Game and information theory analysis of electronic countermeasures in pursuit-evasion games

R. R. Brooks, Jing En Pang, C. Griffin

    Research output: Contribution to journalArticlepeer-review

    24 Scopus citations

    Abstract

    Two-player pursuit-evasion games in the literature typically either assume both players have perfect knowledge of the opponent's positions or use primitive sensing models. This unrealistically skews the problem in favor of the pursuer who needs only maintain a faster velocity at all turning radii. In real life, an evader usually escapes when the pursuer no longer knows the evader's position. In our previous work, we modeled pursuit evasion without perfect information as a two-player bimatrix game by using a realistic sensor model and information theory to compute game-theoretic payoff matrices. That game has a saddle point when the evader uses strategies that exploit sensor limitations, whereas the pursuer relies on strategies that ignore the sensing limitations. In this paper, we consider, for the first time, the effect of many types of electronic countermeasures (ECM) on pursuit-evasion games. The evader's decision to initiate its ECM is modeled as a function of the distance between the players. Simulations show how to find optimal strategies for ECM use when initial conditions are known. We also discuss the effectiveness of different ECM technologies in pursuit-evasion games.

    Original languageEnglish (US)
    Pages (from-to)1281-1294
    Number of pages14
    JournalIEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans
    Volume38
    Issue number6
    DOIs
    StatePublished - 2008

    All Science Journal Classification (ASJC) codes

    • Software
    • Control and Systems Engineering
    • Human-Computer Interaction
    • Computer Science Applications
    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'Game and information theory analysis of electronic countermeasures in pursuit-evasion games'. Together they form a unique fingerprint.

    Cite this