Vulnerability assessment method for manufacturing system based on complex network

被引:0
|
作者
Gao G. [1 ]
Rong T. [1 ]
Yue W. [1 ]
机构
[1] College of mechanical and Electrical Engineering, Hunan University of Science and Technology, Xiangtan
基金
中国国家自然科学基金;
关键词
Assessment; Complex network; Engine assembly manufacturing system; Manufacturing system; Vulnerability;
D O I
10.13196/j.cims.2018.09.016
中图分类号
学科分类号
摘要
Vulnerability analysis and assessment is a hotspot in the field of system security, but there are less research for vulnerability of manufacturing systems. Aiming at the shortcoming of manufacturing systems vulnerability research, a comprehensive vulnerability evaluation method for manufacturing system was presented based on complex network theory. By defining the node, edge, local world and network growth model, a complex network model of the manufacturing system was built. An evaluation framework for manufacturing system vulnerability was constructed, and the specific evaluation from topological vulnerability and functional vulnerability two dimensions were conducted. Based on topological characteristics of complex network, the structural vulnerability was evaluated; based on functional indicators of system, the functional vulnerability was specifically assessed. Thus, a comprehensive vulnerability evaluation model of manufacturing system was established. The engine assembly manufacturing system was taken as an example, by establishing the complex network model, the overall vulnerability of the proposed system was assessed, the feasibility was verified, and the corresponding suggestions were given for its safe operation. © 2018, Editorial Department of CIMS. All right reserved.
引用
收藏
页码:2288 / 2296
页数:8
相关论文
共 18 条
  • [1] Deng Y., Mahadevan S., Zhou D., Vulnerability assessment of physical protection systems: a bio-inspired approach, International Journal of Unconventional Computing, 11, 3-4, pp. 227-243, (2015)
  • [2] Wang S.L., Yue X., Vulnerability analysis of interdependent infrastructure systems, Application Research of Computers, 51, 1, pp. 328-337, (2014)
  • [3] Baker G., A vulnerability assessment methodology for critical infrastructure sites
  • [4] Barabasi A.L., Albert R., Emergence of scaling in random networks, Science, 286, 5349, pp. 509-512, (1999)
  • [5] Fuchs S., Birkmann J., Glade T., Vulnerability assessment in natural hazard and risk analysis: current approaches and future challenges, Natural Hazards, 64, 3, pp. 1969-1975, (2012)
  • [6] Zhang W., Li Q., Wang W., Analysis of characteristics, manifestations and essence of SOS safety problem, China Safety Science Journal, 24, 9, pp. 88-94, (2014)
  • [7] Yang H., Liu H., Study on computer vulnerability taxonomy, Computer Engineering & Design, 25, 7, pp. 1143-1145, (2004)
  • [8] Han G., Yuan J., Li K., Research on the urban vulnerability in Lanzhou, Journal of Arid Land Resources and Environment, 30, 11, pp. 70-76, (2016)
  • [9] Shi Y., Xu S., Shi C., Et al., Progress in research on vulnerability of natural disasters, Journal of Institute of Disaster Prevention, 20, 2, pp. 131-137, (2011)
  • [10] Du S., Wang H., Liu S., A groundwater vulnerability assessment method based on typical karst region in north China, Environmental Science & Technology, pp. 471-475, (2014)