7
Abstract—The survivability of a naval surface combatant depends largely on the effective management of combat resources. In terms of platform-centric self-protection, situation assessment strategies and engagement policies governing weapon usage influence effective management. Situation assessment strategies enable the surface combatant to adapt to changes in the battlespace. In the case of network-centric operations, the task force’s ability to adapt to changes in the battlespace relies on the information superiority gained through shared awareness. Although shared awareness enables surface combatants to apply situation assessment strategies to self-synchronize to the situation, engagement policies governing weapons usage typically remain platform-centric and rely on centralized command structures to provide overall coordination. The research presented, herein, examines the implementation of intelligent agents to create a partially centralized, distributed command structure that uses Contract Nets to coordinate tactical responses across the task force. Index Terms—Contract Nets, Intelligent Agents, Network- Centric Operations I. INTRODUCTION NFORMATION is critical to meaningful interactions between individuals, communities, businesses, and governments. In fact, information is vital to any endeavor where people must collaborate to accomplish specific goals. Information systems aim to facilitate this collaboration by providing capabilities such as collection, storage, processing, and dissemination. Prevalent in business communities, information systems support day-to-day operations while also sustaining strategic planning and decision-making. In fact, an information system can provide a significant competitive advantage whereby a business can respond more quickly to changes in the marketplace than its competitors. Military organizations have recognized the strategic advantage afforded by information systems and have been moving towards information-enabled, network-centric operations for more than a decade [1]. This work was supported in part by the Defense Research & Development Canada (DRDC). 1. R. J. Martelli is with Lockheed Martin Canada, Ottawa, ON K2K 2M8 Canada. Tel: +1-613-599-3270; fax: +1-613-599-3282; e-mail: [email protected]. 2. L. Esmahi is with the School of Computing & Information Systems, Athabasca University, Athabasca, AB T9S 3A3 Canada. Tel: +1-780-473- 8564; fax: +1-780- 675-6186; e-mail: [email protected]. Network-centric operations aim to achieve information superiority and, thus, gain a strategic and tactical advantage. These advantages translate into an increased agility that influences the networked combatant’s response to changes in the battlespace that might otherwise jeopardize mission success. Force protection, the defensive ability of a task force, is a key element to mission success. Current network-centric operations rely on shared awareness to enable individual combatants to self-synchronize (respond to new information in kind rather than through external direction) in a cooperative response to new threats. However, poor quality or conflicting information can hinder the self-synchronization process resulting in a less than optimal response across the networked force. The project detailed in this paper examined an approach for the coordination and collaboration of networked combatants that does not rely on self-synchronization. This approach features autonomous agents that, fitted with appropriate goal- oriented behavior, can achieve optimal response coordination through a negotiation mechanism based on Contract Nets. II. LITERATURE REVIEW A. Command and Control (C2) The act of command is distinct from the act of command execution thereby allowing for some degree of decentralization. For example, a command center issues orders to combatants within its command. These combatants execute the orders thereby decentralizing command execution. Lee and Ghosh [2] characterize the various C2 organizations noting that the traditional form of centralized command with centralized or decentralized control is inferior to a completely decentralized solution. The attack vulnerability of a single command center feeds this assumption of inferiority. However, the authors note that having a central command provides an effective vehicle for synchronizing combatants where the command center acts as the information and decision gateway. Dekker [3] poses key questions for determining the best combination of centralized and decentralized decision-making within C2. In particular, Dekker explains that although a centralized headquarters typically provides adequate facilities for collecting information and issuing globally optimal solutions, time constraints and communications infrastructure may hinder the ability to develop a globally optimal solution. Coordinating Autonomous Agents for Force Protection Using Contract Net Richard J. Martelli 1 , Larbi Esmahi 2 I Fourth International Conference on Autonomic and Autonomous Systems 0-7695-3093-1/08 $25.00 © 2008 IEEE DOI 10.1109/ICAS.2008.32 219

[IEEE 2008 Fourth International Conference on Autonomic and Autonomous Systems (ICAS) - Gosier, Guadeloupe (2008.03.16-2008.03.21)] Fourth International Conference on Autonomic and

  • Upload
    larbi

  • View
    215

  • Download
    2

Embed Size (px)

Citation preview

Page 1: [IEEE 2008 Fourth International Conference on Autonomic and Autonomous Systems (ICAS) - Gosier, Guadeloupe (2008.03.16-2008.03.21)] Fourth International Conference on Autonomic and

Abstract—The survivability of a naval surface combatant

depends largely on the effective management of combat resources.

In terms of platform-centric self-protection, situation assessment

strategies and engagement policies governing weapon usage

influence effective management. Situation assessment strategies

enable the surface combatant to adapt to changes in the

battlespace. In the case of network-centric operations, the task

force’s ability to adapt to changes in the battlespace relies on the

information superiority gained through shared awareness.

Although shared awareness enables surface combatants to apply

situation assessment strategies to self-synchronize to the situation,

engagement policies governing weapons usage typically remain

platform-centric and rely on centralized command structures to

provide overall coordination.

The research presented, herein, examines the implementation

of intelligent agents to create a partially centralized, distributed

command structure that uses Contract Nets to coordinate tactical

responses across the task force.

Index Terms—Contract Nets, Intelligent Agents, Network-

Centric Operations

I. INTRODUCTION

NFORMATION is critical to meaningful interactions

between individuals, communities, businesses, and

governments. In fact, information is vital to any endeavor

where people must collaborate to accomplish specific goals.

Information systems aim to facilitate this collaboration by

providing capabilities such as collection, storage, processing,

and dissemination.

Prevalent in business communities, information systems

support day-to-day operations while also sustaining strategic

planning and decision-making. In fact, an information system

can provide a significant competitive advantage whereby a

business can respond more quickly to changes in the

marketplace than its competitors. Military organizations have

recognized the strategic advantage afforded by information

systems and have been moving towards information-enabled,

network-centric operations for more than a decade [1].

This work was supported in part by the Defense Research & Development

Canada (DRDC).

1. R. J. Martelli is with Lockheed Martin Canada, Ottawa, ON K2K 2M8

Canada. Tel: +1-613-599-3270; fax: +1-613-599-3282; e-mail:

[email protected].

2. L. Esmahi is with the School of Computing & Information Systems,

Athabasca University, Athabasca, AB T9S 3A3 Canada. Tel: +1-780-473-

8564; fax: +1-780- 675-6186; e-mail: [email protected].

Network-centric operations aim to achieve information

superiority and, thus, gain a strategic and tactical advantage.

These advantages translate into an increased agility that

influences the networked combatant’s response to changes in

the battlespace that might otherwise jeopardize mission

success.

Force protection, the defensive ability of a task force, is a

key element to mission success. Current network-centric

operations rely on shared awareness to enable individual

combatants to self-synchronize (respond to new information in

kind rather than through external direction) in a cooperative

response to new threats. However, poor quality or conflicting

information can hinder the self-synchronization process

resulting in a less than optimal response across the networked

force.

The project detailed in this paper examined an approach for

the coordination and collaboration of networked combatants

that does not rely on self-synchronization. This approach

features autonomous agents that, fitted with appropriate goal-

oriented behavior, can achieve optimal response coordination

through a negotiation mechanism based on Contract Nets.

II. LITERATURE REVIEW

A. Command and Control (C2)

The act of command is distinct from the act of command

execution thereby allowing for some degree of

decentralization. For example, a command center issues orders

to combatants within its command. These combatants execute

the orders thereby decentralizing command execution. Lee and

Ghosh [2] characterize the various C2 organizations noting

that the traditional form of centralized command with

centralized or decentralized control is inferior to a completely

decentralized solution. The attack vulnerability of a single

command center feeds this assumption of inferiority. However,

the authors note that having a central command provides an

effective vehicle for synchronizing combatants where the

command center acts as the information and decision gateway.

Dekker [3] poses key questions for determining the best

combination of centralized and decentralized decision-making

within C2. In particular, Dekker explains that although a

centralized headquarters typically provides adequate facilities

for collecting information and issuing globally optimal

solutions, time constraints and communications infrastructure

may hinder the ability to develop a globally optimal solution.

Coordinating Autonomous Agents for Force

Protection Using Contract Net

Richard J. Martelli 1, Larbi Esmahi

2

I

Fourth International Conference on Autonomic and Autonomous Systems

0-7695-3093-1/08 $25.00 © 2008 IEEEDOI 10.1109/ICAS.2008.32

219

Page 2: [IEEE 2008 Fourth International Conference on Autonomic and Autonomous Systems (ICAS) - Gosier, Guadeloupe (2008.03.16-2008.03.21)] Fourth International Conference on Autonomic and

In fact, Dekker favors decentralization noting that the

transmission of orders is typically more compact than the

transmission of information required to formulate the orders.

Cebrowski and Garstka [1] also maintain that “battle time”

is a critical factor in the decision-making and execution of

tactics and recognize that network-centric operations can

provide a significant advantage in terms of reacting to changes

in the battlespace. Cebrowski and Gartska use analogies from

the commercial sector as motivation for moving to network-

centric operations. In particular, Cebrowski and Gartska

comment:

Network-centric warfare, where battle time plays

a critical role, is analogous to the new economic

model, with potentially increasing returns on

investment. Very high and accelerating rates of

change have a profound impact on the outcome,

"locking-out" alternative enemy strategies and

"locking-in" success. (p. 5)

Cebrowski and Gartska believe networked combatants can

synchronize themselves to the mission based on shared

awareness. Where centralized command is a top-down method

of synchronization and control, Cebrowski and Gartska believe

that a bottom-up process, such as self-synchronization through

shared awareness, can be just as effective.

Lee and Ghosh [2] take the notion of synchronization a step

further. They believe that within the chaos of battle, events

occur asynchronously with respect to individual combat units.

Hence, rather than focusing on synchronization through

centralization, Lee and Ghosh examine algorithms that

promote cooperation between decentralized command and

control centers. Mission objectives and common rules of

engagement form the basis for cooperation.

In this manner combatants are free to take independent

actions based on beliefs derived from locally available

information and shared awareness. Decisions formed from

these beliefs must adhere to the established mission objectives

and rules of engagement. A combatant communicates its

beliefs and decisions only to those combatants within its

sphere of influence as a means of reducing the risk of

information saturation that might otherwise interfere with

decision-making. Lee and Ghosh use simulations to

demonstrate the superiority of this approach against the more

traditional model of centralized command.

The simulation implements scenarios featuring both evenly

matched and unevenly matched forces. In each scenario, one

force utilizes decentralized command and control while the

opposing force establishes a central command structure. The

opposing force must process all changes in the battlefield at

the command centre, which, due to inherent delays in

processing and communications, results in less responsive

maneuvering and targeting, and ultimately fewer kills.

Lee and Ghosh claim faster reaction times to dynamic

information using the decentralized command structure but do

not discuss the role of centralized command in providing an

optimal response. One might assume that by reducing

processing and communications delays the centralized force

could approach or exceed the level of effectiveness of

decentralized command. This observation suggests that

decentralized command could benefit by coordinating

resources for an optimal response. This optimization would

involve an allocation of assets to specific targets that best

increases mission success.

B. Market-Based Approaches for coordination

Centralized command organizations are most likely to

develop globally optimal solutions. However, time constraints

warrant a decentralized approach using some form of

coordination to achieving an optimal response. When

considering optimization as essential to allocating assets to

specific targets of opportunity, coordination becomes a

resource allocation problem. In view of coordination as a

resource allocation problem, techniques from other domains,

such as market-based approaches, may be applicable to

decentralized command.

Market-based approaches deal with the concept of the

global good in an environment where self-interested agents

apply strategies that would otherwise maximize their own

good. The following sections discuss various market-based

approaches and their influence on the global good.

1) Auctions

Auctions are a means for mutually beneficial exchanges

ensuring that the seller receives fair market value while

bidders obtain items at or below their valuation. Typical to

most forms of auctions, bidders continue to place ascending

bids until no other bids are tendered. The final bid establishes

the price paid by the winner or all subsequent buyers.

The seller can choose the form of auction to influence a

better price but it is incumbent on individual bidders to

establish a valuation of the auctioned item and implement a

bidding strategy in line with that valuation and compliant with

the form of auction. For example, in an English (Ascending)

auction each bidder must bid a higher amount than the last

accepted bid to remain in the competition. To reduce the risk

of having to bid an amount greater than the item’s perceived

valuation, bidders will implement a dominant strategy whereby

bids are intentionally lower than the bidder’s valuation of the

item and, using small increments, higher than the leading bid.

In certain situations, the demand for an item may drive bids

above the item’s true valuation.

Wellman, Walsh, Wurman, and MacKie-Mason [4] examine

the English auction for decentralized scheduling of

computational resources. Agents bid according to tasks to be

completed whereby an agent’s bidding strategy aims to

maximize the surplus value across all jobs - the difference

between the agent’s maximum valuation and the actual bid.

The auctioneer establishes a reserve price for a time slot

based on demand. The reserve price encourages agents to

reassess preferences for particular time slots and maximize

their surplus value. Wellman et al. notes that this approach is

more appropriate for agents competing for a single unit.

Combinatorial auctions specifically support bidding on a

preferred bundle of items [5] [6].

220

Page 3: [IEEE 2008 Fourth International Conference on Autonomic and Autonomous Systems (ICAS) - Gosier, Guadeloupe (2008.03.16-2008.03.21)] Fourth International Conference on Autonomic and

A common consideration when applying auctions is the role

of the auctioneer. The auctioneer acts as a mediator and

attempts to resolve conflicts while encouraging a globally

optimal solution. Using auctions as a coordination technique in

network-centric operations would require a similar form of

mediation and mandate a more centralized command

organization that would promote the global good.

2) Contract Nets

Contract nets were first proposed as a means for distributed

problem solving [7] [8]. Through negotiation, contracts are

formed between the contract initiator and selected contractors.

Initial contract announcements include terms and conditions

that contractors must satisfy in order to participate. The

initiator evaluates the submitted bids and selects one or more

contractors, as necessary. Contract-net have been proposed for

adaptive workflow control [9] and for network-centric

operations [10]. When applied to network-centric operations, a

central command structure was used where it was noted that

reaction time was a constraining factor.

3) Other Approaches

Other approaches not based on market economies also apply

to coordination. These range from negotiation or bargaining

strategies to cooperative approaches such as blackboard and

voting systems. Although negotiation and bargaining strategies

apply to cooperative settings, the participants are typically

constrained at two. Blackboard or voting systems [11] are not

so constrained but, similar to auction, require some form of

centralization or mediation.

4) Discussion

In general, market-based approaches use bidding strategies

to establish globally optimal solutions for resource allocation

while the non market-based approaches reviewed tend to focus

more on collective problem solving. Auctions require a

mediator and successive rounds to develop an optimal solution

whereas non market-based approaches require some form of

centralization. Hence, neither of these approaches lends itself

very well to decentralized command and presents levels of

communications that might prove unaffordable.

In our context of force protection, contract-net may best

minimize the exchange of information and provide roles (i.e.,

contractor and participant) and messages to support

decentralization and coordination. By allowing more than one

networked combatant to assume the role of contractor while

preventing more than one contractor for any given missile

threat. A dynamic, partially centralized organization can be

achieved while also supporting the distribution of command.

Similar approaches used to coordinate large groups of agents

found a reduction in the overall complexity of coordination

when using dynamic, partial centralization [12].

III. NETSCHEDULER, A SIMULATION TOOL FOR RESPONSE

COORDINATION

A. Simulating Response Coordination

The simulation uses low-fidelity models for both self-

directed anti-ship missile threats and for surface combatants.

The Java-based platform-centric, Dynamic Engagement

Scheduler (DEScheduler) developed at Defense Research &

Development Canada (DRDC) provides the necessary low-

fidelity models. In this paper we are presenting the resulting

extension to the DEScheduler application herein referred to as

the NetScheduler.

Extending the platform-centric nature of the simulation to

include network-centric coordination involved the introduction

of autonomous agents. The agents interact using the Contract

Net Interaction Protocol and utilize roles (i.e., Mission

Commander and Mission Support) to support a dynamic,

partially centralized command structure.

Using Gaia [13], [14] an agent-oriented methodology,

models of the environment, roles, and interactions facilitate the

development of role schemas (see Table I).

TABLE 1: ROLE SCHEMA FOR THE MISSION COMMANDER

Role Schema: MISSION COMMANDER (MC)

Description: This role involves announcing the command of a mission, and

soliciting support as required.

Protocols and Activities:

IdentifyNewMissions, ExecuteMission, ReviewMissionObjectives, Announce, CallForProposal, FormulatePlan, ReviewProposals, RejectProposal, AcceptProposal, Cancel

reads System Tracks

changes Mission

changes Call for Proposals

consumes Proposals

Permissions:

changes Contracts

Liveness: MISSION COMMANDER = (ASSESS || COMMAND)ω

ASSESS = (IdentifyNewMissions.Announce) COMMAND = (ExecuteMission. (ReviewProposals.(AcceptProposal || RejectProposal) || Cancel ) || ReviewMissionObjectives.CallForProposals.FormulatePlan)

Safety: All threats (system tracks) have a mission commander

assigned

Schemas depict the protocols and activities supporting the

role while also outlining the agent’s influence on the

environment (permissions). “Liveness” and “Safety” describe a

role‘s responsibility where liveness (the desirable path)

expresses the logical flow of protocols and activities, and

safety (avoiding the undesirable) denotes the conditions

needed to maintain operational integrity.

As a society of agents, rules establish how agents can

assume roles within the society’s organization. For the purpose

of force protection, these organizational rules must specifically

address the dynamic nature of the command structure. The

organizational rules are defined as follows where s refers to

sensor information (tracks), and i refers to the agent

(combatant):

1. ))(,())(,(, sSupportiPlayssCommanderiPlaysis ¬∧∀⋅∀

2. ))(,())((),( sCommanderiPlayssCommanderisiCanEngageif →¬∃∧

3. )()())(),,((,, iSuccessjSuccessiffsCommanderjiSupercedePlaysji >∀

221

Page 4: [IEEE 2008 Fourth International Conference on Autonomic and Autonomous Systems (ICAS) - Gosier, Guadeloupe (2008.03.16-2008.03.21)] Fourth International Conference on Autonomic and

The first rule simply states that for all tracks s, agent i

cannot play the roles of Mission Commander and Mission

Support concurrently. The second organizational rule indicates

that an agent can assume the role of Mission Commander if the

agent can engage the threat and no other agent is currently in

that role. The third rule allows an agent to supersede the

Mission Commander if that agent deems its success criteria

offer a greater chance of mission success. This is necessary

due to delays in communication that would result in more than

one agent satisfying the second rule. In this situation, agents in

the Mission Support role would defer to the Mission

Commander with the higher probability of success. Note, an

agent may also choose to assume its own mission and agenda

based on its own need for survival.

B. Implementation of the NetScheduler

The Agent Model (Figure 1) defines the class architecture of

the agent system. This model incorporates intelligent agents

that, by design, are able to react to the environment, pursue

goal-directed behavior, and socially interact [15]. The agents

consist of the Weapons Manager, Sensor Manager, and

Command Link.

