共查询到20条相似文献,搜索用时 171 毫秒
1.
2.
3.
对于由多个同类型的单通道火力单元组成的防空武器系统,运用排队理论建立了防空武器系统作战效能分析模型.将对空作战过程视为具有两个服务阶段的先到先服务的排队系统,并将空袭目标持续入侵视为泊松到达.在作战过程中,只有空闲的火力通道才能对入侵的空袭目标进行服务,一旦目标在通过防空区的过程中未被服务或未被击中则突防成功.基于作战想定和计算分析,研究了防空武器系统的作战效能,为辅助作战指挥决策,优化火力单元配置等提供了一定的参考依据. 相似文献
4.
5.
针对常用的3类火力分配算法存在的不足,对其进行了研究和改进,以解决信息化条件下空袭火力资源分配的建模问题.分析了火力资源分配的对抗性,以及信息化条件下空袭火力分配对抗系统,总结了火力分配的研究现状,并分别分析了3类不同的火力分配算法的研究情况,指出混合优化分配算法在处理火力分配问题的优势.同时分析了3类不同的火力分配算法在处理信息化条件下的空袭火力资源分配时存在的不足,提出使用博弈论方法建立火力分配模型的可行性和有效性,并提出利用混合优化算法求解均衡解的新思路.该研究为建立接近于实战的空袭火力资源分配模型提供了新的方向. 相似文献
6.
7.
8.
9.
10.
11.
针对无线传感器网络各节点在安全需求与资源消耗上存在的矛盾,提出一种基于博弈论的无线传感网络节点优化博弈模型.首先,通过分析网络节点中攻击方的攻击代价与防守方的防守开销,基于博弈论分析攻防双方的效用函数并构造攻防博弈模型;其次,根据网络节点中攻防双方选择的不同行动策略,结合信息论技术将攻防双方抽象成随机变量,并设计博弈信... 相似文献
12.
13.
To solve the problem of the optimal strategy selection for moving target defense,the defense strategy was defined formally,the defense principle from the perspective of attack surface shifting and exploration surface enlarging was taken into account.Then,network attack-defense behaviors were analyzed from the sight of dynamic confrontation and bounded information.According to the analysis of attack-defense game types and confrontation process,the moving target defense model based on signaling game was constructed.Meanwhile,the method to quantify strategies was improved and the solution of perfect Bayesian equilibrium was proposed.Furthermore,the optimal defense strategy selection algorithm was designed by the equilibrium analysis.Finally,the simulation demonstrates the effectiveness and feasibility of the proposed optimal strategy and selection method. 相似文献
14.
为提高电子战中弹载雷达检测性能,该文提出基于纳什均衡的雷达波形设计方法。首先建立电子战条件下雷达与干扰信号博弈模型,基于最大化信干噪比(SINR)准则,分别设计了雷达和干扰的波形策略;然后通过数学推导论证了博弈纳什均衡解的存在性,设计了一种重复剔除严格劣势的多次迭代注水方法来实现纳什均衡;通过二步注水法推导了非均衡的maxmin优化方案;最后通过仿真实验测试不同策略下雷达检测性能。仿真结果证明,基于纳什均衡的雷达信号设计有助于提升博弈条件下雷达检测性能,对比未博弈时,雷达检测概率最高可提升12.02%,较maxmin策略最高可提升3.82%,证明所设计的纳什均衡策略更接近帕累托最优。 相似文献
15.
In view of the characteristic that attacker depended on the detected information to decide the next actions,the non-cooperative signal game theory was applied to analyze cyber attack and defense.The signal deception mechanism in the process of cyber attack and defense was considered deeply by constructing a multi-stage cyber deception game model,and the dynamic analysis and deduction of the multi-stage cyber attack and defense was realized by considering the attenuation of cyber deception signals.A solution for multi-stage cyber deception game equilibrium was improved based on analysis of cyber attack and defense,and an optimal algorithm for selecting cyber deception defense strategies was designed.The effectiveness of the model is verified by simulations.The rules of multi-stage cyber deception games are summarized based on the results,which can provide effective guidance for the research on cyber active defense. 相似文献
16.
Most of the existing stochastic games are based on the assumption of complete information,which are not consistent with the fact of network attack and defense.Aiming at this problem,the uncertainty of the attacker’s revenue was transformed to the uncertainty of the attacker type,and then a stochastic game model with incomplete information was constructed.The probability of network state transition is difficult to determine,which makes it impossible to determine the parameter needed to solve the equilibrium.Aiming at this problem,the Q-learning was introduced into stochastic game,which allowed defender to get the relevant parameter by learning in network attack and defense and to solve Bayesian Nash equilibrium.Based on the above,a defense decision algorithm that could learn online was designed.The simulation experiment proves the effectiveness of the proposed method. 相似文献
17.
Xin Ai Vikram Srinivasan Chen-Khong Tham 《Selected Areas in Communications, IEEE Journal on》2008,26(7):1170-1182
In this paper, we investigate the coverage problem in wireless sensor networks using a game theory method.We assume that nodes are randomly scattered in a sensor field and the goal is to partition these nodes into K sets. At any given time, nodes belonging to only one of these sets actively sense the field. A key challenge is to achieve this partition in a distributed manner with purely local information and yet provide near optimal coverage. We appropriately formulate this coverage problem as a coverage game and prove that the optimal solution is a pure Nash equilibrium. Then, we design synchronous and asynchronous algorithms, which converge to pure Nash equilibria. Moreover, we analyze the optimality and complexity of pure Nash equilibria in the coverage game. We prove that, the ratio between the optimal coverage and the worst case Nash equilibrium coverage, is upper bounded by 2 ? 1 m+1 (m is the maximum number of nodes, which cover any point, in the Nash equilibrium solution s*). We prove that finding pure Nash equilibria in the general coverage game is PLS-complete, i.e. ?as hard as that of finding a local optimum in any local search problem with efficient computable neighbors?. Finally, via extensive simulations, we show that, the Nash equilibria coverage performance is very close to the optimal coverage and the convergence speed is sublinear. Even under the noisy environment, our algorithms can still converge to the pure Nash equilibria. 相似文献
18.
We consider a distributed joint random access and power control scheme for interference management in wireless ad hoc networks. To derive decentralized solutions that do not require any cooperation among the users, we formulate this problem as noncooperative joint random access and power control game, in which each user minimizes its average transmission cost with a given rate constraint. Using supermodular game theory, the existence and uniqueness of Nash equilibrium are established. Furthermore, we present an asynchronous distributed algorithm to compute the solution of the game based on myopic best response updates, which converges to Nash equilibrium globally. Finally, a link admission algorithm is carried out to guarantee the reliability of the active users. Performance evaluations via simulations show that the game-theoretical based cross-layer design achieves high performance in terms of energy consumption and network stability. 相似文献
19.
恶意程序传播是无线传感器网络(wireless sensor network,WSN)面临的一类重要安全问题。从博弈论的角度对WSN恶意程序传播的微观机理进行分析,建立了WSN的攻防博弈模型,求出了博弈模型的混合纳什均衡解,并根据博弈双方的混合纳什均衡策略确定恶意程序的传染概率,从而建立了WSN的恶意程序传播模型。通过使用元胞自动机方法对WSN的恶意程序传播过程进行模拟,揭示了恶意程序的传播速度与博弈参数之间的关系,研究结果对抑制WSN恶意程序传播具有理论指导意义。 相似文献