height, the shape and the width of the air route; the method does not consider the diversion or off-course of the aircraft due to the reasons of the weather, military activities and the like; the route network is regarded as a non-directional network, namely the aircraft can carry out back-and-forth activities between two route points; in this embodiment, a route network including 206 nodes and 259 edges is established based on airspace route data in east China (as shown in fig. 3).
In order to reasonably utilize an airspace, improve air traffic service capacity and accelerate safe and orderly operation of air traffic, a control unit usually divides the airspace into a plurality of sectors; dividing a control sector into an airport tower control area, a terminal (approach) control area, a medium and low altitude control area and a high altitude control area according to the flight altitude of the aircraft; in order to facilitate the construction and analysis of a sector network (a control sector network), the height and the shape of a sector are not considered, a sector boundary line is projected to a two-dimensional plane, and a sector node is the central point of each sector; the sector network is regarded as a non-directional network, namely, the aircraft takes off and enters a terminal (approach) control sector from an airport tower control sector, the aircraft continuously climbs and enters a regional control sector, and the aircraft can also enter the airport tower control sector along the opposite path when landing; in this embodiment, a sector network including 57 nodes and 171 edges is established based on sector data regulated in the central and south regions of China (as shown in fig. 4).
Fig. 5 is a schematic diagram of an air traffic dependent network model according to the present invention.
In this embodiment, the method for constructing the air traffic dependent network and acquiring the characteristics of the air traffic dependent network includes: constructing an air traffic dependent network, namely constructing an air traffic dependent network G0 (G, e) according to the operation relation of traffic flow among an airport network, a route network and a control sector network and a dependent network association method (as shown in figure 5); wherein G is a set of an airport network, a route network and a control sector network, and G is { G1, G2, G3 }; e is the set of 3 pairs of inter-layer network edges, E ═ E12, E13, E23; e12 is the connecting edge of the airport network and the route network, the aircraft enters the route point from the takeoff phase and the aircraft enters the airport control area from the last approach route point in the landing phase, and the connecting edge between the corresponding airport node and the route point is E12; e13 is the connecting edge of the airport network and the control sector network, according to the air traffic management rule, after the aircraft leaves the ground from the runway, the aircraft generally flies according to the standard instrument departure procedure, and the climbing stage is directed by the controller entering the control area; during the approach descent phase, the aircraft typically approaches and lands according to standard instrument approach procedures, which are also governed by the approach sector. On the contrary, when the airport runway is busy or the airport has special conditions, the airport can also feed back information to the control sector to enable the entering aircraft to hover and wait in the air; therefore, the sector network node can be connected with the airport network node which has the control command right to construct a connecting edge E13; e23 is the connection edge of the air route network and the control sector network, the connection of the air route and the control sector network has close relation with the sector control area, the corresponding air route point and the sector polygon are projected on the ground, and the air route point in the sector two-dimensional projection is controlled by the sector; on the contrary, when the aircraft passes through the waypoints, information feedback is generated for the corresponding control sector, for example, if a certain waypoint in the airspace is busy, the corresponding sector can reduce the interval of the aircraft reaching the waypoint on the premise of ensuring flight safety; therefore, the network node of the control sector is connected with the network node of the air route controlled by the network node of the control sector to form a connecting edge E23.
In this embodiment, the method for constructing the air traffic dependent network and acquiring the characteristics of the air traffic dependent network further includes: acquiring the characteristics of the air traffic dependent network, namely acquiring the network diameter, the maximum degree, the average shortest path length, the average degree and the average cluster coefficient according to the topological structure of the air traffic dependent network; the airport is used as the starting point and the terminal point of all civil aviation flight activities and is an important field of the aviation activities; the air route is an air channel with a certain width and is arranged by an air management department; the control sector network covers the whole airspace so as to realize command and scheduling of each flight in the airspace; selecting several measurement indexes of network diameter, maximum degree, average shortest path length, average degree and average clustering coefficient for quantitative analysis of topological structure of each layer of network; taking the east China as an example, the topological structure index of each network is calculated, and the results shown in table 1 are obtained:
table 1: air traffic dependent network topological structure index in east China
Figure BDA0002801150360000101
For an airport network, the average degree is 12.3, which means that each node is approximately connected with other 12 nodes on average, the communication among the nodes is more, and the network connectivity is better; the diameter of the airport network is 4, which means that a flight can reach any airport in the network through 4 airports at most, and means that a passenger can travel in any two cities in east China by taking 4 flights at most; the average shortest path length of the airport network is 1.91, which means that the connection of any two airports in the whole network needs 2 flights to execute flight on average, and the airport network has small world characteristics; for the airway network, the number of nodes is greater than that of the airport network, but the difference between the number of connecting edges and the airport network is not much, which indicates that the airway network has low density, thereby indicating that airway points are strictly distributed on a fixed airway and can not fly randomly between any two airway points; the average degree of the route network is 2.51, which shows that each route is connected with 3 route sections on average; and the average value of the network nodes of the sectors is 6, and the maximum value is 9, which shows that each sector is connected with the 6 surrounding sectors on average. The average shortest path length of the network is 6.27, indicating that a flight needs to fly through approximately 6 regulatory sectors, as directed by the regulatory interval of 6 sectors.
FIG. 6 is a detailed flow chart of the method for analyzing vulnerability of air traffic dependent network according to the present invention;
FIG. 7 is a flow chart of a method for analyzing cascade failure vulnerability of an air traffic dependent network according to the present invention.
In the embodiment, the vulnerability of the air traffic dependent network is divided into structural vulnerability and functional vulnerability, the network node is directly deleted, and the network structure is damaged, wherein the structural vulnerability of the network is mainly reflected at the moment; in the cascade failure process, the node load is transferred, and the function vulnerability of the network is mainly reflected at the moment; under two attack methods of selective attack and random attack, calculating and deleting the structure entropy and the network efficiency of the dependent network with different numbers of nodes; if a certain layer of network nodes completely fails, the calculation is terminated; the algorithm flow for determining the vulnerability of the air traffic dependent network structure is shown in fig. 6; when cascade failure occurs and network traffic flow is transferred, calculating the network flow entropy and the traffic flow loss ratio; if a certain layer of network nodes completely fails, the calculation is terminated; the algorithm flow for determining the vulnerability to cascade failure of the air traffic dependent network is shown in fig. 7.
In this embodiment, the method for performing vulnerability analysis according to the air traffic dependent network includes: selecting a vulnerability attack mode, namely selecting selective attack or random attack; selective attack is also called deliberate disturbance, and is a targeted attack on network nodes according to a certain specific method, and subjective destructive events such as terrorist attacks, purposeful crimes and the like are usually simulated; attacking an airport network, an airway network and a control sector network according to two specific methods of node value priority and clustering coefficient priority, sequentially deleting nodes in the network, and respectively calculating the network efficiency and the network structure entropy of a dependent network after each node deletion until all the nodes in the network are deleted; random attacks are also called unintentional disturbances, and are nodes deleted from the network at equal probability, which means that the probability of each node in the network being attacked is the same, and the network node failure caused by natural factors is a random attack; the nodes can be attacked randomly in four ways: (1) randomly deleting nodes of any layer of the airport, air route and control sector network; (2) randomly deleting nodes in the airport network, and simulating the running condition under the condition that the airport is closed; (3) randomly deleting nodes in the airway network, and simulating the running conditions of ground navigation platform faults and airway congestion; (4) randomly deleting nodes in a controlled sector network, and simulating the operation condition of a saturated or invalid sector; and respectively calculating two measurement indexes of network efficiency and structure entropy of the dependent network after each attack, and repeating the simulation attack for 20 times each time to obtain an average value so as to obtain the accurate validity of the simulation result until all nodes in the network are deleted.
In this embodiment, the method for performing vulnerability analysis according to the air traffic dependent network further includes: cascading failure modeling, namely in a specific network, a few or some node or connecting line failures can cause other nodes to also generate failures by virtue of coupling relations among the nodes, so that a cascading effect can be brought, and finally, some nodes even cause the network to crash, and the phenomenon is called cascading failure or is called 'avalanche' in the form of image; the air traffic network is a dynamic network which actually runs, and the network cannot completely lose functions after being attacked, for example, after airport nodes are interfered by severe weather or part of runways and taxiways are maintained, the airport cannot be closed, the runways cannot completely lose the taking-off and landing functions, and the method of ground waiting programs (GDP), terminal area sequencing and the like is adopted to increase the clearance and landing intervals of the aircraft; after the route nodes are jammed due to the influences of factors such as route weather, the route points cannot be directly invalid, and route point flow is improved by adopting a route trailing interval program (Miles-In-Tail, MIT); therefore, the cascade failure process of the dependent network is analyzed, and the vulnerability of the network is necessary to be researched, wherein the most common method is a capacity-load model; in the research of the static vulnerability of the air traffic dependent network, after a node receives an attack, the node is considered to be completely invalid and deleted from the network; in the actual air traffic operation process, the situation that an airport, an air way point or a control sector completely loses functions after being influenced by various factors is rare; according to the relation between the capacity and the load of the node i at the moment t, three states of the node are set: the node is normal, the node is partially failed, and the node is completely failed; the node normally operates normally when the node capacity is larger than the load at the moment; the node is partially failed, namely the node capacity is smaller than the load at the moment, and the node capacity is in an oversaturation state and cannot accept the loads from other nodes; the complete failure of the node is the loss of the function of the node, and the original load of the node is redistributed to other nodes; according to air traffic management rules, aiming at the failure of each layer of sub-network nodes, the influence mechanism of the node failure on the network vulnerability is displayed; and (3) influence mechanism analysis in layer network: the airport network nodes fail, and the connecting edges from the airport to the destination airport also fail, so that the traffic flow of the failed nodes can be transferred to the adjacent airport nodes of the nearby network layer; if the node of the air route network fails, the corresponding traffic flow can be transferred to the adjacent air route point, however, when the node is particularly transferred, the transferred traffic flow is limited by the node capacity of the control sector network; the network node of the control sector fails, and at the moment, the communication of the corresponding failed node is transferred to the adjacent control sector node, however, in the transfer link, the corresponding traffic flow is limited by the node capacity of the airway network; analyzing influence mechanism between layer networks: when the airport network node fails, the other two layers of network nodes butted with the airport network node do not have traffic flow transfer, namely, the airway network node and the sector network node connected with the failed airport node still keep normal operation; when the node of the air route network fails, the connected airport network and the control sector network generate traffic flow transfer, namely if the air route point is the only air route point connected with a certain airport node, the airport node partially fails; if the airport node is connected with other waypoints besides the waypoint, the airport node operates normally, and the network node of the control sector connected with the failed waypoint still operates normally; the network node of the control sector fails, the connected airport network and the airway network transfer the traffic flow, namely the airway node in the control range of the sector fails and can not accept other traffic flows; the airport node that is uniquely connected to the sector also becomes partially dead.
In this embodiment, the method for performing vulnerability analysis according to the air traffic dependent network further includes: dividing a cascade failure stage, namely dividing the cascade failure of the air traffic dependent network into four stages: a normal operation stage of the network, a node attacked failure stage, a cascade failure propagation stage and a failure ending stage; in the normal operation stage of the network, the load and the capacity of each node of the dependent network are initialized, the state of each node is a normal state, and the air traffic operation is normal; in the node attack failure stage, a certain node in the dependent network is damaged by random attack or selective attack, the node state is that the node completely fails, and the node traffic flow is transferred to an adjacent node of the network on the same layer according to a load distribution principle; cascading failure propagation stages. When a node is attacked and damaged, the traffic flow of the node is transferred to an adjacent node, and if the transferred traffic flow is smaller than the capacity of the adjacent node, the node becomes a partial failure state, namely a node congestion state; if the traffic flow exceeds the capacity of the adjacent node, the excess will continue to be transferred to the next node. The process is a propagation process of the cascade failure of the network nodes; and (5) a failure ending stage. When all the node states are restored to normal again; or when the state of a certain node is partial failure and the phase states of the adjacent nodes are partial failure or complete failure, the cascade failure is considered to be finished.
In this embodiment, the method for performing vulnerability analysis according to the air traffic dependent network further includes: analyzing the vulnerability of the air traffic dependent network according to the cascade failure, namely analyzing the vulnerability (functional vulnerability) of the air traffic dependent network failure process according to the network flow entropy and the traffic flow overrun ratio; the network traffic entropy is an index describing the distribution balance degree of network traffic flow, and the larger the traffic entropy is, the more unbalanced the traffic flow distribution of nodes in the network is; the smaller the flow entropy is, the more balanced the traffic flow distribution of the nodes in the network is;
the network traffic entropy n (t) is:
Figure BDA0002801150360000141
Figure BDA0002801150360000142
wherein r isiThe ratio of the traffic flow of the node i to the total network traffic flow is node flow distribution; liA traffic flow for node i; attacking the network nodes according to a certain proportion, when the cascade failure process is finished, the network can not accommodate the traffic flow, namely the ratio of the traffic flow exceeding the network capacity to the total traffic flow of the attacked nodes is called traffic flow overrun ratio, and the traffic flow overrun ratio LR is as follows:
Figure BDA0002801150360000143
wherein t (q) is the traffic flow beyond the network when the node with the attack proportion of q is used; t (q) is the total traffic flow of the attacked node; the larger the traffic flow overrun ratio value is, when a certain proportion of nodes are attacked, the traffic flow exceeding the network is larger, more traffic flows need to be redistributed due to the damage of the network structure, and therefore the stability of the network is poor, and the vulnerability of the network is higher.
In this embodiment, the method for performing vulnerability analysis according to the air traffic dependent network further includes: analyzing the structural vulnerability of the air traffic dependent network according to the network structure entropy and the network efficiency, wherein the entropy is a very important parameter for describing the state of a complex network, and the change of the magnitude value can reflect the change of the network state; the structural vulnerability of the air traffic dependent network is expressed by adopting a measure index of the network structure entropy; when the air traffic is orderly operated according to the network, the degree distribution of the network nodes tends to be consistent, and the structure is stable; when the air traffic dependent network runs out of order, the distribution of the network node degrees is inconsistent, and the structure is unstable; the network structure entropy is the ordered or unordered description of the air traffic dependent network operation state, and is increased when the network is changed from the ordered state to the unordered state; if the network changes from the unordered state to the ordered state, the entropy of the network structure is reduced;
the network structure entropy M is:
Figure RE-GDA0002852646610000151
Figure BDA0002801150360000152
where N is the number of nodes in the network under study, IiIs the importance of node i; k is a radical ofiIs the value of node i;
the shortest path length needs to be calculated in a corresponding connection graph, and if nodes in the network cannot be connected, the shortest path length of the two nodes can be an infinite value;
the network efficiency F is:
Figure BDA0002801150360000153
wherein d isijIs the shortest path length from the node i to the node j, if the node i is not communicated with the node j, dijInfinity, +,; g is a set of air traffic dependent networks, which comprises all nodes in an airport network, a route network and a control sector network and all connecting edges in the network and among layer networks; the shortest path length and the network efficiency measure the overall transmission capacity of the network; the shorter the shortest path length is, the higher the network overall efficiency is, the faster the information transmission speed between the network nodes is; the network efficiency is an innovative network measurement index, the clustering coefficient and the shortest path are fused to form a uniform expression, and a new idea is developed for the brittleness research of a complex network; when the value of F is large, it indicates that the network efficiency is high and the connectivity is good, i.e., the network vulnerability is low.
Fig. 8 is a schematic diagram of an AC algorithm in accordance with the present invention.
