A Reconnaissance Penetration Game With Territorial-Constrained Defender

被引:12
|
作者
Liang, Li [1 ]
Deng, Fang [2 ]
Wang, Jianan [3 ]
Lu, Maobin [2 ]
Chen, Jie [4 ,5 ]
机构
[1] Beijing Univ Chem Technol, Coll Informat Sci & Technol, Beijing 100029, Peoples R China
[2] Inst Technol, Sch Automat, Beijing 100081, Peoples R China
[3] Inst Technol, Sch Aerosp Engn, Beijing 100081, Peoples R China
[4] Tongji Univ, Shanghai Res Inst Intelligent Autonomous Syst, Shanghai 200092, Peoples R China
[5] Beijing Inst Technol, Key Lab Intelligent Control & Decis Complex Syst, Beijing 100081, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Games; Reconnaissance; Differential games; Missiles; Base stations; Velocity measurement; Trajectory; Barrier; pursuit-evasion differential game; reconnaissance penetration; DIFFERENTIAL GAME; PURSUIT; STRATEGIES;
D O I
10.1109/TAC.2022.3183034
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A reconnaissance penetration game is a classic target-attacker-defender game. In this game, a reconnaissance UAV (namely attacker) tries to avoid the defender and reconnoiter a target as close as possible, whereas a target tries to escape the attacker with the help of defender. Practically, the defender is considered constrained in a certain territory to capture the attacker and help the target. This article is primarily concerned with the winning region for three players. An explicit policy method is proposed to construct the barrier analytically. In addition, taking practical payoff functions into account, a complete solution to the reconnaissance game is provided by fusing the games of kind and degree. Simulation results are elaborated to showcase the effectiveness of the proposed policy.
引用
收藏
页码:6295 / 6302
页数:8
相关论文
共 50 条
  • [41] Is the end-game penetration (of the airway)?
    Lipman, J
    CRITICAL CARE MEDICINE, 2005, 33 (07) : 1654 - 1655
  • [42] Multi-agent Target Defense Game with Learned Defender to Attacker Assignment
    Manoharan, Amith
    Thakur, Prajwal
    Singh, Arun Kumar
    2023 INTERNATIONAL CONFERENCE ON UNMANNED AIRCRAFT SYSTEMS, ICUAS, 2023, : 297 - 304
  • [43] Cyber security based on mean field game model of the defender: Attacker strategies
    Miao, Li
    Li, Shuai
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (10): : 1 - 8
  • [44] Optimal Target Capture Strategies in the Target-Attacker-Defender Differential Game
    Garcia, Eloy
    Casbeer, David W.
    Pachter, Meir
    2018 ANNUAL AMERICAN CONTROL CONFERENCE (ACC), 2018, : 68 - 73
  • [45] Modeling and mitigating the effects of supply chain disruption in a defender-attacker game
    Xu, Jie
    Zhuang, Jun
    Liu, Zigeng
    ANNALS OF OPERATIONS RESEARCH, 2016, 236 (01) : 255 - 270
  • [46] Optimal DDoS Attack Strategy for Cyber–Physical Systems: A Multiattacker–Defender Game
    Zhang, Hao
    Yao, Jie
    Wang, Zhuping
    Gao, Sheng
    Yan, Huaicheng
    IEEE SYSTEMS JOURNAL, 2024, 18 (02): : 929 - 940
  • [47] A Strategic Analysis of Attacker-Defender Repeated Game in Smart Grid Security
    Paul, Shuva
    Ni, Zhen
    2019 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2019,
  • [48] Analysis of indicators of load during the game in activity of the heavy defender in water polo
    Lozovina, V
    Pavicic, L
    KINESIOLOGY NEW PERSPECTIVES, PROCEEDINGS BOOK, 2002, : 357 - 360
  • [49] GAME THEORY AND TERRITORIAL BEHAVIOR IN SPECKLED WOOD BUTTERFLIES
    DAVIES, NB
    ANIMAL BEHAVIOUR, 1979, 27 (AUG) : 961 - 962
  • [50] Penetration Testing Active Reconnaissance Phase - Optimized Port Scanning With Nmap Tool
    Shah, Mujahid
    Ahmed, Sheeraz
    Saeed, Khalid
    Junaid, Muhammad
    Khan, Hamayun
    Ata-ur-rehman
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING, MATHEMATICS AND ENGINEERING TECHNOLOGIES (ICOMET), 2019,