Figure 1. NetScheduler Agent Model

The Weapons Manager Agent specifically supports the

Mission Commander and Support roles, while the Command

Link Agent implements the Contract Net protocol. The Sensor

Manager Agent maintains the track information consumed by

the Weapons Manager Agent.

The features supported by the NetScheduler include the

main editors required for managing the simulations data:

• Scenario Explorer - used to access editors and simulation

features

• Engagement Scenario Editor (figure 2) - combines an

attack scenario with a defense scenario and establishes the type

of policies and constraints used during simulation. f

• Attack Scenario Editor (figure 3) - defines missile threats

and associated information establishing the attack profile.

• Defense Scenario Editor – defines the surface platforms

and configures the available weapon systems.

Figure 2. The Engagement Scenario Editor

Figure 3. The Attack Scenario Editor

Figure 4. The Defense Scenario Editor

222

Page 5: [IEEE 2008 Fourth International Conference on Autonomic and Autonomous Systems (ICAS) - Gosier, Guadeloupe (2008.03.16-2008.03.21)] Fourth International Conference on Autonomic and

The NetScheduler offers also the models and tools for control

and visualization. These tools include:

• Damage Assessment – establishes a simple probability

model for disabling systems in the event of a missile hit

against own ship.

• Simulation Execution (figure 5)– provides control over

simulation execution.

• Visualization Displays (figure 6 and figure 7)– includes

Network-centric and Platform-centric views.

• Data Logging - records data and event information for

post analysis

• Scenario Database - a central repository of all

engagement scenarios, attack scenarios, and defense scenarios.

Figure 5. The Defense Scenario Editor

Figure 6. The Defense Scenario Editor

Figure 7. The Defense Scenario Editor

IV. SIMULATION RESULTS

To determine the viability of using contract nets to establish

response coordination for task force protection we have

processed some simulations scenarios that allow us to compare

results from coordination that relies on a platform-centric

response (i.e., common rules of engagement) with those

obtained as part of a network-centric (i.e., coordinated task

force) response. Given the limited space we have for this paper

we present here only the summary of the results in terms of the

Measures of Merit (MOM) acquired via Monte Carlo

simulation techniques. For this simulation we used air defense

scenarios featuring four separate missile threats appearing at

distances exceeding sensor range to distances that significantly

reduce TTG (e.g., 10 km). The MOM presented, summarize

the recorded experimentation results denoting the number and

duration of engagements, engagement types (i.e., hard-kill,

soft-kill), engagement outcomes (i.e., success, fail, or aborted),

results (i.e., hit, miss, soft-kill, hard-kill), and weapon

inventory usage.

The network-centric response was shown to provide higher

effectiveness scores than platform-centric responses, with the

noted exception of soft-kill effectiveness (Table 2). The low

score of soft-kill effectiveness is a direct result of the

simultaneous deployment of hard-kill tactics.

The destruction of a missile threat by a hard-kill weapon

results in the suspension of any soft-kill assessment. The

cancellation of the soft-kill assessment results in the soft-kill

engagement being flagged as a failure. Hence, the soft-kill

effectiveness value does not provide an indication of the

efficacy of soft-kill tactics but viewed in conjunction with the

chaff inventory can give some indication to the coordination

provided by the network-centric response. This coordination

produced fewer soft-kill engagements and ultimately expended

223

Page 6: [IEEE 2008 Fourth International Conference on Autonomic and Autonomous Systems (ICAS) - Gosier, Guadeloupe (2008.03.16-2008.03.21)] Fourth International Conference on Autonomic and

fewer munitions.

TABLE 2: MEASURES OF MERIT (MOM) SUMMARY

Initial Range Platform-Centric

Response

Network-Centric

(Coordinated)

Response

Kill Effectiveness 96.6% 98.9%

Battlespace Efficiency

Ratio (BER)

71.1% 63.1%

Engagement

Effectiveness

21.4% 39.3%

Hard-Kill Effectiveness 34.9% 46.6%

Soft-Kill Effectiveness 4.0% 2.9%

Although the network-centric response demonstrated better

effectiveness, the efficiency score provided by the BER was

below that of the platform-centric response. The BER values

favor the platform-centric response where BER is a measure of

the task force’s ability to make use of the window of

opportunity to engage a missile threat. The lower BER for

network-centric responses is an indication of the time spent on

deliberation and coordination of the task force’s resources.

While the missile threat is beyond weapon range, the

difference in BER values is negligible because deliberation

and coordinating communications takes place before the threat

has entered weapon ranges. When missile threats appear

within weapon range, the time spent on deliberation and

coordination occurs within the window of opportunity to

engage the threat thereby reducing the actual time spent

engaging the threat and, thus, reducing the BER.

Although the BER for the network-centric response is lower

than that of the platform-centric response, the time spent on

deliberation and communications does not show any adverse

effect on the networked combatant’s defensive ability. In fact,

based on the average number of engagements and remaining

inventory, the resource consumption is lower for the network-

centric response.

V. CONCLUSION

In this project we examined the use of Contract Nets for the

coordination and collaboration of networked combatants

against anti-ship missile threats. This examination involved the

development of a simulated environment wherein each surface

combatant uses intelligent agents to formulate plans and

negotiate a coordinated response. Simulation results

demonstrated improved survivability with increased

effectiveness in the management of combat resources.

The simulation involved a comparison of surface

combatants using platform-centric engagement policies versus

those using intelligent agents for network-centric response

coordination. Combatants operating in platform-centric mode

formed a completely decentralized C2 structure while the

combatants using intelligent agents created a dynamic,

partially centralized organization. The resulting comparison

focused on ship survivability, battlespace management, and

resource usage. In particular, it was necessary to determine if

using Contract Nets for response coordination compromised

the task force’s defensive ability.

The results of the comparison did not reveal any

compromise to force protection. In fact, the results revealed an

improvement in survivability in the form of kill effectiveness

while also demonstrating a reduction in resource consumption.

A reduction in resource consumption increases the task force’s

ability to react to new situations. In other words, as new threat

detections occur, the availability of resources enables the task

force to respond with a broader range of options (i.e., long-

range or mid-range weapons). This broader range of options

increase the task force’s agility.

The command structure also influences the task force’s

agility. In the approach examined in this project, the intelligent

agents implemented a dynamic, partially centralized command

structure through roles facilitated by the contract net

interaction protocol. Beaumont’s use of a central coordinator

with Contract Nets found good survivability results. However,

Beaumont noted that communications and TTG were critical

factors [16].

This project’s results did not reflect this observation. In fact,

results based on the dynamic, partially centralized organization

showed consistent scores across all TTG values (represented

as ranges). In the case of communications, a partial

centralization could compensate in the event of failure. This

compensation would manifest as multiple Mission Command

roles being assumed. In addition, the intelligent agent’s goal-

directed behavior maintains the surface combatant’s ability to

take independent action. This independence enables the

surface combatant to rely on local information to set priorities,

formulate plans, and, when necessary, to give all priority to

defending itself.

Although the proposed dynamic, partially centralized

command structure was an attempt to evolve organization and

doctrine, as suggested by Alberts [17], in line with advances in

self-protection, it was necessary to circumvent some of the

situation assessment algorithms developed specifically for self-

protection. Due to the platform-centric nature of these

algorithms (i.e., lethality and soft-kill kill-assessments), a

surface combatant could prematurely assign a non-threat status

to an anti-ship missile based on its own self-centric evaluation

and not consider the threat to other combatants. Hence, further

work is required to progress concepts used in self-protection

towards more inclusive task force policy.

Coordination of tactics is another area that warrants further

work. Investigating how the deliberative planner could decide

upon which tactics to initiate from proposed plans was not

within the scope of this project. However, based on the

feasibility of Contract Nets demonstrated by the results, there

would be merit in growing the deliberative planner used in the

NetScheduler tool to include tactical coordination.

224

Page 7: [IEEE 2008 Fourth International Conference on Autonomic and Autonomous Systems (ICAS) - Gosier, Guadeloupe (2008.03.16-2008.03.21)] Fourth International Conference on Autonomic and

REFERENCES

[1] A. Cebrowski and J. J. Gartska, (1998, January) “Network-Centric

Warfare: Its Origins and Future,” in Proceedings of the Naval

Institute, 124(1).

[2] T. Lee and S. Ghosh (1996, Winter). “Simulating Asynchronous,

Decentralized Military Command and Control,” IEEE Computational

Science and Engineering, 3(4), pp. 69-79

[3] A. H. Dekker (2003, July), “Centralisation and Decentralisation in

Network Centric Warfare,” Journal of Battlefield Technology, 6(2), pp.

23-28.

[4] M. Wellman, W. Walsh, P. Wurman, and J. Mackie-Mason, Auction

Protocols for Decentralized Scheduling, Technical Report, University

of Michigan, July 1998.

[5] W. Conen and T. Sandholm, “Differential-revelation VCG Mechanisms

for Combinatorial Auctions,” Proceedings of the 4th ACM Conference

on Electronic Commerce (San Diego, CA, USA, June 09-12, 2003).

EC’03 ACM Press, New York, NY, pp. 196-197.

[6] E. Kutanoglu and S. D. Wu, (1999) “On Combinatorial Auction and

LaGrangean Relaxation for Distributed Resource Scheduling,” IIE

Transactions, 31, pp. 813-826.

[7] R. G. Smith, (1980) “The Contract Net Protocol: High Level

Communication and Control in a Distributed Problem Solver,” IEEE

Trans. On Computers, 29(12), pp. 1104-113.

[8] R. G. Smith, and R. Davis (January, 1981) “Frameworks for

Cooperation in Distributed Problem Solving,” IEEE Trans. On Systems,

Man, and Cybernetics, 11(1).

[9] T. H. Harker, and L. H. Ungar, (1996) “A Market-Based Approach to

Workflow Automation,” presented at NSF Workshop in Information

Systems Athens, GA, May 8-10.

[10] P. Beaumont, (2004) “Multi-Platform Coordination and Resource

management in Command and Control,” Master Thesis, Laval

University

[11] J. R. Parker (November, 1995) “Voting Methods for Multiple

Autonomous Agents, presented at ANZIIS ’95, Perth, Australia.

[12] P. Scerri, R. Vincent, and R. Mailler (July, 2004) “Comparing Three

Approaches to Large Scale Coordination,” Proceedings of the First

Workshop on the Challenges in the Coordination of Large Scale Multi-

agent Systems.

[13] M. J. Wooldridge, N. R. Jennings, and K. Kinny (2000) “The Gaia

Methodology for Agent-Oriented Analysis and Design,” Autonomous

Agents and Multi-Agent Systems, 3(3) pp. 285-312

[14] F. Zambonelli, N. R. Jennings, M. J. Wooldridge (2003) “Developing

Multi-Agent Systems: The Gaia Methodology,” ACM Transactions on

Software Engineering and Methodology, 12(3), pp. 317-369

[15] M. J. Wooldridge, An Introduction to Multi Agent Systems. West

Sussex, England: Wiley & Sons, 2002

[16] P. Beaumont (2004). Multi-Platform Coordination and Resource

Management in Command and Control, Master Thesis, Laval

University. Retrieved on November 29, 2006 from

http://damas.ift.ulaval.ca/projets/TeamWork/publications.en.html.

[17] D. Alberts, J.J. Gartstka, and F.P. Stein (2000). Network-Centric

Warfare: Developing and Leveraging Information Superiority 2nd

Edition (Revised), CCRP Publications. Retrieved on March 1, 2007

from http://www.dodccrp.org/html3/pubs_download.html.

225