1. College of Systems Engineering, National University of Defense Technology, Changsha 410073, China
2. School of Management, Technical University of Munich, Heilbronn 74076, Germany
ljcnudt@hotmail.com
kayyang27@nudt.edu.cn
Show less
History+
Received
Accepted
Published
2024-09-20
2025-01-01
Issue Date
Revised Date
2025-03-31
2024-12-18
PDF
(13613KB)
Abstract
A combat system-of-systems (CSoS) is a network of independent entities that interact to provide overall operational capabilities. Enhancing the resilience of CSoS is garnering increasing attention due to its practical value in optimizing network architectures, improving network security and refining operational planning. Accordingly, we present a unified framework called CSoS space-time resilience enhancement (CSoS-STRE) to enhance the resilience of CSoS. Specifically, we develop a spatial combat network model and a space-time resilience optimization model that captures the complex spatial relationships between entities and reformulates the resilience enhancement problem as a linear optimization model with spatial features. Moreover, we extend the model to include obstacles. Next, a resilience-oriented recovery optimization method based on the improved non-dominated sorting genetic algorithm II (R-INSGA) is proposed to determine the optimal recovery sequence for the damaged entities. This method incorporates spatial features while providing the optimal travel paths for multiple recovery teams. Finally, the feasibility, effectiveness, and superiority of the CSoS-STRE are demonstrated through a case study, providing valuable insights for guiding recovery and developing more resilient CSoS.
Modern warfare has transitioned from the paradigm of isolated combat forces to system-to-system confrontations due to advancements in combat technologies and application concepts. The US Navy and the Defense Advanced Research Projects Agency (DARPA) introduced the groundbreaking concepts of network-centric warfare (Sinex et al., 2000) and mosaic warfare (Deptula et al., 2019), advocating for system-of-systems level engagements as the primary form of warfare in the information age and in future intelligent eras. Consequently, system-of-systems operations have emerged as a key aspect of military transformation worldwide. This approach emphasizes the effective utilization of networked connections among diverse entities to establish a cohesive and efficient combat system-of-systems (CSoS) (Gao et al., 2024, Koehler et al., 2024, Watson et al., 2023, Xu et al., 2024, Zhang et al., 2024), thereby capitalizing on informational advantages on the battlefield to achieve operational superiority. A CSoS (Li et al., 2024, Liu,et al., 2024, 2023, Markina-Khusid et al., 2021, Sun et al., 2024a, Uday and Marais., 2015) is a combat network composed of independently operating entities that interact with one another to provide overall operational capabilities, which cannot be achieved by a individual entities alone. In this network (Xu et al., 2023a), nodes represent entities, and links represent various interactions between entities.
The primary objective of studying CSoS is to ensure task fulfillment during operations (Sun et al.,2024b). As a type of long-lasting system, CSoS inevitably faces disturbances like enemy attacks, interference, or internal failures in dynamic combat environments, which can lead to performance degradation and failure to meet task requirements (Holling, 1973, Xu et al., 2024). Resilience (Artime et al., 2024, Du et al., 2023, Liu et al., 2022, Wang et al., 2024a), defined as the system’s ability to absorb and recover from disruptive events, offers a novel perspective for maintaining task fulfillment during operations. The profound uncertainties, complexities, and dynamics inherent in the battlefield present diverse challenges for the CSoS, underscoring the necessity to develop a more resilient CSoS. Moreover, the widespread implementation of advanced information and intelligent technologies further magnifies these challenges. The resilience of CSoS, defined as its ability to ensure task fulfillment during operations through the implementation of a series of recovery strategies, is closely related to its reliability (Chen et al., 2023b, Miller et al., 2021), effectiveness (Gao et al., 2023, Huang et al., 2023), and affordability (Chatterjee et al., 2023, 2022). Enhancing the resilience of CSoS is garnering increasing attention due to its practical value in optimizing network architectures, improving network security and refining operational planning.
The resilience analysis of CSoS is closely linked to network because of the inherent similarity between system-of-systems architecture and networks (De Domenico, 2023). Therefore, the first step in enhancing the resilience of CSoS is to establish an effective combat network model. Numerous researchers (Markina-Khusid et al., 2021, Chatterjee et al., 2022, Chen et al., 2024a, Filippini et al., 2014, Watson et al., 2022) contend that employing complex networks to characterize CSoS offers the most straightforward approach. However, the combat network integrates diverse entities that interact based on various functions, requiring a descriptive model beyond traditional complex networks to capture its heterogeneous nature. To address this issue, Li et al. (2019) introduced heterogeneous combat networks model to characterize CSoS, which takes into account various types of entities and information flows. Sun et al. (2023) employed a functional dependency network analysis method to capture interdependencies among heterogeneous entities and construct a dependent combat network. In addition to its heterogeneity, the CSoS exhibits distinct temporal characteristics, with its performance or structure evolving over time (Han et al., 2023, Uday et al., 2019, Xu et al., 2023b). To simultaneously capture the heterogeneity and dynamics of CSoS, Li et al. (2021) proposed a temporal combat network model that offered a precise description of its operational processes. Fang et al. (2021) analyzed the structure and operational processes of CSoS to construct a graphical evaluation and review technique (GERT) combat network, where entities serve as nodes and various interactions as directed links. System-of-systems and networks frequently exhibit spatial features (Lanier and Petnga, 2019, Rescia et al., 2023, Wang et al., 2024b, Yabe et al., 2022), and CSoS is no exception. However, existing combat network modeling and resilience optimization of CSoS have not sufficiently addressed this aspect. On one hand, the arrangement of entities within CSoS exhibits spatial features. For instance, AWACS must carefully balance proximity, which increases vulnerability to attack, and distance, which diminishes the effectiveness of intelligence gathering. On the other hand, interactions among entities also demonstrate spatial features. For example, UAVs are limited by remote control range; exceeding this threshold can lead to signal loss and reduced operational capability.
Similar to optimizing network resilience (Artime et al., 2024, Danziger. and Barabási, 2022, Edwards et al., 2024, Liu et al., 2022, Qi and Mei, 2024), current research on enhancing the resilience of CSoS primarily focuses on three aspects (Uday et al., 2019): pre-attack protection (Liu et al., 2024, Xing et al., 2019), mid-attack reconfiguration (Chen et al., 2023a, Li et al., 2024, Sun et al., 2024b, 2022, Tran et al., 2016), and post-attack recovery (Xu et al., 2023a, Zhong et al., 2024). Pre-attack protection primarily involves safeguarding critical entities or interactions within CSoS before an attack occurs, thereby reducing the negative impact of attacks on CSoS. For example, Liu et al. (2024) proposed an optimization method based on reinforcement learning to protect critical entities and enhance the resilience of CSoS under continuous attacks. Mid-attack reconfiguration involves reconfiguring interactions within CSoS without introducing external resources, aimed at mitigating the negative impact of attacks. For instance, Sun et al. (2022) presented a cooperative factor-based resilience optimization model that uses existing entities from one swarm to replace damaged entities in another swarm. However, in practice, pre-attack protection and mid-attack reconfiguration involve stringent conditions. The unpredictable and inevitable nature of enemy attacks makes it highly challenging to devise completely effective protection strategies beforehand. Furthermore, achieving interface interoperability among all entities in CSoS reconfiguration is somewhat idealistic and impractical. The two-year Russia-Ukraine conflict in 2022 tested that implementing post-disturbance recovery measures in CSoS is a straightforward method, including repairing infrastructure such as the Crimean Bridge, restoring damaged tank equipment, and recruiting new forces to meet task requirements. Post-attack recovery involves determining a set of entities requiring restoration and their recovery sequence (Aslani et al., 2024, Dui et al., 2024), with the aim of improving the performance of CSoS and thereby enhancing its resilience. Pan et al. (2019) and Xu et al. (2023a) respectively introduced recovery importance metrics from the perspectives of nodes and links within CSoS, aiming to recover critical components and thereby enhance the resilience of CSoS. Compared to these component importance measures, optimization methods offer a more efficient and effective approach to enhancing the resilience of CSoS. For example, Zhong et al. (2024) proposed a kill chain optimization method for resilient CSoS, focusing on optimizing the selection of kill chains within the network to enhance resilience from a recovery perspective. However, existing research on post-attack recovery for CSoS emphasizes temporal aspects, overlooking its spatial features. During the recovery process in actual military operations, the physical distances between entities influence the sequence of entity restoration, as recovery teams take more time to move between distant combat entities. Few prior studies have incorporated the spatial features into enhancing post-attack recovery.
In view of these issues, this study explores the resilience enhancement problem for CSoS. By leveraging multilayer networks, operation loops, and network recovery optimization techniques, we present a unified framework called CSoS space-time resilience (CSoS-STRE) to integrate spatial features into the resilience analysis of CSoS. The CSoS-STRE framework comprises two key aspects: 1) the resilience optimization model and 2) the recovery optimization method. We summarize the main contributions of this study as follows.
i) We develop a spatial combat network model and a space-time resilience optimization model, which not only captures the complex spatial relationships between entities, accurately reflecting the operational process, but also reformulates the resilience enhancement problem as a classic linear optimization model with spatial features. Moreover, we extend the model from a no-obstacles scenario to one with obstacles, thereby further emphasizing spatial features.
ii) A resilience-oriented recovery optimization method based on an improved non-dominated sorting genetic algorithm (R-INSGA) is proposed to determine the optimal recovery sequence for the damaged entities. This method not only considers spatial features but also provides the optimal travel path for multiple recovery teams.
iii) Numerous experiments are conducted using a CSoS case study to demonstrate the feasibility, effectiveness, and superiority of the CSoS-STRE in enhancing the resilience of CSoS. By varying relevant parameters and comparing against baseline methods, the results provide valuable insights for guiding recovery and developing more resilient CSoS.
The structure of this study is outlined as follows. Section 2 describes the spatial combat network model, while Section 3 presents the spatial resilience optimization model and extends it to incorporate obstacles. In Section 4, we propose a recovery optimization method called R-INSGA. In Section 5, numerous experiments are conducted to demonstrate the feasibility, effectiveness and superiority of the proposed framework. Conclusions and future directions are presented in Section 6.
2 Spatial combat network model
2.1 Concept of operation loop
In system-of-systems operations, CSoS is required to effectively integrate various types of operational forces to meet task requirements. Typically, the CSoS comprises various types of entities with diverse functions such as sensing, control, interference, and strike capabilities. Based on Jeffrey’s (Khasawneh et al., 2017), Dekker’s (Deller et al., 2009) and Tan’s (Li et al., 2017) combat model, entities in CSoS can be classified into four categories: sensor entities (S), decider entities (D), influencer entities (I), and enemy target entities (T). According to Boyd’s OODA cycle theory (Yang et al., 2022), a basic combat process involves the sensor system detecting enemy targets (TS) and transmitting relevant information to the decider entity (SD). Subsequently, the decider entity issues commands to the influencer entity (DI), which then exerts adverse effects on the enemy target entity (IT).
The concept of operation loop can be employed to describe the aforementioned basic combat process. A basic operation loop consists of a sensor, a decider, an influencer, and an enemy target. Beyond this, there are three generalized types of operation loops. These multiple operation loops interconnect and intertwine with each other to form a CSoS. Figure 1 shows the four types of operation loops, which encompass all existing situations under current combat rules (Chen et al., 2023b, Li et al., 2024, Liu et al., 2024, Sun et al., 2024b).
