Professional Documents
Culture Documents
Abstract—Littoral combat is a critical component of naval war- independent and useful systems are integrated into a larger
fare that has gained importance since the late 20th century due system that delivers unique capabilities.” Additionally, the
to a shift from matched blue-water combat to agile, asymmetric following characteristic traits were proposed by Maier [3] to
warfare near the coast. With the increased relevance of this aid in identification of what might distinguish an SoS from a
type of naval combat, the ability of a networked naval warfare monolithic system:
System-of-Systems (SoS) to operate effectively given the chal-
lenges of operations in the littoral zone becomes imperative.
Resilience in an SoS in the face of a variety of threats is vital. Operational Independence Constituent systems may have
These threats may take various forms: traditional warfare, their own tasks to fulfill outside of the context of the SoS.
cyber attacks, or communications breakdowns. The challenge Managerial Independence Units may have a unique tasking
for any SoS practitioner is identifying such architectures from a by their respective operators/owners.
vast design space. We define an architecture as the constituent
systems in the SoS and the connections among these systems. Some heuristics were also proposed in [3] on the effective ar-
We seek to apply an agent-based modeling approach to create an chitecture of SoS namely the concept of stable intermediate
architecture evaluation tool that leverages the modular nature of
an SoS to quickly conduct trade studies and analyses to identify forms– the SoS must be able to perform its functions even
architectures that are resilient to a variety of threats. The if not at its complete/optimal configuration, policy triage–
simulation tool is built on the principles of the Open Systems the designers need to exact just the right amount of control
Architecture put forth by the Department of Defense (DoD). We over the model design, leveraging at the interfaces– with
present an analysis that seeks to find a suitable SoS architecture the components having their own independence the design of
configuration that maintains operability and performance dur- the SoS boils down to how they communicate with each other,
ing the loss of command authorities. This loss can be attributed and finally ensuring cooperation among the constituent sys-
to battle casualties or other forms of threats including commu- tems. Keeping these in mind, we aim to look at the premise
nications failures. We demonstrate that distributing managerial of littoral combat from an SoS perspective.
control in the architecture improves, to some extent, SoS perfor-
mance in terms of time to threat elimination. This single analysis
demonstrates how SoS practitioners can use agent-based models Context and Motivation
to quickly construct and evaluate potential architectures against The term ‘Littoral Combat’ refers to naval engagements close
a variety of threats and disruptions, ultimately building resilient to the shoreline generally in support of or related to amphibi-
SoS architectures that perform to prescribed levels even in the
face of network failures and attacks. ous operations. While by no means a new aspect of naval
warfare2 it has gained increased relevance in the late 20th and
21st century. This could possibly be due to a shift from evenly
matched blue-water engagements to a more asymmetric form
TABLE OF C ONTENTS against smaller or non-state actors. This could make an
already challenging scenario all the more difficult especially
1. I NTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 when one considers the possibility of civilian traffic in the
2. B UILDING THE M ODEL . . . . . . . . . . . . . . . . . . . . . . . . . . 2 same waters.
3. A NALYSIS - A RCHITECTURE P ERFORMANCE . . . 5
4. R ESULTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 To realize this increased relevance, the US Navy has com-
5. C ONCLUSION , S UMMARY AND F UTURE D E - missioned the Freedom[5] and Independence[6] classes of
VELOPMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Littoral Combat ships (LCS). Along with the ’Sea Lance
System’ [7] the LCS is expected to feature prominently in
the Navy’s future engagements. In this context, our proposed
1. I NTRODUCTION objective is to develop a model and simulation for potential
littoral engagements that implements both directed and ac-
Designing a suitable System-of-Systems (SoS) architecture knowledged forms of managerial control. The acknowledged
poses strong challenges owing to the need to balance the variant of the SoS would require that subsystems maintain
independent managerial control of constituent elements as their own management akin to the SoS. This should ensure
well as their operational interdependence. To gain a better cooperation among subsystems as each is now incentivized
idea of what makes SoS architecture design challenging, it to perform more effectively.
may be necessary to understand what constitutes an SoS and
how it differs from a system. A system is defined by Gibson
et al. in [1] as “a set of elements so interconnected so as to aid Our motivation for this project is the belief that a major
in driving toward a defined goal.” In comparison the Defense challenge for a littoral combat naval warfare SoS is the
Acquisition Handbook (DAG) (2008)[2] seeks to describe an
SoS as “a set or arrangement of systems that results when 2 Notable examples include the Gallipoli landings(1915), the invasion of
Normandy (1944), and the invasion and counter-invasion of the Falkland
978-1-4673-7676-1/16/$31.00 2016
c IEEE Islands (1982)[4].
1
Table 1. ROPE Table for the proposed SoS 2. B UILDING THE M ODEL
Agent-Based Modeling
Levels Resources Operations Policy Economics
α Sensors, Commun- Communi- Unit Systems-of-systems and large-scale complex systems such as
Con- icate with cations Operat- the stock market are difficult to model analytically due to the
trollers, other Rules ing and complex nature of interactions among constituent systems.
Com- agents to Training Additionally, the observed behavior in these systems adheres
manders, generate Cost to the notion, “the whole is greater than the sum of its
Weapons a threat parts”. Agent-based modeling (ABM) strives to capture
map the complex behaviors using a bottom-up approach where
individual systems in the SoS are expressed as agents in the
β Platforms: Maneu- Rules of Mainte- model. This approach provides a more natural description
LCS, vering engage- nance of the system, is flexible, and captures emergent phenomena
Aircraft, and ment and that an SoS practitioner would be most interested in[9]. An
Sub- engaging operating agent model receives information from the environment and
marines targets costs acts using a set of internal rules and principles. These basic
principles are replicated for all agents in a system. Axtell
γ Theater Deploy- Strategic Defense identifies three potential cases where agent-based modeling
Com- ment Policy, Budget can be beneficial[10]:
mand deci- Order of
Authority sions, site Battle 1. The model can be expressed using analytical means. In
planning this case, the agent-based model can serve to verify the results
obtained from analytical means. This however is not the most
effective use of agent-based modeling and is rarely employed.
2. The model can only partially be expressed analytically.
In this case, a numerical agent-based model can help comple-
ment the analytical expression of the system to obtain a result
decentralization of Command & Control (C2 ). If all control that is otherwise unattainable.
of the SoS is delegated to one unit (for example a single 3. The model is intractable. This case is especially true in
LCS), the risk of complete system failure would be very large-scale complex systems. Using an agent-based model
high if that particular system is removed from the scenario. can give insight into key behaviors and a better understanding
Distributing control among similar C2 capable systems might of the system as whole.
help mitigate this risk. This shift in control is also in line
with the US Navy’s initiative to move towards a net-centric Case #3 is directly applicable to SoS as it is difficult to capture
warfare (NCW) model as described by its four tenets [8]: the independent behaviors of each individual system and the
interactions among them. Additionally, many different types
of agents can easily be constructed by changing internal
1. Robust networking improves information sharing parameters that govern how they make decisions. This makes
2. Collaboration and information sharing improves the qual- ABM particularly well-suited for littoral combat applications
ity of data and shared situational awareness where an SoS practitioner as able to perturb specific agent
3. Shared situational awareness enables self-synchronization parameters or methods from a baseline and observe the im-
4. Which leads to an increase in mission effectiveness pact on overall performance. The advantages of ABM in this
domain do not render other methods (e.g. system dynamics,
model-based systems engineering) ineffective. In the realm of
Table 1 shows our layout of the hierarchy of constituent
systems (Resources), their functions within the context of
the SoS (Operations), their controlling rules (Policy) and the
Economics of operation.
Networking, Architectures
The network architectures used in the analysis of the littoral
for their design are listed in Table 2. combat scenario of the Falklands War [17] are discussed in
this section. According to Maier, operational and managerial
independence are vital in establishing the uniqueness of an
In addition to these, two single-role platforms are defined, SoS network architecture [3]. In this vein, three network
namely the anti-ship mines and mine sweeping platform.
The mine sweeping platform is based on the MH-53E Sea architectures namely Directed, Acknowledged and Mixed
Dragon platform [15] and the anti-ship mines are based on the architectures are adopted, based on their operational and man-
Stonefish influence mine [16]. In this scenario, the mines are agerial form of control, in modeling the littoral combat sce-
deployed by the red force and the MH-53E mine sweeper by nario. Currently, most integrated defense systems, especially
the blue force. This arrangement allows for more metrics to those involving naval warfare, utilize a strictly directed SoS
measure effectiveness – the percentage of simulations where architecture as their main form of managerial control. The
all mines are destroyed (Figure 8 and Equation 1) and the component systems are designed and centrally regulated such
average destruction per simulation (Figure 9 and Equation 2). that they carry out specific tasks geared towards the overall
Further details are described in Section 4 goal of the SoS [3]. However, a directed architecture runs a
high risk of being overly controlling, and this may dissuade
existing or potential subsystems from effectively fulfilling
Because agent interfaces define the baseline of the model, their roles in the SoS. An acknowledged SoS architecture
comprises of constituent systems that help to accomplish the
agents can quickly be added or removed as either comman- SoS goal, but the systems maintain their own management
ders or controllers. Furthermore, agents can easily be re- and authority akin to the SoS. This ensures cooperation
wired to represent different networks. This modularity is amongst subsystems, as each subsystem is incentivized to
critical during the analysis phase for it allows us to test perform efficiently with the knowledge that its successful
multiple network configurations. operations ultimately benefit the SoS. The mixed architecture
combines the properties of both directed and acknowledged
Modeling Assumptions architectures [3].
In order to build a suitable model that captures desirable
dynamics of the SoS while being modular and computation-
ally simple, some assumptions are made. Although these We focus our efforts on defensive littoral combat site plan-
assumptions would not hold in a real-life scenario we believe ning, which includes two separate force (red and blue)
them to be reasonable enough to make modeling possible compositions. The attacking red force maintains a constant
without ruining the integrity of our results. network configuration in the analysis as shown in Figure 3,
Weapon dynamics are modeled probabilistically using range, with 2 commanders and 10 controllers representing a strictly
weapon type, and the target platform’s expected defen- directed SoS network architecture. Two of the four littoral
sive/evasive capability. Each platform is capable of carrying combat ships (LCS) are command and control (C2 ) agents,
a mix of one or more of Anti-Ship Missile (ASM), Torpedo, with each C2 agent having a connection with three of the
Surface-to-Air Missile (SAM), and Air-to-Air Missile types. six attack aircraft (AA), one LCS, and both submarines in
Depending on the currently targeted threat, the appropriate the SoS network. The red force network loses half of its
platform is tasked to engage it with the suitable weapon effectiveness if one of the C2 agents is destroyed. Hence, the
type. The effectiveness of the engagement is modeled as a C2 s in the network exhibit high levels of situational aware-
Total Kill Probability (tpk). Clearly tpk would be smaller ness to maintain adequate red force effectiveness. While
for a target further away. This is compounded by the the blue force composition remains constant, the links and
weapon accuracy and defensive capabilities of the target. number of C2 agents within each platform change to allow for
The calculated value of tpk is compared against a randomly the network architecture evolution. Figures 4,5,6 represent
generated threshold value (0, 1] to account for the chance that the directed, acknowledged, and mixed network architectures
an engagement may succeed in difficult conditions as well as for the defending blue force respectively. The directed blue
it failing under very good conditions. force network consists of two LCS, three attack aircraft, one
The sensor effectiveness is similarly modeled. Given a ball reconnaissance aircraft (RA), and one submarine. However,
4
Figure 3. Red Force Architecture Figure 5. Acknowledged Blue Force Structure
Figure 4. Directed Blue Force Structure Figure 6. Mixed Blue Force Structure
4. R ESULTS
This investigation strives to assess the effectiveness of dif-
ferent blue force architecture types (directed, mixed, and Figure 8. Percent of Simulations where all mines are
acknowledged) against a static red force composition. Each destroyed
simulation contained 40 mines (modeled after Stonefish
mines). In addition to the three metrics (Time to threat
elimination, red and blue forces remaining), the number of
mines destroyed in each simulation serves as an analog to These two figures offered a glimpse into the static effec-
assessing architecture effectiveness. With added command tiveness of the architecture at the end of the simulation,
authorities (C2 capable platforms) the MH-53E helicopter can but does not speak to the effectiveness of the architecture
receive additional tasking commands to remove mines. This over the duration of the simulation. Figure 10 displays the
notion suggests that added situational awareness (in more blue force, red force, and mine fraction as a function of
mixed and acknowledged architectures) would maximize the both time and architecture type. The directed architecture
number of mines destroyed in the simulation. Figure 8 structure is represented using circle markers, mixed with
shows the percentage of simulations where all 40 mines are square markers, and acknowledged with x markers. Several
eliminated as captured in Equation 1. interesting behaviors are seen from this decomposition of the
6
littoral combat architectures using an agent-based modeling
approach. The authors believe that the results shown illustrate
the capability of TRITON in its infancy and also reveal many
avenues for exploration and development. The modular,
adaptable nature of the software tool offers SoS practitioners
a top-level modeling tool to analyze the effectiveness of po-
tential architectures quickly. Potentially viable architectures
identified using TRITON can then be evaluated using higher
fidelity simulations. Often, a goal of agent-based modeling is
to identify emergent behavior from the simulation. Emergent
behavior is seen only when analyzing the interactions among
agents rather than pairing the agents together themselves.
The authors find it enticing to claim emergence regarding the
behavior seen in the analysis, but it is premature given the ma-
turity of the software tool TRITON. Moving forward, several
potential avenues have been identified for development:
8
opment Recommendations,” Simulation, vol. 82, no. 9,
pp. 609–623, 2006.
[13] D. A. DeLaurentis, “System-of-Systems Laboratory.”
[Online]. Available: https://engineering.purdue.edu/
people/daniel.a.delaurentis.1/html/SoSL.html
[14] D. N. Fry, R. Campbell, and D. A. DeLaurentis,
“Modeling Systems-of-Systems from Multiple Design
Perspectives: Agents, Interfaces, and Architectures,”
AIAA Modeling and Simulation Technologies Confer-
ence, vol. 1, pp. 1–15, 2015.
[15] “Sizing up the beast: The MH-53E Sea
Dragon in action,” jan 2014. [Online]. Available:
http://ic.galegroup.com/ic/ovic/NewsDetailsPage/
NewsDetailsWindow?failOverType={&}query=
{&}prodId=OVIC{&}windowstate=normal{&}
contentModules={&}display-query={&}mode=
view{&}displayGroupName=News{&}limiter=
{&}currPage={&}disableHighlighting=false{&}
displayGroups={&}sortBy={&}search
[16] S. B. T. D. E. Galatowitsch, “Undersea
mines grow smarter and deadlier,” vol. 23,
no. 3, pp. 57+, jan 1991. [Online]. Available:
http://go.galegroup.com.ezproxy.lib.purdue.edu/ps/
i.do?id=GALE{%}7CA10506741{&}v=2.1{&}u=
purdue{ }main{&}it=r{&}p=PPMI{&}sw=w{&}
asid=de7b1148d143a99cf2a0eeedebb9367f
[17] UK MoD, “Falklands 25: Background Briefing,”
1997. [Online]. Available: http://webarchive.
nationalarchives.gov.uk/20100503141944/http:
//www.mod.uk/DefenceInternet/FactSheets/
Falklands25BackgroundBriefing.htm