Next Article in Journal
Optimal Solution for Frequency and Voltage Control of an Islanded Microgrid Using Square Root Gray Wolf Optimization
Previous Article in Journal
A Novel Mutation Analysis-Based Approach for Testing Parallel Behavioural Scenarios in Multi-Agent Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Bilateral Cooperative Strategy for Swarm Escort under the Attack of Aggressive Swarms

School of Marine Science and Technology, Northwestern Polytechnical University, Xi’an 710072, China
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(22), 3643; https://doi.org/10.3390/electronics11223643
Submission received: 21 September 2022 / Revised: 3 November 2022 / Accepted: 5 November 2022 / Published: 8 November 2022
(This article belongs to the Section Systems & Control Engineering)

Abstract

:
With the development of swarm intelligence and low-cost unmanned systems, the offence and defense of a swarm have become essential issues in defense and security technologies. A swarm of drones can be used to attack some high-value units (HVUs), such as bases or fuel tanks. Moreover, some moving HVUs such as cargo ships are also greatly threatened when attacked by a swarm of unmanned surface vehicles. A promising approach to protect a HVU from the attack of an aggressive swarm is to use another low-cost swarm. However, escorting a HVU with a swarm is challenging since defenders must respond to attacks and carry out escorts in a noncentralized manner. It is difficult to balance the above tasks well using the unilateral escort strategy adopted by defenders in previous studies. Therefore, this paper proposes a bilateral cooperative strategy for the swarm escort problem under the attack of aggressive swarms. In this bilateral cooperative strategy, the HVU adaptively select different evasion strategies by inferring the threat level according to the spatial distributions of the defenders and attackers. Meanwhile, the defenders of the swarm take a noncentralized escort algorithm by moving around the HVU in a dual-layer formation. Within each layer, the defenders cluster into several uniformly distributed subswarms to counteract the attackers. Numerical simulations are conducted using different aggressive swarm models to demonstrate the effectiveness of the proposed bilateral cooperative strategy.

1. Introduction

Swarm behavior is common in the natural world, such as when colonies use pheromones to engage with individual profiles within the colony to accomplish the shortest interaction [1,2], and honeybees use individual interactions within the colony to create a balance between flight distance and nectar harvest [3,4,5]. Some studies have found that the emergence of swarming in animals is beneficial for avoiding predators or foraging [6,7] and can compensate for the deficiency of individual abilities, which has inspired artificial swarms. Take the unmanned aerial vehicle (UAV), for example, multiple UAVs can complete more complex and challenging tasks than a single UAV. The use of UAV swarms to attack high-value units (HVUs) such as bases and fuel tanks is on the rise [8,9]. The threat of aggressive swarms is growing across the world and with it the importance of staying ahead in the development of defense systems. Therefore, it has become an urgent issue to develop efficient ways to handle aggressive swarms and to escort the HUVs [10].

1.1. Related Work

Previous studies on escort strategies mainly focus on two issues: offense–defense confrontation and formation control. As for offense–defense confrontations, researchers are usually concerned with target allocation in multi-agent confrontations [11,12,13,14]. The main idea of these studies is to decompose a multi-agent adversarial problem into multiple one-to-one adversarial problems. The one-to-one adversarial problem is often seen as a Target–Attacker–Defender (TAD) game [15], which consists of a target, attacker, and defender. The differential equations are constructed by their geometric relations, and each individual’s desired position then travels to the desired point [16]. Appropriate target allocation strategies significantly influence the defensive validity of such studies. As the swarm size becomes larger, the complexity of the target allocation algorithm increases, leading to difficulties in implementing simple individuals. In comparison, the other type is more concerned with strategy selection. These studies focus on selecting individuals’ strategies and are generally solved using game theory or machine learning approaches [17,18,19,20]. Since the 1990s, studies have been conducted on the application of reinforcement learning (RL) techniques to the solution of multi-agent adversarial games. Littman combined reinforcement learning to solve a two-person stochastic zero-sum game problem [21]. Bowling suggested using multi-agent reinforcement learning (MARL) to express learning in stochastic games [22]. The Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm, developed by Lowe in 2017 and based on the Deep Deterministic Policy Gradient (DDPG), uses a framework of centralized training and decentralized execution, and can be used in hostile circumstances. These techniques, however, have an intractable issue because of their centralized strategy training architecture, which causes the training input to increase exponentially with the number of agents and exerts more of a strain on the agents’ computational capabilities.
The other issue is formation control. Shepherding is an often-discussed formation control algorithm [23,24]. The shepherding model consists of two parts: shepherd agents and herd agents. One or more shepherd agents escort non-cooperative herd agents to the goal area [25], or the defense swarm is treated as multiple shepherd agents, which “escort” attackers to the safety area [26]. However, this problem differs from the escort model in that the HVU has a preset goal rather than being driven by the escort process dynamically. Research on the escort model has been relatively limited compared to the Shepherding model. In the available studies, Jiehong Wu et al. regard the escort swarm and HVU as one heterogeneous swarm [27] and use loss functions to correct the real-time position of escorts to form escort formations to protect the HVU. In that work, escorts and the HVU are unilateral, not bilateral, i.e., only the escorts move according to the HUV but the HUV’s maneuver is independent of the escorts. Moreover, the above research on escorting rarely considers the response of the escort swarm to aggressive swarms. The escort’s unilateral protection effect on the HUV will be diminished when it reacts to the attackers, but the bilateral cooperation between the escort and the HUV can make up for this deficiency and increase the escort efficiency. In this paper, we propose a bilateral cooperative strategy to adjust the inner interactions of the defenders and the reaction of the HVU to counteract aggressive swarms and escort the HUV.
Threat assessment is essential for bilateral cooperative escorts. Threat level, intent, and opportunity are regarded as the three main components of threat assessment according to [28]. Threat assessment entails not only evaluating the threat level and threat intent of the enemy but also considering its limits. Gonsalves P et al. employ the genetic algorithm and fuzzy logic theory to establish a threat assessment model. They use fuzzy logic to analyze the enemy’s threat intent and threat targets, design a genetic algorithm with a fitness function as the threat level, and then use it to generate and evaluate behavior sets [29,30]. Okello N et al. use the Bayesian network to analyze the threat level of an incoming target to the stronghold [31]. Ruining Luo et al. use the analytic hierarchy process (AHP) and information entropy to determine the subjective and objective threat factor weights of low altitude, slow speed, and small targets [32]. In the paper, we will use the Dynamic Bayesian Network (DBN) to construct the threat assessment model. Within the DBN, the HVU evaluates the current threat based on locally perceived information and make strategic selections based on the results. The interaction of the HVU to the escort swarm involves the evaluation of the escort subswarms’ statuses. Since different factors have inconsistent effects on the status evaluation, AHP is used to evaluate their status and select the status-optimal subswarm.