In this embodiment, the method for performing vulnerability analysis according to the air traffic dependent network further includes: acquiring a node influence evaluation index to evaluate the influence of nodes of the air traffic dependent network, namely as shown in fig. 8, an aggregation coefficient can represent the structural characteristics of the nodes, the more edges of the nodes connected in a network structure, the larger the aggregation coefficient, and the greater the importance of the nodes, evaluating the influence of the network nodes by adopting a centrality reachable algorithm based on a complex network topology structure, identifying important nodes, and then optimizing the nodes;
the influence among the nodes is H (i, j), the node i passes through a path with the length of k to the node j, the number of the passed nodes is the influence of the node i on the k-step path of the node j, and is Hk(i,j):
Figure BDA0002801150360000161
Wherein A (i, j) is the 1-step path inter-node influence of node i on node j, namely H1(i,j);Hk(i, j) not only considers the connection relationship between every two nodes, but also considers the number of nodes on the paths of the two nodes, so that the influence of the nodes with relatively compact network structures is larger, the influence of the nodes with relatively sparse network structures is smaller, and finally, the evaluation of the influence of the nodes is more sufficient and reasonable;
and f (i), which is the sum of the influence from the node i to all nodes in the network, and when the path length is k, the path is called as k-step path node integral influence:
Figure BDA0002801150360000162
the evaluation index of the node influence is AC (i), and the sum of the ratios of the normalized overall influence of the k-step path nodes to the path length k is marked as follows:
Figure BDA0002801150360000171
Figure BDA0002801150360000172
wherein, ufk(i) Is fk(i) The normalization processing of (1); the higher the node influence evaluation index value of a node in the air traffic dependent network is, the higher the importance degree of the node is.
FIG. 9 is a schematic diagram of the variation of air traffic dependent network efficiency for attacking airport network nodes using different attack methods in accordance with the present invention;
FIG. 10 is a schematic diagram of the variation of air traffic dependent network efficiency for attacking airway network nodes using different attack methods in accordance with the present invention;
fig. 11 is a schematic diagram of changes in air traffic dependent network efficiency when different attack methods are used to attack a sector network node according to the present invention.
In the embodiment, taking the flight data in east China as an example, two strategies of random attack and selective attack are selected to attack the air traffic dependent network, and the vulnerability of the air traffic dependent network is evaluated; the variation of the network efficiency of the air traffic dependent network under different attack methods is shown in fig. 9, fig. 10 and fig. 11, which respectively attack an airport network, an airway network and a sector network, wherein the horizontal axis in the figure represents the number of nodes of the attack network, and the vertical axis represents the network efficiency of the air traffic dependent network; when only attacking airport network nodes, the nodes transmit influences to other networks through coupling mechanisms among different layer networks, and due to the fact that partial nodes are invalid, connection among the nodes is damaged, connection edges are reduced, connectivity of the networks is poor, distances among the nodes are increased, and therefore the efficiency of a dependent network is reduced; the middle dotted line is used for carrying out random attack on airport nodes in east China, and after the attack simulation is repeated for 20 times, the curve is obtained by averaging; as can be seen from fig. 9, when the airport network nodes are randomly attacked, the network efficiency tends to decrease uniformly; according to the attack mode with the prior clustering coefficient of the nodes, the airport which is closely connected in the network is deleted firstly, so that the probability of deleting the small airport is higher, and the influence on the network efficiency is slow finally.
FIG. 10 shows the variation of network efficiency after different attack methods are adopted to attack the route network nodes; after the network nodes of the air route are attacked, the network efficiency is firstly reduced and then increased, and compared with attacking airport network nodes, the network nodes of the air route are attacked by adopting different attacking methods, so that the variation difference of the network efficiency is larger; the attack in sequence according to the maximum value can lead the network efficiency to be reduced to the minimum; when 50% -70% of nodes of the network are deleted, the network efficiency is not reduced or increased, because the number of connecting edges between each layer of network is reduced after a part of route points are deleted, the connection between the networks is mainly formed by connecting edges of airport and sector network nodes, and the number of the airport nodes and the sector nodes is less than that of the route network nodes, so the distance between the airport network and the sector network is reduced due to the deletion of the route nodes; the number of network nodes is reduced, a plurality of scattered networks are formed, the connectivity of the networks is increased, the network efficiency is increased, and therefore a section of curve is increased; however, the influence of deleted airway nodes on flight operation in the actual operation process is not considered, which proves that the static vulnerability of the air traffic dependent network is only researched from a network topology structure and cannot completely express the network performance.
When attacking a sector network, the change situation of the network efficiency is as shown in fig. 11, which can be obtained from the figure, and the attack method of the sequential attack with the largest value is adopted, when a certain sector node is deleted, the network efficiency suddenly and sharply decreases, which indicates that the sector node plays a critical role in the communication of the dependent network, and the node can also be said to be an important node of the dependent network; when about 80% of nodes in the network are deleted, the network efficiency is maintained at the lowest value, which shows that most of the nodes in the network are isolated at the moment, the connectivity of the network is very poor, and the nodes are deleted again, so that the path length of the network is not greatly influenced, and the network is in a state of being approximately broken down.
After the networks of all layers are attacked independently by adopting different attack methods, the influence of an airport network, an airway network and a sector network on the performance of the air traffic dependent network can be obtained; when the sector network is attacked, the network efficiency of the dependent network can reach the lowest value, because the sector network has higher control command right to the aircraft in the actual operation process, the failure of the sector node can cause the failure of the airway node and the airport node in the jurisdiction thereof, the distance between the nodes is increased, the damage of the airway node only can affect the airport node, the failure of the airport node can not affect other layer networks, and the influence of the attack sector network node on the network efficiency is larger; for the airway network, along with the increase of the number of attack nodes, the network efficiency shows a trend that the network efficiency is reduced firstly and then increased, because part of the airway nodes are deleted to form a plurality of scattered networks with larger connectivity, and the network connectivity is increased. When the airport network nodes are attacked in sequence according to the maximum value and the maximum clustering coefficient, the network efficiency is attacked again after the network efficiency is reduced to a lower value, and the change of the network efficiency tends to be smooth.
FIG. 12 is a schematic diagram of the change of the entropy of the air traffic dependent network structure when different attack methods are used to attack airport network nodes in accordance with the present invention;
FIG. 13 is a schematic diagram of the variation of the entropy of the air traffic dependent network structure for attacking airway network nodes using different attack methods in accordance with the present invention;
fig. 14 is a schematic diagram of changes of the entropy of the air traffic-dependent network structure when different attack methods are adopted to attack the network nodes of the sectors according to the invention.
The variation of the network structure entropy of the air traffic dependent network under different attack methods is shown in fig. 12, 13 and 14, which respectively attack an airport network, an airway network and a sector network, wherein the horizontal axis in the figure represents the number of nodes of the attack network, and the vertical axis represents the network structure entropy of the air traffic dependent network.
When the airport network nodes are attacked in sequence by adopting the maximum value, the change condition of the network structure entropy is that the network structure entropy rises firstly and then falls, as shown in figure 12; the reason is that when the value of the attack degree is larger, the vulnerability of the network does not become obvious, the entropy of the network structure is temporarily increased, the degree distribution difference of the nodes becomes larger when the dependent network is changed from the ordered state to the disordered state; however, as the number of attack nodes increases, the entropy of the network structure begins to decrease, and at this time, the distribution of the node degrees of the network is approximate, and the dependent network changes to an ordered state. When the clustering coefficient is adopted to attack the network nodes in the maximum order and random attack, the network structure entropy is in a descending trend; after the nodes with larger degree values are deleted, the distribution difference of the network node degrees is obvious, the airport network nodes are continuously deleted, the distribution of the network degree values is reduced, the distribution difference of the degrees is smaller, the network vulnerability is smaller, and the network structure is stable; and the attack and the random attack are carried out in sequence according to the maximum clustering coefficient, and the nodes with larger values cannot be deleted preferentially, so that the structural entropy of the dependent network presents a descending trend.
When selective attack and random attack are adopted to attack the nodes of the airway network and the sector network, as shown in fig. 13 and 14, the network structure entropy has a uniform descending trend; with the deletion of the airway nodes and the sector nodes, the air traffic dependent network is changed from a non-ordered state to an ordered state, and the degree distribution diversity of the network nodes is also reduced, which shows that in the air traffic dependent network, after the airway nodes and the sector nodes are attacked, the connections among the airport network, the airway network and the sector network are invalid, the number of connected edges is reduced, the dependent network is decomposed into a plurality of small networks, and the connectivity of the network is reduced.
FIG. 15 is a schematic diagram of a network topology model of a portion of airports in the east China area according to the present invention.
As shown in fig. 15, several typical airports in east china are selected for topology network modeling, and an AC value of each airport node, that is, the global influence of each node (as shown in table 2), is obtained;
table 2: airport node influence calculation result
Figure BDA0002801150360000201
In the network, the AC value of the building door/Gaokazaki airport is the largest, the influence of the node is the largest, which means that the building door/Gaokazaki airport is an important node of the network, and the node is damaged, possibly causing the vulnerability of the network.
FIG. 16 is a schematic diagram of a skyheart VOR-Pudong VOR airway network topology model according to the present invention.
As shown in fig. 16, a topological network modeling is performed on the way of the fairway map in the east China area, wherein S is a Tianhe VOR, 1 is a compost VOR, 2 is a tin-free VOR, 3 is a dilute VOR, 4 is a Longkou VOR, 5 is a pond VOR, 6 is a Jingdezhen VOR, 7 is a Tung cottage VOR, and T is a Pudong VOR; obtaining an AC value of each route node, i.e., a global influence of each route node (as shown in table 3);
TABLE 4-2 calculation of airway node influence for AC Algorithm
Figure BDA0002801150360000211
The AC value of the combined-fertilizer VOR in the airway network is the largest, the influence of the node is the largest, and the situation that the airway point of the combined-fertilizer VOR is an important node of the network is shown, so that the node is damaged, the vulnerability of the network can be caused, and the flight change can be caused.
In summary, the invention constructs the air traffic dependent network and obtains the characteristics of the air traffic dependent network; and performing vulnerability analysis according to the air traffic dependent network, unifying related sub-networks (airports, air routes and control sectors) in the air traffic network, deeply exploring complex network attributes of the sub-networks, and then constructing a model analysis research network of the air traffic dependent network by means of a complex network theory according to an air traffic management rule and giving a reasonable optimization suggestion.
In the embodiments provided in the present application, it should be understood that the disclosed method can be implemented in other ways. The apparatus embodiments described above are merely illustrative and, for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
In light of the foregoing description of the preferred embodiment of the present invention, many modifications and variations will be apparent to those skilled in the art without departing from the spirit and scope of the invention. The technical scope of the present invention is not limited to the content of the specification, and must be determined according to the scope of the claims.

Claims (9)

1. An air traffic network vulnerability analysis method is characterized by comprising the following steps:
constructing an air traffic dependent network and acquiring the characteristics of the air traffic dependent network; and
and carrying out vulnerability analysis according to the air traffic dependent network.
2. The air traffic network vulnerability analysis method of claim 1,
the method for constructing the air traffic dependent network and acquiring the characteristics of the air traffic dependent network comprises the following steps:
construction of air traffic dependent networks, i.e.
According to the operation relation of traffic flow among the airport network, the air route network and the control sector network, constructing an air traffic dependent network G0 which is { G, e };
wherein G is a set of an airport network, a route network and a control sector network, and G is { G1, G2, G3 }; e is the set of 3 pairs of inter-layer network edges, E ═ E12, E13, E23;
e12 is the connecting edge of the airport network and the air route network;
e13 is the connecting edge of the airport network and the control sector network;
e23 is the connection edge between the air route network and the control sector network.
3. The air traffic network vulnerability analysis method of claim 2,
the method for constructing the air traffic dependent network and acquiring the characteristics of the air traffic dependent network further comprises the following steps:
obtaining characteristics of air traffic dependent networks, i.e.
And acquiring the network diameter, the maximum degree, the average shortest path length, the average degree and the average cluster coefficient according to the topological structure of the air traffic dependent network.
4. The air traffic network vulnerability analysis method of claim 3,
the method for performing vulnerability analysis according to the air traffic dependent network comprises the following steps:
vulnerability attack style selection, i.e.
And selecting selective attack or random attack.
5. The air traffic network vulnerability analysis method of claim 4,
the method for vulnerability analysis according to an air traffic dependent network further comprises:
modeling cascading failures, i.e.
According to the relation between the capacity and the load of the node i at the moment t, three states of the node are set: the node is normal, the node is partially failed, and the node is completely failed;
the node normally operates normally when the node capacity is larger than the load at the moment;
the node is partially failed, namely the node capacity is smaller than the load at the moment, and the node capacity is in an oversaturation state and cannot accept the loads from other nodes;
the complete failure of the node is that the node loses function, and the original load of the node is redistributed to other nodes.
6. The air traffic network vulnerability analysis method of claim 5,
the method for vulnerability analysis according to an air traffic dependent network further comprises:
partitioning cascade failure stages, i.e.
The cascade failure of the air traffic dependent network is divided into four stages:
the method comprises a network normal operation stage, a node attacked failure stage, a cascade failure propagation stage and a failure ending stage.
7. The air traffic network vulnerability analysis method of claim 6,
the method for vulnerability analysis according to an air traffic dependent network further comprises:
air traffic dependent network vulnerability analysis based on cascading failures, i.e.
Analyzing the vulnerability of the air traffic dependent network failure process according to the network flow entropy and the traffic flow overrun ratio;
the network traffic entropy n (t) is:
Figure FDA0002801150350000021
Figure FDA0002801150350000031
wherein r isiThe ratio of the traffic flow of the node i to the total network traffic flow is node flow distribution; liA traffic flow for node i;
the traffic flow overrun ratio LR is as follows:
Figure FDA0002801150350000032
wherein t (q) is the traffic flow beyond the network when the node with the attack proportion of q is used; and T (q) is the total traffic flow of the attacked node.
8. The air traffic network vulnerability analysis method of claim 7,
the method for vulnerability analysis according to an air traffic dependent network further comprises:
analyzing the structural vulnerability of air traffic dependent networks based on network structural entropy and network efficiency, i.e.
The network structure entropy M is:
Figure RE-FDA0002852646600000034
Figure RE-FDA0002852646600000035
where N is the number of nodes in the network under study, IiIs the importance of node i; k is a radical ofiIs the value of node i;
the network efficiency F is:
Figure RE-FDA0002852646600000036
wherein d isijIs the shortest path length from the node i to the node j, if the node i is not communicated with the node j, dijInfinity, +,; g is a set of air traffic dependent networks.
9. The air traffic network vulnerability analysis method of claim 8,
the method for vulnerability analysis according to an air traffic dependent network further comprises:
obtaining node influence evaluation indexes to evaluate influence of nodes of the air traffic dependent network, i.e.
The influence among the nodes is H (i, j), the node i passes through a path with the length of k to the node j, the number of the passed nodes is the influence of the node i on the k-step path of the node j, and the number of the passed nodes is Hk(i,j):
Figure FDA0002801150350000041
Wherein A (i, j) is the 1-step path inter-node influence of node i on node j, namely H1(i,j);
And f (i), the overall influence of the node is the sum of the influences from the node i to all nodes in the network, and when the path length is k, the overall influence of the k-step path node is called as:
Figure FDA0002801150350000042
the evaluation index of the node influence is AC (i), and the index is equal to the sum of the ratio of the normalized overall influence of the k-step path nodes to the path length k:
Figure FDA0002801150350000043
Figure FDA0002801150350000044
wherein, ufk(i) Is fk(i) The normalization processing of (1);
the higher the node influence evaluation index value of a node in the air traffic dependent network is, the higher the importance degree of the node is.
CN202011350533.4A 2020-11-26 2020-11-26 Air traffic network vulnerability analysis method Active CN112530206B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011350533.4A CN112530206B (en) 2020-11-26 2020-11-26 Air traffic network vulnerability analysis method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011350533.4A CN112530206B (en) 2020-11-26 2020-11-26 Air traffic network vulnerability analysis method

Publications (2)

Publication Number Publication Date
CN112530206A true CN112530206A (en) 2021-03-19
CN112530206B CN112530206B (en) 2022-03-11

Family

ID=74993665

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011350533.4A Active CN112530206B (en) 2020-11-26 2020-11-26 Air traffic network vulnerability analysis method

Country Status (1)

Country Link
CN (1) CN112530206B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113723792A (en) * 2021-08-25 2021-11-30 武汉理工大学 Method and device for measuring vulnerability of logistics service supply chain and electronic equipment
CN115884242A (en) * 2022-11-25 2023-03-31 江苏省工商行政管理局信息中心 Dynamic network vulnerability evaluation system and method based on dynamic complex information system
CN116543602A (en) * 2023-07-04 2023-08-04 中国民用航空飞行学院 Situation complexity identification method and system for aircraft clusters

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030195861A1 (en) * 2002-01-15 2003-10-16 Mcclure Stuart C. System and method for network vulnerability detection and reporting
US20070067845A1 (en) * 2005-09-22 2007-03-22 Alcatel Application of cut-sets to network interdependency security risk assessment
CN105933145A (en) * 2016-04-13 2016-09-07 哈尔滨理工大学 Adjacent matrix based dependent network system and frangibility detection method thereof
CN107294949A (en) * 2016-04-11 2017-10-24 波音公司 System and method for context-aware network filtering
CN107958094A (en) * 2016-10-18 2018-04-24 武汉理工大学 A kind of waters air route fragility research method based on Complex Networks Theory
CN108446820A (en) * 2018-02-06 2018-08-24 四川大学 A kind of guidance station device network vulnerability assessment method considering neighbor node contribution function
CN108566302A (en) * 2018-04-24 2018-09-21 西南财经大学 Node failure restoration methods based on the connected side of interdependent network
CN109034654A (en) * 2018-08-20 2018-12-18 中国民航大学 The measure of the interdependent network vulnerability of air traffic
CN109218084A (en) * 2018-08-28 2019-01-15 浙江工业大学 A method of the raising interdependence network robustness based on coupling link local center accumulation index
CN109768894A (en) * 2019-03-04 2019-05-17 中国民航大学 The interdependent network vulnerability identification of air traffic and control method and system
US20190280870A1 (en) * 2018-03-06 2019-09-12 Robust Analytics, Inc. Method and network to implement decentralized validation and authentication mechanisms to prevent ads-b cyber-attacks

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030195861A1 (en) * 2002-01-15 2003-10-16 Mcclure Stuart C. System and method for network vulnerability detection and reporting
US20070067845A1 (en) * 2005-09-22 2007-03-22 Alcatel Application of cut-sets to network interdependency security risk assessment
CN107294949A (en) * 2016-04-11 2017-10-24 波音公司 System and method for context-aware network filtering
CN105933145A (en) * 2016-04-13 2016-09-07 哈尔滨理工大学 Adjacent matrix based dependent network system and frangibility detection method thereof
CN107958094A (en) * 2016-10-18 2018-04-24 武汉理工大学 A kind of waters air route fragility research method based on Complex Networks Theory
CN108446820A (en) * 2018-02-06 2018-08-24 四川大学 A kind of guidance station device network vulnerability assessment method considering neighbor node contribution function
US20190280870A1 (en) * 2018-03-06 2019-09-12 Robust Analytics, Inc. Method and network to implement decentralized validation and authentication mechanisms to prevent ads-b cyber-attacks
WO2019173216A1 (en) * 2018-03-06 2019-09-12 Robust Analytics, Inc. Method and network to implement decentralized validation and authentication mechanisms to prevent ads-b cyber-attacks
CN108566302A (en) * 2018-04-24 2018-09-21 西南财经大学 Node failure restoration methods based on the connected side of interdependent network
CN109034654A (en) * 2018-08-20 2018-12-18 中国民航大学 The measure of the interdependent network vulnerability of air traffic
CN109218084A (en) * 2018-08-28 2019-01-15 浙江工业大学 A method of the raising interdependence network robustness based on coupling link local center accumulation index
CN109768894A (en) * 2019-03-04 2019-05-17 中国民航大学 The interdependent network vulnerability identification of air traffic and control method and system

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
SUEKI S,KIM Y: "Vulnerabilities and Mitigation Methods in the NextGen Air Traffic Control System", 《ADVANCES IN INTELLIGENT SYSTEMS AND CONPUTERS》 *
吴润泽,吴万旭,李莉等: "基于节点影响力的电力通信网拓扑结构诊断", 《电力***保护与控制》 *
周子丰: "基于复杂网络理论的民航陆基空管保障***脆弱性分析", 《中国优秀硕士学位论文全文数据库(工程科技Ⅱ辑)》 *
朱潜等: "灰色信息攻击下相依网络的鲁棒性", 《东北大学学报(自然科学版)》 *
潘维煌: "基于相依网络理论的空中交通***脆弱性研究", 《中国优秀硕士学位论文全文数据库(工程科技Ⅱ辑)》 *
王俊超,殷志远,冯光柳: "复杂网络特性及可靠性分析-以中国航空网为例", 《微型电脑应用》 *
王兴隆,潘伟煌,赵末: "空中交通相依网络的脆弱性研究", 《航空学报》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113723792A (en) * 2021-08-25 2021-11-30 武汉理工大学 Method and device for measuring vulnerability of logistics service supply chain and electronic equipment
CN115884242A (en) * 2022-11-25 2023-03-31 江苏省工商行政管理局信息中心 Dynamic network vulnerability evaluation system and method based on dynamic complex information system
CN115884242B (en) * 2022-11-25 2023-08-15 江苏省工商行政管理局信息中心 Dynamic network vulnerability evaluation system and method based on dynamic complex information system
CN116543602A (en) * 2023-07-04 2023-08-04 中国民用航空飞行学院 Situation complexity identification method and system for aircraft clusters
CN116543602B (en) * 2023-07-04 2023-09-01 中国民用航空飞行学院 Situation complexity identification method and system for aircraft clusters

Also Published As

Publication number Publication date
CN112530206B (en) 2022-03-11

Similar Documents

Publication Publication Date Title
CN112530206B (en) Air traffic network vulnerability analysis method
CN112735188B (en) Air traffic network vulnerability analysis system based on complex network theory
US20220036743A1 (en) Low-altitude air route planning and design method, device and storage medium with multi-objective constraints
CN112116830B (en) Unmanned aerial vehicle dynamic geo-fence planning method based on airspace meshing
Liang et al. Integrated sequencing and merging aircraft to parallel runways with automated conflict resolution and advanced avionics capabilities
US20190096269A1 (en) Terminal and en-route airspace operations based on dynamic routes
Wei et al. Algebraic connectivity maximization for air transportation networks
CN112102650B (en) Navigation route changing generation method, device and storage medium
CN115204466A (en) International airline route planning method with traffic limitation
CN111813144B (en) Multi-unmanned aerial vehicle collaborative route planning method based on improved flocks of sheep algorithm
CN109034654A (en) The measure of the interdependent network vulnerability of air traffic
CN115938162A (en) Conflict minimization track collaborative planning method considering high-altitude wind time variability
CN110986954A (en) Military transport plane route planning method based on wolf optimization algorithm
Liang Aircraft route network optimization in terminal maneuvering area
Prete et al. Flexible, performance-based route planning for super-dense operations
Zhao et al. Evaluating ground–air network vulnerabilities in an integrated terminal maneuvering area using co-evolutionary computational red teaming
Alam et al. Discovering delay patterns in arrival traffic with dynamic continuous descent approaches using co-evolutionary red teaming
CN109215398B (en) Unmanned aerial vehicle route planning method and device
Gianazza et al. Separating air traffic flows by allocating 3D-trajectories
Idan et al. Efficient air traffic conflict resolution by minimizing the number of affected aircraft
Gianazza et al. Assessment of the 3D-separation of Air Traffic Flows
Cai et al. Optimization of the crossing waypoints in air route network
CN115662198B (en) Method and system for passing through civil aviation route based on dynamic path planning field
CN113536502B (en) Airway network establishing method, airway network establishing device and electronic equipment
Chen et al. A multi-objective crossing waypoints location optimization in air route network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant