Previous Article in Journal
D2T2 Analysis of a Loss of Main Feed Water Accident
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multidimensional Effectiveness Evaluation of Weapon System-of-Systems Based on Hypernetwork Under Communication Constraints

1
Center for Control Theory and Guidance Technology, Harbin Institute of Technology, Harbin 150001, China
2
Beijing Institute of Aerospace Systems Engineering, Beijing 100076, China
*
Author to whom correspondence should be addressed.
Systems 2025, 13(10), 928; https://doi.org/10.3390/systems13100928
Submission received: 29 July 2025 / Revised: 26 September 2025 / Accepted: 9 October 2025 / Published: 21 October 2025
(This article belongs to the Section Artificial Intelligence and Digital Systems Engineering)

Abstract

A weapon system-of-systems (WSoS) is a higher-level system comprising various functional weapon equipment systems interconnected via mutual relationships, forming a hierarchical structure that can generate overall combat effectiveness. A critical factor in assessing WSoS performance is the kill chain, and quantifying the combat effectiveness of a WSoS based on the kill chain is crucial for optimizing the system’s structure and improving the understanding of the battlefield situation, holding significant military value. Scenarios involving restricted communication (e.g., limitations in weapon system capabilities, terrain obstructions, or enemy interference) make analyzing WSoS performance challenging, so proposed here is a kill chain-based method for analyzing WSoS capability in order to address the impact of communication restrictions. Specifically, a generalized multilayer network model with information relays is used to network the WSoS, then based on this, a capability-matrix-based method for generating and analyzing the kill chain is designed. Experiments show that the proposed model and method enable effective generation and analysis of the kill chain in communication-denial situations. Furthermore, a framework for evaluating WSoS performance is established from the dimensions of mission tasks and network structure, and combat effectiveness is assessed by quantifying performance indicators based on kill chain information. Finally, case studies are used to validate the proposed algorithm and show its reliability.

1. Introduction

The new form of confrontation in modern warfare under informatized conditions involves defense and offense among multiple weapon systems on both sides, unfolding in the integrated five domains of sea, land, air, space, and cyber, and key to achieving victory is situational control of the operational system [1,2,3]. The main steps in the process for designing a weapon system-of-systems (WSoS) are system modeling, evaluation, and optimization. The basic approach is to build a networked model of the WSoS, using the kill chain (KC) as the fundamental element for measuring the system’s effectiveness, and then constructing a multi-objective optimization problem for the system structure design [4,5,6]. Therefore, key components of WSoS design are KC generation and combat-effectiveness evaluation. However, communication-restricted combat situations create a more complex WSoS structure [7,8], therefore requiring more-effective methods for analyzing system capability.
Because of the complexity of real-world combat scenarios, the strong interconnections therein, and the varying information elements among different combat stages, a networked WSoS representation is effective for quantifying the relationships among these stages and capturing KC information from the operational environment. However, the redundancy and constraints in path search within the kill web make obtaining an effective KC very challenging. Cares [9] categorized combat forces into enemy targets, decision entities, sensor entities, and influence entities, thereby creating the Information Age Combat Model (IACM) to represent the complex information flow among these four types of entities. Dekker [10] described the heterogeneity of combat networks and constructed the FINC (force, intelligence, networking, and C2) model that divides combat entities into force nodes, intelligence nodes, and command-and-control nodes, with the information flow among entities represented by lines or arcs. To simulate the real battlefield more accurately, networked WSoS models were developed sequentially [11,12,13], based on which Chen et al. [14] and Tan et al. [15] integrated reconnaissance equipment, decision-making equipment, strike equipment, and enemy targets into a closed loop to form the KC. Qi et al. [16] proposed a combat-network construction algorithm to generate a distributed combat-system network topology model; the constructed combat network model includes the condition of information relays but does not specify the constraints or implementation details of these relays, focusing solely on building the distributed combat-system network topology. Based on the standard KC form, various types of KCs were studied primarily, such as those considering coordination and information sharing [17,18]; however, those models ignored the fact that a single combat stage could be performed by multiple entities working together, limiting the KC acquisition to a simplified form. Furthermore, using higher-order adjacency matrix methods provides only the KC quantity, leaving insufficient the quantification of the KC information of the WSoS. Graph path searching [19] can reveal the KC’s structure, thereby quantifying its effectiveness, but a lack of structural constraints can lead to many redundant chains, thus impacting the evaluation of WSoS effectiveness. However, in real-world combat scenarios, alongside inherent limitations in equipment capabilities and uncontrollable factors such as weather, there are also random variables such as enemy interference and terrain obstructions, which restrict the transmission of both perception and decision-making information. Therefore, the primary motivation herein is to construct a networked model of a WSoS under communication constraints and to acquire all KCs that are both sufficient and meet the necessary constraints.
The KC is the basic unit that forms combat events and is also a fundamental component of evaluating WSoS combat effectiveness. Generating the KCs of a WSoS can quickly capture key information in the battlefield situation, providing data support for networked effectiveness evaluation. Li et al. [12] extended the concept of natural connectivity to directed combat networks and proposed directed natural connectivity to measure the robustness of the CNWSOS (combat network of WSoS) network model. Many studies have addressed the robustness analysis of complex networks by introducing various evaluation metrics, such as vertex (edge) connectivity, fault diameter, isoperimetric number, scattering number, toughness, expansion parameters, algebraic connectivity, and natural connectivity [10,20,21,22,23,24]. However, most of these measures are focused on the structural connectivity of complex networks, with few studies addressing robustness from a functional perspective [25,26]. Furthermore, based on the IACM model, Cares [9] calculated the Perron–Frobenius eigenvalue of the combat network’s adjacency matrix to measure combat efficiency. Similarly, Deller [27] validated the effectiveness of the Perron–Frobenius eigenvalue in assessing the robustness of forces within the combat network by establishing an agent-based simulation model. However, most of those studies considered only the topological structure of the combat network, neglecting the capabilities and cooperation of functional entities when evaluating robustness [28,29]. Di et al. [30] analyzed the robustness of heterogeneous military organizations by quantifying the combat loops within combat networks. Nevertheless, the proposed metrics have high computational complexity and are ill suited for large-scale network applications. Because modern warfare involves offensive and defensive confrontation between the systems on both sides, evaluating the effectiveness of a WSoS based solely on its own capabilities is not sufficiently comprehensive. Therefore, the second motivation herein is to establish an evaluation framework for WSoS effectiveness by considering both sides’ strategies from multiple dimensions, particularly using networked models and KC information for effective assessment.
The aim herein is to provide a solution for the generation and effectiveness evaluation of WSoS KCs under communication constraints. Based on the above theoretical background, the main contributions of this research are as follows.
(1)
A generalized multilayer network model that includes information relays is proposed, and based on combat characteristics, a directed multilayer network model is designed to construct a capability matrix for quantifying a WSoS. Unlike existing relay-less network models and adjacency-matrix quantification methods [11,13], under communication-constrained conditions, this approach integrates combat segment capability information by compensating for missing information relay relationships, thereby providing strong data support for networked effectiveness evaluation.
(2)
Considering time and probability constraints, a KC generation and analysis method is proposed. Based on this, an effectiveness-evaluation index framework for a WSoS is constructed from the two dimensions of mission tasks and network structure. It includes the effectiveness of both the red force’s (explained later) own structure and its execution of combat tasks. Unlike other methods [15,17,19], KCGA simultaneously considers the time and probability constraints of combat loops and individual combat segments, thereby simplifying the KC generation process. The resulting KC information is more accurate and complete, providing support for the networked effectiveness evaluation of the WSoS.

2. Construction of Networked Model for WSoS

2.1. Construction of Supernetwork Model with Information Relays

The primary form of warfare in the information age is system-of-systems warfare, where systems comprise numerous independent units with specific functions interacting with each other, creating a large and complex system with defined capabilities. From a topological perspective, this forms a complex network in which single-function entities or multifunctional integrated entities serve as nodes, while energy, information, and cognitive interactions among entities form the edges. These nodes themselves are also complex networks, characterized by multilevel, multidimensional, multitiered, multi-attribute, and multi-objective features. As a result, complex networks are essentially networks of networks that self-organize and integrate various types of networks, also referred to as a system’s supernetwork. By transforming the system structure into a supernetwork, graph-theory characterization of complex networks can be used to represent the system, thereby enabling the system model to be matrixed and its entity elements digitized.
A supernetwork [31] is a multi-edge heterogeneous network that connects various types of nodes according to the direction of information transmission, emphasizing overall functionality. This network can be divided into multiple interacting complex networks based on the attributes of its nodes or links, and it can be represented as
M = ( E , L ) ,
where M represents the supernetwork graph model, as shown in Figure 1a; L = L α α = 1 d is the set of d complex networks L α in the supernetwork, with complex network layer α consisting of nodes R i α and the edges among them. Each complex network can represent a specific link of information transmission based on the actual problem’s requirements, and they are formed sequentially according to the order of information transmission. E represents the set of edges within all complex networks in the supernetwork and among different complex networks. The interlayer relationships are divided into two types: Solid lines represent the interactions between adjacent complex network layers, while dashed lines represent the interactions between the current complex network and non-adjacent complex networks. Therefore, the supernetwork requires the construction of models for nodes and edges within each complex network layer, as well as the interaction relationships among the layers of different complex networks. A single-layer complex network L α refers to a network comprising nodes of the same type and their interactions, which can be represented as
G α = V α , E α ,
where V α = R i α , L α L α L , i [ 1 , 2 , , n ] is the set of nodes in the complex network L α , R i α is the set of nodes in L α , V α = n is the number of nodes in the network, and E α = R i α , R j α i , j [ 1 , 2 , , n ] , i j represents the interaction edges among the nodes in the network, with corresponding values as the link weights.
The interlayer relationships of the supernetwork refer to the cross-layer transmission of information. This mode of information transmission requires that the starting nodes in the upper-layer network and the terminal nodes in the lower-layer network can exchange information directly. If communication is restricted, then this will affect the interaction of information between adjacent layers, resulting in the loss of information transmission paths. To enhance the resilience of the supernetwork, a relay complex network L r e l a y is designed to indirectly transmit information between adjacent layers, as shown in Figure 1b. L r e l a y contains all nodes with information transmission functions, and its definition is the same as that of L α . At this point, the interlayer relationships represent the mapping of the same equipment across different layers, i.e., the starting nodes are R 3 β = R 3 r e l a y , R 4 β = R 4 r e l a y , R 5 β = R 5 r e l a y , and the terminal nodes are R 14 β + 1 = R 14 r e l a y , R 13 β + 1 = R 13 r e l a y , R 12 β + 1 = R 12 r e l a y . If direct information transmission between adjacent layers is restricted, then relay links in the relay layer can be used to transmit information indirectly, thereby compensating for the link loss caused by communication constraints.

2.2. Construction of Directed Multilayer Network Model for WSoS

The functional combat network of a WSoS is a network aimed at specific combat tasks, where during operations various functional units within the WSoS transmit information through various material, energy, and information flows (functional edges) to form combat power against enemy targets. These units cooperate and work together to complete the corresponding combat tasks, forming a supernetwork interwoven with the enemy’s targets through interconnected links. According to the OODA loop (observe–orient–decide–act) combat theory [32], information-based combat is a target-oriented, directed operational activity that follows the cycle of observe–orient–decide–act, with the target as the source node and ending the cycle with the target as the sink node. Specifically, the target’s information is gathered by reconnaissance equipment, decision-making equipment issues instructions, and impact equipment takes action on the target. Therefore, the combat process is divided into three stages, i.e., reconnaissance–decision–impact, with each stage being directed and essential. Thus, the combat process can be viewed as a directed flow of information (target) from reconnaissance to strike, which is represented in the supernetwork as a directed multilayer network with layers for reconnaissance, decision-making, and impact.
In actual combat scenarios, because of equipment limitations or obstacles such as weather, terrain, or enemy interference, communication may be obstructed between reconnaissance equipment and decision-making equipment or between decision-making equipment and impact equipment. To ensure that the combat process remains complete and closed, information transmission must go through other relay equipment for indirect communication. Therefore, relay entities (C) are introduced to assist in information transmission, compensating for the loss of operational situation information. These relay entities include not only combat equipment with relay capabilities but also other multifunctional equipment with relay capabilities, such as reconnaissance entities, strike entities, and decision-making entities. The WSoS combat entities are classified in Table 1.
The WSoS is described using two factions, red and blue. The blue side has m pieces of equipment, while the red side has n pieces: The equipment of the blue side is represented by the set T = T 1 , T 2 , T m , and that of the red side is represented by the set R = R 1 , R 2 , R n . If the red side’s equipment R i has reconnaissance capability, then it is represented by S i ; similarly, if  R i has communication, command, or strike capability, then it is represented by C i , D i , or  I i , respectively. The difference in the importance of enemy targets affects the WSoS capability analysis. Let w t [ 0 , 1 ] , 0 t m represent the importance level of target t, and it satisfies t = 1 m w t = 1 .
From the above discussion, it can be seen that under communication-constrained conditions, the transmission of combat information not only relies on the basic reconnaissance, command, and strike layer networks but also depends on necessary information relays. Therefore, the WSoS directed multi-layer complex network is divided into five interacting networks based on the actual direction of information transmission in combat: the reconnaissance network ( L 1 ), relay network ( L 2 ), command network ( L 3 ), relay network ( L 4 ), and strike network ( L 5 ). L 2 and L 4 serve as the media for transmitting reconnaissance and decision-making information, respectively. The quantification of the WSoS’s directed multi-layer network includes the construction of both intra-layer and inter-layer relationships. Intra-layer relationships can be quantified using the adjacency matrix concept in graph theory, while inter-layer relationships can be described based on the construction mechanism of the relay layer in the hypernetwork model and the characteristics of combat information.

2.3. Directed Multilayer Network Model Capability Matrix Representation

In a multilayer network, the intra-network relationship refers to the interactions and connections among nodes within L α , including connectivity probability and time metrics. Using the adjacency matrix to represent intra-network relationships not only allows for easy retrieval of connectivity characteristics between any two nodes in the network but also enables the study of various properties of complex networks via matrix analysis. However, traditional 0–1 matrices (0 indicating no connectivity and 1 indicating connectivity) no longer fully meet the requirements for representing multiple attributes among nodes. Therefore, constructing the complex network capability matrices A p and A t quantifies the connectivity probability and time attributes of equipment in the WSoS, providing data support for evaluating its effectiveness.

2.3.1. Reconnaissance Layer L 1

The reconnaissance layer comprises red-side entities and enemy targets, performed primarily by sensor entities tasked with reconnaissance and surveillance of enemy targets. We define the effective reconnaissance probability threshold P i n v . The closure probability capability matrix for the reconnaissance layer is A L 1 p = p i j L 1 m × n , where p i j L 1 represents the probability of reconnaissance equipment R j detecting target T i :
p i j L 1 = p i j L 1 p i j L 1 P i n v 0 others
We define the effective reconnaissance time threshold T i n v . The closure time capability matrix for the reconnaissance layer is A L 1 t = t i j L 1 m × n , where t i j L 1 represents the time required for reconnaissance equipment R j to detect target T i :
t i j L L = t i j L 1 t i j L 1 T i n v null others
If t i j L 1 does not meet the threshold requirement, it indicates that the reconnaissance time is meaningless and is represented as null. If we consider only whether the entities in the reconnaissance layer can be connected, then the adjacency matrix for the reconnaissance layer is A L 1 = q i j L 1 m × n , where q i j L 1 = 1 indicates connectivity, and 0 indicates no connectivity:
q i j L 1 = 1 p i j L 1 P i n v , t i j L 1 T i n v 0 others

2.3.2. Relay Layers L 2 and L 4

The relay network is composed of Red team entities and is primarily responsible for information transmission tasks carried out by Red team equipment with communication capabilities. Define the node effective communication probability judgment threshold P c o m , then the relay layer closure probability adjacency matrix is A L 2 p = A L 4 p = p i j L 2 n × n , where p i j L 2 represents the stability of communication between equipment R i and equipment R j .
p i j L 2 = p i j L 2 p i j L 2 P c o m 0 others
Define the node effective communication time judgment threshold T c o m , then the relay layer closure time adjacency matrix is A L 2 t = A L 4 t = t i j L 2 n × n , where t i j L 2 represents the time required for equipment R i and equipment R j to establish communication. If the threshold requirement is not met, it is represented as null, meaning it is meaningless.
t i j L 2 = t i j L 2 t i j L 2 T c o m null others
If only the ability of equipment to establish communication is considered, the relay layer link count adjacency matrix is A L 2 = A L 4 = q i j L 2 n × n , where q i j L 2 = 1 indicates that communication can be established, and  q i j L 2 = 0 indicates that communication cannot be established.
Q i j L 2 = 1 p i j L 2 P c o m , t i j L 2 T c o m 0 others
The interactive edge between the reconnaissance network and the relay network is denoted as E L 1 L 2 = S j C j q i j L 1 = 1 , which represents the different mappings of the red side’s equipment R j that detects enemy entities in the reconnaissance and relay networks, at which point R j = S j = C j .

2.3.3. Command Layer L 3

The command network is composed of Red team entities and is primarily responsible for the tasks of command and control carried out by decision-making entities. Define the effective command probability judgment threshold P c c , then the command layer closure probability capability matrix is A L 3 p = p i j L 3 n × n , where p i j L 3 represents the accuracy of the command equipment R i issuing command information to the strike equipment R j .
p i j L 3 = p i j L 3 p i j L 3 P c c 0 others
Define the effective command time judgment threshold T c c , then the command layer closure time capability matrix is A L 3 t = t i j L 3 n × n , where t i j L 3 represents the time required for command equipment R i to issue command information to strike equipment R j . If the threshold requirement is not met, it is represented as null, meaning it is meaningless.
t i j L 3 = t i j L 3 t i j L 3 T c c null others
If only the accuracy of the command information is considered, the link count capability matrix is A L 3 = q i j L 3 n × n , where q i j L 3 = 1 indicates that the command information is accurate, and  q i j L 3 = 0 indicates that the information is unavailable.
q i j L 3 = 1 p i j L 3 P c c , t i j L 3 T c c 0 others
The interaction edge between the relay network and the command network is E L 2 L 3 = C i D i a i j L 3 = 1 , representing the different mappings of the Red team equipment R i that received the perception information in the relay network and the command network, with  R i = C i = D i at this time.

2.3.4. Strike Layer L 5

The strike network is composed of Red team entities and enemy targets, and is primarily responsible for the tasks of striking enemy targets and performing electromagnetic interference carried out by influencing entities. Define the effective strike probability judgment threshold P a c t , then the strike layer closure probability capability matrix is A L 5 p = p i j L 5 n × m , where p i j L 5 represents the probability of strike equipment R i hitting target T j .
p i j L 5 = p i j L 5 p i j L 5 P a c t 0 others
Define the effective strike time judgment threshold T a c t , then the strike layer closure time capability matrix is A L 5 t = t i j L 5 n × m , where t i j L 5 represents the time required for strike equipment R i to hit target T j . If the threshold requirement is not met, it is represented as null, meaning it is meaningless.
t i j L 5 = t i j L 5 t i j L 5 T a c t null others
If only the connectivity between entities in the strike layer is considered, the link count capability matrix is A L 5 = q i j L 5 n × m , where q i j L 5 = 1 indicates a successful strike, and  q i j L 5 = 0 indicates a strike failure.
q i j L 5 = 1 p i j L 5 P a c t , t i j L 5 T a c t 0 others
According to the command rules, the command information needs to be transmitted to the strike equipment in order to complete the actual command. The transmission of command information involves a source node (the command node) and a destination node (the accused node), with the information being relayed between the two. Therefore, the interactive edge between the command and relay networks includes not only the command relationship E L 3 L 4 D , where command information is transmitted to strike equipment, but also the relay relationship E L 3 L 4 C for command information. Thus, according to the command relationship, E L 3 L 4 D = D i I j q i j L 3 = 1 is used to specify the source and destination nodes of the command link, representing a virtual interlayer interaction relationship. E L 3 L 4 C = D i C i q i j L 3 = 1 is used to define the relay relationship of the command link, transmitting command information to the accused equipment. Therefore, the same equipment in different layers is used to represent interlayer relationships, which constitute the actual interlayer interaction relationship. The interaction edge between the relay network and the strike network is E L 4 L 5 = C i I i q i j L 5 = 1 , representing the different mappings of the Red team equipment R i that received the decision information in the relay network and the strike network, with  R i = C i = I i at this time.

3. Networked Effectiveness Evaluation Based on Kill Chains

3.1. Kill Chain and Constraint Construction

The KC is a product of information warfare, typically referring to the closed-loop process of detecting a target, targeting the target, engaging the enemy, and assessing the results of the engagement. Based on the OODA loop operational theory, the WSoS’s ability to strike enemy targets effectively is due to the continuous directed combat activities performed by our side’s nodes on the target nodes within the combat network, following the sequence of detect–perceive–decide–strike. The continuous path of the target nodes and combat activities involved in this process is defined as the KC within the WSoS network. If each combat activity is completed by a single node, i.e., the continuous path T S D I T from the target node via reconnaissance–decision–impact pointing to the target node, then this type of KC is defined as one of standard form as shown in Figure 2.
For equipment entities with communication limitations, the standard KC model no longer fully meets the requirements in a directed multilayer network. The KC should be a continuous path starting from the target node and passing through the operational activities of reconnaissance–relay–decision–relay–impact leading to the target node, which can be represented as T S C S D D C D I I T . Here, C S D and C D I represent the sets of red-side nodes required for the perception information and decision information relays, respectively.
Multiple relays of information may lead to an explosive growth in the number of KCs, resulting in many redundant chains during network searches. Closing the KC requires the efficient transmission of situational information, necessitating further constraints on the KC structure. When acquiring KCs, those that do not meet the constraint conditions should be filtered out. The completeness constraint is that the KC must simultaneously include nodes of types S, D, I, and T, otherwise the link cannot form a closed loop. The redundancy constraint is that the communication link between S and D cannot use S or D as relay nodes, and similarly neither can the communication link between D and I. If any two nodes on the KC are directly connected in the relay adjacency matrix, then they must also be directly connected in the relay link, otherwise it will cause a “communication detour,” affecting the closure of the KC. The capability constraint is that the KC and each combat segment of which it consists should satisfy time and probability constraints.

3.2. Constraint-Based Kill Chain Generation Algorithm

To address the issue of complex connectivity relationships and redundant information relays in a WSoS, we propose a capability-constrained KC generation algorithm (KCGA) to obtain all chains that satisfy the KC constraints, as shown in Algorithm 1. To increase the KC search efficiency, we consider the special structure of the WSoS supernetwork model, which is split into upper (reconnaissance and command networks) and lower (command and strike networks) layers with the command network L 3 acting as the watershed. The KC structure that satisfies the constraints is searched for separately for each layer based on the connectivity relationships in the adjacency matrix of the equipment. Finally, the links between the upper and lower layers are established based on link characteristics, and all the KCs that meet the requirements are obtained.
Algorithm 1: KCGA
Systems 13 00928 i001
KCGA uses the WSoS’s capability matrix as input and ultimately obtains all the KCs that meet the constraint requirements. First, the current network state is checked to see whether it meets the conditions for generating a KC (line 1), i.e., whether there is an intersection between the target set T S detected by reconnaissance nodes and the target set T I struck by impact nodes. If there is an intersection, then the WSoS may have a KC; otherwise, KCGA returns an empty list of K C . After the condition is satisfied, the upper and lower layers of the network are simultaneously searched for links, and the reconnaissance nodes and strike nodes are connected via command relationships (line 2). The perception and decision information intermediaries are the same command node, initializing two link dictionaries C S D (upper layer) and C D I (lower layer) (line 4). The relay link generation algorithm (RCGA) is then executed for both perception information relay (line 7) and decision information relay (line 12) to obtain the links C S D and C D I that satisfy the time and probability constraints (lines 5–13). Only when the tail node of the link in C S D and the head node of the link in C D I are the same command node can the links be connected to form a KC. All links in C S D and C D I are traversed (lines 14–24). For all links in C S D starting from n o d e 2 , the common target set T c o m m o n with links in C D I ending at n o d e 3 is obtained (line 16). For each target in T c o m m o n , the connection among segment links is established. Specifically, for the target that can be detected by n o d e 2 and struck by n o d e 3 (line 17), the link C S D [ n o d e 2 ] starting from n o d e 2 and the link C D I [ n o d e 3 ] ending at n o d e 3 are concatenated to form a KC K C c (line 18). If this link satisfies the time constraint T t h r e and the probability constraint P t h r e (line 19), then it is added to K C (line 20). The same approach is used to concatenate links in C S D and C D I , and finally, all the KCs that meet the requirements are returned (line 25). Relay links are an important component of the KC. Considering the redundancy constraints and capability constraints related to the KC set for specific targets, the KC constraint conditions are combined with the layer search algorithm [19] to design RCGA, as shown in Algorithm 2.
Algorithm 2: RCGA
Systems 13 00928 i002
RCGA can perform a search for all nonredundant paths in any connectivity matrix. The algorithm takes as input the capability matrix of the relay network, a layer list l a y e r , a layer path list l a y e r P a t h , and a set of visited nodes e x i s t L i s t , ultimately obtaining all paths from the start node S to the end node E that satisfy the requirements. l a y e r records the nodes present at each layer during the search process, l a y e r P a t h records the paths after traversing each layer, and e x i s t L i s t records the nodes that have already been processed by the algorithm. Intermediate variable sets n e x t - e x i s t e d , n e x t - p a t h , and n e x t - l a y e r are established to record the elements of e x i s t L i s t , l a y e r P a t h , and l a y e r , respectively (line 1), and the start node E is added to l a y e r (line 2). For each node n o d e in the current layer l a y e r (line 5), the directly connected node set n o d e - s e t is found based on the connectivity matrix A L 2 (line 6). If the start node s is in n o d e - s e t and the composed path satisfies the time constraint T t h r e and probability constraint P t h r e (line 7), then the path search ends at the current layer and the path [S, l a y e r - p a t h ] is returned (line 8). Otherwise, it is checked whether n o d e has been visited in e x i s t e d - l i s t ; if it has not been visited and the composed path satisfies the time constraint T t h r e and probability constraint P t h r e (line 10), then n o d e is added to n e x t - e x i s t e d and n e x t - l a y e r as a visited node and as a starting node for the next layer search, and n o d e is added to the path l a y e r - p a t h (line 11). e x i s t L i s t , l a y e r P a t h , and l a y e r are updated according to the search method described above (line 15) until no elements remain in l a y e r for visitation, at which point the relay link set R C is returned (line 17). For KC i, i.e., K C i [ R 1 R 2 R n ] , its closure time K C T i and closure probability K C P i can be obtained via the time capability matrix and probability capability matrix as follows:
K C T i = j = 1 n 1 t j , j + 1 L α , α { 1 , 2 , 3 , 4 , 5 } ,
K C P i = j n 1 p j , j L α , α { 1 , 2 , 3 , 4 , 5 } .
The outer loop of Algorithm 2 requires traversing up to n layers in the worst case, where n is the number of red-side nodes. The inner loop processes n nodes per iteration, which is the maximum number of red-side nodes per layer. The time complexity of a single inner loop operation is O ( 1 ) . Therefore, the time complexity of the basic traversal part is O ( n 2 ) . When considering the additional overhead of concatenating relay link paths, in the worst case, all possible paths need to be recorded, resulting in a time complexity of O ( n 2 + P × L ) , where P is the total number of paths and L is the average path length. However, RCGA focuses more on finding valid relay chains rather than recording all paths, so the core complexity is O ( n 2 ) .
Algorithm 1 consists of Part 1 (lines 5–8), Part 2 (lines 9–13), and Part 3 (lines 14–24), where Part 1 and Part 2 have the same structure and thus the same time complexity. In the worst case, Part 1 needs to traverse n nodes, which are all the red-side nodes. The time complexity of RCGA is O ( n 2 ) , so the time complexity of Part 1 is O ( n 3 ) . In Part 3, lines 14 and 15, in the worst case, the number of nodes to be traversed is n, and in line 17, the number of common targets to be traversed is m. Let q 1 and q 2 be the sizes of C D I . k e y s ( ) and C S D . k e y s ( ) , respectively, then the time complexity of Part 3 is O ( n 2 × q 1 × q 2 × m ) . Considering that the outer loop needs to traverse n nodes in the worst case, the time complexity of Algorithm 1 is O ( n 3 × m × q 1 × q 2 + n 4 ) . Since the time complexity is dominated by the term with the fastest-growing rate, the time complexity of Algorithm 1 can be approximated as O ( n 4 ) .

3.3. Construction of Multidimensional Performance Evaluation Index System

We construct and analyze the WSoS to maintain the stability of its own operational system structure while effectively striking the enemy, meaning that the operational system must maintain the stability of its structure as well as the accuracy and speed of performing combat tasks. For the quantitative supernetwork performance evaluation of the WSoS, on one hand, it is necessary to fully describe and reflect the characteristics of the system structure, and on the other hand, it is crucial to focus on the system’s ability to carry out tasks. The WSoS performance evaluation index framework is constructed from two aspects, i.e., mission task performance and network structure performance, as shown in Table 2. Mission task performance is measured by task KC matching degree, task completion time, and task completion probability to assess the accuracy and speed of task execution during operations. Network structure performance is measured by survivability, redundancy, and communication efficiency to evaluate the stability of the operational system. In practical applications, the effectiveness of a kill web could be quantified at different granularities based on varying needs. [33] defines the effectiveness of the WSoS as its ability to complete predetermined combat tasks. This is achieved by considering the probability of a connected loop existing within the kill web under conditions of random failure of edges and nodes, thus converting the effectiveness of the WSoS into network reliability for analysis. This paper analyzes the effectiveness of the WSoS from different granularities, dividing it into mission task performance and network structure performance. This approach provides evaluation information from different levels, allowing for comprehensive analysis of the WSoS. Therefore, the mission task performance evaluation index proposed in this paper is suitable for combat scenarios in red–blue adversarial games, where it measures the accuracy and speed of task execution during combat, using information about the closure of kill chains as fundamental elements. The network structure performance index is used to assess the stability of the own combat system. These two indices together measure the effectiveness of the WSoS, providing strong data support for the capability analysis and design of the kill web.

3.3.1. Mission Task Performance

(1)
The task completion time ( T C T ) represents the average time required for any of the KCs in the WSoS to successfully strike any enemy target; the smaller this value, the faster the average strike speed on a target. Suppose that there are N KCs for all targets and that target j, i.e., T j (where j = 1 , 2 , , m ), has N T j KCs: K C i T j i = 1 , 2 , , NT j . Then, we have N = N T 1 + N T 2 + + N T m , and T C T is given as
T C T = j = 1 m i = 1 N T j K C T K C i T j / N T j m ,
where i = 1 N T j K C T K C i T j represents the total closure time of the N T j KCs for a single target T j , and i = 1 N T j K C T K C i T j / N T j represents the average time required to execute task T j by selecting any one of the N T j KCs. Using the same method, the average task completion time for all targets can be calculated, and by taking the average of all targets, the average time required for selecting any KC to execute any task across all links is obtained.
(2)
The task completion probability ( T C P ) represents the average reliability with which any of the KCs in the WSoS can successfully strike any enemy target; the larger this value, the greater the probability of successfully striking a target. We have
T C P = j = 1 m i = 1 N T j K C P K C i T j / N T j m ,
where i = 1 N T j K C P K C i T j represents the sum of the closure probabilities of the N T j KCs for a single target T j , and i = 1 N T j K C P K C i T j / N T j represents the average reliability of completing task T j using any one of the N T j KCs. Using the same method, the average reliability for all targets can be calculated, and by taking the average of all targets, the average reliability for selecting any KC to execute any task across all links is obtained.
(3)
The KC task matching degree (TMD) describes the matching relationship between the average quality of KCs assigned to each target and the importance of the target. If the target node being struck is considered more important and the probability of successfully striking the target is greater, then the KC TMD is higher; conversely, the TMD is lower. We have
T M D = t = 1 m 1 i = 1 N T t K C P K C i I t j = 1 m i = 1 N T j K C P K C i τ j w t i = 1 m w i / m ,
where i = 1 N T t K C P K C i T t represents the sum of the closure probabilities of all KCs assigned to target T t , and j = 1 m i = 1 N T j K C P K C i τ j represents the sum of the closure probabilities of all KCs in the WSoS; the ratio of these two values gives the average quality of KCs assigned to the target. Meanwhile, w t represents the importance weight of target T t , and i = 1 m w i represents the sum of the importance weights of all targets in the WSoS; the ratio of these two values gives the average importance of target T t . The smaller the difference between these two values, the more balanced the KC allocation, and the higher the KC TMD for task T t . The average of all targets gives the overall average matching degree between the KC average quality and the target importance for all targets.

3.3.2. Network Structure Performance

(1)
Survivability. The risk N R K of the WSoS represents mainly the impact on the entire kill web after a friendly node is attacked; the fewer the KCs lost by the targets when a friendly node is destroyed and unable to participate in the WSoS’s interaction, the lower the risk. We have
N R K = i = 1 n N N R i n ,
where N represents the number of KCs before destruction, and N R i represents the number of remaining KCs after equipment R i is destroyed; the difference between these two values is the number of KCs lost. Using the same method, the number of KCs lost after the destruction of all equipment can be calculated, and the average of these values gives the average number of KCs lost when a particular piece of equipment is destroyed in the supernetwork.
(2)
Redundancy. Given by N R D , this characterizes mainly the degree of diversification of available strike means for a target in the WSoS, as given by
N R D = N m .
The specific evaluation approach is to calculate the average number N of KCs that can be formed by a multilayer network for m targets. The more KCs that there are, the stronger the redundancy; conversely, the fewer the KCs, the weaker the redundancy.
(3)
Communication efficiency. The network communication efficiency N C E of the WSoS refers to the ability of various constituent systems within the operational system to seek, acquire, and provide information and services to other systems based on combat needs. The more elements in the communication adjacency matrix A L 2 that have the value 1, the greater the communication efficiency. Therefore, the spectral norm A L 2 2 can be chosen as the evaluation matrix norm for the connectivity matrix, as given by
N C E = A L 2 2 A L 2 * 2 .
Here, A L 2 * 2 represents the spectral norm when A L 2 is a fully connected matrix (all elements are 1), and the ratio of these two values represents the degree of connectivity in the current state compared to the optimal connectivity state.

4. Experimental Study

4.1. Scenarios

In this section, we compare two WSoS example scenarios in which the types and quantities of equipment are the same. The scenario includes 12 pieces of Red team equipment and 2 pieces of Blue team equipment. The Red team equipment includes Bombers ( R 1 , R 6 ), Drones ( R 2 , R 3 , R 5 ), Fighters ( R 4 , R 9 ), Reconnaissance Aircraft ( R 7 , R 10 ), Command Ship ( R 8 ), and Satellites ( R 11 , R 12 ). The Blue team equipment consists of Destroyers ( T 1 , T 2 ). The interaction relationships between the pieces of equipment can be formed based on factors such as their own capabilities, position, and other constraints in the operational scenario. This paper focuses on solving the generation of the weapon system-of-systems (WSoS) kill chain and performance evaluation after determining the interaction relationships between the pieces of equipment, analyzing the impact of communication constraints on performance evaluation. Figure 3 shows the equipment connectivity relationships of the WSoS at time 1 (scenario I) and time 2 (scenario II). The arrows between pieces of equipment indicate possible connections, and the 2D vector ( p , t ) above an arrow represents the connection characteristics, with p and t referring to the closure probability and closure time of the operational link, respectively. In scenario I, reconnaissance node R 2 can send perception information directly to command node R 8 without needing an information relay. In scenario II, because of its own limitations, R 2 cannot communicate directly with command node R 8 , but the connectivity of the other pieces of equipment remains unchanged from that in scenario I. Based on the connectivity relationships of the equipment in the current scenario, a multilayer network model of the WSoS is constructed, and the capability matrix is used to quantify the situational information in the operational scenario, which is then used to evaluate the impact of communication constraints on WSoS KC generation and combat effectiveness.

4.2. Basic Experimental Results

For scenario II, the WSoS multilayer network is constructed by hierarchical node connectivity relationships, as shown in Figure 4. The intra-layer connectivity relationship is denoted by “→”, while the inter-layer connectivity relationship is denoted by “—”. Specifically, “⤏” represents the virtual interaction relationship between the command layer L 3 and the relay layer L 4 , that is, the relationship where command nodes point to the commanded nodes. The capability matrices of the WSoS multilayer network are calculated as shown in Table 3.
Based on the adjacency matrix of each functional layer, the supernetwork is divided into two layers, and KCGA search is performed simultaneously to generate KCs. Scenario I is similar to scenario II except that during the RCGA second-layer search, the termination node is found and the search stops, thus obtaining the desired KCs. Table 4 compares the KC information between scenarios I and II.
Table 4 shows the KC structures, along with the corresponding time and probability information, obtained by KCGA under two scenarios: one where information transfer between R 2 and R 8 is normal, and one where it is restricted. For target T 2 , the KC information in both scenarios is the same because the closure of the operational link related to T 2 does not require the participation of R 2 ’s perception information. In contrast, the closure of the operational link for T 1 does require R 2 ’s perception information, and the information transfer from R 2 has a significant impact on both scenarios. For T 1 , when R 2 and R 8 can communicate normally (scenario I), two KCs are obtained in total, with no need for relay nodes in the communication between R 2 and R 8 . When communication between R 2 and R 8 is restricted (scenario 2), four KCs are obtained in total. At this point, the direct link between R 2 and R 8 is lost, resulting in the loss of the two standard KCs from scenario I. However, four additional KCs involving indirect information transfer through R 9 , R 11 , and R 12 are acquired, compensating for the loss caused by the communication restrictions. Furthermore, in the KC T 2 S 7 ( D 7 ) I 5 T 2 , S 7 acts as both the reconnaissance and command equipment.
Based on the capability information of each KC in Table 4 and the multilayer network capability matrices, the combat effectiveness of the WSoS is calculated. The evaluation results are compared in Table 5. The connectivity between R 2 and R 8 in the two scenarios affects the system’s effectiveness. The number of KCs in scenario I is two fewer than in scenario II, but due to the impact of the KC closure probability, its task matching degree is comparable to that of scenario II. In scenario II, the increased number of KCs compensates for the impact of R 2 ’s failure on the WSoS. Although there are more KCs, the additional ones are generated through relay nodes that transmit information indirectly, leading to more operational links. As a result, scenario II has lower task completion speed and task completion probability compared to scenario I. The number of KCs in scenario I is two less than in scenario II, but due to the reduced closure probability of the KCs, its task matching degree is comparable to that of scenario II. The increase in the number of KCs in scenario II improves its resilience and redundancy, making it superior to scenario I in these aspects. However, the loss of the communication link between R 2 and R 8 in scenario II results in lower communication efficiency compared to scenario I. In summary, although the use of information relays in scenario II compensates for the generation of KCs targeting T 1 and improves the TMD, resilience, and redundancy, the closure of relay-generated KCs may be less effective than that of standard KCs. Therefore, scenario II is inferior to scenario I in terms of task completion speed and task completion probability.

4.3. Comparison of Experimental Results

To assess the effectiveness of the proposed model and the performance of the algorithm, we select three WSoS KC construction methods for comparison [15,17,19], to which we refer hereinafter using the relevant citation numbers. Of these, [15] is the standard form of the KC, [17] defines four types of KCs based on this, using a higher-order adjacency matrix method to obtain the number of KCs [19]. Using the layered search approach, all simple paths between two vertices can be obtained. By replacing the RCGA algorithm (lines 7 and 12) in Algorithm 1 with [19], all the kill chains formed by simple paths in the scenario can be obtained. Given that [19] relies on integrating the framework of Algorithm 1 to generate kill chains composed of simple paths, we will continue to use [19] to represent all the linkages obtained by substituting the RCGA algorithm in Algorithm 1 with the simple path generation algorithm for the sake of comparative analysis. By applying the KC information obtained from the three methods to the KC closure and effectiveness evaluation models, the performance of the proposed algorithm is compared and analyzed. Because [17] can obtain only the number of KCs, it cannot provide information about the structure, closure time, and closure probability of individual KCs nor the related effectiveness indicators such as TMD, task completion time, and task completion probability. The KC information generated by each algorithm in both scenarios is given in Table 6, with the information that could not be obtained in [17] indicated by “/”. The content in parentheses (kill chain structure) represents the link count information. Additionally, indicates the absence of relevant information.
For T 2 , because the communication restriction between R 2 and R 8 affects only the link composition related to T 1 , the KC information for T 2 is consistent across both scenarios for each algorithm. Ref. [17] defines three types of link forms in addition to the standard KC, resulting in one more KC compared to [15]. For T 1 , in scenario I after filtering out the relay links, KCGA performs similarly to [15,17], but by not considering the constraints of the KC, ref. [19] searches for a large number of redundant relay links based on connectivity, leading to an inaccurate description of WSoS performance. In scenario II for T 1 ’s KCs, the direct link between R 2 and R 8 is lost in [15,17], resulting in two fewer KCs compared to scenario I. At this point, the failure of R 2 prevents the formation of a KC for T 1 . KCGA—which considers information relays during R 2 ’s failure—adds four more KCs related to R 2 compared to the algorithms [15,17], compensating for the impact of R 2 ’s failure on the WSoS performance. Although [19] considers R 2 ’s information relay, it loses the standard chain for the transmission of R 2 ’s perception information while acquiring too many redundant KCs, resulting in two fewer links compared to scenario I. By considering relay link constraints, KCGA ensures that no redundant relay chains are generated during the KC creation process.
Based on the information about each KC from the different algorithms in Table 6, we calculate the combat effectiveness of the WSoS, and Table 7 compares the effectiveness evaluation results. The analysis is conducted via both self-comparison (horizontal) and inter-comparison (vertical) of the algorithms in the two scenarios. In the horizontal comparison, because [15,17] do not consider information relays and only generate KCs with a determined structure, the failure of R 2 in scenario II severely affects the generation of KCs for T 1 , resulting in poorer performance for these two algorithms in scenario II compared to scenario I. In particular, for scenario II, because [15] does not form any KCs for target T 1 , its task completion speed metric is meaningless and, so, is represented as “null.” In the vertical comparison, the number of KCs generated by KCGA for each target in both scenarios is significantly better than [15], so KCGA’s task matching degree is superior to [15]. Although the number of KCs in [19] exceeds that of KCGA, the limitation of KC closure probability causes its task matching degree in scenario I to be worse than KCGA’s but slightly better in scenario II. Since KCGA considers necessary information relay, the task completion probability in scenario II is better than [15] and comparable to [15] in scenario I. Regarding task completion time, because KCGA’s KCs in scenario I include information relay, the efficiency of information transmission is worse than [15]. The number and structure of KCs affect the quantification of survivability and redundancy metrics; therefore, KCGA and [19] outperform [15,17] in these two metrics in both scenarios. In terms of communication efficiency, the relay adjacency matrix is the same in each scenario; therefore, so is the communication efficiency. In summary, KCGA demonstrates a significant superiority in KCs generation and effectiveness evaluation in both scenarios.
This paper constructs the performance evaluation indicators of the WSoS based on the concept of the kill chains. Therefore, in order to verify the effectiveness and discriminative power of the proposed indicators, an analysis of the sufficiency and redundancy of the generated kill chains is conducted. Ref. [19] utilized a hierarchical search approach to obtain all simple paths between two vertices. By replacing the RCGA algorithm in Algorithm 1 with the algorithm for obtaining simple paths, all the kill chains composed of these simple paths in the scenarios were derived. Table 6 presents all the kill chains composed of simple path combinations obtained in [19], with a total of 14 kill chains in scenario I and 12 in scenario II. In scenario I, regarding the kill chains involving T 1 , since S 2 and D 8 can communicate directly, the links T 1 S 2 C 9 C 12 D 8 I 4 T 1 , T 1 S 2 C 11 D 8 I 4 T 1 , T 1 S 2 C 9 C 12 D 8 I 9 T 1 and T 1 S 2 C 11 D 8 I 9 T 1 are redundant. After removing these redundant links, the remaining links T 1 S 2 D 8 I 4 T 1 and T 1 S 2 D 8 I 9 T 1 match those related to T 1 in scenario I, as shown in Table 4. Algorithm 1 successfully obtained all simple paths that meet the constraints, i.e., the kill chains, ensuring the validity of the evaluation metrics based on kill chains as fundamental elements. Similarly, for the kill chains involving T 2 in scenario I, since C 11 and I 6 could communicate directly, the links T 2 S 5 C 7 D 10 C 11 C 8 C 9 C 12 I 6 T 2 and T 2 S 7 D 10 C 11 C 8 C 9 C 12 I 6 T 2 are redundant. After removing these redundant links, the remaining links match those related to T 2 in scenario I, as shown in Table 4. In scenario II, the connectivity between R 2 and R 8 fails, which only affects the generation of kill chains involving T 1 . Therefore, the kill chains composed of simple paths involving T 2 in both scenarios are identical, and after eliminating redundant links, they match the links related to T 2 in Table 4. For T 1 in scenario II, all four kill chains composed of simple paths meet the constraints and match the links related to T 1 in scenario II, as shown in Table 4. In summary, Algorithm 1 is capable of obtaining all simple paths that satisfy the constraints, ensuring the validity of evaluation metrics based on kill chains as fundamental elements.

5. Conclusions

This study delves deeply into the evaluation of the effectiveness of the WSoS based on kill chains under communication constraints. It not only innovatively constructs a generalized information relay supernetwork model and its corresponding directed hypernetwork model, but also establishes an accurate time and probability capability matrix to quantify the situational information of the WSoS. Furthermore, an efficient kill chain generation strategy is proposed. From the perspective of red–blue adversarial games, we have carefully developed a comprehensive WSoS effectiveness evaluation index system, which focuses on both the structural robustness of the combat system and the accuracy and timeliness of combat tasks. Numerical simulation results showed that this method outperforms existing methods. This paper primarily investigates the network construction and capability analysis methods of the WSoS under communication constraints, transforming the communication constraint issue into a problem of whether communication can occur. However, it does not analyze the impact of the degree of communication constraint on the closure of kill chains. Future work will model the effects of electronic warfare and other factors on equipment communication capabilities, integrating these models into the analysis of kill chain closure and the effectiveness evaluation model of kill web, thus providing a more comprehensive description of the WSoS under communication constraints.

Author Contributions

Conceptualization, N.W.; Methodology, N.W. and S.S.; Software, N.W.; Validation, N.W. and Y.Z.; Formal analysis, N.W. and Y.Z.; Investigation, Y.Z.; Data curation, Y.Z.; Writing – original draft, N.W.; Writing – review & editing, Y.Z.; Supervision, S.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

DURC Statement

Current research is limited to the [complex network analysis], which is beneficial [by providing a scientific framework for evaluating and optimizing the multidimensional effectiveness of weapon system of systems under communication constraints, thereby enhancing national defense security and operational efficiency in peacekeeping and humanitarian missions] and does not pose a threat to public health or national security. Authors acknowledge the dual-use potential of the research involving hypernetwork modeling techniques for analyzing interdependencies in weapon systems and communication constraint simulations and confirm that all necessary precautions have been taken to prevent potential misuse. As an ethical responsibility, authors strictly adhere to relevant national and international laws about DURC. Authors advocate for responsible deployment, ethical considerations, regulatory compliance, and transparent reporting to mitigate misuse risks and foster beneficial outcomes.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Ashraf, N. The paradox of cyber warfare and clausewitz’s conception of war. NUST J. Int. Peace Stab. 2025, 8, 17–29. [Google Scholar] [CrossRef]
  2. Yang, H.G.; Xia, Z.C.; Chen, Y.Q.; Zhu, L.Q.; Dai, L.H.; Xu, R.T.; Sun, G.Y.; Yu, H.Y.; Xu, W.T. Research on visual simulation for complex weapon equipment interoperability based on MBSE. Multimed. Tools Appl. 2024, 83, 13463–13482. [Google Scholar] [CrossRef]
  3. Xu, X.; Zhu, W.; Li, R.; Fu, X.; Zhang, F.; Wang, P. Research on security authentication methods for unmanned aerial vehicle systems in mosaic warfare scenarios. In Proceedings of the International Conference on Guidance, Navigation and Control, Changsha, China, 9–11 August 2024; Springer: Berlin/Heidelberg, Germany, 2024; pp. 58–67. [Google Scholar]
  4. Chen, Z.; Zhou, Z.; Zhang, L.; Cui, C.; Zhong, J. Mission reliability modeling and evaluation for reconfigurable unmanned weapon system-of-systems based on effective operation loop. J. Syst. Eng. Electron. 2023, 34, 588–597. [Google Scholar] [CrossRef]
  5. Xu, R. J; Ning, G.Y.; Liu, J.H.; Li, M.H.; Li, J.C.; Yang, K.W.; Lou, Z.Y. CSoS-STRE: A combat system-of-system space-time resilience enhancement framework. Front. Eng. Manag. 2025, 1–21. [Google Scholar]
  6. Zhang, Y.; Chen, X.; Li, J.; Chen, G.; Jiang, J. Research on the selection and application of weapons portfolio considering threats. In Proceedings of the 10th International Conference on Big Data and Information Analytics (BigDIA), Chiang Mai, Thailand, 25–28 October 2024; pp. 76–83. [Google Scholar]
  7. Pang, X.; Sheng, M.; Zhao, N.; Tang, J.; Niyato, D.; Wong, K.-K. When UAV meets IRS: Expanding air-ground networks via passive reflection. IEEE Wirel. Commun. 2021, 28, 164–170. [Google Scholar] [CrossRef]
  8. Fei, Z.; Wang, X.; Wu, N.; Huang, J.; Zhang, J.A. Air-ground integrated sensing and communications: Opportunities and challenges. IEEE Commun. Mag. 2023, 61, 55–61. [Google Scholar] [CrossRef]
  9. Cares, J.R. An Information Age Combat Model; Alidade, Inc.: Newport, PR, USA, 2004. [Google Scholar]
  10. Dekker, A.H. Measuring the agility of networked military forces. J. Battlef. Technol. 2006, 9, 19–24. [Google Scholar]
  11. Zhao, Q.; Li, S.; Dou, Y.; Wang, X.; Yang, K. An approach for weapon system-of-systems scheme generation based on a supernetwork granular analysis. IEEE Syst. J. 2015, 11, 1971–1982. [Google Scholar] [CrossRef]
  12. Chen, Z.W.; Yin, S.Y.; Li, L.F.; Cui, W.W.; Hong, D.P. Resilience metric and dynamic assessment of unmanned system-of-systems considering cooperative reconfiguration strategies. IEEE Trans. Reliab. 2024, 74, 2942–2954. [Google Scholar] [CrossRef]
  13. Li, J.; Jiang, J.; Yang, K.; Chen, Y. Research on functional robustness of heterogeneous combat networks. IEEE Syst. J. 2018, 13, 1487–1495. [Google Scholar] [CrossRef]
  14. Chen, W.; Li, J.; Jiang, J. Research on disintegration of combat networks under incomplete information. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC), Melbourne, Australia, 17–20 October 2021; pp. 784–791. [Google Scholar]
  15. Tan, Y.; Zhang, X.; Yang, K. Research on networked description and modeling methods of armament system-of-systems. J. Syst. Manag. 2012, 21, 781–786. [Google Scholar]
  16. Qi, Y.; Liu, Z.; Chen, H.; Han, J. Distributed combat system of systems network modeling. J. Networks 2013, 8, 1906. [Google Scholar] [CrossRef]
  17. Chen, W.; Li, W.; Zhang, T. Complex network-based resilience capability assessment for a combat system of systems. Systems 2024, 12, 31. [Google Scholar] [CrossRef]
  18. Han, Q.; Pang, B.; Li, S.; Li, N.; Guo, P.; Fan, C.; Li, W. Evaluation method and optimization strategies of resilience for air & space defense system of systems based on kill network theory and improved self-information quantity. Def. Technol. 2023, 21, 219–239. [Google Scholar]
  19. Bundy, A.; Wallen, L. Breadth-first search. In Catalogue of Artificial Intelligence Tools; Springer: Berlin/Heidelberg, Germany, 1984; p. 13. [Google Scholar]
  20. Estrada, E.; Hatano, N.; Benzi, M. The physics of communicability in complex networks. Phys. Rep. 2012, 514, 89–119. [Google Scholar] [CrossRef]
  21. Fiedler, M. Algebraic connectivity of graphs. Czechoslov. Math. J. 1973, 23, 298–305. [Google Scholar] [CrossRef]
  22. Iyer, S.; Killingback, T.; Sundaram, B.; Wang, Z. Attack robustness and centrality of complex networks. PLoS ONE 2013, 8, e59613. [Google Scholar] [CrossRef]
  23. Wu, J.; Barahona, M.; Tan, Y.-J.; Deng, H.-Z. Natural connectivity of complex networks. Chin. Phys. Lett. 2010, 27, 078902. [Google Scholar]
  24. Wu, J.; Barahona, M.; Tan, Y.-J.; Deng, H.-Z. Spectral measure of structural robustness in complex networks. IEEE Trans. Syst. Man, Cybern.-A Syst. Humans 2011, 41, 1244–1252. [Google Scholar] [CrossRef]
  25. Randles, M.; Lamb, D.; Odat, E.; Taleb-Bendiab, A. Distributed redundancy and robustness in complex systems. J. Comput. Syst. Sci. 2011, 77, 293–304. [Google Scholar] [CrossRef]
  26. Kim, H.; Anderson, R. An experimental evaluation of robustness of networks. IEEE Syst. J. 2013, 7, 179–188. [Google Scholar] [CrossRef]
  27. Deller, S.; Rabadi, G.; Tolk, A.; Bowling, S.R. Organizing for improved effectiveness in networked operations. In Operations Research for Unmanned Systems; Cares, J.R., Dickmann, J.Q., Eds.; John Wiley & Sons: Hoboken, NJ, USA, 2016; pp. 255–270. [Google Scholar]
  28. Lee, Y.; Lee, T. Network-based metric for measuring combat effectiveness. Def. Sci. J. 2014, 64, 115–122. [Google Scholar] [CrossRef]
  29. Jiang, J.; Li, X.; Zhou, Z.-J.; Xu, D.-L.; Chen, Y.-W. Weapon system capability assessment under uncertainty based on the evidential reasoning approach. Expert Syst. Appl. 2011, 38, 13773–13784. [Google Scholar] [CrossRef]
  30. Di, P.; Hu, T.; Hu, B.; Zhang, J. Research on invulnerability of combat net model based on complex networks. J. Syst. Simul. 2011, 23, 56–60. [Google Scholar]
  31. Wang, Y.; Chen, B.; Chen, X.; Pan, C. Hierarchical evolution model of command and control network based on hypernetwork. J. Control Sci. Eng. 2019, 2019, 5860461. [Google Scholar] [CrossRef]
  32. Li, J.; Ge, B.; Yang, K.; Chen, Y.; Tan, Y. Meta-path based heterogeneous combat network link prediction. Phys. A Stat. Mech. Its Appl. 2017, 482, 507–523. [Google Scholar] [CrossRef]
  33. Zhou, C.; Shang, B.; Song, B.; Ke, E.; Wang, Y. Contribution evaluation of aviation armament sys-tem-of-systems based on operation loop. Acta Aeronaut. Et Astronaut. Sin. 2022, 43, 224958. [Google Scholar]
Figure 1. Hypernetwork model with information relays: (a) supernetwork model; (b) adjacent complex network with relay layer.
Figure 1. Hypernetwork model with information relays: (a) supernetwork model; (b) adjacent complex network with relay layer.
Systems 13 00928 g001
Figure 2. Standard kill chain (KC).
Figure 2. Standard kill chain (KC).
Systems 13 00928 g002
Figure 3. Connectivity relationships of equipment in combat scenario.
Figure 3. Connectivity relationships of equipment in combat scenario.
Systems 13 00928 g003
Figure 4. The multi-layer network in scenario II.
Figure 4. The multi-layer network in scenario II.
Systems 13 00928 g004
Table 1. Classification of weapon system-of-systems (WSoS) combat entities.
Table 1. Classification of weapon system-of-systems (WSoS) combat entities.
TypeNameDescriptionEntity Capabilities
TTarget type nodeEnemy combat entityAnti damage; counter reconnaissance; threat
SReconnaissance type nodeOur equipment with reconnaissance, surveillance, and other functionsCommunication; reconnaissance; identification
CCommunication type nodeResponsible for relaying and transmitting informationCommunication
DCommand type nodeOur command platforms, command posts, or command centers responsible for war commandCommunication; information processing
IInfluence type nodeA weapon platform or weapon system that causes damage or severe disruption to enemy targetsCommunication; firepower strike
Table 2. WSoS effectiveness evaluation indicator framework.
Table 2. WSoS effectiveness evaluation indicator framework.
Indicator TypeIndicator DecompositionKey Quantitative ParametersIndicator Explanation
Network structure performanceSurvivabilityNNumber of KCs
N R i Number of KCs after R i is destroyed
RedundancyNNumber of KCs
Communication efficiency A L 2 Adjacency matrix of relay layer
Mission task performanceTask kill chain matching degree K C P Closure probability of each kill chain
w i Importance of each target
Task completion time K C T Closure time of each kill chain
Task completion probability K C P Closure probability of each kill chain
Table 3. WSoS multilayer network capability matrices.
Table 3. WSoS multilayer network capability matrices.
a Reconnaissance layer’s adjacency matrix A L 1 b Reconnaissance layer’s closure probability capability matrix A L 1 p
R 1 R 2 R 3 R 4 R 5 R 6 R 7 R 8 R 9 R 10 R 11 R 12 R 1 R 2 R 3 R 4 R 5 R 6 R 7 R 8 R 9 R 10 R 11 R 12
T 1 010000000000 T 1 00.950000000000
T 2 000010100000 T 2 00000.7500.9200000
c Reconnaissance layer’s closure time capability matrix A L 1 t d Strike layer’s adjacency matrix A L 5
R 1 R 2 R 3 R 4 R 5 R 6 R 7 R 8 R 9 R 10 R 11 R 12 R 1 R 2 R 3 R 4 R 5 R 6 R 7 R 8 R 9 R 10 R 11 R 12
T 1 null7nullnullnullnullnullnullnullnullnullnull T 1 100100001000
T 2 nullnullnullnull8null9nullnullnullnullnull T 2 000011000000
e Strike layer’s closure probability capability matrix A L 5 p f Strike layer’s closure time capability matrix A L 5 t
R 1 R 2 R 3 R 4 R 5 R 6 R 7 R 8 R 9 R 10 R 11 R 12 R 1 R 2 R 3 R 4 R 5 R 6 R 7 R 8 R 9 R 10 R 11 R 12
T 1 0.84000.9200000.88000 T 1 20nullnull35nullnullnullnull51nullnullnull
T 2 00000.790.85000000 T 2 nullnullnullnull2842nullnullnullnullnullnull
g Command layer’s adjacency matrix A L 3 h Command layer’s closure probability capability matrix A L 3 p
R 1 R 2 R 3 R 4 R 5 R 6 R 7 R 8 R 9 R 10 R 11 R 12 R 1 R 2 R 3 R 4 R 5 R 6 R 7 R 8 R 9 R 10 R 11 R 12
R 1 000000000000 R 1 000000000000
R 2 000000000000 R 2 000000000000
R 3 000000000000 R 3 000000000000
R 4 000000000000 R 4 000000000000
R 5 000000000000 R 5 000000000000
R 6 000000000000 R 6 000000000000
R 7 100010000000 R 7 0.820000.870000000
R 8 000100001000 R 8 0000.9400000.92000
R 9 000000000000 R 9 000000000000
R 10 000001000000 R 10 000000.98000000
R 11 000000000000 R 11 000000000000
R 12 000000000000 R 12 000000000000
i Command layer’s closure time capability matrix A L 3 t j Relay layer’s adjacency matrix A L 2 = A L 4
R 1 R 2 R 3 R 4 R 5 R 6 R 7 R 8 R 9 R 10 R 11 R 12 R 1 R 2 R 3 R 4 R 5 R 6 R 7 R 8 R 9 R 10 R 11 R 12
R 1 nullnullnullnullnullnullnullnullnullnullnullnull R 1 000000000000
R 2 nullnullnullnullnullnullnullnullnullnullnullnull R 2 000000001010
R 3 nullnullnullnullnullnullnullnullnullnullnullnull R 3 100000000000
R 4 nullnullnullnullnullnullnullnullnullnullnullnull R 4 000000000000
R 5 nullnullnullnullnullnullnullnullnullnullnullnull R 5 000000100000
R 6 nullnullnullnullnullnullnullnullnullnullnullnull R 6 000000000000
R 7 8nullnullnull7nullnullnullnullnullnullnull R 7 001010000100
R 8 nullnullnull9nullnullnullnull10nullnullnull R 8 000100001000
R 9 nullnullnullnullnullnullnullnullnullnullnullnull R 9 000000000001
R 10 nullnullnullnullnull7nullnullnullnullnullnull R 10 000000000011
R 11 nullnullnullnullnullnullnullnullnullnullnullnull R 11 000001010000
R 12 nullnullnullnullnullnullnullnullnullnullnullnull R 12 000001010000
k Relay layer’s closure probability capability matrix A L 2 p = A L 4 p l Relay layer’s closure time capability matrix A L 2 t = A L 4 t
R 1 R 2 R 3 R 4 R 5 R 6 R 7 R 8 R 9 R 10 R 11 R 12 R 1 R 2 R 3 R 4 R 5 R 6 R 7 R 8 R 9 R 10 R 11 R 12
R 1 000000000000 R 1 nullnullnullnullnullnullnullnullnullnullnullnull
R 2 000000000.8400.820 R 2 nullnullnullnullnullnullnullnull8null5null
R 3 0.9100000000000 R 3 7nullnullnullnullnullnullnullnullnullnullnull
R 4 000000000000 R 4 nullnullnullnullnullnullnullnullnullnullnullnull
R 5 0000000.8500000 R 5 nullnullnullnullnullnull6nullnullnullnullnull
R 6 000000000000 R 6 nullnullnullnullnullnullnullnullnullnullnullnull
R 7 000.7700.8700000.7900 R 7 nullnull3null4nullnullnullnull7nullnull
R 8 0000.8400000.91000 R 8 nullnullnull6nullnullnullnull7nullnullnull
R 9 000000000000.89 R 9 nullnullnullnullnullnullnullnullnullnullnull4
R 10 00000000000.920.78 R 10 nullnullnullnullnullnullnullnullnullnull108
R 11 000000.9500.880000 R 11 nullnullnullnullnull11null9nullnullnullnull
R 12 000000.7300.820000 R 12 nullnullnullnullnull8null8nullnullnullnull
Table 4. KC information for scenarios I and II.
Table 4. KC information for scenarios I and II.
Scenario T 1 T 2
IKill ChainTime [s]ProbabilityKill ChainTime [s]Probability
T 2 S 5 D 7 I 5 T 2 530.38
T 2 S 5 C 7 D 10 C 11 I 6 T 2 910.37
T 1 S 2 D 8 I 4 T 1 610.5 T 2 S 5 C 7 D 10 C 12 I 6 T 2 860.24
T 1 S 2 D 8 I 9 T 1 790.5 T 2 ( S 7 ) D 7 I 5 T 2 480.55
T 2 S 7 D 10 C 11 I 5 T 2 860.53
T 2 S 7 D 10 C 12 I 5 T 2 810.34
II T 1 S 2 C 11 D 8 I 4 T 1 710.5 T 2 S 5 D 7 I 5 T 2 530.38
T 2 S 5 C 7 D 10 C 11 I 6 T 2 910.37
T 1 S 2 C 9 C 12 D 8 I 4 T 1 770.42 T 2 S 5 C 7 D 10 C 12 I 6 T 2 860.24
T 1 S 2 C 11 D 8 I 9 T 1 890.51 T 2 ( S 7 ) D 7 I 5 T 2 480.55
T 1 S 2 C 9 C 12 D 8 I 9 T 1 950.43 T 2 S 7 D 10 C 11 I 5 T 2 860.53
T 2 S 7 D 10 C 12 I 5 T 2 810.34
Table 5. Effectiveness evaluation results for scenarios I and II.
Table 5. Effectiveness evaluation results for scenarios I and II.
ScenarioKill-Chain CountTask Matching DegreeTask Completion TimeTask Completion ProbabilityAnti-DestructivenessAgilityCommunication Efficiency
I80.9472.10.452.3340.19
II100.9278.580.433.2550.17
Table 6. Comparison of KC information from different algorithms.
Table 6. Comparison of KC information from different algorithms.
ScenarioKill Chain Count T 1 T 2
Kill Chain StructureTime [s]ProbabilityKill Chain StructureTime [s]Probability
[15]I3 T 1 S 2 D 8 I 4 T 1 610.5 T 2 S 5 D 7 I 5 T 2 530.38
T 1 S 2 D 8 I 9 T 1 790.5
II1 T 2 S 5 D 7 I 5 T 2 530.38
[17]I4/(2)///(2)//
II2/(0)///(2)//
[19]I14 T 2 S 5 D 7 I 5 T 2 530.38
T 1 S 2 D 8 I 4 T 1 610.5 T 2 S 5 C 7 D 10 C 11
I 6 T 2
910.37
T 1 S 2 C 9 C 12 D 8
I 4 T 1
770.42 T 2 S 5 C 7 D 10 C 11
C 8 C 9 C 12 I 6 T 2
1080.2
T 1 S 2 C 11 D 8 I 4
T 1
710.5 T 2 S 5 C 7 D 10 C 12
I 6 T 2
860.24
T 1 S 2 D 8 I 9 T 1 790.5 T 2 ( S 7 ) D 7 I 5 T 2 480.55
T 1 S 2 C 9 C 12 D 8
I 9 T 1
950.43 T 2 S 7 D 10 C 11 I 6
T 2
860.53
T 1 S 2 C 11 D 8 I 9
T 1
890.51 T 2 S 7 D 10 C 11 C 8
C 9 C 12 I 6 T 2
1030.29
T 2 S 7 D 10 C 12 I 6
T 2
810.34
II12 T 2 S 5 D 7 I 5 T 2 530.38
T 2 S 5 C 7 D 10 C 11
I 6 T 2
910.37
T 1 S 2 C 9 C 12 D 8
I 4 T 1
770.42 T 2 S 5 C 7 D 10 C 11
C 8 C 9 C 12 I 6 T 2
1080.2
T 1 S 2 C 11 D 8 I 4
T 1
710.5 T 2 S 5 C 7 D 10 C 12
I 6 T 2
860.24
T 1 S 2 C 9 C 12 D 8
I 9 T 1
950.43 T 2 ( S 7 ) D 7 I 5 T 2 480.55
T 1 S 2 C 11 D 8 I 9
T 1
890.51 T 2 S 7 D 10 C 11 I 6
T 2
860.53
T 2 S 7 D 10 C 11 C 8
C 9 C 12 I 6 T 2
1030.29
T 2 S 7 D 10 C 12 I 6
T 2
810.34
Table 7. Comparison of effectiveness evaluation results of different algorithms.
Table 7. Comparison of effectiveness evaluation results of different algorithms.
ScenarioKill Chain CountTask Matching DegreeTask Completion TimeTask Completion ProbabilityAnti-DestructivenessAgilityCommunication Efficiency
KCGAI80.9472.10.452.3340.19
II100.9278.580.433.2550.17
[15]I30.6361.50.440.671.50.19
II10.65null0.190.170.50.17
[17]I4///0.8320.19
II2///0.3310.17
[19]I140.8580.30.42570.19
II120.9682.50.414.560.17
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, N.; Zhang, Y.; Song, S. Multidimensional Effectiveness Evaluation of Weapon System-of-Systems Based on Hypernetwork Under Communication Constraints. Systems 2025, 13, 928. https://doi.org/10.3390/systems13100928

AMA Style

Wang N, Zhang Y, Song S. Multidimensional Effectiveness Evaluation of Weapon System-of-Systems Based on Hypernetwork Under Communication Constraints. Systems. 2025; 13(10):928. https://doi.org/10.3390/systems13100928

Chicago/Turabian Style

Wang, Ningning, Yuchen Zhang, and Shenmin Song. 2025. "Multidimensional Effectiveness Evaluation of Weapon System-of-Systems Based on Hypernetwork Under Communication Constraints" Systems 13, no. 10: 928. https://doi.org/10.3390/systems13100928

APA Style

Wang, N., Zhang, Y., & Song, S. (2025). Multidimensional Effectiveness Evaluation of Weapon System-of-Systems Based on Hypernetwork Under Communication Constraints. Systems, 13(10), 928. https://doi.org/10.3390/systems13100928

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop