Title :
Network topology based on information security for Network Centric Warfare simulation
Author :
Peng, Jing ; Han, Liang ; Gong, Guanghong ; Liu, Lingyu
Author_Institution :
Sch. of Autom. Sci. & Electr. Eng., Beijing Univ. of Aeronaut. & Astronaut., Beijing, China
Abstract :
This paper presents a Multi-Link Topology (MLT) control algorithm for Network Centric Warfare (NCW) system based on information security. This method explains the complexity of communication links for NCW well. To accurately study the communication performance in HLA/RTI framework by the network simulators for real-time NCW simulation, it is important to simplify the network links topology through discarding the unnecessary communication links. The proposed algorithm takes several typical military communication links as target and optimizes the links according to the information security satisfaction degree with network connectivity unchanged. The simulation results show that the algorithm has good links optimization ability with the average optimization rate more than 50%.
Keywords :
military communication; security of data; telecommunication links; telecommunication network topology; HLA/RTI framework; communication link; communication performance; information security; multilink topology control algorithm; network centric warfare simulation; network connectivity; network simulator; network topology; real time NCW simulation; Ad hoc networks; Encryption; Mobile computing; Real time systems; communication performance; information security; modeling/simulation; network centric warfare; topology control;
Conference_Titel :
Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4244-6539-2
DOI :
10.1109/ICACTE.2010.5579593