Advancing Network Securing Strategies with Network Algorithms for Integrated Air Defense System (IADS) Missile Batteries

Rakib Hassan Pran
2023-03-21
Abstract:Recently, the Integrated Air Defense System (IADS) has become vital for the defense system as the military defense system is vital for national security. Placing Integrated Air Defense System batteries among locations to protect locations assets is a crucial problem because optimal solutions are needed for interceptor missiles to intercept attacker missiles for maximizing protection of assets across locations or places. In this research, the procedures of using network algorithms along with developing several network algorithms are going to be demonstrated to develop a model for sequential development of seven network securing strategies of placing Surface to Air Missile (SAM) batteries to maximize the protection of assets across locations (based on given asset values) by generating optimal solutions through computation to destroy maximum attacker missiles by using minimum interceptor missiles with given intercept probability. This network securing strategies can be implemented not only for Integrated Air Defense System (IADS) planning but also Counter Air (CA) planning as Integrated Air Defense System (IADS) is conducted with defensive counter air supported by attack operations in offensive counter air.
Social and Information Networks,Computation
What problem does this paper attempt to address?
The paper attempts to address the problem of how to optimally deploy Integrated Air Defense System (IADS) missile sites to maximize asset protection given the asset values. Specifically, the study develops a series of strategies through network algorithms aimed at determining the optimal location nodes for placing Surface-to-Air Missile (SAM) sites, thereby destroying the maximum number of incoming missiles with the fewest interceptors possible. These strategies are applicable not only to IADS planning but also to operations involving defensive counter-air (DCA). The study employs six different network algorithms to evaluate each node in the network and develops seven strategies based on these algorithms. By generating a location network with weighted edges and assigning asset values, the paper demonstrates how to use these strategies to minimize the percentage of unprotected asset value. Finally, the paper also explores the effectiveness of different strategies and their relationships with parameters such as network diameter and small-world characteristics using ordinary least squares linear regression analysis.