Next Article in Journal
Key-Value Mapping-Based Text-to-Image Diffusion Model Backdoor Attacks
Previous Article in Journal
ZechariahNet: A Novel Method of MS Lesion Diagnosis Through MRI Images by the Combination of C-LSTM and 3D CNN Algorithms
Previous Article in Special Issue
Genetic-Based Lottery Ticket Pruning for Transformers in Sentiment Classification: Realized Through Lottery Sample Selection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

ICCA: Independent Multi-Agent Algorithm for Distributed Jamming Scheduling

1
Rocket Force University of Engineering, Xi’an 710025, China
2
PLA 967XX Unit, Henan, China
3
School of Computer Science and Information Engineering, Hefei University of Technology, Hefei 230009, China
*
Author to whom correspondence should be addressed.
Algorithms 2026, 19(1), 73; https://doi.org/10.3390/a19010073
Submission received: 14 October 2025 / Revised: 7 January 2026 / Accepted: 9 January 2026 / Published: 15 January 2026

Abstract

In extreme scenarios, to prevent the leakage of jamming coordination information, the jammers must proactively terminate their communication functions and implement jamming resource scheduling via Non-Networked Cooperation. However, current research on this non-networked jamming approach is relatively limited. Furthermore, existing algorithms either rely on networked interactions or lack cognitive strategies for the surrounding communication countermeasure situation. For example, they fail to adapt to dynamic changes in electromagnetic noise and struggle to determine jamming effectiveness, leading to low jamming efficiency and severe energy waste in non-networked scenarios. To address this issue, this paper establishes a game process and corresponding algorithm for non-networked communication countermeasures and designs cognitive, cooperative, and scheduling strategies for individual jammers. Meanwhile, a novel performance metric called the “Overall Communication Suppression Ratio (OCSR)” is proposed. This metric quantifies the relationship between “sustained full-suppression duration” and “ operating duration of the jamming system,” overcoming the defect that traditional metrics cannot evaluate the dynamic jamming effectiveness in non-networked scenarios. Experimental results indicate that although the OCSR of the proposed Intelligent Concentric Circle Algorithm (ICCA) is significantly lower than that of the Full-Power Jamming Algorithm (FPJA), ICCA extends the operating duration of the jamming system by 4.8%. This achieves non-uniform power setting of jammers, enabling flexible and dynamic jamming in non-networked scenarios and retaining more battery capacity for jammers after overall jamming failure.

1. Introduction

Wireless communication is a critical factor in modern military operations. Communication jamming technology, which can disrupt the enemy’s command chain and expand one’s own advantages, has therefore attracted the attention and development of major military powers worldwide [1,2,3]. High-power jammers represent the traditional development direction of communication jamming, but the continuous increase in jamming power and equipment scale has led to a decline in their battlefield mobility and survivability. In contrast, distributed communication jammers, with their low power and low cost, have become a research hotspot and new development trend due to their characteristics of wide distribution area, flexible jamming, and strong concealment. Distributed jammers rely on communication networking to achieve jamming coordination. However, complex electromagnetic environmental noise in modern battlefields can disrupt the communication links between jammers, rendering network-dependent jamming scheduling algorithms unable to achieve coordination due to information interruption. Furthermore, there is relatively little research on resource scheduling and coordination strategies for non-networked jammers.
Existing resource scheduling research has mainly focused on radar jamming [4,5,6,7,8,9,10,11,12], but its mathematical models and scheduling strategies are not applicable to communication jamming. In the research of communication jamming, more attention has been paid to the problem of static resource scheduling. Some studies using traditional optimization algorithms with global search [13], convex optimization theory [14], various genetic algorithms [15,16,17], intelligent optimization algorithms [18,19,20], and knowledge-based Bayesian neural network algorithms [21] have made progress. The rapidly developing machine learning technology has contributed to the algorithm research of communication countermeasures [22,23,24,25]. However, the difficulty in obtaining communication countermeasure datasets has limited the application of deep learning technology [26]. The above studies generally assume that all information of the communication parties is fully known and remains unchanged for a long time, without considering issues such as the usage timing of multiple jammers, resulting in poor applicability in dynamic communication countermeasure processes. Compared with traditional resource scheduling methods based on intelligent optimization algorithms, the proposed method in this paper adds jamming effectiveness evaluation and coordination strategies for non-networked scenarios. In contrast to traditional convex optimization-based methods, the proposed algorithm features a simple mathematical principle and is more suitable for scenarios with multiple distributed communication jammers. Compared with traditional deep learning-based methods, the method in this paper does not rely on pre-acquired communication party datasets, nor does it require tedious long-term adjustment and training processes of deep learning models.
Reinforcement learning algorithms can interact with the environment autonomously without prior information to learn the optimal strategies. Therefore, reinforcement learning technology has been widely used in dynamic resource scheduling [27,28,29,30,31,32,33,34], but most of them assume that the jammers can directly obtain the jamming effects. In reality, first, the implementation approaches (such as jamming index estimation and communication quality cognition) are ignored; second, the anti-jamming power and channel adjustment strategies of the communicating parties are not considered [35,36].
To address these issues, some scholars, based on the judgment principles of communication jamming, have modeled the communication countermeasure process as an MDP (Markov Decision Process) and proposed corresponding jamming methods [37]. They have taken channel alignment as an evaluation index for effective jamming [38] and used the Q-learning algorithm [39] to predict the changes in communication channels. They have also formulated jamming effectiveness measurement indicators by integrating the basic principles of jamming and the behavioral changes of communication targets [40].
However, there are still deficiencies in the evaluation of jamming effects. Firstly, The above strategies are established on the basis that jammers can normally detect and identify all communication information, without considering the masking interference of electromagnetic environmental noise. Secondly, they are based on mutually independent and deterministic two-way communication links, which is not applicable to complex communication networks. Thirdly, they rely on the search strategies of algorithms and fail to fully utilize the positional information of both communication and jamming parties as well as the roles of electromagnetic propagation characteristics.
The optimization objectives of most of the research content are the physical layer parameters such as the jamming styles and power of a single jammer, and there is very little research involving the scheduling of distributed jamming resources. References [41,42,43,44,45] have studied a small number of high-power and long-distance communication jammers deployed on the ground and adopted technologies such as multi-agent reinforcement learning and hierarchical reinforcement learning. Reference [46] has designed a proximal policy optimization algorithm to solve the problem of scheduling jamming resources when a small number of jammers are in the air and in a moving state. The above algorithms have shown good performance in small-scale scenarios.
The majority of prior works operate under the assumption of interconnected jammer networks, with minimal literature addressing autonomous coordination in non-networked scenarios involving standalone jamming units. Reference [47] proposed a cooperative jamming strategy based on self-confidence. Under the constraint of self-confidence, jamming cooperation is achieved at the cost of more interaction times, but the limited power of jammers is not considered. Reference [27] introduced a multi-agent reinforcement learning algorithm with centralized training and distributed decision-making. However, in a complex electromagnetic environment, the large environmental noise makes it impossible for jammers to identify all signals, thus it is difficult to meet the actual requirements of overall communication countermeasures. Compared with traditional reinforcement learning-based methods, the proposed method can obtain feasible solutions in a short time. It does not need to design reward functions according to scenarios, nor does it require long training time or a large number of interactions with the environment, making it more suitable for non-networked jammers with limited battery capacity.
Facing severe electromagnetic jamming in wireless communications, deep reinforcement learning (DRL) and multi-agent reinforcement learning (MARL) have become core frameworks for recent anti-jamming research, with notable advances in single/multi-user scenarios. For single-user frequency hopping (FH) systems, Li et al. proposed a Markov decision process (MDP) model with frequency-power action space and a dual-action network DRL algorithm, which considered energy and switching overhead and was validated in simulations and field tests [48]. To address insufficient exploration of traditional DRL in multi-user scenarios with external jamming and internal co-interference, Jing et al. established a Markov game model, discretized the soft actor-critic (SAC) algorithm, and extended it to the multi-agent discrete SAC (MA-DSAC) algorithm under the centralized training with decentralized execution (CTDE) framework, achieving over 25% performance improvement and reducing system instability [49]. For moving reactive jammers with hybrid modes, Li et al. designed a parallelized DRL strategy that decomposed action spaces and accelerated convergence, realizing nearly 90% normalized throughput gain while balancing concealment and anti-jamming [50].
Scenario-specific anti-jamming solutions have made breakthroughs in aerial networks and communication-computing integration. For multi-hop aerial networks, Ma et al. formulated a joint anti-jamming problem, constructed a decentralized partially observable Markov decision process (Dec-POMDP) model, and proposed a graph convolutional MARL algorithm with jammer adversarial pre-training and information temporal smoothing (ITS) mechanism, showing superior transmission success ratio and energy efficiency [51]. For unmanned aerial vehicle (UAV)-enabled semantic communication-mobile edge computing (MEC) integration under jamming, Liu et al. proposed a DRL algorithm optimizing UAV trajectories, user associations and channels, which captured jammer behavior and mitigated impacts on task offloading [52]. For multi-user spectrum sharing, Li et al. proposed the local knowledge diffusion and differential weighted fusion mechanisms (LKD-DWF-M) distributed strategy for low-overhead collaboration; theoretical analysis confirmed Nash equilibrium and convergence, and simulations showed significant throughput improvement under statistical jamming (SJ), dynamic sweeping jamming (DSJ) and intelligent comb jamming (ICJ) [53]. The aforementioned anti-jamming resource scheduling algorithms based on machine learning rely on known jammer information and long-term training time, belonging to the autonomous and intelligent anti-jamming adjustment behaviors of communication devices. However, in battlefield environments, a large number of communication devices are operated by personnel, which is prone to numerous unexplainable or irrational behaviors. To construct a simple and feasible jamming target for communication jamming algorithms, it is necessary to design a new communication party behavior simulation algorithm.
The wireless links of the air–ground communication network system are complex, and it has a strong self-organizing and adaptive ability. There are a large number of both communicating and jamming parties, and the jamming parties need to exert dynamic jamming on all communication receiving nodes. Prior art assumes networked topologies, consequently lacking real-time scheduling mechanisms for standalone jammers operating in geometrically sparse, dimensionally complex battlespaces with imperfect situational data because:
  • In the face of unknown and dynamic communication power scheduling strategies, reinforcement learning-based algorithms have a long training time and require a large number of interactions. This delays the overall time to achieve jamming and consumes a large amount of energy.
  • There is a lack of specific strategies for non-networked distributed jammers to perceive the environment using reconnaissance information and determine the jamming effects.
  • There is a lack of applicable mathematical models and strategies, and there is insufficient research on issues such as the superposition, coordination, and usage order of jamming power.
In summary, the contributions of this paper are as follows:
  • Based on the detected and prior location information, cognitive and power scheduling strategies for non-networked jammers are designed.
  • Considering the requirements of high-speed and overall countermeasures, a deterministic strategy with strong robustness is adopted.
  • The OCSR is defined as the normalized temporal ratio between the total sustained full-suppression jamming duration and the partial effectiveness periods (i.e., periods where communication quality degrades above a threshold but remains detectable).
  • A simulation experiment for distributed communication countermeasures in a complex electromagnetic environment is designed and solved, and the problem of the indeterminate decision-making order of jammers is identified.
By virtue of the above contributions, this paper further focuses on addressing practical battlefield challenges: aiming at the three key challenges of non-networked distributed jamming—“incomplete information, long training time, and energy waste”—it designs a non-network-dependent jamming scheduling algorithm with low latency and high endurance. Meanwhile, a jamming effectiveness evaluation index suitable for dynamic scenarios is proposed, ultimately addressing the practicality issues of traditional methods in battlefield environments.

2. Communication Countermeasure Mode

The air–ground communication network system has self-organizing and encryption functions. It is difficult for the jamming side to obtain the transmitting and receiving ends of the communication link through reconnaissance. Therefore, it is necessary to apply jamming to the maximum receiving power of communication nodes. In a complex electromagnetic environment, a single jammer has limited information and cannot receive overall feedback for decision-making, which makes cooperation difficult, as shown in Figure 1.

2.1. Mathematical Model of the Air–Ground Communication Network System

In the air–ground communication scenario, the path loss between airborne devices and between airborne and ground devices is line-of-sight propagation, while the path loss between ground devices is two-ray propagation.
In Equation (1), P c t is the transmission power of the communication signal, P c r is the received power of the communication signal, and the unit of both is dBW. G tc is the antenna gain of the communication transmitting antenna in the direction of the communication receiving antenna, G rc is the antenna gain of the communication receiving antenna in the direction of the communication transmitting antenna, L c is the path loss of the communication transmission, L pc is the attenuation of the cable and cable head at the communication receiving end, and the unit of all of them is dB.
P c t = P c r G tc G rc + L c + L pc
The received power of the communicating party’s receiving end needs to meet the communication link margin, and the environmental noise power needs to be taken into account. In Equation (2), R S is the receiving sensitivity of the communication device, σ 2 represents the environmental noise power, and S F M is the System Fade Margin.
P c r max ( R S , σ 2 ) > S F M
When the communication device transmits a signal, it selects the path with the minimum transmission loss and uses the lowest power that meets the communication requirements. In Equation (3), P c j t min is the lowest transmitting power of the j -th communication device, L c j is the path loss of the communication transmission with the remaining devices, and the total number of communication devices is J .
P c j t min = S F M + max ( R S , σ 2 ) G tc G rc + min ( L c j ) + L pc , j ( 1 , J )   and j

2.2. Mathematical Model of Air–Ground Joint Communication Jamming

2.2.1. Quantized Jammer-to-Signal Ratio

k j b = P j n + i = 1 I P j i n P j r m a x
In Equation (4), the ratio of the sum of the airborne jammer, ground jammer, and electromagnetic environmental noise to the maximum power in the received signal of the communication device is k j b . Among them, P j i n is the jamming signal released by the i -th jammer and received by the j -th communication device, where the i -th jammer is an airborne or ground jammer; P j n is the environmental noise at the j -th communication device; and P j max r is the actual maximum communication signal power received by the j -th communication device.
In Equation (5), if the power ratio of the interference signal to the communication received signal is not less than the jamming-to-signal ratio k j , it is considered that the interference is successful, that is, the quantized jamming-to-signal ratio J S R j of the j -th communication device is 1.
J S R j = 0 , k j b < k j 1 , k j b k j

2.2.2. Restriction Conditions

Under non-networked cooperation, it is necessary to impose interference on the received signals of communication devices to reduce their communication quality. As shown in Equation (6), where J S R j is the quantized jammer-to-signal ratio of the j -th communication device, and J is the total number of communication devices, and R j is the proportion of communication nodes that are disturbed. If the constraints are satisfied, the equation holds; otherwise, it does not hold.
j = 1 J J S R j J R j

2.2.3. System Operating Duration

When the jamming system is operating, if the overall communication jamming cannot be achieved, it is considered that the operating duration of the jamming system ends at this time. The operating duration T of the jamming system is the sum of the operating duration T i q of the jamming system in a single scheduling.
In Equation (7), after the i -th jammer undergoes the q -th scheduling, T i q is its operating duration this time, with the unit of hour (H). η s is the battery power limit required for normal jamming, U out is the battery operating voltage, with the unit of volt (V), E esq is the battery power consumed in this scheduling, with the unit of ampere-hour (AH), P i is the jamming output power of the i -th jammer, and P x is the power consumed by the jammer to maintain other functions, with the unit of watt (W).
T i q = η s U outs E esq ( P i + P x )

2.2.4. Overall Communication Suppression Ratio

In non-networked jammer scenarios, achieving the overall jamming target (i.e., successfully applying power-suppressive jamming to the received power of all communication nodes) is relatively challenging. Consequently, traditional jamming effectiveness indicators (such as “jamming success rate”) cannot be simply used to determine “whether suppression is achieved”. In addition, traditional indicators have two shortcomings: first, they fail to reflect “suppression continuity” and “partial failure states” (e.g., degraded communication quality without complete interruption) in dynamic scenarios. However, “sustained suppression” is more critical than “instantaneous suppression” on the battlefield (for instance, the enemy’s communication can quickly recover after a brief interruption); second, they cannot reflect the proportion of “overall complete jamming” in the “operating duration of the jamming system”, that is, on the basis of meeting basic jamming requirements, measuring the achievement rate of overall effective jamming from the perspective of duration.
In the dynamic communication countermeasure game process, the overall communication suppression ratio is defined as the ratio of total interference duration to operating duration of the jamming system T , which is used to evaluate communication jamming effectiveness. In Equation (8), R t o t a l is the overall communication suppression ratio, and T t o t a l is total interference duration.
R t o t a l = T t o t a l T
If OCSR = 1, meaning jamming fully covers the period of quality degradation, this is defined as “ideal suppression”, but it also consumes more battery power of the jammer; if OCSR < 1, indicating gaps in jamming, scheduling optimization is required. This indicator not only covers “overall complete jamming” but also includes “partial failure states”, making it more in line with the actual needs of dynamic jamming on the battlefield.
Communication nodes with different JSR exhibit varying degrees of susceptibility to different types of communication signals. In the scenario of non-networked communication jamming, the minimum JSR for all communication nodes needs to be set to prevent individual nodes from maintaining normal bidirectional communication with the outside world. In Equation (9), if the power ratio of the interference signal to the communication received signal is not less than the jamming-to-signal ratio k j 2 , it is considered that the interference achieves a low degree of success, that is, the quantized jamming-to-signal ratio J S R j 2 of the j -th communication device is 1.
J S R j 2 = 0 , k j b < k j 2 1 , k j b k j 2
The air–ground communication network system has anti-jamming measures such as multi-hop forwarding, and the jamming party needs to exert effective jamming on the received signals of all communication devices. As shown in Equation (9), where J S R j 2 is the quantized jammer-to-signal ratio of the j -th communication device, and J is the total number of communication devices. If the constraints are satisfied, the equation holds; otherwise, it does not hold.
j = 1 J J S R j 2 = J

2.2.5. Configurable Range Gradation

In non-networked operations, individual jammers require configurable range gradation with multiple preset tiers. Using estimation strategies, these systems autonomously target communication nodes within designated ranges.
d j min = min ( ( x i x j ) 2 + ( y i y j ) 2 + ( z i z j ) 2 ) , i ( 1 , I )
In Equation (11), the minimum spacing represents the shortest distance between a jammer and its nearest communication node.
Communication links between heterogeneous antennas (transmitter/receiver vs. jammer) exhibit differential link gains. For each gain category, non-uniform graduated reference distances must be established.
Based on the shortest distance between the integrated jammer and communication nodes as well as the reference distance, the range tiers for each type of link gain are set empirically, where Tier 1 represents the lowest tier and Tier X represents the highest tier. The number of range tiers needs to balance the relationship between the time consumption and effectiveness of non-networked collaborative scheduling of jammers.

2.3. Strategies of the Air–Ground Communication Party

The initial power allocation of communication nodes must balance “energy consumption” and “communication quality”. If a high-loss link is selected, higher transmission power is required, which will accelerate energy consumption and expose electromagnetic signals. Therefore, Algorithm 1 is designed to enable nodes to maintain communication with the minimum power (meeting the link margin of 12 dB, as shown in Table 1). This strategy not only aligns with the battlefield requirements of “low exposure and long endurance” but also provides a benchmark for the subsequent “on-demand power scheduling” of the jamming party. The initial communication power allocation method for the air–ground network system is shown in Algorithm 1 ( j is the serial number of the communication device, i is the serial number of the jammer).
Algorithm 1 The Initial Communication Power Allocation Method
Input: Communication Party Information
Output: New Communication Party Information
1:Select P c j t in order, for j = 1 to J
2:  Search for j with L c min as the receiving node (Iterate through all communication links with j as the receiving end, aiming to filter out the link with the minimum transmission loss and avoid initial power redundancy caused by improper link selection)
3:  Estimate P c j t min
4:Select P c j r in order, for j = 1 to J :
5:  Select P c j t in order, for j = 1 to J :
6:  If j j , or P c j t 0 :
7:   Estimate P c j r
8:   If P c j r > P c j r o l d :
9:     P c j r o l d = P c j r
10:   End if
11:  End if
12:Select P c j t in order, for j = 1 to J
13:  If P c j r max do not meet the demand for receiving signals:
14:   Search for j with L c min as the transmitting node
15:   Estimate P c j t
16:   If P c j t > P c j t o l d :
17:     P c j t o l d = P c j t
18:   End if
19:  End if
In Algorithm 1, each communication node is instructed to select the link with the minimum transmission path loss. Through the traversal calculation of the transmitting end and the receiving end, the initial transmitting power of the communication nodes is set.
After the overall communication jamming is achieved, the receiving power of all communication nodes is suppressed. Based on the current communication power, the communicating party adjusts the transmitting power in a roulette wheel selection manner. It can increase the transmitting power to counteract the communication jamming, stop transmitting to avoid the jamming, or reduce the transmitting power and maintain the status quo to confuse the jamming party, as shown in Algorithm 2 ( P c t lim i t is the upper limit of the transmitting power of the communication node, P c j t i n i is the initial transmitting power).
Algorithm 2: Communication Power Scheduling Method for Countering Interference
Input: Communication Party Information
Output: New Communication Party Information
1:Select P c j t in order, for j = 1 to J
2:If P c j t = 0:
3:  Adjust the transmitting state in a roulette wheel manner to be, lower than, higher than P c j t i n i , and no transmission
4:End if
5:If P c j t and P c t lim i t :
6:  Adjust the transmitting state in a roulette wheel selection method to reduce, increase, maintain P c j t , and stop transmitting
7:End if
8:If P c j t = P c t lim i t :
9:   P c j t = random( P c j t , 0)
10:End if

2.4. Strategies of the Air–Ground Jamming Party

As an independent intelligent agent, a single jammer estimates the states of surrounding communication nodes and jammers based on the prior information of the communication countermeasure location and the detected signal information, as shown in Algorithm 3. In this scenario, assuming all communication nodes operate at their maximum transmit power, the maximum received power at the communication node is defined as the theoretical maximum received power P j r max . The environmental noise at the jammer i is P i n .
Algorithm 3 Estimation Strategy of the Surrounding Electromagnetic Environment
Input: The layout of communication countermeasures and the information of the electromagnetic environment detected
Output: Estimated communication and jamming information
1:If the i detects the source azimuth and power of the signal from the j :
2: Select j in order, for j = 1 to J
3:  Compare j and j , and infer the information and distance of j
4:   Estimate P c j t or P j i t
5:End if
6:If P i r contains only one communication signal:
7: If d j i Tier 1:
8:   P j r = P j r max
9: End if
10:End if
11: Select i in order, (signals within the Tier x and have not been detected)
12: If d j i Tier 2:
13:  Set P j r max as the receiving power.
14: End if
15: If d j i Tier 3:
16: Take P i n as the received power, and estimate P i t
17: End if
18:Select j in order, for j = 1 to J
19:  Update P c r max
After a single jammer completes the environmental awareness, it independently conducts power scheduling, as shown in Algorithm 4. P j n c r i is the critical value of the environmental noise, P j s u m n is the total power of the jamming signals received by j , P i n is the jamming power requirement of i .
Algorithm 4: Independent Scheduling Strategy of Jamming Power
Input: Estimated communication information and real-time information of the interfering party
Output: Jammer Power Setting
1:Select j in order, for j = 1 to J
2: Select i in order, for i = 1 to I
3: If i i and P j r c P j n c r i , d j i Tier x:
4:  Calculate P j s u m n
5:   P j n = P c r k j σ 2 P j s u m n
6:  End if
7: Estimate P i n
8: P i max n = min ( P i n , P i max ) , update
9: If the battery power cannot guarantee P i max n :
10:  Set the jamming power based on the current battery level
11: Else:
12:  Set it as P i max n
In Figure 2, in the non-networked state of the jammer, for the surrounding communication nodes, multiple ranges for selecting jamming targets are preset based on location information. After the communication network undergoes adaptive adjustment, a single jammer, based on part of the information it has detected through reconnaissance, selects communication targets and applies jamming at certain time intervals according to the jamming ranges from near to far. During this process, it will identify adjacent jamming information to assist the decision-making of a single jammer. In the non-networked scenario, the jammers cannot be synchronized and will be scheduled in a chaotic order. The ICCA and the communication countermeasure environment are as shown in Figure 3.
During the execution of ICCA, the communication nodes will be traversed first, and then the jammers will be traversed. Therefore, its time complexity is O ( n 2 ) , where n denotes the problem size.
The interference party information in ICCA employs real-number encoding, which can represent continuous real values, thereby reducing encoding conversion errors when scheduling interference resources. The ICCA adopts lightweight data structures to adapt to the low-latency requirement of non-networked scenarios: (1) Arrays are used to store communication node and jammer IDs for linear traversal, ensuring a time complexity of O ( n 2 ) ; (2) Structs encapsulate multi-dimensional state information (e.g., communication node type, coordinates, transmit power) for efficient data transmission during local decision-making; (3) Key-value pairs map scenario IDs to tier thresholds (Scenario 1: 3, Scenario 2: 2, Scenario 3: 5) to enable fast parameter lookup. All data structures are designed to minimize computational overhead, aligning with the core objective of ‘real-time scheduling for distributed jammers’.

3. Simulation Experiment

3.1. Parameter Setting of the Simulation Scenario

All simulations were conducted on a hardware platform equipped with an Intel(R) Core(TM) i5-8300H CPU @ 2.30 GHz, 16.0 GB of RAM, and an NVIDIA GTX 1080Ti graphics card. The software environment was built on Anaconda 23.7.4, with Python code implemented using PyCharm 2023.2.1 (Professional Edition) as the integrated development environment (IDE) and runtime version 17.0.8 + 7-b1000.8 amd64. The core third-party libraries utilized for the experiments included anaconda_depends_2023.09 and PyTorch 1.13.1, which provided reliable support for algorithm operation and data processing.
In the face of a complex electromagnetic environment, the communication party will raise the antenna to improve the communication quality. This paper adopts three simulation scenarios, where the ground height is uniformly set to 0, as shown in Figure 4, Figure 5 and Figure 6. The statistics of the number of communication nodes and jammers in each scenario are shown in Table 1. The static jammer layout used in the simulation experiment is based on the premise that the jamming target can be achieved with full-power jamming.
The parameters of the simulation experiment are shown in Table 2.

3.2. Results and Analysis of the Comparative Experiment

In this paper, the ICCA is compared with FPJA (Full-Power Jamming Algorithm), MADJPA (Multi-Agent Distributive Jamming Power Allocation) [27], SRSA (Simple Random Search Algorithm) and GA (Greedy Algorithm). MADJPA schedules ground distributed jamming resources, and its scenario is relatively similar to that of this paper, so it is used as a comparison algorithm. All algorithms are run 30 times independently, with the experimental results reported as the mean value plus/minus the 95% confidence interval.
In Table 3, the comparison of the initial decision-making time reflects the advantages of the algorithm in this paper, such as a high solution rate and no need for training. “Time for each decision” refers to the time required for the jamming party to complete resource scheduling after the power of communication nodes in the air–ground communication network changes, which includes some communication nodes stopping transmission and some starting transmission. The variation in the system’s operating duration indicates that the scheduling of dynamically adjusted jammers is dependent on the static layout of the jammer deployment. The subdued overall communication suppression ratio demonstrates ICCA’s power-conservation approach to jamming.
In the non-networked scenario studied in this paper, individual jammers independently impose jamming on communication nodes based on reconnaissance information while minimizing jamming power consumption as much as possible. If the greedy myopic algorithm is adopted, each jammer only considers its own operating duration and lacks non-networked coordination with other jammers. This results in the total number of jammed communication nodes failing to meet the constraint requirements, thereby directly leading to jamming failure.
In Figure 7, the system operating duration of the algorithm in this paper is 4.8% longer than that of the compared algorithms. The experimental results show that the algorithm in this paper can complete the scheduling of jamming resources quickly and efficiently.
When the jammers are not networked, a single jammer cannot obtain the true feedback of the overall jamming effect and thus cannot optimize the search for the solution based on this. The compared algorithms lack the cognition, scheduling, and non-networked coordination strategies for independent jammers, making it difficult to meet the requirements of overall communication countermeasures. The complex air–ground confrontation layout and electromagnetic environment make it difficult for a single jammer to infer global information from the incomplete local information it has detected, leading to the failure of the MADJPA algorithm.
Non-networked distributed jamming aims to disrupt the enemy’s communication command chain rather than achieving “continuous full suppression” (which is the premise of OCSR = 1 for FPJA). The OCSR metric quantifies the ratio of “sustained full-suppression duration” to “system operating duration” (Equation (8) revised). For ICCA, the low OCSR values (0.16 in Scenario 1 and 0 in Scenario 2) do not indicate “ineffective jamming”—instead, they reflect its core design philosophy:
ICCA adopts non-uniform power scheduling (Algorithm 4) to dynamically adjust jamming intensity based on target distance tiers. It prioritizes maintaining “low-intensity suppression” for all communication nodes (meeting Equation (9) with JSR ≥ 1.76 dB) rather than pursuing “full suppression” (JSR ≥ 4.77 dB) at the cost of excessive energy consumption.
In battlefield scenarios, “low-intensity suppression” is sufficient to hinder the enemy’s communication signal recognition and command transmission (as verified by engineering practice in Section 2.2.5), which constitutes the “jamming effectiveness” claimed in the paper. FPJA achieves OCSR = 1 by adopting full-power continuous jamming, but this leads to rapid energy depletion and zero residual battery capacity after jamming failure (Table 4), making it unsuitable for long-duration battlefield missions.
Both ICCA and FPJA can sustain jamming operations in non-networked scenarios. Post-jamming-failure, their residual energy levels are compared. The jammer failure ratio is defined as the proportion of depleted jammers.
In Table 3, ICCA demonstrates more balanced energy consumption than FPJA across both aerial and ground jammers, while maintaining higher residual energy reserves. In battlefield applications, this non-uniform power allocation strategy enhances operational flexibility and survivability compared to full-power jamming approaches.
Figure 8, Figure 9 and Figure 10 are the heatmaps of the transmit power of communication nodes in three simulation scenarios during a single run of the ICCA. The abscissa represents the serial number of communication nodes, and the ordinate denotes the number of adjustment intervals of the interferer. The first interval corresponds to the transmit power of communication nodes under the action of Algorithm 1, while the others correspond to that under the action of Algorithm 2. It can be observed that Algorithm 1 enables communication nodes to maintain bidirectional communication with the minimum transmit power; Algorithm 2 allows communication nodes to adjust their transmit power irregularly after being interfered.
Figure 11, Figure 12 and Figure 13 are the heatmaps of the JSR of communication nodes in three simulation scenarios during a single run of the ICCA. The abscissa represents the serial number of communication nodes, and the ordinate denotes the number of adjustment intervals of the interferer. It can be observed that the JSR distribution of each communication node varies with location and time, but it can satisfy the scenario constraint that a certain proportion of communication nodes are under high-intensity interference and all communication nodes are under low-intensity interference at the same time. In the simulation experiment, after the communication party makes a single adjustment, the interferer, under the decision-making of the ICCA, updates or maintains the jamming power of each individual jammer in a random-order and non-networked manner. The JSR at each communication node is output and recorded in real time by the relevant program in the simulation scenario.
Figure 14, Figure 15 and Figure 16 are the line charts of the average JSR of communication nodes in three simulation scenarios during a single run of the ICCA. The abscissa represents the number of adjustment intervals of the interferer, and the ordinate denotes the average JSR of all communication nodes. It can be observed that on the basis of meeting a relatively high intensity of communication JSR, the JSR under each adjustment interval of the interferer exhibits significant fluctuations, which is a combined result of the communication party’s power adjustment strategy and the ICCA.

4. Conclusions and Future Prospects

The algorithm proposed in this paper coordinates distributed jammers via distance-interval-based decision-making in non-networked, complex electromagnetic environments, even when the jammer decision-making sequence is uncertain. It adopts a reliable communication state estimation strategy to meet the overall countermeasure requirements. Power scheduling based on the deterministic strategy of location information eliminates the redundant operations of random search and the inefficient training links of reinforcement learning. This paper proposes an interference effectiveness analysis metric, namely the Overall Communication Suppression Ratio (OCSR), which quantifies the relationship between the “sustained full-suppression duration” and the “operating duration of the jamming system”. This metric makes up for the defect that traditional metrics are not applicable to evaluating dynamic interference effectiveness in non-networked scenarios.
The simulation experiments show that, compared with traditional intelligent optimization algorithms (e.g., MADJPA), the ICCA has a stronger ability to search for feasible solutions, a faster interference decision-making speed, saves jamming power, extends the system operating time by 4.8%, and retains more battery capacity for jammers after the communication jamming system fails to achieve overall jamming.
Future research could investigate:
Estimation strategies for interference path loss in complex terrains and heterogeneous electromagnetic noise environments.
Integration of multi-agent reinforcement learning with non-networked cooperative frameworks. This would involve developing small-sample RL training strategies for distributed countermeasures under information-scarce conditions, while designing jamming-compliant cognition, estimation, and scheduling methodologies [54,55,56,57].

Author Contributions

Author contributions Z.W. proposed a design plan; W.W. and Z.Z. conducted experimental simulations; Z.W. and W.W. wrote the manuscript; J.Z. provided guidance on the experiments and did the final revision of the manuscript completed by Z.W. and W.W.; J.Z., C.L., S.Z. and H.Y. provided guidance on the experiments and carried out the final revision of the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the General Project of Shaanxi Provincial Natural Science Basic Research Program, grant number 2025JC-YBMS-730.

Data Availability Statement

The data that support the findings of this study are available in github with the [https://github.com/hellogoodstudents/ICCA (accessed on 7 January 2026)]. Other data related to this study are available from the corresponding author.

Acknowledgments

The authors would like to thank the reviewers for their valuable comments and suggestions that helped improve the quality of this manuscript.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

References

  1. Jornet, J.M.; Knightly, E.W.; Mittleman, D.M. Wireless communications sensing and security above 100 GHz. Nat. Commun. 2025, 14, 841. [Google Scholar] [CrossRef] [PubMed]
  2. Shrestha, R.; Guerboukha, H.; Fang, Z.; Knightly, E.; Mittleman, D.M. Jamming a terahertz wireless link. Nat. Commun. 2022, 13, 3045. [Google Scholar] [CrossRef]
  3. Kong, Z.; Cui, J.; Ding, L.; Huang, T.; Yan, S. Jamming precoding in AF relay-aided PLC systems with multiple eavesdroppers. Sci. Rep. 2024, 14, 8335. [Google Scholar] [CrossRef]
  4. Wang, X.; Huang, T.; Liu, Y. Resource allocation for random selection of distributed jammer towards multistatic radar system. IEEE Access 2021, 9, 29048–29055. [Google Scholar] [CrossRef]
  5. Li, S.; Liu, G.; Zhang, K.; Qian, Z.; Ding, S. DRL-Based Joint Path Planning and Jamming Power Allocation Optimization for Suppressing Netted Radar System. IEEE Signal Proc. Lett. 2023, 30, 548–552. [Google Scholar] [CrossRef]
  6. Zhang, D.; Sun, J.; Yi, W.; Yang, C.; Wei, Y. Joint Jamming Beam and Power Scheduling for Suppressing Netted Radar System. In Proceedings of the 2021 IEEE Radar Conference (RadarConf21), Atlanta, GA, USA, 7–14 May 2021; pp. 1–6. [Google Scholar]
  7. Lu, D.J.; Wang, X.; Wu, X.T.; Chen, Y. Adaptive allocation strategy for cooperatively jamming netted radar system based on improved cuckoo search algorithm. Def. Technol. 2023, 24, 285–297. [Google Scholar] [CrossRef]
  8. Xin, Q.; Xin, Z.; Chen, T. Cooperative Jamming Resource Allocation with Joint Multi-Domain Information Using Evolutionary Reinforcement Learning. Remote Sens. 2024, 16, 1955. [Google Scholar] [CrossRef]
  9. Yao, Z.; Tang, C.; Wang, C.; Shi, Q.; Yuan, N. Cooperative jamming resource allocation model and algorithm for netted radar. Electron. Lett. 2024, 58, 834–836. [Google Scholar] [CrossRef]
  10. Jin, W.-C.; Kim, K.; Choi, J.-W. Adaptive Jamming Considering Location Information Inaccuracy for Anti-UAV System. In Proceedings of the 2021 ICOIN, Jeju Island, Republic of Korea, 13–16 January 2021; pp. 480–482. [Google Scholar]
  11. Xiong, M.; Zhuo, J.; Dong, Y.; Jing, X. A layout strategy for distributed barrage jamming against underwater acoustic sensor networks. J. Mar. Sci. Eng. 2020, 8, 252. [Google Scholar] [CrossRef]
  12. Wu, Z.; Luo, Y.; Hu, S. Optimization of jamming formation of USV offboard active decoy clusters based on an improved PSO algorithm. Def. Technol. 2024, 32, 529–540. [Google Scholar] [CrossRef]
  13. Wang, H. Research on Anti-Jamming Strategy of IRS Communication Pair Under Information Uncertainty. Master’s Thesis, Nanjing University of Posts and Telecommunications, Nanjing, China, 2022. [Google Scholar]
  14. Wu, L.; Wang, W.; Ji, Z.; Yang, Y.; Cumanan, K.; Chen, G.; Dobre, O.A. UAV-assisted maritime legitimate surveillance: Joint trajectory design and power allocation. IEEE Trans. Veh. Technol. 2023, 72, 13701–13705. [Google Scholar] [CrossRef]
  15. Wei, Z.; Wu, W.; Zhan, J.; Zhang, Z. Distributed communication interference resource scheduling using the master-slave parallel scheduling genetic algorithm. Sci. Rep. 2025, 15, 3431. [Google Scholar] [CrossRef]
  16. Tang, C.; Ding, J.; Zhang, L. LEO satellite downlink distributed jamming optimization method using a non-dominated sorting genetic algorithm. Remote Sens. 2024, 16, 1006. [Google Scholar] [CrossRef]
  17. Amuru, S.; Buehrer, R.M. Optimal Jamming Against Digital Modulation. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2212–2224. [Google Scholar] [CrossRef]
  18. Yao, Z.; Liu, T.; Wang, C. Cooperative jamming resource allocation model based on the improved firefly algorithm. In Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 21–23 October 2022; pp. 1719–1724. [Google Scholar]
  19. Lin, K. Research on Communication and Jamming Integrated Resource Allocation Based on Intelligent Optimization Algorithm. Master’s Thesis, Xidian University, Xi’an, China, 2023. [Google Scholar]
  20. Wu, T.; Zou, Q.; Yang, Y.; Zhang, X.; Liu, S. A hierarchical comb interference resource allocation algorithm based on greedy strategy and evolutionary algorithm. In Proceedings of the 2022 7th ICSP, Xi’an, China, 15–17 April 2022; pp. 299–303. [Google Scholar]
  21. Kong, F. Knowledge Based Communication Jamming Decisions. Master’s Thesis, University of Electronic Science and Technology of China, Chengdu, China, 2022. [Google Scholar]
  22. Wang, S.; Yang, J.; Gao, Y.; Hu, P.; Yang, J. The future is calling. In Cognitive Electronic Warfare: The Intelligent Game in the Electromagnetic Space, 1st ed.; Science Press: Beijing, China, 2024; pp. 89–122. [Google Scholar]
  23. Sharma, P.; Sarma, K.K.; Mastorakis, N.E. Artificial Intelligence Aided Electronic Warfare Systems—Recent Trends and Evolving Applications. IEEE Access 2020, 8, 224761–224780. [Google Scholar] [CrossRef]
  24. Liu, Z.; Wang, X.; Kang, W.; Chen, Y. Research on multi-UAV collaborative electronic countermeasures effectiveness method based on CRITIC weighting and improved gray correlation analysis. AIP Adv. 2024, 14, 045340. [Google Scholar] [CrossRef]
  25. Xiang, P.; Hua, X.; Lei, J.; Yue, Z.; Ning, R.A. Dynamic Adaptive Jamming Power Allocation Method Based on Deep Reinforcement Learning. Acta Electron. Sin. 2023, 5, 1223–1234. [Google Scholar]
  26. Zhao, C.; Wang, Q.; Liu, X.; Li, C.; Shi, L. Reinforcement learning based a non-zero-sum game for secure transmission against smart jamming. Digit. Signal Process. 2021, 112, 103002. [Google Scholar] [CrossRef]
  27. Rao, N.; Xu, H.; Jiang, L.; Song, B.; Shi, Y. Allocation Algorithm of Distributed Cooperative Jamming Power Basedon Multi-Agent Deep Reinforcement Learning. Acta Electron. Sin. 2022, 6, 1319–1330. [Google Scholar]
  28. Amuru, S.; Tekin, C.; van der Schaar, M.; Buehrer, R. Jamming bandits—A novel learning method for optimal jamming. IEEE Trans. Wirel. Commun. 2015, 15, 2792–2808. [Google Scholar] [CrossRef]
  29. Zhuansun, S.; Yang, J.-A.; Liu, H.; Huang, K. A novel jamming strategy-greedy bandit. In Proceedings of the 2017 IEEE 9th ICCSN, Guangzhou, China, 6–8 May 2017; pp. 1142–1146. [Google Scholar]
  30. Zhuansun, S.; Yang, J.A.; Liu, H. An algorithm for jamming strategy using OMP and MAB. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 85. [Google Scholar] [CrossRef]
  31. Zhuansun, S.; Yang, J.; Liu, H.; Huang, K. An algorithm for jamming decision using dual reinforcement learning. J. Xi’an Jiaotong Univ. 2018, 52, 63–69. [Google Scholar]
  32. Zhou, C.; Ma, C.; Lin, Q.; Man, X.; Ying, T. Intelligent bandit learning for jamming strategy generation. Wirel. Netw. 2023, 29, 2391–2403. [Google Scholar] [CrossRef]
  33. Rao, N.; Xu, H.; Zhang, Y.; Wang, D.; Jiang, L.; Peng, X. Joint optimization of jamming link and power control in communication countermeasures: A multiagent deep reinforcement learning approach. Wirel. Commun. Mob. Com. 2022, 1, 7962686. [Google Scholar] [CrossRef]
  34. Li, X.; Cui, Q.; Zhao, B.; Zhang, X.; Jiang, B.; Tao, X. Distributed Multi-Agent Interference Coordination in Native AI Enabled Multi-Cell Networks for 6G. In Proceedings of the 2023 26th International Symposium on WPMC, Tampa, FL, USA, 19–22 November 2023; pp. 8–13. [Google Scholar]
  35. Li, F.; Xiong, J.; Zhao, X.; Zhao, H.; Wei, J.; Su, M. Wireless communications interference avoidance based on fast reinforcement learning. J. Electron. Inf. Technol. Sin. 2022, 44, 3842–3849. [Google Scholar]
  36. Niu, Y.; Wan, B.; Chen, C. A centralized multi-user anti-composite intelligent interference algorithm based on improved Q-learning. Electronics 2023, 12, 1803. [Google Scholar] [CrossRef]
  37. Verguts, T. 9 Reinforcement Learning: The Markov Decision Process Approach; MIT Press: Cambridge, MA, USA, 2021; pp. 133–152. [Google Scholar]
  38. Yang, H.; Zhang, J. Research on intelligent interference algorithm based on reinforcement learning. Electron. Meas. Technol. 2018, 41, 49–54. [Google Scholar]
  39. Andersen, M.; Hansson, A. Reinforcement Learning; Wiley: Hoboken, NJ, USA, 2023; pp. 327–349. [Google Scholar]
  40. Zhou, C.; Lin, X.; Ma, S.; Ying, T.; Man, X. Intelligent Decision-making for Selection of Communication Jamming Channel and Power. J. Electron. Inf. Technol. Sin. 2024, 46, 3957–3965. [Google Scholar]
  41. Rao, N.; Xu, H.; Qi, Z.; Song, B.; Shi, Y. Allocation method of communication interference resource based on deep reinforcement learning of maximum policy entropy. J. Northwest. Polytech. Univ. 2021, 39, 1077–1086. [Google Scholar] [CrossRef]
  42. Peng, X.; Xu, H.; Jiang, L.; Rao, N.; Song, B. A deep reinforcement learning communication jamming resource allocation algorithm fused with noise network. J. Electron. Inf. Techn. Sin. 2023, 45, 1043–1054. [Google Scholar]
  43. Ning, R.; Hu, X.; Song, B. Q-learning intelligent jamming decision algorithm based on efficient upper confidence bound variance. J. Harbin Inst. Technol. Engl. Ed. 2022, 54, 162–170. [Google Scholar]
  44. Xu, H.; Song, B.; Jiang, L.; Rao, N.; Shi, Y. An Intelligent Decision-making Algorithm for Communication Countermeasure Jamming Resource Allocation. J. Electron. Inf. Techn. Sin. 2021, 43, 3086–3095. [Google Scholar]
  45. Bailin, S.; Hux, X.; Zisen, Q.; Ning, R.; Peng, P. A Collaborative Communication Jamming Decision Algorithm Based on Deep Reinforcement Learning. Acta Electron. Sin. 2022, 50, 1301–1309. [Google Scholar]
  46. Liu, Y.; Li, X.; Yang, J.; Yang, J.; Wang, J. SANER-PPO algorithm-based jamming resource allocation for UAV swarm. Control Decis. 2024, 39, 3937–3945. [Google Scholar]
  47. Zhuansun, S. Research on Reinforcement Learning Based Communication Jamming Strategy Learning Methods. Doctoral Dissertation, National University of Defense Technology, Changsha, China, 2019. [Google Scholar]
  48. Li, X.; Chen, J.; Ling, X.; Wu, T. Deep Reinforcement Learning-Based Anti-Jamming Algorithm Using Dual Action Network. IEEE Trans. Wirel. Commun. 2023, 22, 4625–4637. [Google Scholar] [CrossRef]
  49. Jing, X.; Wang, R.; Lei, H.; Liu, H.; Chen, Q. Multi-Agent Discrete Soft Actor-Critic Algorithm-Based Multi-User Collaborative Anti-Jamming Strategy. IEEE Trans. Inf. Forensics Secur. 2025, 20, 5025–5038. [Google Scholar] [CrossRef]
  50. Li, Y.; Xu, Y.; Li, W.; Li, G.; Feng, Z.; Liu, S.; Du, J.; Li, X. Achieving Hiding and Smart Anti-Jamming Communication: A Parallel DRL Approach Against Moving Reactive Jammer. IEEE Trans. Commun. 2025, 73, 8377–8390. [Google Scholar] [CrossRef]
  51. Ma, Y.; Liu, K.; Liu, Y.; Wang, X.; Zhao, Z. An Intelligent Game-Based Anti-Jamming Solution Using Adversarial Populations for Aerial Communication Networks. IEEE Trans. Cogn. Commun. Netw. 2025, 11, 1981–1995. [Google Scholar] [CrossRef]
  52. Liu, S.; Yang, H.; Zheng, M.; Xiao, L.; Xiong, Z.; Niyato, D. UAV-Enabled Semantic Communication in Mobile Edge Computing Under Jamming Attacks: An Intelligent Resource Management Approach. IEEE Trans. Wirel. Commun. 2024, 11, 17493–17507. [Google Scholar] [CrossRef]
  53. Li, L.; Jing, X.; Lei, H.; Liang, C.; Chen, Q. Distributed Anti-Jamming Strategy Based on Local Knowledge Diffusion and Differential Weighted Fusion Mechanisms. IEEE Trans. Inf. Forensics Secur. 2025, 20, 9054–9067. [Google Scholar] [CrossRef]
  54. Wei, Z.; Zhan, J.; Han, S.; Wu, M. Introduction. In Air-Ground Joint Distributed Communication Jamming Technology and Practice, 1st ed.; National Defense Industry Press: Beijing, China, 2023; pp. 1–5. [Google Scholar]
  55. Hua, X.; Jun, W.; Lei, J. Communication Interference Technologies and Methods. In Principles and Applications of Modern Communication Countermeasures, 1st ed.; National Defense Industry Press: Beijing, China, 2022; pp. 403–411. [Google Scholar]
  56. Rao, N.; Xu, H.; Wang, D.; Qi, Z.; Zhang, Y.; Gu, W.; Peng, X. Efficient jamming resource allocation against frequency-hopping spread spectrum in WSNs with asynchronous deep reinforcement learning. IEEE Sens. J. 2024, 24, 13560–13577. [Google Scholar] [CrossRef]
  57. Rao, N.; Xu, H.; Qi, Z.; Wang, D.; Peng, X.; Jiang, L. Adaptive jamming decision-making against FHSS communications via inexpert demonstrations assisted meta reinforcement learning. IEEE Commun. Lett. 2024, 29, 105–109. [Google Scholar] [CrossRef]
Figure 1. Schematic diagram of independent dynamic resource scheduling for air–ground communication.
Figure 1. Schematic diagram of independent dynamic resource scheduling for air–ground communication.
Algorithms 19 00073 g001
Figure 2. Collaborative strategy of concentric circle interaction.
Figure 2. Collaborative strategy of concentric circle interaction.
Algorithms 19 00073 g002
Figure 3. ICCA and the countermeasure environment.
Figure 3. ICCA and the countermeasure environment.
Algorithms 19 00073 g003
Figure 4. Scenario 1.
Figure 4. Scenario 1.
Algorithms 19 00073 g004
Figure 5. Scenario 2.
Figure 5. Scenario 2.
Algorithms 19 00073 g005
Figure 6. Scenario 3.
Figure 6. Scenario 3.
Algorithms 19 00073 g006
Figure 7. Comparison of the working duration of the interference system.
Figure 7. Comparison of the working duration of the interference system.
Algorithms 19 00073 g007
Figure 8. Scenario 1: heatmap of transmit power of communication nodes.
Figure 8. Scenario 1: heatmap of transmit power of communication nodes.
Algorithms 19 00073 g008
Figure 9. Scenario 2: heatmap of transmit power of communication nodes.
Figure 9. Scenario 2: heatmap of transmit power of communication nodes.
Algorithms 19 00073 g009
Figure 10. Scenario 3: heatmap of transmit power of communication nodes.
Figure 10. Scenario 3: heatmap of transmit power of communication nodes.
Algorithms 19 00073 g010
Figure 11. Scenario 1: heatmap of JSR of communication nodes.
Figure 11. Scenario 1: heatmap of JSR of communication nodes.
Algorithms 19 00073 g011
Figure 12. Scenario 2: heatmap of JSR of communication nodes.
Figure 12. Scenario 2: heatmap of JSR of communication nodes.
Algorithms 19 00073 g012
Figure 13. Scenario 3: heatmap of JSR of communication nodes.
Figure 13. Scenario 3: heatmap of JSR of communication nodes.
Algorithms 19 00073 g013
Figure 14. Scenario 1: line chart of the average JSR of communication nodes.
Figure 14. Scenario 1: line chart of the average JSR of communication nodes.
Algorithms 19 00073 g014
Figure 15. Scenario 2: line chart of the average JSR of communication nodes.
Figure 15. Scenario 2: line chart of the average JSR of communication nodes.
Algorithms 19 00073 g015
Figure 16. Scenario 3: line chart of the average JSR of communication nodes.
Figure 16. Scenario 3: line chart of the average JSR of communication nodes.
Algorithms 19 00073 g016
Table 1. Statistics of the Number of Communication Nodes and Jammers in Simulation Scenarios.
Table 1. Statistics of the Number of Communication Nodes and Jammers in Simulation Scenarios.
Scenario 1Scenario 2Scenario 3
Airborne Communication Nodes101015
Ground Communication Nodes202020
Ground jammers82632
Airborne jammer24412
Table 2. Table of Simulation Scenario Parameter Settings.
Table 2. Table of Simulation Scenario Parameter Settings.
ProjectParameter
Maximum transmitting power of airborne communication equipment10 dBW
Antenna gain of airborne communication equipment2 dBi
Height of airborne communication equipment2000–3000 m
Maximum transmitting power of ground communication equipment13.98 dBW
Antenna gain of ground communication equipment2.5 dBi
Height of ground communication equipment10 m
Communication frequency band600 MHz
Receiving sensitivity of communication equipment−133 dBW
Communication link margin12 dB
Ambient electromagnetic noise−95–−115 dBW
Antenna gain of jammers2 dBi
Maximum jamming power of airborne jammers13 dBW
Height of airborne jammers300–2000 m
Maximum jamming power of ground jammers16 dBW
Height of ground jammers3 m
Planar area of the simulation scenario50 km × 50 km
Attenuation of cables and cable connectors
at the communication receiving end
1 dB
Environmental factor for line-of-sight propagation3
Environmental factor for two-ray propagation3
The jamming-to-signal ratio when the communication quality deteriorates k j 2 1.76 dB [16]
The jamming-to-signal ratio for communication interference suppression k j 4.77 dB [54]
Maximum battery power limit required for normal jamming0.95
Operating voltage of jammer batteries24 V
Battery capacity of airborne jammers12 AH
Battery capacity of ground jammers20 AH
Energy consumption of other functions of jammers4 W
Minimum distance between jammers and communication equipment500 m
Time limit for the first decision of intelligent optimization algorithms10 s
Time limit for non-first interference decision1 s
Communication state adjustment interval90 s
Angle Recognition Accuracy of Communication Nodes0.3 degrees
Tier X in scenario 13
Tier X in scenario 22
Tier X in scenario 35
The proportion of communication nodes that are disturbed R j 0.9
The minimum distance between jammers and communication nodes [27]500 m
The flexible update coefficient of MADJPA [27]0.01
The number of training episodes of MADJPA [27]5000
The number of interactions per episode of MADJPA [27]500
The capacity of the experience replay buffer of MADJPA [27]217
The discount factor of MADJPA [27]0.98
The initial value of the entropy coefficient of MADJPA [27]1
Fixed random number seed for Scenario 1 of MADJPA36
Fixed random number seed for Scenario 2 of MADJPA46
Fixed random number seed for Scenario 3 of MADJPA40
The commit hash of the ICCA code4a4c29994211a1
e2109bad2f2a75
a9f670634164
Fixed random number seed for Scenario 1 of ICCA36
Fixed random number seed for Scenario 2 of ICCA46
Fixed random number seed for Scenario 3 of ICCA40
Random number generation moduleNumPy’s numpy.random submodule
Threshold for airborne jammers targeting air–ground communication objectives[2.8, 5.2, 7.8, 10.4, 15, 20] km
Threshold for ground jammers targeting ground communication objectives[1.7, 3, 4.5, 6, 10, 16] km
Threshold for ground jammers targeting airborne communication objectives[3.1, 6.2, 9.3, 12.4, 15, 20] km
Tier X in scenario 1 of ICCA3
Tier X in scenario 2 of ICCA2
Tier X in scenario 3 of ICCA5
Table 3. Comparison of the Algorithm Results.
Table 3. Comparison of the Algorithm Results.
AlgorithmICCAFPJAMADJPASRSAGA
Indicator
Scenario 1Training time (95% CI) NoneNone1.67 ± 0.44 sNoneNone
Time for each decision (95% CI)64.2 ± 9.8 ms10.2 ± 1.4 ms40.3 ± 14 msNoneNone
Operation duration of system (95% CI) 11.6 ± 0.7 h10.4 ± 0 h0.02 ± 0.02 hNoneNone
OCSR (95% CI)0.16 ± 0.121 ± 00.92 ± 0.27NoneNone
Scenario 2Training time (95% CI) NoneNone1.73 ± 0.35 sNoneNone
Time for each decision (95% CI)92.2 ± 11.2 ms8.8 ± 1.6 msNoneNoneNone
Operation duration of system (95% CI) 11.1 ± 0.4 h10.4 ± 0 hNoneNoneNone
OCSR (95% CI)0 ± 0.041 ± 0NoneNoneNone
Scenario 3Training time (95% CI) NoneNone1.79 ± 0.31 sNoneNone
Time for each decision (95% CI)112.6 ± 13.5 ms9.71 ± 1.8 msNoneNoneNone
Operation duration of system (95% CI) 10.9 ± 0.4 h10.4 ± 0 hNoneNoneNone
OCSR (95% CI)0.05 ± 0.031 ± 0NoneNoneNone
The bold text in the table indicates the comparative data of the algorithms.
Table 4. Comparison of Remaining Power Status of Communication Jammers.
Table 4. Comparison of Remaining Power Status of Communication Jammers.
AlgorithmICCAFPJA
Indicator
Scenario 1Ground jammer max14 AH0 AH
Ground jammer mean5.37 ± 3.67 AH0 ± 0 AH
Ground jammer failure ratio0.18 1
Air jammer max4.55 AH1.16 AH
Air jammer mean1.19 ± 1.27 AH1.16 ± 0 AH
Air jammer failure ratio0.1 0
Scenario 2Ground jammer max15.89 AH0 AH
Ground jammer mean6.6 ± 6.3 AH0 ± 0 AH
Ground jammer failure ratio0.161
Air jammer max9.83 AH1.16 AH
Air jammer mean6.6 ± 4.9 AH1.16 ± 0 AH
Air jammer failure ratio00
Scenario 3Ground jammer max17.8 AH0 AH
Ground jammer mean5.5 ± 4.9 AH0 ± 0 AH
Ground jammer failure ratio0.151
Air jammer max5.2 AH1.16 AH
Air jammer mean1.1 ± 1.2 AH1.16 ± 0 AH
Air jammer failure ratio00
The bold text in the table indicates the comparative data of the algorithms.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wu, W.; Wei, Z.; You, H.; Zhang, Z.; Li, C.; Zhan, J.; Zhao, S. ICCA: Independent Multi-Agent Algorithm for Distributed Jamming Scheduling. Algorithms 2026, 19, 73. https://doi.org/10.3390/a19010073

AMA Style

Wu W, Wei Z, You H, Zhang Z, Li C, Zhan J, Zhao S. ICCA: Independent Multi-Agent Algorithm for Distributed Jamming Scheduling. Algorithms. 2026; 19(1):73. https://doi.org/10.3390/a19010073

Chicago/Turabian Style

Wu, Wenpeng, Zhenhua Wei, Haiyang You, Zhaoguang Zhang, Chenxi Li, Jianwei Zhan, and Shan Zhao. 2026. "ICCA: Independent Multi-Agent Algorithm for Distributed Jamming Scheduling" Algorithms 19, no. 1: 73. https://doi.org/10.3390/a19010073

APA Style

Wu, W., Wei, Z., You, H., Zhang, Z., Li, C., Zhan, J., & Zhao, S. (2026). ICCA: Independent Multi-Agent Algorithm for Distributed Jamming Scheduling. Algorithms, 19(1), 73. https://doi.org/10.3390/a19010073

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop