Analytical game strategies for active UAV defense considering response delays

被引:0
|
作者
Xiaopeng Gong [1 ]
Wanchun Chen [1 ]
Wengui Lei [1 ]
Jinyang Wang [1 ]
Zhongyuan Chen [1 ]
Yunyun Li [2 ]
机构
[1] School of Astronautics, Beihang University
[2] Beijing Electro-Mechanical Engineering
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In the realm of aerial warfare, the protection of Unmanned Aerial Vehicles(UAVs) against adversarial threats is crucial. In order to balance the impact of response delays and the demand for onboard applications, this paper derives three analytical game strategies for the active defense of UAVs from differential game theory, accommodating the first-order dynamic delays. The targeted UAV executes evasive maneuvers and launches a defending missile to intercept the attacking missile, which constitutes a UAVMissile-Defender(UMD) three-body game problem. We explore two distinct operational paradigms: the first involves the UAV and the defender working collaboratively to intercept the incoming threat, while the second prioritizes UAV self-preservation, with independent maneuvering away from potentially sacrificial engagements. Starting with model linearization and order reduction, the Collaborative Interception Strategy(CIS) is first derived via a linear quadratic differential game formulation. Building upon CIS, we further explore two distinct strategies: the Informed Defender Interception Strategy(IDIS), which utilizes UAV maneuvering information, and the Unassisted Defender Interception Strategy(UDIS), which does not rely on UAV maneuvering information. Additionally, we investigate the conditions for the existence of saddle point solutions and their relationship with vehicle maneuverability and response agility. The simulations demonstrate the effectiveness and advantages of the proposed strategies.
引用
收藏
页码:191 / 210
页数:20
相关论文
共 50 条
  • [41] Generation of security system defense strategies based on evolutionary game theory
    Zou, Bowen
    Wang, Yongdong
    Liu, Chunqiang
    Dai, Mingguang
    Du, Qianwen
    Zhu, Xiang
    NUCLEAR ENGINEERING AND TECHNOLOGY, 2024, 56 (09) : 3463 - 3471
  • [42] Examination of Restaurants Online Pricing Strategies: A Game Analytical Approach
    Guo, Xiaolong
    Zheng, Xiabing
    JOURNAL OF HOSPITALITY MARKETING & MANAGEMENT, 2017, 26 (06) : 659 - 673
  • [43] Coordinated Optimization Scheduling of Microgrid and Distribution Network Based on Cooperative Game Considering Active/Passive Demand Response
    Fan T.
    Wang H.
    Wang W.
    Li X.
    Yan S.
    Dianwang Jishu/Power System Technology, 2022, 46 (02): : 453 - 462
  • [44] THE BEAD GAME - RESPONSE STRATEGIES IN FREE ASSORTMENT
    BOND, AB
    HUMAN FACTORS, 1982, 24 (01) : 101 - 110
  • [45] A game theoretic method for decision and analysis of the optimal active defense strategy
    Jiang, Wei
    Tian, Zhi-hong
    Zhang, Hong-li
    Song, Xin-fang
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 819 - +
  • [46] Maximizing the Target's Longevity in the Active Target Defense Differential Game
    Pachter, Meir
    Garcia, Eloy
    Anderson, Roger
    Casbeer, David W.
    Khanh Pham
    2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 2036 - 2041
  • [47] A cluster UAV inspired honeycomb defense system to confront military IoT: a dynamic game approach
    Meng, Yufeng
    Xu, Jiancheng
    He, Jianhua
    Tao, Siqi
    Gupta, Deepak
    Moreira, Catarina
    Tiwari, Prayag
    Guo, Chenguang
    SOFT COMPUTING, 2023, 27 (02) : 1033 - 1043
  • [48] A cluster UAV inspired honeycomb defense system to confront military IoT: a dynamic game approach
    Yufeng Meng
    Jiancheng Xu
    Jianhua He
    Siqi Tao
    Deepak Gupta
    Catarina Moreira
    Prayag Tiwari
    Chenguang Guo
    Soft Computing, 2023, 27 : 1033 - 1043
  • [49] Role of Analytical Chemistry in Defense Strategies Against Chemical and Biological Attack
    Janata, Jiri
    ANNUAL REVIEW OF ANALYTICAL CHEMISTRY, 2009, 2 : 321 - 331
  • [50] Active Defense strategies selection for network mixed malicious action
    Chen Yong-qiang
    Wu Xiao-ping
    Fu Yu
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 336 - 340