DOI QR코드

DOI QR Code

Two-Layer Approach Using FTA and BBN for Reliability Analysis of Combat Systems

전투 시스템의 신뢰성 분석을 위한 FTA와 BBN을 이용한 2계층 접근에 관한 연구

  • Kang, Ji-Won (Department of Computer Engineering, Korea Maritime and Ocean University) ;
  • Lee, Jang-Se (Division of Marine Information Technology, Korea Maritime and Ocean University)
  • Received : 2019.01.18
  • Accepted : 2019.02.13
  • Published : 2019.03.31

Abstract

A combat system performs a given mission enduring various threats. It is important to analyze the reliability of combat systems in order to increase their ability to perform a given mission. Most of studies considered no threat or on threat and didn't analyze all the dependent relationships among the components. In this paper, we analyze the loss probability of the function of the combat system and use it to analyze the reliability. The proposed method is divided into two layers, A lower layer and a upper layer. In lower layer, the failure probability of each components is derived by using FTA to consider various threats. In the upper layer, The loss probability of function is analyzed using the failure probability of the component derived from lower layer and BBN in order to consider the dependent relationships among the components. Using the proposed method, it is possible to analyze considering various threats and the dependency between components.

전투 시스템은 다양한 적대적 환경에서 주어진 임무를 수행한다. 주어진 임무를 수행하는 능력을 높이기 위하여 전투 시스템의 신뢰성을 분석하는 연구가 중요하다. 대부분의 기존 연구에서는 위협을 고려하지 않거나 하나의 위협을 고려하며 구성 요소간의 종속적 관계를 고려하고 있지 않다. 본 논문에서는 전투 시스템의 기능에 대한 상실 확률을 도출하며, 이를 이용하여 신뢰성 분석을 진행한다. 제안하는 방법은 하위, 상위의 두 계층으로 나누어 분석한다. 하위 계층에서는 다양한 위협을 동시에 고려하기 위하여 FTA 기법을 이용하여 구성 요소별 고장 확률을 도출한다. 상위 계층에서는 하위 계층에서 도출된 구성 요소의 고장 확률을 이용하며 구성 요소간의 종속적 관계를 고려하기 위해 BBN을 이용하여 기능의 상실 확률을 분석한다. 제안하는 방법을 이용하면 다양한 위협을 동시에 고려하면서 구성 요소간의 종속적 관계에 대한 분석이 가능하다.

Keywords

HOJBC0_2019_v23n3_333_f0001.png 이미지

Fig. 1 Flow chart of the proposed method

HOJBC0_2019_v23n3_333_f0002.png 이미지

Fig. 2 The proposed hierarchical reliability analysis of combat system

HOJBC0_2019_v23n3_333_f0003.png 이미지

Fig. 3 construction of fault tree

HOJBC0_2019_v23n3_333_f0004.png 이미지

Fig. 4 Example of FT

HOJBC0_2019_v23n3_333_f0005.png 이미지

Fig. 5 construction of BBN

HOJBC0_2019_v23n3_333_f0006.png 이미지

Fig. 6 FT of components(A, B, C)

HOJBC0_2019_v23n3_333_f0007.png 이미지

Fig. 7 BBN of components(A, B, C)

HOJBC0_2019_v23n3_333_f0008.png 이미지

Fig. 8 BBN of components(A, B, C) including the dependent between A, B, C

HOJBC0_2019_v23n3_333_f0009.png 이미지

Fig. 9 CPT of node A

HOJBC0_2019_v23n3_333_f0010.png 이미지

Fig. 10 CPT of node B, C, F1

Table. 1 Failure probability of components by threat on the front

HOJBC0_2019_v23n3_333_t0001.png 이미지

Table. 2 Failure probability of components(A, B, C)

HOJBC0_2019_v23n3_333_t0002.png 이미지

References

  1. H. G. Hwang, "A Methodology for Integrated Reliability Analysis of Combat Systems," Ph. D. dissertation, Korea Maritime and Ocean University, Busan, 2016.
  2. J. Sakong. J. T. Kim, S. C. Woo, J. W. Park, J. H. Choi, J. S. Park, and T. W. Kim, "A Development of Unified Survivability Prediction Technology," The Korean Society of Mechanical Engineers Spring Conference, pp. 277-278, 2017.
  3. H. G. Hwang, J. W. Kang, and J. S. Lee, "A Development of Component Vulnerability Analysis Program for Armored Fighting Vehicle using Criticality based on FMECA," Journal of the Korea Institute of Information and Communication Engineering, vol. 19, issue 8, pp. 1973-1980, 2015. https://doi.org/10.6109/jkiice.2015.19.8.1973
  4. M. H. Nam, K. Park, W. S. Park, and C. Yoo, "The Vulnerability Assessment of Hydro-pneumatic Suspension of Ground Combat Vehicles Using Vulnerable Area Method and DMEA," International Journal of CAD/CAM, vol. 22, issue 2, pp. 141-149, 2017.
  5. G. Kevorkian, "UAS Risk Analysis using Bayesian Belief Networks: An Application to the Virginia Tech ESPAARO," Ph. D. dissertation, Virginia Polytechnic Institute and State University, Virginia, 2016.
  6. H. Song, H. G. Park, and S. S. Go, "A Study on the Analysis of Accident Cause of Form Work Using FTA(Fault Tree Analysis) System," Journal of the Architectural Institute of Korea Structure & Construction, vol. 22, issue 6, pp. 119-127, 2006.
  7. J. H. Lim, Y. J. Choi, K. Y. Lee, Y. G. Jang, and N. Y. Lim, "A Study on Cause Analysis of Derailment Accident Using Failure Tree Analysis," Journal of The Korean Society of Hazard Mitigation, vol. 18, issue 2, pp. 19-26, 2018. https://doi.org/10.9798/kosham.2018.18.2.19
  8. Luminoso, Fred. "Bayesian Belief Network Analysis of Legal Evidence," Letter from the Editors-in-Chief, 46, 2002.
  9. J. S. Shin, "Cyber Security Evaluation for Nuclear I&C Systems Using Bayes'Theorem," Ph. D. dissertation, Kyung Hee University, Seoul, 2017.
  10. M. Frigault, L. Wang, "Measuring Network Security Using Bayesian Network-Based Attack Graghs," Annual IEEE International Computer Software and Applications Conference, pp.698-703, 2008.
  11. J. W. Kang, "A Methodology for Hierarchical Reliability Analysis of Combat Systems Using FTA and BBN," M. S. thesis, Korea Maritime and Ocean University, Busan, 2019.