2.2 Spatial combat network model of CsoS
Given that CSoS is influenced by spatial features during task completion (Chen et al., 2024b), and drawing inspiration from the concept of multilayer networks (De Domenico, 2023), we develop a spatial combat network model to characterize the spatial nature of CSoS. Non-interconnected networks, as multilayer networks without inter-layer links, effectively characterize multiple relationships within CSoS. A CSoS can be abstracted as a non-interconnected network , where denotes the set of network layers, and represents the set of inter-layer links. Here, depicts the information layer illustrating information flows between entities, while describes the spatial layer illustrating the distance relationships among these entities. Figure 2 illustrates an example of a spatial combat network. It is important to note that the entities in both layers are identical, and no interdependent links exist between the two layers.
In the information layer , where node set represent the entities and link set denotes information flows between entities. Here, represent sensor, decider, influencer, and target entities, respectively. The information flow , denote target reconnaissance, reconnaissance sharing, information collection, decision-sharing, command issuance, and engagement with the enemy, respectively. If the number of nodes in the information layer is , then the adjacency matrix is a square matrix of dimension , where is represented as follows
where and .
In the spatial layer , where node set and regarding the link set , every pair of nodes is connected. In fact, the spatial layer is represented by a fully connected undirected graph. Differing from information layers, which are characterized by binary values 0 and 1 indicating entity connectivity, the spatial layer represents connections between entities using a distance measure : larger distances between entities correspond to higher values of . Assume the adjacency matrix is a square matrix of dimension , where is represented as follows
where represents the distance between entities and .
When an entity in the network is damaged, it is removed from the information layer, leading to the removal of connected links. Conversely, if the entity is restored, the opposite process occurs. Additionally, attacks and recoveries synchronously affect entities within the spatial layer. Let denote the set of damaged entities and denote the corresponding damaged links. The spatial combat network, after the entity is destroyed, is represented by , where denotes the number of entities to be damaged, with . Similarly, let denote the set of restored entities and denote the corresponding restored links. The spatial combat network obtained after the entity restored is represented by .
3 Spatial resilience optimization model for CSoS
3.1 The performance of CSoS
The performance of CSoS is achieved by aggregating the performance of all operation loops within its spatial combat network, which improves with the increasing number and capabilities of these operation loops. Typically, the capability of operation loops is assessed by quantifying both the length of the operation loop and the capability of entities involved. Referring to (Li et al., 2024, Li et al., 2021, Liu et al., 2024) the capability of the operation loop, , is calculated using Eq. (3):
where represents an operation loop involving a target entity , a sensor entity set , a decider entity set and an influncer entity set , the absolute value denotes the length of the operation loop in the information layer. The symbols of , and respectively represent the capability of sensor, decider, and influencer entities within the CSoS, while denotes the importance of the target entity within the enemy’s operational framework.
The capabilities of operation loop reflect the capability of attacking enemy target entities, while the number of operation loops signifies having more ways available for attacking these entities. Given the presence of multiple operation loops within a CSoS and varying importance levels of enemy target entities, the performance of CSoS, , is calculated using Eq. (4):
where denotes the weight of the -th enemy target entity, with . The CSoS consists of a set of operation loop .
3.2 Resilience metrics
Resilience measurement is a crucial starting point in the study of CSoS. If a network collapse has already occurred, recovering the damaged entities proves to be an effective way to mitigate the declining performance of CSoS and enhance its resilience (Artime et al., 2024). Typically, the aim of this step is to establish the objective function to provide an optimized objective for the swift and efficient recovery of the CSoS during the recovery period. Therefore, our primary focus lies on two key aspects: recovery speed and performance. Drawing upon established resilience metrics in engineering systems (Cimellaro et al., 2010, Zobel, 2011), we utilize two specific metrics to measure the resilience of CSoS: recovery speed resilience and cumulative performance loss resilience .
3.2.1 The recovery speed resilience
The recovery speed resilience primarily quantifies the resilience of the CSoS from a temporal perspective, as shown in Eq. (5):
where , a larger signifies a faster recovery speed of the CSoS and indicates higher resilience. As shown in Fig. 3(b), and respectively represent the time required to recover all damaged entities and the given maximum recovery time. Here, is subjectively determined by decision-makers based on the urgency of the recovery task. , where denotes the time required to recover the -th damaged entity. When , it indicates that CSoS instantly recovers after being attacked, with . When , it indicates that the total recovery time under the current recovery sequence (X) exceeds the given maximum recovery time deemed acceptable by the decision-makers, suggesting that the current recovery sequence is not feasible in terms of recovery speed, resulting in .
3.2.2 The cumulative performance loss resilience
In addition to temporal considerations, the resilience triangle model can be applied from a performance perspective to assess the resilience of CSoS, as illustrated in Eq. (6):
The value of is inversely related to , with smaller values being preferable. Consequently, we standardize for analytical convenience to derive the cumulative performance loss resilience , as illustrated in Eq. (7):
where , , , .
Graphically, is quantified by the area of the white region, as shown in Fig. 3. A larger indicates smaller cumulative performance loss, reflecting higher resilience. When , it signifies that CSoS cannot recover. Consequently, without a resilience optimization period, resulting in . When , , it indicates that the CSoS has experienced no post-attack loss, resulting in .
3.3 Problem analysis
We use the example in Fig. 4 to illustrate the impact of different recovery strategies on CSoS by incorporating spatial features. In this example, each entity’s capability is set to 1, and the performance of CSoS is calculated as . Assuming that three entities (represented by false nodes) are damaged, the performance decreases from to . When spatial features are not considered (focusing solely on the information layer), there is no gap between the recovery of two damaged entities; the recovery of the next entity begins immediately after the previous one is completed. However, when spatial features are considered (with spatial layer present), a travel distance is required before the recovery of the next entity can begin after the previous entity has been restored. To further illustrate the impact of spatial features on the resilience of CSoS, we define two recovery strategies:
● Recovery strategy 1: The recovery sequence for the damaged entities is D1, I1, S2.
● Recovery strategy 2: The recovery sequence for the damaged entities is I1, D1, S2.
As shown in Fig. 4(b), when spatial features are not considered, both recovery strategies require the same amount of time to restore all entities. However, when spatial features are considered, recovery strategy 2 requires only 1.30 units of time to achieve maximum performance, whereas recovery strategy 1 requires 1.42 units of time. Since the required recovery time is closely related to resilience metrics and , it demonstrates that spatial features indeed affect the resilience of CSoS.
3.4 Resilience optimization model
Based on the description above, there is a significant difference between resilience optimization with spatial features and traditional resilience optimization in CSoS. Hence, this study categorizes the network recovery optimization problem for the resilience of CSoS as a network recovery optimization problem with spatial features and then presents a corresponding spatial resilience optimization model. Additionally, in real-world scenarios, specific areas may become impassable due to geographical factors or enemy blockades, referred to as ‘obstacle’. Consequently, we extend the spatial resilience optimization to a new model that incorporates obstacles, termed the spatial resilience optimization model with obstacles. The notations in this section are listed in Table 1.
3.4.1 Spatial resilience optimization model
In an ideal scenario where recovery teams’ travel path is unaffected by geographical factors or enemy blockades, meaning they can move freely. In this case, the shortest travel path between any two entities for the recovery teams is the straight-line distance between them. Based on this, we present the spatial resilience optimization model as follows.
s.t.
We consider various objective functions in our analysis. Specifically, the objective functions (8) and (9) represent the maximization of recovery speed resilience and cumulative performance loss resilience , respectively. Equation (11) ensures that the number of recovered entities does not exceed the number of damaged entities, while Eq. (12) ensures that each damaged entity can be recovered only once by a single recovery team. Equation (13) represents the moment when the damaged entity is first restored by recovery team , while Eq. (14) indicate the moment when the damaged entity is restored by recovery team . Equations (10) and (15) respectively represent the recovery sequence of damaged entities and the moment of recovery completion for each damaged entity in recovery team . Equation (16) aims to order the recovery completion times for each damaged entity. To further simplify, Eq. (16) can be reformulated as a combination of linear constraints, as follows:
where variable indicates that the damaged entity with identifier is ranked in the overall recovery sequence; represents the moment at which the damaged entity with identifier is restored. By introducing the variable along with Eqs. (17), (18) and (19), Eq. (16) essentially transforms the ordering problem into a 0-1 assignment problem.
3.4.2 Spatial resilience optimization model with obstacles
In real-world scenario, specific areas may become impassable due to geographical factors or enemy blockades. In this case, the travel paths of recovery teams are subject to these obstacles. The optimal path is no longer a straight line and must account for detours around these obstacles, as illustrated in Fig. 5. Clearly, the travel paths for recovery teams differ with and without obstacles, and Eqs. (13) and (14) are no longer applicable in the spatial resistance optimization model with obstacles. Therefore, the spatial resilience optimization model can be refined by accounting for obstacles, leading to an enhanced spatial resilience optimization model with obstacles, as detailed below.
s.t. Eqs. (10)–(19)
The essential distinction between the two spatial resilience optimization models lies in the travel paths of the recovery teams, which influence the minimum distances between damaged entities. In the presence of obstacles, as outlined by Eqs. (22) and (23), both the travel paths of the recovery teams and the minimum distances between damaged entities are constrained by these obstacles, introducing additional spatial limitations.
4 The resilience-oriented recovery optimization method based on improved NSGA-II
4.1 Problem description and assumptions
The resilience optimization problem in CSoS presents a challenge due to the intricate nature of the complex spatial relationships between entities. The complexity is further compounded when obstacles in spatial combat networks and multi-objective optimization are considered, making the problem intractable for traditional methods. To overcome this, we propose a recovery optimization method called R-INSGA, which determines the optimal recovery sequence for damaged entities, thereby enhancing the resilience of CSoS.
Given the specific features of the resilience optimization problem in CSoS the following assumptions are made:
i) Upon damage, an entity’s capability immediately drops to zero without intermediate states. Similarly, when the entity is restored, it follows the same principle.
ii) The model exclusively considers the scenario where entities are damaged, excluding cases where connections between entities are independently damaged. A link is assumed to be damaged if the entities it connects are damaged, and it recovers concurrently with the restoration of those entities.
iii) Complete information on all entities is known, including their type, capability, and location, as well as the location and size of any obstacles.
4.2 Solution algorithm
The NSGA-II (Deb et al., 2002, Hafsa et al., 2025), which introduces fast non-dominated sorting, has become a standard paradigm for multi-objective optimization problems and can effectively enhance the resilience of CSoS from both performance and time perspectives. Accordingly, we propose the R-INSGA method to enhance the resilience of CSoS. In addition, we introduce a variable neighborhood search (VNS) mechanism (Lozano-Osorio et al., 2025) with excellence and tabu criteria to the proposed R-INSGA. Specifically as follows.
1) Encoding and decoding.
Solutions are encoded according to the damaged entities, with each damaged entity corresponding to a gene , where represents the recovery team assigned to the damaged entity and indicates the recovery sequence of the damaged entity within the recovery team. For example, when :, it indicates that the damaged entity is recovered by recovery team , and it ranks first in the recovery order of .
2) Mutation operator and selection operator.
We utilize a two-point mutation operator combined with a binary tournament selection operator.
3) Crossover operator.
The crossover operator randomly divides genes into two segments, designated as Segments A and B, as illustrated in Fig. 6(b). The gene of Child 1 is derived from Segment A of Parent 1 and Segment B of Parent 2, while the gene of Child 2 is derived from Segment B of Parent 1 and Segment A of Parent 2. Additionally, the crossover operator may produce infeasible solutions, which necessitate gene repair.
4) Variable neighborhood Search.
We designed two neighborhoods for the VNS, termed the 2-exchange neighborhood and the 3-exchange neighborhood, respectively. Each 2- or 3-exchange local search randomly swaps the recovery teams and their repair sequences for two or three damaged entities, as illustrated in Fig. 6(c). To improve the effectiveness of the VNS, we introduce two additional criteria. The first is the excellence criterion, which applies VNS only to individuals in the Pareto front of each generation. The second is the tabu criterion, which excludes individuals that do not yield improved solutions from VNS in subsequent iterations, regardless of their Pareto front status.
Given the presence of obstacles, repair teams must navigate around these barriers to reach the damaged entities. The continuous Dijkstra algorithm (Wang, 2023) effectively addresses this challenge. Leveraging these approaches, the R-INSGA algorithm is formalized and presented in Algorithm 1.
5 Experimental analysis
5.1 Case description
To demonstrate the feasibility, effectiveness, and superiority of the CSoS-STRE in enhancing the resilience of CSoS, numerous experiments are conducted using a CSoS case study (Liu et al., 2024). The CSoS consists of 15 sensor entities, 10 decider entities, 20 influencer entities, and 5 enemy target entities. The topology of the CSoS is depicted in Fig. 7 and includes both the information layer and the spatial layer with and without obstacles.
5.2 Parameter settings
The detailed information of all entities in the space combat network are shown in Table 2. The space combat network comprises 321 operation loops in the information layer, while the spatial layer is defined as an “4200 × 3500” area with five obstacles. The CSoS comprises 50 entities and 176 links, with an attack event resulting in the destruction of 15 entities. Currently, there is one recovery team (), with its travel speed is set to . The maximum recovery time is set to .
5.3 Resilience analysis
Assuming that the CSoS experiences random attacks resulting in the destruction of 15 entities (S8, S13, D1, D2, D3, D5, D6, D7, I2, I6, I10, I12, I18, I19, I20), its performance reaches its lowest point at , and performance drops from to . To demonstrate the feasibility and effectiveness of the proposed framework, we compare it with traditional random recovery strategies (RRS). In this analysis, we consider a single recovery team and evaluate its performance from four different initial positions: down (D5), right (D1), up (I6), and left (I8).
Figure 8(a) depicts the travel path of the recovery team in the absence of obstacles. As shown in Fig. 8, regardless of the recovery team’s initial position, the curve of the proposed R-INSGA consistently outperforms that of RRS. Similarly, in the presence of obstacles (Fig. 9), the curve for the proposed R-INSGA remains superior to that of RRS. However, with obstacles present, the travel path of the recovery team becomes more complex due to the inability to navigate directly through the obstacles.
To facilitate the comparison of resilience, we define the resilience comparison parameter as . As shown in Table 3, the proposed R-INSGA demonstrates superior performance compared to RRS in enhancing the resilience of CSoS. For example, with initial positions at D5 and obstacles present, the proposed R-INSGA achieves a 69% greater resilience enhancement compared to RRS. In addition, we observe that, overall, although the resilience values with obstacles are not significantly different from those without obstacles, it remains evident that the resilience enhancement effect is weaker in the presence of obstacles. The former is due to the given maximum recovery time being excessively long, while the latter is attributable to the longer travel path of the recovery team in the presence of obstacles. The above findings align with real-world situations, demonstrating that the proposed space combat network and resilience optimization model are both feasible and effective.
5.4 Extend analysis
5.4.1 Effect of the number of recovery team
Keeping other parameters constant, Figs. 10 and 11 illustrate the effect of the number of recovery teams on the travel path in the presence of obstacles. Here, we considered two scenarios for four different numbers of recovery teams: one where all recovery teams start from position D5 (same direction), and another where the recovery teams start from different positions (different directions).
Table 3 provides the resilience enhancement effects, indicating that a single recovery team () is insufficient, and the resilience enhancement effect gradually improves. Note that variations in and are not linearly related. For example, in the case of different directions, the resilience value for is 33.90% higher compared to , while shows only an 8.86% improvement over , and provides a 3.49% increase over . In addition, the impact of the recovery teams’ initial positions on resilience values is minimal between the same direction and different directions scenarios. This is due to the fact that the given maximum recovery time and other related recovery resources have been set to sufficient levels.
The above experiment yields the following insights: indiscriminately increasing the number of recovery teams does not necessarily lead to significantly better outcomes. It is crucial to balance the costs of adding more teams with the benefits of improved resilience. Additionally, when recovery resources are set to sufficient levels, decision-makers do not need to consider the initial positions of multiple recovery teams.
5.4.2 Effect of the given maximum recovery time
Keeping other parameters constant, Figs. 12 and 13 illustrate the effect of given maximum recovery time on resilience, considering obstacles and different directions. We consider four scenarios with different maximum recovery times: .
As shown in Fig. 12 and Table 3, when the given maximum recovery time , variations in do not alter the travel paths or recovery sequence, as the time required to recover all damaged entities is . However, when , meaning that the time to restore all damaged entities exceeds the given maximum recovery time, the travel path and recovery sequence of the recovery teams will change. This is because recovery teams cannot recover all damaged entities; rather, they can only restore a specific subset of damaged entities within a given maximum recovery time to achieve a locally optimal resilience value rather than a global optimum. According to Eqs. (5) and (7), and are positively correlated with , and thus increase as increases. Therefore, can be determined based on practical considerations to highlight the urgency of recovery.
The above experiment yields the following insights: decision-makers can adjust the travel paths of recovery teams to achieve local optimization by altering the given maximum recovery time. Additionally, setting the given maximum recovery time also reflects the urgency of the recovery effort.
5.4.3 Effect of the travel speed of recovery team
Keeping other parameters constant, Figs. 13 and 14 illustrate the effect of the travel speed of recovery team on resilience, considering obstacles and different directions. We consider four situations for the travel speed of recovery teams: .
As shown in Fig. 13 and Table 3, travel speed significantly affects both the recovery sequence of damaged entities and the effectiveness of resilience enhancement. As travel speed increases, the time required to recover all damaged entities decreases and the resilience value improves. For example, at a travel speed of , , whereas at a travel speed of , . The former is 7% more effective than the latter. Essentially, represents the recovery speed rate to some extent. If the travel speed is too low, it may not be possible to restore all damaged entities within the given maximum recovery time . Conversely, if the travel speed is too high, the associated recovery costs may become prohibitive, as travel speed is often closely linked to recovery costs in practical scenarios. Therefore, can be determined based on practical recovery cost considerations.
The above experiment yields the following insights: adjustments to travel speed directly influence the rate of recovery, with higher travel speeds accelerating the overall recovery process. Decision-makers can optimize the trade-off between recovery costs and resilience enhancement by adjusting in accordance with practical constraints and operational considerations. For the extended analysis of the no-obstacle scenario, please refer to Supplementary Material 1. The results adhere to the same rules as those observed in the obstacle scenario’s extended analysis.
5.5 Baseline comparison
To demonstrate the superiority of the proposed framework, we replace the previous RRS with two deliberate attack strategies, each addressing different perspectives. i) Deliberate attack 1: this strategy employs a degree centrality-based approach, where entities in the CSoS are sequentially removed in descending order of their degree centrality, focusing on the structural perspective. ii) Deliberate attack 2: this strategy uses a maximum operation loop-performance-first approach, removing entities in descending order based on their impact on the performance of operation loops, thereby concentrating on the functional perspective. Additionally, we select six baseline methods (Liu et al., 2024) and RRS for comparison with the proposed framework. The methods are described as follows.
1) Performance-based recovery strategy (PBRS). The damaged entities are restored in descending order based on their instantaneous performance improvement.
2) Time-based recovery strategy (TBRS). The damaged entities are restored in ascending order based on the speed of performance improvement. For example, if restoring damaged entity A takes less time compared to restoring damaged entity B, entity A will be prioritized for recovery.
3) Degree centrality-based recovery strategy (DCRS). The damaged entities are restored in descending order of their degree centrality values.
4) Betweenness centrality-based recovery strategy (BCRS). The damaged entities are restored in descending order of their betweenness centrality values.
5) Closeness centrality-based recovery strategy (CCRS). The damaged entities are restored in descending order based on their closeness centrality values.
6) Eigenvector centrality-based recovery strategy (ECRS). The damaged entities are restored in descending order of their eigenvector centrality values.
We consider both single recovery team (, ) and multiple recovery team (, ) scenarios for a comprehensive analysis, with Fig. 15(a) illustrating the travel paths of under the proposed R-INSGA. As shown in Fig. 15(b) and Table 4, the performance curve of R-INSGA generally positions above those of the other baseline methods, regardless of the attack strategy or the number of recovery teams, indicating its superiority. For instance, under deliberate attack 1, a single recovery team restores all damaged entities more quickly than other recovery strategies (except TBRS), achieving full restoration in just 838.88 time units. Surpassing other recovery strategies in resilience values by 39.39%, 3.86%, 20.72%, 17.23%, 50.70%, and 52.45%, respectively. Similarly, in the scenario with four recovery teams, it is evident that R-INSGA outperforms other recovery strategies in both and . Based on the values of , the ranking of the recovery strategies is R-INSGA > TBRS > > PBRS > DCRS = BCRS > ECRS > CCRS > RRS, underscoring the superiority of the proposed framework.
6 Conclusion and future directions
Nowadays, modern warfare has transitioned from the paradigm of isolated combat forces to system-to-system confrontations. However, CSoS inevitably faces disturbances like enemy attacks, interference, or internal failures in dynamic environments, which can lead to performance degradation and failure to meet task requirements. Enhancing the resilience of CSoS is garnering increasing attention due to its practical value in optimizing network architectures, improving network security, and refining operational planning. To address these challenges, we present a unified framework called CSoS-STRE, which incorporates spatial features to enhance CSoS resilience, offering the following benefits.
i) CSoS-STRE fully integrates spatial features and represents CSoS as multilayer networks, including information and spatial layers, offering a precise depiction of the operational process.
ii) CSoS-STRE not only incorporates practical factors such as the given maximum recovery time, as well as the number and travel speed of recovery teams, but also skillfully reformulates the problem into a linear optimization model.
iii) CSoS-STRE can simultaneously provide optimal travel paths and recovery sequences. Compared to other baseline methods, it achieves faster convergence and better performance.
The results provide valuable insights for guiding recovery and developing more resilient CSoS. Some insights are as follows: i) indiscriminately increasing the number of recovery teams does not necessarily lead to significantly better outcomes. ii) decision-makers can adjust the travel paths of recovery teams to achieve local optimization by altering the given maximum recovery time. iii) adjustments to travel speed directly influence the rate of recovery, with higher travel speeds accelerating the overall recovery process. While this study represents a foundational step in enhancing the resilience of CSoS through the integration of spatial features, several challenges remain to be addressed in future research. For example, leveraging machine learning to develop more efficient and cost-effective optimization algorithms offers a promising direction. In addition, the initial positions of recovery teams significantly impact the recovery sequence of subsequent damaged entities. Scientifically determining the optimal initial positions for one or multiple teams presents a significant challenge for further exploration.
Artime O,Grassia M,De Domenico M,Gleeson J P,Makse H A,Mangioni G,Perc M,Radicchi F, (2024). Robustness and resilience of complex networks. Nature Reviews. Physics, 6( 2): 114–131
[2]
Aslani B,Mohebbi S,Oughton E, (2024). A systematic review of optimization methods for recovery planning in cyber–physical infrastruc-ture networks: Current state and future trends. Computers & Industrial Engineering, 192: 110224
[3]
Chatterjee A,Helbig C,Malak R,Layton A, (2023). A comparison of graph-theoretic approaches for resilient system of systems design. Journal of Computing and Information Science in Engineering, 23( 3): 030906
[4]
Chatterjee A,Malak R,Layton A, (2022). Ecology-inspired resilient and affordable system of systems using degree of system order. Systems Engineering, 25( 1): 3–18
[5]
Chen W,Li W,Zhang T, (2024a). Complex network-based resilience capability assessment for a combat system of systems. Systems, 12( 1): 31
[6]
Chen Z,Hong D,Cui W,Xue W,Wang Y,Zhong J, (2023a). Resilience evaluation and optimal design for weapon system of systems with dynamic reconfiguration. Reliability Engineering & System Safety, 237: 109409
[7]
ChenZYinSLiLCuiWHongD (2024b). Resilience metric and dynamic assessment of unmanned system-of-systems considering cooperative reconfiguration strategies. IEEE Transactions on Reliability. doi:10.1109/TR.2024.3438810
[8]
Chen Z,Zhou Z,Zhang L,Cui C,Zhong J, (2023b). Mission reliability modeling and evaluation for reconfigurable unmanned weapon system-of-systems based on effective operation loop. Journal of Systems Engineering and Electronics, 34( 3): 588–597
[9]
Cimellaro G P,Reinhorn A M,Bruneau M, (2010). Framework for analytical quantification of disaster resilience. Engineering Structures, 32( 11): 3639–3649
[10]
Danziger M M,Barabási A L, (2022). Recovery coupling in multilayer networks. Nature Communications, 13( 1): 955
[11]
De Domenico M, (2023). More is different in real-world multilayer networks. Nature Physics, 19( 9): 1247–1262
[12]
Deb K,Pratap A,Agarwal S,Meyarivan T, (2002). A fast and elitist multiobjective genetic algorithm: Nsga-ii. IEEE Transactions on Evolutionary Computation, 6( 2): 182–197
[13]
DellerSBowlingS RRabadiG ATolkABellM I (2009). Applying the information age combat model: quantitative analysis of network centric operations. The international C2 Journal, 3(1)
[14]
DeptulaD APenneyH RStutzriemL AGunzingerM (2019). Restoring america’s military competitiveness: Mosaic warfare. Mitchell Institute for Airpower Studies
[15]
Du C,Ouyang M,Zhang H,Wang B,Wang N, (2023). Resilience patterns of urban road networks under the worst-case localized disruptions. Risk Analysis, 44( 10): 2333–2347
[16]
Dui H,Zhu Y,Tao J, (2024). Multi-phased resilience methodology of urban sewage treatment network based on the phase and node recovery importance in IoT. Reliability Engineering & System Safety, 247: 110130
[17]
Edwards C M,Nilchiani R R,Miller I M, (2024). Impact of graph energy on a measurement of resilience for tipping points in complex systems. Systems Engineering, 27( 4): 745–758
[18]
Fang Z,Wu S,Zhang X,Sun Y, (2021). ADC-GERT network parameter estimation model for mission effectiveness of joint operation system. Journal of Systems Engineering and Electronics, 32( 6): 1394–1406
[19]
Filippini R,Silva A, (2014). A modeling framework for the resilience analysis of networked systems-of-systems based on functional dependencies. Reliability Engineering & System Safety, 125: 82–91
[20]
Gao F,He W,Bi W, (2024). An intuitionistic fuzzy weighted influence non-linear gauge system for equipment evaluation under system-of-systems warfare environment. Expert Systems with Applications, 238: 122187
[21]
Gao Y,Cheng J,Tian Y,Liu H, (2023). Machine learning-based evaluation of the contribution effectiveness in SoS missions. IEEE Systems Journal, 17( 4): 5877–5888
[22]
Hafsa M,Wattebled P,Jacques J,Jourdan L, (2025). Solving a multiobjective professional timetabling problem using evolutionary algorithms at mandarine academy. International Transactions in Operational Research, 32( 1): 244–269
[23]
Han Q,Pang B,Li S,Li N,Guo P S,Fan C L,Li W M, (2023). Evaluation method and optimization strategies of resilience for air and space defense system of systems based on kill network theory and improved self-information quantity. Defence Technology, 21: 219–239
[24]
Holling C S, (1973). Resilience and stability of ecological systems. Annual Review of Ecology and Systematics, 4( 1): 1–23
[25]
Huang Y,Luo A,Chen T,Zhang M,Ren B,Song Y, (2023). When architecture meets RL+EA: A hybrid intelligent optimization approach for selecting combat system-of-systems architecture. Advanced Engineering Informatics, 58: 102209
[26]
Khasawneh M T,Shearer N,Rabadi G,Bowling S, (2017). The information age combat model: A vision for a discrete event simulation approach. International Journal of Simulation and Process Modelling, 12( 5): 429–445
[27]
KoehlerM TBricio-NetoJ LPageE HTolkA (2024). Applying complex adaptive systems research results to combat simulations of the generation-after-next. The Journal of Defense Modeling and Simulation, 15485129241233608
[28]
LanierBPetngaL (2019). Spatial functions for modeling and analysis of safety-critical systems of systems. 2019 14th Annual Conference System of Systems Engineering, SoSE 2019, page 352–357
[29]
Li J,Jiang J,Yang K,Chen Y, (2019). Research on functional robustness of heterogeneous combat networks. IEEE Systems Journal, 13( 2): 1487–1495
[30]
Li J,Tan Y,Yang K,Zhang X,Ge B, (2017). Structural robustness of combat networks of weapon system-of-systems based on the operation loop. International Journal of Systems Science, 48( 3): 659–674
[31]
Li J,Zhao D,Jiang J,Yang K,Chen Y, (2021). Capability oriented equipment contribution analysis in temporal combat networks. IEEE Transactions on Systems, Man, and Cybernetics. Systems, 51( 2): 696–704
[32]
Li R,Yuan H,Ren B,Zhang X,Chen T,Luo X, (2024). Optimal unmanned combat system-of-systems reconstruction strategy with heterogeneous cost via deep reinforcement learning. Mathematics, 12( 10): 1476
[33]
Liu J,Xu R,Li J,Yang K,Lou Z, (2024). Enhancing the resilience of combat system-of-systems under continuous attacks: Novel index and reinforcement learning-based protection optimization. Expert Systems with Applications, 251: 123912
[34]
Liu M,Li J,Yang Z,Yang K, (2023). Higher-order functional structure exploration in heterogeneous combat network based on operational motif spectral clustering. IEEE Systems Journal, 17( 3): 4279–4290
[35]
Liu X,Li D,Ma M,Szymanski B K,Stanley H E,Gao J, (2022). Network resilience. Physics Reports, 971: 1–108
[36]
Lozano-Osorio I,Sánchez-Oro J,López-Sánchez A,Duarte A, (2025). A variable neighborhood search for the median location problem with interconnected facilities. International Transactions in Operational Research, 32( 1): 69–89
[37]
Markina-Khusid A,Jacobs R B,Antul L,Cho L,Tran H T, (2022). A complex network framework for validated assessments of systems of systems robustness. IEEE Systems Journal, 16( 1): 1092–1102
[38]
Miller K,Bordetsky A,Mun J,Maule R,Pollman A, (2021). Merging future knowledgebase system of systems with artificial intelli-gence/machine learning engines to maximize reliability and availability for decision support. Military Operations Research, 26( 4): 77–93
[39]
Qi X,Mei G, (2024). Network resilience: Definitions, approaches, and applications. Journal of King Saud University – Computer and Information Sciences, 36( 1): 101882
[40]
Rescia A,Gómez Menéndez A,González Lodares C,Ortega M, (2023). Quantification of the spatial resilience of the spanish rural landscape to fire occurrence analysed using the sispares network of plots. Landscape Ecology, 38( 12): 3621–3636
[41]
Sinex C H,Lilly T C,Harlow M A, (2000). Using the war room process to explore network-centric warfare. Johns Hopkins APL Technical Digest, 21( 3): 368–377
[42]
Sun L,Zhou Y,Zhu C,Zhang W, (2024a). A new important nodes identification method in multi-layer heterogeneous combat network with meta-path centrality. Journal of Complex Networks, 12( 3): cnae021
[43]
Sun Q,Li H,Wang Y,Zhang Y, (2022). Multi-swarm-based cooperative reconfiguration model for resilient unmanned weapon system-of-systems. Reliability Engineering & System Safety, 222: 108426
[44]
Sun Q,Li H,Zhong Y,Ren K,Zhang Y, (2024b). Deep reinforcement learning-based resilience enhancement strategy of unmanned weapon system-of-systems under inevitable interferences. Reliability Engineering & System Safety, 242: 109749
[45]
Sun Y,Zhang T, (2023). Research on autonomous reconstruction method for dependent combat networks. IEEE Systems Journal, 17( 4): 6104–6113
[46]
Tran H T,Domerçant J C,Mavris D N, (2016). A network-based cost comparison of resilient and robust system-of-systems. Procedia Computer Science, 95: 126–133
[47]
Uday P,Chandrahasa R,Marais K, (2019). System importance measures: Definitions and application to system-of-systems analysis. Reliability Engineering & System Safety, 191: 106582
[48]
Uday P,Marais K, (2015). Designing resilient systems-of-systems: A survey of metrics, methods, and challenges. Systems Engineering, 18( 5): 491–510
[49]
Wang H, (2023). A new algorithm for euclidean shortest paths in the plane. Journal of the Association for Computing Machinery, 70( 2): 11
[50]
Wang L,Jin J G,Sun L,Lee D H, (2024a). Urban rail transit disruption management: Research progress and future directions. Frontiers of Engineering Management, 11( 1): 79–91
[51]
Wang Z,Su Z,Deng Y,Kurths J,Wu J, (2024b). Spatial network disintegration based on kernel density estimation. Reliability Engineering & System Safety, 245: 110005
[52]
Watson B,Chowdhry A,Weissburg M,Bras B, (2022). A new resilience metric to compare system of systems architecture. IEEE Systems Journal, 16( 2): 2056–2067
[53]
Watson B C,Morris Z B,Weissburg M,Bras B, (2023). System of system design-for-resilience heuristics derived from forestry case study variants. Reliability Engineering & System Safety, 229: 108807
[54]
Pan X,Wang H,Yang Y,Zhang G, (2019). Resilience based importance measure analysis for SoS. Journal of Systems Engineering and Electronics, 30( 5): 920–930
[55]
Xu R,Gong L,Xie J,Liu X,Yang K, (2023a). Operation network link importance evaluation and recovery strategy based on equipment system-of-systems resilience. Journal of Systems Engineering and Electronics, 45( 1): 139–147
[56]
Xu R,Liu J,Li J,Yang K,Zio E, (2024). TSoSRA: A task-oriented resilience assessment framework for system-of-systems. Reliability Engineering & System Safety, 248: 110186
[57]
Xu R,Liu X,Cui D,Xie J,Gong L, (2023b). An evaluation method of contribution rate based on fuzzy bayesian networks for equipment system-of-systems architecture. Journal of Systems Engineering and Electronics, 34( 3): 574–587
[58]
Yabe T,Rao S C,Ukkusuri S V,Cutter S L, (2022). Toward data-driven, dynamical complex systems approaches to disaster resilience. Proceedings of the National Academy of Sciences of the United States of America, 119( 8): e2111997119
[59]
Yang D,Li Q,Zhu F,Cui H,Yi W,Qin J, (2023). Parallel emergency management of incidents by integrating ooda and prea loops: The c2 mechanism and modes. IEEE Transactions on Systems, Man, and Cybernetics. Systems, 53( 4): 2160–2172
[60]
Zhang J,Fang Z,Dong W,Zhang L, (2024). Portfolios selection decision model for equipment system of systems considering development costs. Expert Systems with Applications, 246: 123235
[61]
Zhong Y,Li H,Sun Q,Huang Z,Zhang Y, (2024). A kill chain optimization method for improving the resilience of unmanned combat system-of-systems. Chaos, Solitons, and Fractals, 181: 114685
[62]
Zobel C W, (2011). Representing perceived tradeoffs in defining disaster resilience. Decision Support Systems, 50( 2): 394–403
RIGHTS & PERMISSIONS
Higher Education Press
AI Summary 中Eng×
Note: Please be aware that the following content is generated by artificial intelligence. This website is not responsible for any consequences arising from the use of this content.