Academy & Industry Research Collaboration Center (AIRCC)

Volume 12, Number 01, January 2022

Identification of Key Nodes in Equipment System Network based on Function Chain


Cheng Huang, Yong Gang Li and Ying Wang, Chongqing University of Posts and Telecommunications, China


With the rapid development of modern military technology, the combat mode has been upgraded from traditional platform combat to system-level confrontation. In traditional combat network, node function is single and which is no proper assignment of tasks. The equipment system network studied in this paper contains many different functional nodes, which constitute a huge heterogeneous complex network. Most of the key node identification methods are analyzed from the network topology structure, such as degree, betweenness, K-shell, PageRank, etc. However, with the change of network topology, the identification effect of these methods will be biased. In this paper, we construct a nodal attack sequence, Consider the change of the number of effective OODA chains in the equipment system network after the nodes in the sequence are attacked. And combined with the improved Gray Wolf optimization algorithm, this paper proposes a key node evaluation model of equipment system network based on function chain - IABFI. Experimental results show that the proposed method is more effective, accurate, and applicable to different network topologies than other key node identification methods.


Equipment system network, node sequence attack, effective OODA chain, improved Grey Wolf optimization algorithm.