1.2. Contributions

In summary, the main contributions of this paper are to propose a bilateral cooperative strategy for the swarm escort problem under the attack of aggressive swarms, and they are presented as follows:
  • To improve the survivability of a HVU, the HVU are guided according to the positions of defenders and attackers. In particular, three evasion strategies are adaptively selected by inferring the threat level.
  • A noncentralized escort algorithm is proposed and the defenders in the swarm distribute in two circles centered at the moving HVU, namely dual-layer formation. Within each circle, the defenders cluster into several sub-swarms rather than uniformly distribute over the whole circle.
  • Different aggressive swarm models are used to validate the proposed bilateral cooperative strategy through numerical simulations.
The rest of the paper is organized as follows: in Section 2, the bilateral cooperative strategy is presented along with the description of the escort problem. In Section 3, the effectiveness and efficiency of the bilateral cooperative strategy are analyzed from two perspectives: attack patterns and parameter settings. Finally, the conclusions and prospects are drawn in Section 4.

2. Proposed Methods

2.1. Problem Formulation

Let us consider an escort swarm of N individuals escorting a HVU that moves at a constant speed from the start point to the goal. During the escort process, the escort swarm will protect the HVU from the aggressive swarms. An escort individual, i.e., a defender, has state information s D i , consisting of position x D i and velocity v D i , and the state of the ith defender updates according to
v D i ( t + Δ t ) = v D i ( t ) + u D i ( t ) * Δ t x D i ( t + Δ t ) = x D i ( t ) + v D i ( t + Δ t ) * Δ t
where Δ t is the simulation step size, u denotes the acceleration. This work considers the social force, which is determined by the interaction rules of the individuals. As for responding to the aggressive swarm, a defender not only cooperates with its neighbors but is also affected by the HVU according to the potential field. Instead of undergoing a passive escort, the HVU can assess threat level and cooperative with the escort swarm by making an active maneuver, which is, namely, the bilateral cooperative strategy.
The essential task of escorting a HVU is to make the HVU reach the goal safely in limited time. In this paper, the escort success rate and travel time are used to evaluate the strategy’s effectiveness. The escort process is defined as successful if the escort swarm eliminates all individuals in the aggressive swarm (no aggressive individual hits the HVU) and the HVU reaching the goal within a preset time. Independent trials will be carried out to sufficiently investigate the effectiveness of the strategy. The success rate is defined as the proportion of successful trails to the total number of trails.

2.2. Aggressive Swarm Model

Responding to aggressive swarm is the basic premise of the escort problem, so another key indicator for escort strategies is the ability to react to swarm attacks with various attack patterns. According to the literature, we generally classify the aggressive swarm into three main categories: non-cooperative swarm attack, single-swarm attack, and multi-subswarm attack.

2.2.1. Non-Cooperative Swarm Attack

The pattern of non-cooperative swarm attack means that individuals in the aggressive swarm only consider collision avoidance without cooperating with each other when attacking the HVU. The main characteristic of this attack pattern is dispersibility, i.e., the attackers tend to move forward to the HVU directly. The formulation of the interaction rules for attackers in the non-cooperative aggressive swarm is shown below [33]:
F i n o n c o = j N i 1 d i j d ^ i j
where N i denotes ith individual’s neighborhood collection in the attacking swarm. d i j is the distance from ith individual to jth neighbor individual. d ^ i j represents the unit vector of the position of j with respect to i. Figure 1a shows the non-cooperative attack pattern in the target-free environment.

2.2.2. Single-Swarm Attack

In this pattern, individuals can aggregate due to the interaction rules. The main characteristic of this attack pattern is collectivity, i.e., individuals in the aggressive swarm will aggregate for a saturation attack on the HVU. The formulation of the interaction rules in the single-swarm attack is shown below [33]:
F i sin gle - s = j N i ( 1 d i j l s ( d i j ) 3 ) d ^ i j
The meaning of the parameters is the same as non-cooperative swarm. Figure 1b shows the single-swarm attack pattern in the target-free environment.

2.2.3. Multi-Subswarm Attack

The aggressive swarm will be divided into some subswarms in this pattern, its characteristic is the combination of the above two attacking patterns. Individuals can aggregate to attack the HVU but do not always remain in a single swarm, which increases the flexibility. The formulation of the interaction rules for a multi-subswarm attacking pattern is shown below [34]:
F i multi - s = j N i [ 1 d i j l s ( d i j ) 3 + exp ( ( d i j l m ) 2 ) ] d ^ i j
ls and lm are the subswarms’ indicators to adjust spatial distribution and the size of subswarms, respectively. Figure 1c shows the multi-subswarm attacking pattern in the target-free environment.

2.3. Bilateral Cooperative Strategy

Bilateral cooperative strategy consists of two parts: escort swarm cooperative strategy and HVU cooperative strategy. Escort swarm cooperative strategy is based on the social force model, building an escort model and defining meta behavioral rules for defenders to make them self-organized to escort the HVU. In HVU cooperative strategy, the HVU adaptively selects different evasion strategies by inferring the threat level according to the spatial distributions of the defenders and attackers.

2.3.1. Escort Model

In this paper, the self-organizing escort swarm is guided by some meta behavioral rules: position synergy rule, velocity synergy rule, anti-intrusion rule, and escort formation rule. The combined social force is determined by the weighted sum of these behavioral rules:
u D i ( t ) = u i a u t o + k p o s u i p o s + k v e l u i v e l + k a i n u i a i n + k e s c u i e s c + η ξ i
where u i p o s , u i v e l , u i a i n , u i e s c are the vectors indicating the position synergy rule, velocity synergy rule, anti-intrusion rule, and escort formation rule, respectively. u a u t o denotes a self-driven force that affects the individual speed, η ξ i denotes the random noise. k p o s ,   k v e l ,   k a i n ,   k e s c denote weights of the corresponding rule.

2.3.2. Formulations of Meta Rules

(a)
Position synergy rule
There is a sensing radius for the defender, and neighboring individuals within the sensing domain can perceive each other’s position and velocity. Based on neighbors’ positions, the defender determines the position synergy force, which describes the attractive or repulsive forces of neighbors to it. The position synergy equation is shown below:
u i p o s = k N i ( 1 d i k k 1 p o s d i k 3 ) e ( d i k k 2 p o s ) 2 * d ^ i k
where d i k is the distance from the ith defender to kth neighbor individual. d ^ i k represents the unit vector of the position of k with respect to i. N i denotes the ith defender’s neighborhood collection. k 1 p o s specifies the desired distance between individuals. k 2 p o s controls the repulsive interaction range, and the repulsive force achieves its maximum when the distance is equal to k 2 p o s . When d i k is smaller than k 1 p o s , the position synergy is portrayed as short-range repulsion, which avoids collision with neighboring individuals; when d i k is slightly larger than k 1 p o s , the position synergy is portrayed as short-range attraction, which enables the defender aggregation with neighboring individuals; when d i k is much larger than k 1 p o s , the position synergy is expressed as medium-range repulsion, which separates the cluster of the defender and neighboring individuals into several smaller groups and achieves its maximum when d i k is equal to k 2 p o s ( k 2 p o s >> k 1 p o s ); when d i k is much larger than k 2 p o s , the position synergy is expressed as long-range attraction, which causes the separated clusters to move close to each other.
(b)
Velocity synergy rule
The defender adjusts its velocity by referring to its neighbors’ velocities. In order to react to the surroundings more quickly, the defender chooses the neighboring individual whose orientation change is the greatest in relation to itself and refers to that neighbor’s velocity, as displayed below:
k * = arg max k N i arccos ( x k ( t ) x D i ( t ) ) ( x k ( t Δ t ) x D i ( t Δ t ) ) x k ( t ) x D i ( t ) x k ( t Δ t ) x D i ( t Δ t )
where a b denotes the dot product of vector a and vector b. The velocity synergy equation is shown below:
u i v e l = v k * ( t ) v D i ( t )
(c)
Anti-intrusion rule
The defender is locally aware of the attacking individuals and can only perceive their position. In order to protect the HVU, the defender performs “point capture” on the attacking individuals within the sensing domain, i.e., after the attacking individual enters the defender’s capture radius, both the defender and the attacker “die” simultaneously. The magnitude of anti-intrusion force is progressively greater with distance. The anti-intrusion force is designed as:
u i a i n = k T i 1 d i k * d ^ i k ( t )
where T i denotes the set of attacking individuals within the sensing domain of the ith defender.
(d)
Escort formation rule
Due to the specificity of the HVU, defenders are globally aware of it and perceive its position. The presence of the escort potential field around the HVU allows the escort swarm to form a dual-layer formation to protect it. The escort potential field consists of three areas: attraction potential field area, repulsion potential field area, and potential-free field area. When a defender is in the attraction potential field area, it is subject to potential field force that drives it towards the HVU; when it is in the repulsion potential field area, the potential field force will drive it away from the HVU; when it is in the potential-free field area, it is not subject to potential field forces. Figure 2 shows the design of the escort potential field.
The potential field force can be stated as:
u i e s c = d i p d ^ i p ; ( d i p ( d 4 e s c , d 3 e s c ) ( d 1 e s c , + ) ) 1 d i p d ^ i p ; ( d i p ( d 3 e s c , d 2 e s c ) ( 0 , d 5 e s c ) )
where d i p is the distance from ith defender to the HVU. d ^ i p represents the unit vector of the position of ith defender with respect to the HVU. d 5 e s c determines the structure of the escort potential field and the remaining parameters are related to it.
d 1 e s c = k 1 * d 5 e s c d 2 e s c = k 2 * d 5 e s c d 3 e s c = k 3 * d 5 e s c d 4 e s c = k 4 * d 5 e s c
where k1, k2, k3, k4 are potential field coefficients, which indicate the range of the corresponding potential field area, respectively. In this paper, the values of potential field coefficients are taken as k1 = 2, k2 = 1.5, k3 = 1.3, k4 = 1.1.
Figure 2. An illustration of the potential field configuration.
Figure 2. An illustration of the potential field configuration.
Electronics 11 03643 g002

2.3.3. HVU Cooperative Strategy

The key concern for escort process is the HVU’s survivability, especially considering aggressive swarms. In practical terms, the HVU (e.g., the carrier, base, etc.) has a relatively stronger ability of perception, i.e., it can perceive the state information (position and velocity) of the escort and aggressive swarms. It is reasonable that the HVU makes an appropriate decision for its maneuver based on the perception information to further improve its survivability. Therefore, in this paper, the cooperative strategy of the HVU consists of two key steps: threat assessment and evasion strategy.
(a)
Threat assessment
Threat assessment is the premise of evasion of the HVU. In the paper, we use Dynamic Bayesian Network (DBN) to conduct threat assessment. Bayesian Networks (BN) [35] are also called as Belief Networks. Based on probabilistic inference theory, the conditional probability relationship between variables is described as a directed acyclic graph. The DBN is an extension in time of the static BN. The DBN consists of two parts: network structure and conditional probability. In this work, we consider these three factors for threat assessment: distance to the nearest attacker, cooperative strength with regard to escort swarm, and HVU heading declination, which are designed as nodes of the DBN, as shown in Figure 3.
As for the distance to the nearest attacker (D_attack), we use three different distance levels, i.e., D_attack1, D_attack2, and D_attack3 to indicate close, medium, and far, respectively. As for the cooperative strength (N_sup), it is determined by the number of defenders and attackers in the most core escort domain (the domain determined by d 5 e s c as shown in Figure 2). We use N_sup1, N_sup2, and N_sup3 to represent that the number of escort individuals is less than that of attacking individuals, similar (within two), and more than, respectively. HVU heading declination (β) represents the angle between the velocity direction of the nearest attacking individual and the line from the attacking individual to the HVU. β1, β2, and β3 are used to represent small, medium, and big angle value, respectively.
The D_attack and β reflect the intent of the nearest attacking individual with regard to the HVU. Both are positively correlated with the threat level. In other words, the attacker is close or the HVU heading declination is small means a higher probability of a high threat level for the HVU. N_sup reflect the available power of the escort swarm that can be used to counteract the attackers. A higher N_sup level will possibly lead to a lower threat level for the HVU.
Based on the structure (see Figure 3) and conditional probabilities (see Table 1), we can combine such three factors to evaluate the threat level and the corresponding probability. The output of the network (i.e., the probabilities of threat levels) at the previous step is used as the prior probability of the root node at the coming step. As a result, using on the constructed DBN, the threat assessment can be updated step by step. We use the Junction Tree Propagation Algorithm [36] to make inference of the DBN.
(b)
Evasion strategy
In this paper, the HVU can make decisions on evasion strategy according to the threat assessment. The threat level with the highest probability will be regarded as the current threat level. When the threat level is low, the HVU has not perceived the attacking swarm, or the attacking swarm does not pose significant threat to the HVU. The HVU is suggested to maintain its original move state. When the threat level is medium, the HVU needs to cooperate with the escort swarm to avoid the aggressive swarm. When the HVU is under high threat, it needs to escape immediately. To achieve the above evasion process, we have designed the corresponding strategies for three different threat levels as shown below.
Strategy for low threat level. The HVU’s task is to not only avoid being attacked but also to reach the goal as soon as possible. Thus, when the HVU is under the low threat level, it will move towards the goal without considering swarm attacks. The velocity of the HVU adjusts according to:
v p = x g o a l x p x g o a l x p
where x g o a l , x p denote the coordination of the goal and HVU, respectively.
Strategy for medium threat level. As for the medium threat level, the HVU needs to cooperate with the escort swarm. To escort the HVU and counteract the attackers, the defenders will move around the HVU in a dual-layer multi-swarm manner, as mentioned in Section 2.3.1 and Section 2.3.2. From the HVU side, it needs to move cooperatively with the escort swarm to obtain better protection, which will be described in detail in this section.
First, the HVU will identify the escort subswarms. In this paper, we introduce the Density-Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm [37] to cluster the escort swarm into several subswarms. The internal density of a subswarm is controlled by two parameters according to the DBSCAN algorithm: the radius of the neighborhood and the minimum number of a subswarm.
Second, the HVU evaluates each subswarm’s status. To achieve this, the following criteria will be taken into account: distance to the subswarm center, distance from the subswarm to attackers, the subswarm size, and distance from the subswarm to the nearest attacker. In this paper, the geometric center will be used to represent the spatial position of a given swarm. Additionally, each criterion has inconsistent effects on subswarm status. Therefore, we use the Analytic Hierarchy Process (AHP) [32] to build a status evaluation hierarchy model, as shown in Figure 4.
Then, through a comprehensive assessment of the four criteria, the pairwise comparison matrix X 0 , which depicts the ratio of importance among the criteria, is illustrated in Table 2. For example, B1 is three times more important than B3, and B2 is twice as important as B1.
The eigenvector of X 0 can be calculated as the weight vector of four criteria, i.e., ω 0 . The subswarms are compared based on one criterion, B i (I = 1,2,3,4), to obtain a pairwise comparison matrix X i , as in Table 2, the eigenvector ω i of X i is the weight vector of B i for the subswarms. The weight matrix of the four criteria for the subswarms can then be derived:
W = [ ω 1 , ω 2 , ω 3 , ω 4 ] T
The subswarm’s status ranking weight vector V can be obtained as follows:
V = ω 0 T W
Thus, the subswarm with the highest ranking can be inferred from V as the status-optimal subswarm.
Finally, the HVU moves towards the status-optimal subswarm, and the velocity of the HVU is defined as:
v p = x c * x p x c * x p
Here, x c * is the position of the status-optimal subswarm’s center.
Strategy for high threat level. When the threat level is high, the HVU needs to escape. The escape direction is determined by the position of all attacking individuals. The formulation is shown below:
v p = j T p d ^ j p / d j p 2 j T p d ^ j p / d j p 2
where T p denotes a collection of attacking individuals in the HVU’s perceptual domain. d j p is the distance from the HVU to jth attacking individual. d ^ j p represents the unit vector of the position of an attacking individual with respect to the HVU.

3. Results

In this section, we conduct a series of numerical simulations to validate the proposed algorithm under different aggressive swarms. The HVU’s initial position is (0,0) and its speed is set to a constant 1 m/s. The escort swarm is initially placed apart away rather than around the HVU. Unless otherwise stated, the settings of the following numerical simulations are given in Table 3.

3.1. Escort without Swarm Attacks

The most essential issue in the self-organized escort problem is whether the escort swarm can adaptively form an escort formation to protect the HVU. The first series of simulations is to validate the dual-layer escort formations without aggressive swarms. In the absence of attackers, the HVU’s threat level is always low. Thus, the HVU only needs to be considered for the task of reaching the goal successfully. Figure 5A shows the escort trajectories of different number of defenders. It is observed that escort individuals can form a dual-layer escort formation around the HVU. It can also be found that escort individuals form multiple subswarms which are uniformly distributed around the HVU. Such behavior is achieved according to simple rules proposed in this work. From the practical perspective, the dual-layer uniformly distributed subswarms can counteract the attacking swarms from any direction with various fleet size.
Moreover, the escort task, i.e., simulation time, is not over when the HVU reaches the goal, the escort formation will vortex around the HVU, as shown in Figure 5B. We use the angular momentum to measure the degree of the orderliness of the swarm during the vortex motion:
m s w a r m = 1 N i = 1 N r i p ( t ) × v D i ( t )
where r i p denotes the position vector from the ith defender to the HVU. We can find that the transition time from escort to vortex becomes longer as the escort size increases. The vortex trajectories with different size of escort swarms are shown in Figure 5C. It can be seen that the escort individuals begin to vortex around the HVU after it reaches the goal, and the orderliness of the vortex steadily improves. This emergent vortex behavior may be a useful base (static HVU) protection. The vortex formation, like a school of fish, is helpful for the defenders to perceive the threats from various directions in time.

3.2. Escort against Swarm Attacks

When encountering swarm attacks, the HVU needs to not only reach the goal but also survive the swarm attacks. Figure 6A shows the snapshots of the 50 escort individuals protecting the HVU under the attack of 30 aggressive individuals with different attacking models, i.e., non-cooperative swarm, single swarm and multi-subswarm attacking models (see Section 2.2). At the beginning, the threat, i.e., the attacking swarm, is far away from the HVU and the escort swarm, the HVU moves towards the goal point and the escort swarm is forming a dual-layer escort formation around the HVU. Later, when encountering the aggressive swarm, the defenders will intercept and eliminate the aggressive individuals, meanwhile the HVU continually evaluates the threat and selects the best evasion strategy. After the aggressive individuals have been eliminated, the escort swarm reverts to a stable dual-layer escort formation.
As for the evasion of the HVU, Figure 6B shows the trajectories of escort individuals and HVU during the whole escort process. It can be seen that the HVU is almost always in the center of the escort swam. Moreover, the trajectory of the HVU indicates that when moving towards the goal the HVU can adaptively make its decision on maneuver for the purpose of evasion, which validates the effectiveness of the proposed bilateral cooperative strategy. Figure 6C shows the inside view of the threat assessment of the HVU. It can be seen that the duration of high threat in the single-swarm attack case is uninterrupted and long. This is because the single-swarm attack is likely to perform a saturation attack in a specific direction, which has been proven to be an effective military tactic. Interestingly, the total duration of high threat is longest despite a small interruption in the non-cooperative swarm attack case. Obviously, the non-cooperative swarm is also very threatening because the attacking direction of each individual does not necessary align with the others. Attacking from diverse directions can also significantly improve the effectiveness. In comparison, the multi-subswarm attack causes the shortest duration of high threat level. This is because this attack model is superior neither in saturation attack in a specific direction nor in the diverse attacking directions.
To investigate the impacts of different swarm attack models, we show the escort success rate and HVU travel time in Figure 7. It can be seen in Figure 7A that the success rate under the single-swarm attack decreases the most with the increase in the attacking swarm’s size, which implies an advantage of the single-direction saturation attack. Interestingly, the decline in success rate is not significant when attacking by a non-cooperative swarm (diverse attacking direction). This reflects the effectiveness of the dual-layer ring formation of the escort swarm to some extent. As for the travel time, the HVU requires the longest time duration to reach the goal when attacked by a non-cooperative swarm. This reveals that the HVU adjusts its direction more frequently when the attacking direction is more diverse, which matches the first subplot in Figure 6C.

3.3. Sensitivity to Parameters

To gain a deep insight into the proposed bilateral cooperative escort method, in this section we will conduct sensitivity analysis of the parameters from the perspective of the HVU and escort swarm, respectively. Without loss of generality, in the following experiments we draw conclusions based on 100 independent runs, the non-cooperative aggressive swarm is used to investigate the success rate of the escort process.
First, we investigate the HVU’s perception range which is set to 8, 10, 12, 14, and 16, respectively. According to the statistical results shown in Figure 8A, the perception range is helpful for maintaining a high success rate. It is intuitive that a short perception range of the HVU means little information (the information about defenders and attackers) that the HVU can obtain to make evasion decision. Such a situation becomes worse when counteracting a larger size of aggressive swarm, see the curve with perception range 8.
Second, as for the other side in the bilateral cooperative escort, i.e., the escort swarm, the basic radius of the escort potential field (i.e., d 5 e s c in Figure 2) is studied. The d 5 e s c determines the scale of the dual-layer escort formation of the defenders. The statistical results shown in Figure 8B indicate that there is an optimal d 5 e s c given an escort swarm size (50 in this experiment). It can be seen that the smallest and largest d 5 e s c lead to the worst two success rate curves, while the best escort performance is obtained when d 5 e s c is equal to 5. This is because a large escort potential field helps the defenders find the attackers early and counteract them in a large scale. However, when given the size of escort swarm, this may also lead to a decrease in spatial density, which is harmful to protecting the HVU. Therefore, the value of d 5 e s c should be carefully selected when applying the proposed bilateral cooperative escort method.
Lastly, it is wort studying the impact of swarm size of both defenders and attackers in the defense-and-offence process. To this end, we set the size of the aggressive swarm to 10, 20, and 30, respectively, to investigate the success rate of the escort process with various size (from 30 to 50) of the escort swarm. As shown in Figure 8C, the success rate can keep above 0.9 if the escort swarm size is larger that of the aggressive swarm by at least 10. In addition, the ratio of aggressive swarm size to escort swarm size significantly impacts the success rate, i.e., a high ratio leads to a low success rate. Interestingly, when the size difference is larger than 20, the success rate always remains at a high level. In contrast, when the size difference is smaller than 10, the success rate dramatically decreases with the increase in aggressive swarm size.

3.4. Validation of Real-World Settings

To confirm the adaptability of the bilateral cooperative strategy to the actual escort scenario, in this section we will consider some constraints and disruptions in the real world. In this paper, we take the drone escort scenario as an example, consider the individual constraints and environmental perturbations in this scenario. The escort scenario is set as 8 km × 8 km and there is a no-fly zone in this scenario. The individual constraints are mainly kinematic constraints, which include maximum velocity, maximum acceleration and maximum turning angular velocity limits. Environmental perturbations include ambient noise and measurement noise, where measurement noise can be caused by various sources, such as wind flow during escort or individual perception accuracy error. Here, we introduce Gaussian noise to simulate the effect of environmental perturbations on the turning angle and speed. The constraints and perturbation parameters of the escort individuals are given in Table 4. The attacker’s maximum speed is greater than defender’s ( v A max =32 m/s), and other constraints are consistent with the defender. The HVU’s speed is constant, and its value is 20 m/s, i.e., v P =20 m/s.
In addition, according to the actual scenario, the relevant parameters of the bilateral cooperative strategy are also adjusted. The perception radius of the HVU is R p s e n = 1000 (m) and the escort potential field radius is d 5 e s c =400 (m).
Based on the above constraints and adjustments, the escort simulation is carried out with 50 escort individuals and 30 aggressive individuals with non-cooperative attack patterns. Figure 9a shows the trajectories of the escort individuals and HVU during the whole escort process. The trajectory of the escort individuals (light gray lines) indicates that under the influence of individual constraints and environmental perturbations, the escort individuals can still spontaneously and stably form a dual-layer escort formation. Additionally, compared to Figure 6B, it can be found that the constraint causes the individuals not to show sharp turning and there is a turning radius. Figure 9b shows the snapshots of the 50 escort individuals protecting the HVU under the attack of 30 aggressive individuals with non-cooperative attack patterns. It can be seen that although the constraints have some influence on the escort process, the escort individuals can still spontaneously form a stable dual-layer escort formation around the HVU and intercept and eliminate the aggressive individuals.
To further validate the effectiveness of the escort strategy in a real-world setting, we perform 100 independent experiments and obtain the escort effectiveness, as in Figure 10. Compared with Figure 7, it can be found that, similar to the unconstrained ideal scenario, an increase in the size of the aggressive individuals makes the escort success rate decrease and the travel time become longer. In addition, after considering the real-world setting, the tendency of the defense effectiveness to degrade as the attack size increases is more apparent. However, overall, the escort strategy is effective in real-world settings for responding to swarm attacks at different attack sizes. Therefore, it can be concluded that the bilateral escort strategy can be well adapted to real escort scenarios.

4. Conclusions

The offence and defense of a swarm have been essential issues for defense technology and security. Escort a moving HVU is challenging since the defenders should move around the HVU in a noncentralized manner and the HVU should also move adaptively according to the defenders and attackers to obtain a high survival rate. Obviously, this is a bilateral cooperative escort process which should be designed from the perspective of both the escort swarm and the HVU.
In this paper, we proposed a bilateral cooperative escort strategy for a moving HVU guarded by a noncentralized escort swarm. In particular, the escort swarm always move around the HVU in a dual-layer circle formation. In addition, the escort swarm is adaptively clustered into several uniformly distributed subswarms along the corresponding circles. Moreover, a threat assessment based on AHP method is proposed to make the threat level apparent so as to make decision on evasion for survival. Numerical simulations were conducted using different aggressive swarm models, i.e., non-cooperative swarm, single-swarm, and multi-subswarm attacks. The effectiveness of the proposed bilateral cooperative escort strategy is validated. The sensitivity of the parameters from the perspective of HVU and escort swarm is also analyzed, and the value of d 5 e s c is more sensitive than the other two parameters. The effectiveness of the escort strategy in a real-world setting is also validated. In the future work, the dynamics of the HVU, escort platforms and aggressive platforms will be considered and adaptive parameter adjusting strategies will also be investigated for the field applications. Moreover, the use of bilateral cooperative escort strategy will be considered for physical platforms, such as drone formations.

Author Contributions

Conceptualization, supervision and funding acquisition, X.P.; methodology, software, investigation, validation, writing—original draft preparation, B.Z.; software and validation, writing—review and editing X.P. All authors have read and agreed to the published version of the manuscript

Funding

This research was funded by the National Natural Science Foundation of China under Grants 62076203.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Conradt, L.; Roper, T.J. Consensus Decision Making in Animals. Trends Ecol. Evol. 2005, 20, 449–456. [Google Scholar] [CrossRef]
  2. Couzin, I.D.; Krause, J. Self-Organization and Collective Behavior in Vertebrates. Adv. Study Behav. 2003, 32, 10–1016. [Google Scholar]
  3. Real, L.A. Animal Choice Behavior and the Evolution of Cognitive Architecture. Science 1991, 253, 980–987. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Beekman, M.; Fathke, R.L.; Seeley, T.D. How Does an Informed Minority of Scouts Guide a Honeybee Swarm as It Flies to Its New Home? Anim. Behav. 2006, 71, 161–171. [Google Scholar] [CrossRef]
  5. Beekman, M.; Gilchrist, A.L.; Duncan, M.; Sumpter, D.J.T. What Makes a Honeybee Scout? Behav. Ecol. Sociobiol. 2007, 61, 985–995. [Google Scholar] [CrossRef]
  6. Giraldeau, L.-A.; Caraco, T. Social Foraging Theory; Princeton University Press: Princeton, NJ, USA, 2018; ISBN 978-0-691-18834-8. [Google Scholar]
  7. Krause, J.; Ruxton, G.D.; Ruxton, G. Living in Groups; OUP Oxford: Oxford, UK, 2002; ISBN 978-0-19-850818-2. [Google Scholar]
  8. Li, R.; Ma, H. Research on UAV Swarm Cooperative Reconnaissance and Combat Technology. In Proceedings of the 2020 3rd International Conference on Unmanned Systems (ICUS), Harbin, China, 27 November 2020; pp. 996–999. [Google Scholar]
  9. Smalley, D. Locust: Autonomous, Swarming Uavs Fly into the Future. Off. Nav. Res. 2015, 14. [Google Scholar]
  10. Shan, Y.; Huang, D. Analysis of the Operational Characteristics of the US Aircraft Carrier Battle Group. In Proceedings of the Journal of Physics: Conference Series; IOP Publishing: Bristol, UK, 2021; Volume 1721, p. 012064. [Google Scholar]
  11. Xing, D.; Zhen, Z.; Gong, H. Offense–Defense Confrontation Decision Making for Dynamic UAV Swarm versus UAV Swarm. Proc. Inst. Mech. Eng. Part G J. Aerosp. Eng. 2019, 233, 5689–5702. [Google Scholar] [CrossRef]
  12. Shishika, D.; Kumar, V. Local-Game Decomposition for Multiplayer Perimeter-Defense Problem. In Proceedings of the 2018 IEEE Conference on Decision and Control (CDC), Miami, FL, USA, 17–19 December 2018; pp. 2093–2100. [Google Scholar]
  13. Zha, W.; Chen, J.; Peng, Z.; Gu, D. Construction of Barrier in a Fishing Game With Point Capture. IEEE Trans. Cybern. 2017, 47, 1409–1422. [Google Scholar] [CrossRef] [PubMed]
  14. English, J.T. A Defender-Aware Attacking Guidance Policy for the TAD Differential Game. Master’s Thesis, Ohio University, Athens, OH, USA, 2020. [Google Scholar]
  15. Boyell, R.L. Defending a Moving Target Against Missile or Torpedo Attack. IEEE Trans. Aerosp. Electron. Syst. 1976, AES-12, 522–526. [Google Scholar] [CrossRef]
  16. Liang, L.; Deng, F.; Peng, Z.; Li, X.; Zha, W. A Differential Game for Cooperative Target Defense. Automatica 2019, 102, 58–71. [Google Scholar] [CrossRef]
  17. Selvi, S.T.; Malmathanraj, R.; Raj, S.M. Solving Missile Defense and Interceptor Allocation Problem Using Reinforcement Learning and Optimization Techniques. Int. J. Recent Trends Eng. 2009, 2, 117. [Google Scholar]
  18. Xuan, S.; Ke, L. UAV Swarm Attack-Defense Confrontation Based on Multi-Agent Reinforcement Learning. In Advances in Guidance, Navigation and Control; Springer: Berlin/Heidelberg, Germany, 2022; pp. 5599–5608. [Google Scholar]
  19. Wang, B.; Li, S.; Gao, X.; Xie, T. UAV Swarm Confrontation Using Hierarchical Multiagent Reinforcement Learning. Int. J. Aerosp. Eng. 2021, 2021, 3360116. [Google Scholar] [CrossRef]
  20. Duan, H.; Li, P.; Yu, Y. A Predator-Prey Particle Swarm Optimization Approach to Multiple UCAV Air Combat Modeled by Dynamic Game Theory. IEEE/CAA J. Autom. Sin. 2015, 2, 11–18. [Google Scholar] [CrossRef]
  21. Littman, M.L. Markov Games as a Framework for Multi-Agent Reinforcement Learning. In Machine Learning Proceedings 1994; Elsevier: Amsterdam, The Netherlands, 1994; pp. 157–163. [Google Scholar]
  22. Lowe, R.; Wu, Y.I.; Tamar, A.; Harb, J.; Pieter Abbeel, O.; Mordatch, I. Multi-Agent Actor-Critic for Mixed Cooperative-Competitive Environments. Adv. Neural Inf. Process. Syst. 2017, 30. [Google Scholar]
  23. Lien, J.-M.; Bayazit, O.B.; Sowell, R.T.; Rodriguez, S.; Amato, N.M. Shepherding Behaviors. In Proceedings of the IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA’04. 2004, New Orleans, LA, USA, 26 April–1 May 2004; Volume 4, pp. 4159–4164. [Google Scholar]
  24. Lien, J.-M.; Pratt, E. Interactive Planning for Shepherd Motion. In Proceedings of the AAAI Spring Symposium: Agents that Learn from Human Teachers, Stanford, CA, USA, 23–25 March 2009; pp. 95–102. [Google Scholar]
  25. Pierson, A.; Schwager, M. Bio-Inspired Non-Cooperative Multi-Robot Herding. In Proceedings of the 2015 IEEE International Conference on Robotics and Automation (ICRA), Seattle, WA, USA, 26–30 May 2015; pp. 1843–1849. [Google Scholar]
  26. Chipade, V.S.; Marella, V.S.A.; Panagou, D. Aerial Swarm Defense by StringNet Herding: Theory and Experiments. Front. Robot. AI 2021, 8, 640446. [Google Scholar] [CrossRef] [PubMed]
  27. Wu, J.; Yu, Y.; Ma, J.; Wu, J.; Han, G.; Shi, J.; Gao, L. Autonomous Cooperative Flocking for Heterogeneous Unmanned Aerial Vehicle Group. IEEE Trans. Veh. Technol. 2021, 70, 12477–12490. [Google Scholar] [CrossRef]
  28. Steinberg, A.N. An Approach to Threat Assessment. In Proceedings of the 2005 7th International Conference on Information Fusion, Philadelphia, PA, USA, 25–28 July 2005; Volume 2, p. 8. [Google Scholar]
  29. Gonsalves, P.G.; Burge, J.E.; Harper, K.A. Architecture for Genetic Algorithm-Based Threat Assessment. In Proceedings of the Sixth International Conference of Information Fusion, Cairns, QLD, Australia, 8–11 July 2003; Volume 2, p. 965971. [Google Scholar]
  30. Gonsalves, P.; Cunningham, R.; Ton, N.; Okon, D. Intelligent Threat Assessment Processor (ITAP) Using Genetic Algorithms and Fuzzy Logic. In Proceedings of the Third International Conference on Information Fusion, Paris, France, 10–13 July 2000; Volume 2, pp. THB1/18–THB1/24. [Google Scholar]
  31. Okello, N.; Thoms, G. Threat Assessment Using Bayesian Networks. In Proceedings of the 6th International Conference on Information Fusion, Cairns, QLD, Australia, 8–11 July 2003; pp. 1102–1109. [Google Scholar]
  32. Luo, R.; Huang, S.; Zhao, Y.; Song, Y. Threat Assessment Method of Low Altitude Slow Small (LSS) Targets Based on Information Entropy and AHP. Entropy 2021, 23, 1292. [Google Scholar] [CrossRef]
  33. Gazi, V.; Passino, K.M. A Class of Repulsion/Attraction Forces for Swarm Aggregations. Int. J. Control 2004, 77, 1567–1579. [Google Scholar] [CrossRef]
  34. Chen, Z.; Liao, H.; Chu, T. Clustering in Multi-Agent Swarms via Medium-Range Interaction. EPL Europhys. Lett. 2011, 96, 40015. [Google Scholar] [CrossRef]
  35. Pearl, J. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference; Morgan Kaufmann: New York, NY, USA, 1988; ISBN 1-55860-479-0. [Google Scholar]
  36. Darwiche, A. Modeling and Reasoning with Bayesian Networks; Cambridge University Press: Cambridge, UK, 2009; ISBN 978-0-521-88438-9. [Google Scholar]
  37. Ester, M.; Kriegel, H.-P.; Sander, J.; Xu, X. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, Portland, OR, USA, 2 August 1996; Volume 96, pp. 226–231. [Google Scholar]
Figure 1. Illustration of three attacking patterns in the target−free environment. (a) The non-cooperative swarm attack pattern; (b) The single-swarm swarm attack pattern; (c) The multi-subswarm attack pattern
Figure 1. Illustration of three attacking patterns in the target−free environment. (a) The non-cooperative swarm attack pattern; (b) The single-swarm swarm attack pattern; (c) The multi-subswarm attack pattern
Electronics 11 03643 g001
Figure 3. HVU threat assessment model based on Dynamic Bayesian Network.
Figure 3. HVU threat assessment model based on Dynamic Bayesian Network.
Electronics 11 03643 g003
Figure 4. Subswarm status evaluation hierarchy model.
Figure 4. Subswarm status evaluation hierarchy model.
Electronics 11 03643 g004
Figure 5. Escort under the environment without attackers. (A) Escort formations with different size of escort swarm. (B) Angular momentum of the escort swarm with different size. (C) Vortex trajectories with different size of escort swarm.
Figure 5. Escort under the environment without attackers. (A) Escort formations with different size of escort swarm. (B) Angular momentum of the escort swarm with different size. (C) Vortex trajectories with different size of escort swarm.
Electronics 11 03643 g005
Figure 6. Simulations of 50 defenders escorting the HVU under the attack of 30 aggressive individuals with different attacking patterns. (A) Snapshots of simulations. (B) Trajectories of the escort individuals (light gray lines) and HVU (orange line). (C) Threat assessment of the HVU.
Figure 6. Simulations of 50 defenders escorting the HVU under the attack of 30 aggressive individuals with different attacking patterns. (A) Snapshots of simulations. (B) Trajectories of the escort individuals (light gray lines) and HVU (orange line). (C) Threat assessment of the HVU.
Electronics 11 03643 g006
Figure 7. Escort performance (100 independent runs) comparison under different swarm attack patterns. (a) Comparison on success rate. (b) Comparison on travel time of HVU.
Figure 7. Escort performance (100 independent runs) comparison under different swarm attack patterns. (a) Comparison on success rate. (b) Comparison on travel time of HVU.
Electronics 11 03643 g007
Figure 8. Sensitivity analysis of the bilateral cooperative escort method. (A) HVU’s perception range. (B) Radius of escort potential field. (C) Swarm size of both sides.
Figure 8. Sensitivity analysis of the bilateral cooperative escort method. (A) HVU’s perception range. (B) Radius of escort potential field. (C) Swarm size of both sides.
Electronics 11 03643 g008
Figure 9. Simulations of 50 defenders escorting the HVU under the attack of 30 aggressive individuals with constraints. (a) Trajectories of the escort individuals (light gray lines) and HVU (orange line). (b) Snapshots of simulations.
Figure 9. Simulations of 50 defenders escorting the HVU under the attack of 30 aggressive individuals with constraints. (a) Trajectories of the escort individuals (light gray lines) and HVU (orange line). (b) Snapshots of simulations.
Electronics 11 03643 g009
Figure 10. Escort effectiveness in response to swarm attacks with different attack sizes under real-world settings (50 escort individuals).
Figure 10. Escort effectiveness in response to swarm attacks with different attack sizes under real-world settings (50 escort individuals).
Electronics 11 03643 g010
Table 1. Dynamic Bayesian Network conditional probabilities for HVU threat assessment.
Table 1. Dynamic Bayesian Network conditional probabilities for HVU threat assessment.
Conditional ProbabilityVariableThreat Level (TL)
LMH
P(D_attack|TL)D_attack10.020.100.83
D_attack20.400.580.10
D_attack30.580.320.07
P(N_sup|TL)N_sup10.150.270.58
N_sup20.350.500.27
N_sup30.500.230.15
P(β|TL)β10.200.350.50
β20.370.450.35
β30.430.200.15
Table 2. The pairwise comparison table of criteria.
Table 2. The pairwise comparison table of criteria.
BB1B2B3B4
B111/234
B22145
B31/31/412
B41/41/51/21
Table 3. Parameters setting.
Table 3. Parameters setting.
ParameterDescriptionValue
HVU
R p s e n Perception radius of the HVU10 m
v p Constant speed 1 m/s
Escort swarm
v D max The maximum speed of defenders2 m/s
d 5 e s c Escort potential field radius5 m
k p o s , k v e l , k a i n , k e s c
Simulation & environment
Weights of interaction rules5, 2, 10, 20
Δ t Time interval1 s
η The amplitude of random noise0.1
MaxsimstepMaximum simulation steps1500
v A max The maximum speed of attackers3 m/s
Table 4. Drone settings.
Table 4. Drone settings.
ParametersDescriptionValue/Unit
v D max Maximum speed30 m/s
u max Maximum acceleration10 m/s2
ω max Maximum turning angular velocity0.6 rad/s
n v Speed noiseN (0.34,0.9)
n ω Angular velocity noiseN (−0.4,1.0)
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zou, B.; Peng, X. A Bilateral Cooperative Strategy for Swarm Escort under the Attack of Aggressive Swarms. Electronics 2022, 11, 3643. https://doi.org/10.3390/electronics11223643

AMA Style

Zou B, Peng X. A Bilateral Cooperative Strategy for Swarm Escort under the Attack of Aggressive Swarms. Electronics. 2022; 11(22):3643. https://doi.org/10.3390/electronics11223643

Chicago/Turabian Style

Zou, Bingyun, and Xingguang Peng. 2022. "A Bilateral Cooperative Strategy for Swarm Escort under the Attack of Aggressive Swarms" Electronics 11, no. 22: 3643. https://doi.org/10.3390/electronics11223643

APA Style

Zou, B., & Peng, X. (2022). A Bilateral Cooperative Strategy for Swarm Escort under the Attack of Aggressive Swarms. Electronics, 11(22), 3643. https://doi.org/10.3390/electronics11223643

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop