[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2675983.2676342acmconferencesArticle/Chapter ViewAbstractPublication PageswscConference Proceedingsconference-collections
research-article

On simulating the resilience of military hub and spoke networks

Published: 08 December 2013 Publication History

Abstract

Hub and spoke networks, while highly efficient, are fragile to targeted attacks: removal of the central hub destroys connectivity of the network. This fragility has led to the assertion that these networks are not suited to military distribution systems. However, military supply chains have redundancy induced by heterogeneous transportation modes (e.g., road, marine, and air) leading to enriched connectivity over a pure hub and spoke structure. In this paper a global military (hierarchical) hub and spoke network model is developed; the topological resilience of such networks are probed by stochastically sampling an ensemble of networks and simulating both random and targeted edge knockout, and the network properties relevant to resilience measured. It is found that such networks are resilient to continual attack and loss (network erosion), performing well relative to preferential (scale free) and random network benchmarks. This regime of network erosion is descriptive of modern asymmetric warfare.

References

[1]
Albert, R., H. Jeong, and A. Barabasi. 2000. "Error and Attack Tolerance of Complex Networks". Nature 406:378--382.
[2]
Allenby, B., and J. Fink. 2005. "Towards Inherently Secure and Resilient Societies". Science 309:1034--1036.
[3]
Bacot, R. 2009. "Global Movements and Operational Support hub Concept: Global Reach for the Canadian Forces". The Canadian Air Force Journal 2:8--17.
[4]
Barabasi, A., and R. Albert. 1999. "Emergence of Scaling in Random Networks". Science 286:509--512.
[5]
Barnett, T. 2004. The Pentagon's New Map. New York, New York: G.P. Putnam's Sons.
[6]
Bates, J. 2005. "UltraLog: Securing Logistics Information on the Battlefield". Army Logistician 37.
[7]
Bohorquez, J., S. Gourley, A. Dixon, M. Spagat, and N. F. Johnson. 2009. "Common Ecology Quantifies Human Insurgency". Nature 462:911--914.
[8]
Bryce, R. 2007. "Logistical Vulnerabilities and the Afghanistan War: The Pakistan Fuel Connection". Heinrich Böll Foundation. Accessed Mar. 14, 2013. http://www.boell.de/downloads/worldwide/bryce_logistical_vulnerabilities.pdf.
[9]
Callaway, D., J. Hopcroft, J. Kleinberg, M. Newman, and S. Strogatz. 2001. "Are Randomly Grown Graphs Really Random?". Physical Review E 64:041902.
[10]
Erdos, P., and A. Renyi. 1960. "On the Evolution of Random Graphs". Publications of the Mathematical Institute of the Hungarian Academy of Science 5:17--61.
[11]
Floyd, R. 1962. "Algorithm 97: Shortest Path". Communications of the ACM 5:345.
[12]
Fredman, M., and R. Tarjan. 1987. "Fibonacci heaps and their uses in improved network optimization algorithms". Journal of the ACM 34:596--615.
[13]
Girard, S., A. Martel, J. Berger, A. Boukhtouta, M. Chouinard, A. Ghanmi, and A. Guitouni. 2008. "Canadian Forces Overseas Supply Network: Strategic Need and Design Methodology". Technical Report CIRRELT-2008-34, Centre interuniversitaire de recherche sur les réseaux d'enterprise, la logistique et le transport, Québec, Canada.
[14]
Goyal, S., and A. Vigier. 2009. "Robust Networks". In Microsoft Research Workshop on Networks, Auctions, and Pricing. Cambridge, UK.
[15]
Goyal, S., and A. Vigier. 2013. "Attack, Defense and Contagion in Networks". Working paper.
[16]
Lumpkin, J. 2006. "USS Cole bombing". GlobalSecurity.org. Accessed Mar. 14, 2013. http://www.globalsecurity.org/security/profiles/uss_cole_bombing.htm.
[17]
Rodrique, J., and B. Slack. 2002. "Logistics and National Security". In Science, Technology, and National Security, edited by S. Majumdar, L. Rosenfeld, E. Miller, S. Alexander, and M. Rieders. Easton, PA: Pennsylvania Academy of Science.
[18]
Scardi, G., and T. Nepusz. 2006. "The igraph software package for complex network research". InterJournal Complex Systems:1695.
[19]
Thadakamalla, H., U. Raghavan, S. Kumara, and R. Albert. 2004. "Survivability of Multiagent-Based Supply Networks: A Topological Perspective". IEEE Intelligent Systems 19:24--31.
[20]
UK Border Agency 2012. "United Kingdom Border Agency Overseas Network". Accessed Mar. 15, 2013. http://www.ukba.homeoffice.gov.uk/aboutus/organisation/overseas-network/.
[21]
van Wijk, B., C. Stam, and A. Daffertshofer. 2010. "Comparing Brain Networks of Different Size and Connectivity Density Using Graph Theory". PLoS ONE 5:0013701.
[22]
Whitlock, C. 2011. "U.S. turns to other routes to supply Afghan war as relations with Pakistan fray". Washington Post. Accessed Dec. 25, 2012. http://articles.washingtonpost.com/2011-07-02/world/35267868_1_pakistan-routes-afghanistan-karachi.
[23]
Wilensky, U. 1999. "NetLogo". Center for Connected Learning and Computer-Based Modeling, Northwestern University. Evanston, IL. Accessed Dec. 25, 2012. http://ccl.northwestern.edu/netlogo/.
[24]
Wright, L. 2006. Looming Tower. New York, New York: Knopf.
[25]
Zhao, K., A. Kumar, T. Harrision, and J. Yen. 2011. "Analyzing the Resilience of Complex Supply Network Topologies Against Random and Targeted Disruptions". IEEE Systems Journal 5:28--39.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WSC '13: Proceedings of the 2013 Winter Simulation Conference: Simulation: Making Decisions in a Complex World
December 2013
4386 pages
ISBN:9781479920778

Sponsors

  • IIE: Institute of Industrial Engineers
  • INFORMS-SIM: Institute for Operations Research and the Management Sciences: Simulation Society
  • ASA: American Statistical Association
  • SIGSIM: ACM Special Interest Group on Simulation and Modeling
  • SCS: Society for Modeling and Simulation International
  • ASIM: Arbeitsgemeinschaft Simulation
  • IEEE/SMCS: Institute of Electrical and Electronics Engineers/Systems, Man, and Cybernetics Society
  • NIST: National Institute of Standards & Technology

Publisher

IEEE Press

Publication History

Published: 08 December 2013

Check for updates

Qualifiers

  • Research-article

Conference

WSC '13
Sponsor:
  • IIE
  • INFORMS-SIM
  • ASA
  • SIGSIM
  • SCS
  • ASIM
  • IEEE/SMCS
  • NIST
WSC '13: Winter Simulation Conference
December 8 - 11, 2013
D.C., Washington

Acceptance Rates

Overall Acceptance Rate 3,413 of 5,075 submissions, 67%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 44
    Total Downloads
  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media