1. Introduction
Collective systems, which demonstrate intricate collective behavior through local interactions among a substantial number of relatively elementary individuals, have been the subject of considerable interest in interdisciplinary research for some time. The phenomenon of self-organization and emergence [
1,
2] is at the core of their appeal. In this process, simple rules governing interactions between individuals can spontaneously generate macroscopic ordered structures and functions, thus circumventing the necessity of global control or predefined blueprints. The modeling of collective systems is imperative for comprehending their fundamental mechanisms and for the subsequent design of application systems. In preliminary studies, Reynolds’ [
3] Boids model effectively replicated the flight behavior of bird flocks by employing three fundamental rules: separation, alignment, and aggregation. That model established the theoretical foundation for collective system modeling, with subsequent studies building upon and refining it [
4]. Vicsek [
5,
6] and others proposed models focusing on the alignment and phase transition phenomena of self-driven particles under noise influence. This transition from a disordered state to a collective alignment state can be conceptualized as a phase transition in a non-equilibrium system, which can be interpreted as spontaneous symmetry breaking [
7]. Jadbabaie [
8] and others explained the behavior observed in the Vicsek model and found that moving autonomous agents could achieve coordination through nearest-neighbor rules without centralized coordination. Additionally, they proposed the seminal leader–follower protocol [
9], which provides a theoretical analysis of alignment and consensus issues in the context of changing network topologies. The emergent behavior exhibited by these models bears a striking resemblance to that observed in other self-organizing systems within the fields of physics and mathematics. To illustrate, within the Kuramoto model, which consists of coupled oscillators, the occurrence of symmetry and symmetry-breaking phenomena can also be observed. Synchronized oscillator clusters have been observed to exhibit one of three distinct states: consensus, polarization, or fragmentation. These states bear a striking resemblance to the formation process of opinion clusters in sociophysical models, such as equality (symmetry) and majority (symmetry breaking) [
10]. Its symmetry breaking is a spontaneous mode formation in phase space based on the relative phase relations between oscillators. In the model proposed by Couzin et al. [
11], individuals attempt to maintain the minimum distance from other individuals (regional repulsion). In the absence of avoidance behaviors, these individuals tend to be attracted to and align with others, a phenomenon known as regional attraction and regional orientation. It was demonstrated that heterogeneous stratification could emerge spontaneously through differences in individual interaction regions. However, this stratification was essentially a mechanical spatial ordering based on individual parameter differences and lacked explicit functional role assignment. Subsequently, Olfati-Saber [
12,
13] and others advanced a rigorous mathematical framework, proposing swarm algorithms that encompassed leader following, obstacle avoidance, and formation control. They explored the role of collective potential energy in shaping group behavior and analyzed its convergence and stability. While that rigorous framework supported a synergistic response by the group, this usually implied a holistic maneuver by the entire formation. Lennard-Jones [
14] addressed the problem of molecular fields using the state equation of gases, demonstrating that many gases could be explained by assuming that both the repulsive and attractive components of molecular fields followed a power-law relationship with distance. These classical models established a substantial foundation for subsequent studies of more complex behaviors. Recent studies have focused on mechanisms generating layered structures through drift–diffusion interactions. For instance, Auricchio et al. [
15] proposed a nonlocal Fokker–Planck-type model employing nonlocal, discontinuous drift while maintaining constant diffusion. That model explicitly computed quasi-steady-state distributions, proving the existence, uniqueness, and positivity of global solutions while providing precise convergence rates and numerical validation. Another study [
16] investigates a class of Fokker–Planck models featuring linear drift and time-dependent diffusion coefficients. It demonstrates the emergence of layered structures through drift–diffusion interactions, providing asymptotic analysis and numerical results.
In the domain of swarm intelligence applications, swarm-based offensive and defensive strategies have emerged as a prominent research focus. Researchers are dedicated to exploring how groups can effectively collaborate, protect themselves, or safeguard critical assets when facing hostile targets or complex threats. A comprehensive exploration of cooperative defense strategies, pursuit–evasion game models, and group-versus-group combat algorithms has been conducted. In their seminal work, Ran et al. [
17] advanced a decentralized multi-agent coordination design method based on bee swarm intelligence. This pioneering approach facilitated autonomous collaboration among drone swarms in electronic defense scenarios. Chipade et al. [
18] proposed a multi-modal solution to defend a circular protection zone against widespread attacks from a group of risk-taking and risk-averse attackers. Shahid et al. [
19] explored the offensive and defensive decision-making issues between drone swarms when attacking aircraft carriers in open seas. In their seminal work, Zhang et al. [
20] advanced a multi-agent, multi-level distributed defense system design for the collaborative defense tasks of multiple unmanned surface vessels. Alqudsi et al. [
21] have highlighted recent advancements in the coordinated control of swarm flying robots, noting that distributed systems can rapidly respond to environmental changes through local advantages, a characteristic that is particularly important in large-scale swarm systems. Furthermore, to address the decision-making challenges inherent in swarm-based conflicts, researchers have developed novel algorithmic frameworks to address complex decision-making problems in offensive–defensive scenarios [
22]. The implementation of these defensive strategies is contingent upon the formation and maintenance of specific functional formations in space, with symmetry playing a pivotal role in this process [
23]. For instance, formations surrounding high-value assets inherently manifest circular symmetry [
24]. In recent years, research in the field of engineering has yielded the development of distributed algorithms capable of achieving symmetrical pattern formation without the necessity of a global planner. A two-stage paradigm, designated SymSwarm, facilitates the formation of a symmetrical formation around a central point within a specified area by a swarm of mobile robots through distributed communication. This method exhibits resilience to the presence of obstacles in the environment [
25]. This engineering implementation is not merely theoretical; rather, it reflects evolutionary selection in nature. The V-shaped symmetrical formation formed by flocks of geese during flight is an efficient pattern that emerges when individuals follow local rules under the constraint of a limited field of view [
26]. Consequently, the construction of symmetrical formations in engineering systems can be regarded as an effective design principle that draws inspiration from biological principles to achieve robustness.
In group-based adversarial scenarios, individual heterogeneity is a critical factor that cannot be overlooked. Heterogeneous groups, composed of individuals with differing abilities, resources, roles, or behavioral preferences, often exhibit greater adaptability and task performance capabilities than homogeneous groups [
27]. Gao et al. [
28] contemplated heterogeneous teams with numerical and resilience advantages (e.g., differing individual health points) in UGV cluster conflicts and formulated corresponding conflict algorithms using MARL. Zhen et al. [
29] developed a collaborative target allocation algorithm for heterogeneous UAV clusters in task allocation, with the objective of optimizing multiple metrics, including flight distance, time, target survival rate, and load balancing. Xue et al. [
30] designed a smooth, bounded mixed potential energy function with uncertain parameters to study the effects of individual and group differences (such as sensing radius, force, obstacle avoidance, and tracking capabilities) on swarm and obstacle avoidance movements. They also explored the potential of “highly influential” mutants as leaders. Wei [
31] took into consideration the differences in social distances between individuals, divided the group into multiple sub-groups, and designed a multi-virtual leader swarm algorithm to address collision and obstacle avoidance problems from a differential game theory perspective. Heterogeneous drone swarms exhibit distinctive advantages in leader–follower formations, wherein leader drones can land and traverse complex terrain while concurrently functioning as both aerial and ground robots [
32]. In heterogeneous target capture tasks, homogeneous robot swarms exhibit robust, flexible, and scalable performance through adaptive density interaction mechanisms [
33]. Heterogeneous swarms demonstrate distinct advantages in defense applications due to their capacity to more effectively adapt to complex tasks and environments. Kaminka et al. [
34] demonstrated through a generalized fully cooperative game model that heterogeneous foraging groups could achieve better performance through adaptive role differentiation. Furthermore, in the context of resource allocation problems, such as spectrum sharing, heterogeneous multi-agent deep reinforcement learning algorithms have demonstrated potential in addressing complex group coordination issues [
35]. These studies provide important theoretical foundations for designing more flexible and efficient heterogeneous group defense systems.
Another concept closely related to group defense is risk perception and spatial positioning. The “Selfish Herd Theory” in ecology, proposed by W. D. Hamilton in 1971 [
36], suggests that individuals within a group tend to minimize their own risk of predation by moving to safer locations, such as the center of the group. This results in a higher exposure to threats for individuals on the periphery [
37]. This self-organizing process, driven by individual risk-avoidance behavior, gives rise to efficient collective defense structures in nature. To illustrate, in flocks of starlings, bird density in the peripheral regions is often greater than in the central regions, forming a structure with a dense outer layer and a relatively loose inner layer [
38]. As indicated by the extant literature, birds located at the periphery of a group demonstrate heightened vigilance and tend to reposition themselves to reduce risk [
39]. This structural element not only facilitates coordination among individuals but, more crucially, enables rapid internal information transmission, manifesting wave propagation phenomena [
40]. Consequently, the group can respond promptly and consistently to external stimuli (e.g., predators). The transmission of information in an efficient manner, coupled with a hierarchical structure, offers significant insights that are instrumental in the design of robust group defense systems. In recent years, there has been notable progress in the field of research on the subject of selfish herd theory. Yang et al. [
41] found that the physical performance of individuals in crowded selfish herds affects their adaptability, and group movement becomes the ultimate effect of crowded selfish herds. This theoretical development provides a novel framework for understanding the intricate relationship between individual behavior and collective emergence within a group. Intriguingly, this biological defense mechanism finds a compelling analogy in physics, specifically the skin effect [
42,
43,
44,
45]. This effect describes the phenomenon in which high-frequency alternating current primarily flows along the surface of a conductor, resulting in a reduction in current density in the core region of the conductor. This core region is, to a certain degree, “protected” from the impact of external strong currents. Whether it is the layered structure of starlings or the skin effect in conductors, their essence is to achieve effective protection of the interior by forming a heterogeneous structure where the outer layer bears the pressure and the core is protected. These phenomena are not merely simple analogies but can be unified under the physical realization of symmetry breaking. These phenomena exemplify a fundamental engineering principle: the exploitation of symmetry breaking. Systems have been observed to spontaneously transition from a high-symmetry state to a low-symmetry yet functionally superior structure under the influence of external pressure or internal heterogeneity [
46]. In recent years, this principle has been explicitly applied to the domain of engineering design. In the domain of soft robotics, for instance, researchers have employed the buckling of actuators under pressure (a manifestation of symmetry breaking) to achieve complex hand manipulation with minimal control inputs [
47]. In this context, symmetry breaking is no longer regarded as a defect to be corrected; rather, it is recognized as a fundamental characteristic that can be harnessed and utilized.
Despite the substantial advancements in the field of group systems modeling, existing research exhibits notable deficiencies in the design of defense mechanisms. A significant number of models prioritize homogeneous groups or heterogeneous groups with predefined roles, while comparatively less attention is devoted to spontaneous functional differentiation driven by differences in individual intrinsic attributes. Moreover, traditional aggregation models based on simple attraction–repulsion rules, while capable of forming groups, often have defense formations that are easily breached when faced with organized invasions. Recent research has further underscored the significance of enhancing the operational resilience of group systems, particularly in dynamic environments where systems necessitate greater adaptability and robustness [
48]. The objective of this paper is to draw inspiration from the behaviors of biological groups and the physical skin effect, in conjunction with symmetry theory, to propose a heterogeneous group defense model based on symmetry-breaking mechanisms. This model utilizes individuals’ risk aversion levels or safety needs (parameterized by the safety radius
d) as the fundamental source of heterogeneity, thereby driving the spontaneous formation of a layered defense system that protects the core region under symmetry constraints. In the event of a threat, the system undergoes a transition from a radially symmetric state to a directional defense state. This design offers a novel modeling approach for heterogeneous group defense and aligns with ecological principles, such as the “selfish herd theory,” in terms of outcomes. Specifically, the core region becomes safer due to the “buffer” provided by the outer layers. The primary contributions of this paper are as follows.
- (1)
A theoretical framework for fast, controllable, and radially symmetric spontaneous hierarchical defense structures with a clear functional division of labor in heterogeneous groups using explicit radial forces inspired by a form of physical skinning effect;
- (2)
A threat response model based on symmetry-breaking mechanisms is proposed, enabling an intelligent transition from passive sensing to active countermeasures.
- (3)
A dynamic adaptive barrier defense strategy is developed, enabling the group to perceive and analyze threat characteristics and to dynamically adjust the scale, position, and intensity of the defense barrier accordingly.
- (4)
The efficacy of the proposed method is systematically substantiated through a series of simulation experiments. These experiments demonstrate the method’s capacity to form stable structures and achieve intelligent defense. Consequently, these experiments reveal the emergent defense mechanisms underlying the model.
3. Simulation Experiments and Analysis of Results
The objective of this section is to validate the effectiveness of the proposed heterogeneous-group adaptive-defense model based on symmetry breaking and skin effect. To this end, a series of simulation experiments were designed and conducted to analyze the model’s radial symmetry self-organizing layering capability, symmetry-breaking threat response mechanism, and dynamic barrier defense efficacy. The simulation environment was developed on the MATLAB R2016b platform, which offers a user-friendly programming environment and visualization tools for modeling and simulating multi-agent systems. The configuration of the simulation’s fundamental parameters exerts a substantial influence on the model’s operational dynamics and the ensuing outcomes.
Table 1 presents a comprehensive list of the primary simulation parameters employed in this study.
The simulation environment was set in a two-dimensional plane, comprising a defensive group constructed using this model and an adversarial group using a traditional attraction–repulsion model as the threat group. The defensive group consisted of 126 individuals, with clear heterogeneity within it, specifically divided into three functional categories: the population under consideration was comprised of 12 individuals occupying the inner core (safety radius ), 52 individuals occupying the middle layer (), and 62 individuals occupying the outer layer (). For visual representation, the three categories of individuals are represented by triangles in shades of red, ranging from dark to light. The opposing threat group consisted of 126 homogeneous individuals, uniformly represented by blue triangles. The connecting lines drawn between any two individuals in the figure indicate that they are within each other’s communication perception radius and can exchange information effectively. In the initial stage, the virtual leaders of the defense and threat groups (denoted by red and blue “o” symbols, respectively) were positioned on the left and right sides, ensuring sufficient safety distance between them to complete initial internal aggregation and stabilization. Consequently, the threat group, under the guidance of its virtual leader, initiated an attack on the defense group, simulating an invasion process.
Simulation 1: Validation of Radial Symmetry Self-Organization and Layering Capabilities Driven by the Skin Effect. This simulation verified if a defensive group could spontaneously form a predefined, stable, radially symmetric, multilayer structure based solely on internal rules, without external interference.
Figure 2 shows the group evolution process, demonstrating the establishment of an ordered, symmetrical structure from a disordered state:
Figure 2a: Initial random state (step = 0). The system is in its lowest symmetry state. Individuals are randomly distributed, and there is no obvious geometric symmetry;
Figure 2b: Symmetry emergence stage (step = 30). Under the strong influence of virtual leader interaction forces, the system begins to converge toward a radially symmetric state. Individuals cluster around the center and establish an initial centrally symmetric geometric structure;
Figure 2c: Symmetry refinement stage (step = 60). At this point, skin effect and damping forces begin to dominate. Individuals of different types move toward their respective target ring layers based on their heterogeneity parameters (safety radius:
), and the system’s radial symmetry gradually refines;
Figure 2d: Stable radial-symmetry layered structure (step = 100). After sufficient self-organization evolution, the system converges to a macroscopically ordered, structurally stable, three-layer, radial-symmetry structure. The individuals in the inner, middle, and outer layers, respectively, aggregate near the predefined target radii
,
,
, and their radial density distributions are highly consistent with the theoretical design.
This result strongly confirms that the model can achieve robust, spontaneous, radial-symmetry stratification through individual heterogeneity (i.e., different safety radii, ) and local interaction rules. This lays the structural foundation for subsequent defensive functions.
To address the model’s sensitivity to parameter variations and ensure reproducibility, we conducted systematic robustness tests on two critical parameters: safety radius () and skin force scale (). We evaluated model performance using two metrics: the Layering Quality Index (LQI), representing the proportion of agents correctly positioned within their target layer bands (), and the Convergence Time (CT), denoting the number of iterations required to achieve LQI .
As shown in
Figure 3a, the model exhibits asymmetric robustness: for
, the LQI stays above 0.94 with accelerated convergence (42–80 iterations); for
, we observe gradual performance degradation (LQI
, CT
); and for
, there is a partial structural collapse (LQI
), indicating the upper robustness boundary. This asymmetry aligns with biological defense principles—tighter formations enhance collective protection, while excessive dispersion compromises structural integrity.
Figure 3b demonstrates remarkable stability across
: the LQI remains stable (0.94–0.95) throughout the range; the CT varies smoothly (48–78 iterations) without anomalies; the consistent performance confirms that skin force primarily affects convergence dynamics rather than final structure quality.
The analysis reveals a robust operational range for , ; an optimal performance zone for with baseline ; and a critical threshold for , which risks structural instability.
Simulation 2: A thorough examination of the failure process of the threat response in traditional aggregation models is imperative to ensure the efficacy of these models. The objective of this simulation was to examine the dynamic process of heterogeneous groups defending against invasive threats in the absence of skin effect and adaptive barrier logic, relying exclusively on fundamental attraction–repulsion rules.
Table 2 lists the primary simulation parameters for defending against groups using the traditional clustering model. The parameters for the adversarial threat group model were identical to those used in subsequent simulations 3 and 5.
The simulation results are displayed in
Figure 4.
Figure 4a: Initial Aggregation Stage (Step = 100). In the early stages of the simulation, the defensive group and the threat group each follow their internal attraction–repulsion rules to self-organize and aggregate within their predefined initial regions, forming relatively stable initial cluster structures. However, due to the absence of radial symmetry constraints, individual distributions exhibit unevenness.
Figure 4b: Initial Invasion Stage (Step = 150). If the threat group instigates an incursion against the defense group, the defense group manifests evident deficiencies. The absence of effective long-range perception and coordination mechanisms leads to a limitation in the capacity of defense individuals to respond to threats. Specifically, they are only able to respond with localized repulsion reactions to threat targets within their perception range. This limitation precludes the possibility of coordinating a unified response to the threat.
Figure 4c: Formation, Penetration, and Structural Collapse Stage (Step = 180). As the threat continues to advance, the structural weaknesses of the defensive formation become evident. The threat group employs a wedge-shaped breakthrough strategy, leveraging the outer weak areas with larger intervals between defensive individuals, also known as formation gaps. Concurrently, the defensive group’s original aggregated structure is gradually eroded and dismantled through sustained local pushing, destroying its overall integrity.
Figure 4d: Defense Collapse and Core Exposure Stage (Step = 200). In the event of a successful penetration of the outer defense, the core individuals inside are directly exposed to the threat due to the loss of outer protection. At this juncture, the defensive structure rapidly disintegrates, connections among individuals become ineffective, and the group is unable to maintain any viable defensive formation.
Simulation 3: The process of adaptive barrier defense is driven by symmetry breaking. In order to provide a comprehensive demonstration and analysis of the adaptive capabilities of the model in response to threats, a key simulation was conducted. The results of that simulation revealed a complete defense chain, ranging from macro behavior to micro decision-making. As illustrated in
Figure 5, the simulation demonstrated the complete process of symmetry breaking and functional emergence from a macro perspective.
Figure 5a illustrates a symmetrical equilibrium state (step = 100). The defense and threat groups complete their internal self-organization at their predefined positions. The defense system has been configured into a stable, radially symmetric, three-layer, hierarchical structure that satisfies continuous rotational symmetry, with defense strength uniformly distributed in all directions.
Figure 5b presents a detailed analysis of the symmetry-breaking trigger (step = 120). As the threat group approaches, it enters the perception range of the outer layer of the defense group. The alarm information (illustrated in a deep red) rapidly saturates and propagates within the defense network. The rapid propagation of threat perception information disrupts the rotational symmetry of the system, thereby introducing a specific spatial directionality (threat direction
), marking the onset of spontaneous symmetry breaking.
Figure 5c shows the ordered symmetry breaking (step = 150). Upon the attainment of the barrier formation threshold by the perception ratio, individuals residing within the outer layer who have discerned the imminent threat undergo activation as barrier individuals. In the presence of tangential forces and radial skin forces, the subjects exhibit rapid movement and aggregation toward the periphery of the group, aligning with the direction of the threatening group’s approach. This results in the formation of an arc-shaped, locally high-density defensive barrier. The system transitions from symmetry to directional symmetry about the threat direction axis.
Figure 5d presents a detailed examination of the symmetry-breaking steady state (step = 180). When the vanguard of the threat group comes sufficiently close to the defensive barrier, strong repulsive forces arise between barrier individuals and threat individuals. It is evident that the barrier’s robust nature, in conjunction with the threat group’s aggregation characteristics, renders it impenetrable to a frontal assault. The system establishes a stable asymmetric defensive structure along the threat direction, achieving a phase transition from passive radial symmetry to active directed defense.
Figure 5e: threat bypass, core protected (step = 210). The asymmetric structure, consequent to symmetry breaking, effectively realizes the anticipated defensive function. The obstructed threat group is compelled to modify its overall movement trajectory, diverting and bypassing the defensive barrier from its flanks. During the confrontation process, the inner and middle core structures of the defensive side remain virtually undisturbed, thereby achieving the primary objective of protecting the core.
To address the need for objective measurement of the model’s effectiveness, we introduce four quantitative metrics to evaluate the adaptive barrier defense mechanism. The defense success rate (DSR) is the proportion of simulation steps where the threat group is successfully prevented from entering the core defense area, defined as , where is the number of steps without core intrusion, and is the total simulation steps. The core area intrusion probability (CAIP) represents the probability of threat agents penetrating the innermost defense layer, calculated as , where counts the steps with at least one threat agent within the core radius. The defense resource utilization rate (DRUR) is the ratio of actively defending agents to total defense agents, expressed as , where represents agents that have perceived threats and positioned themselves within of the threat direction. The threat detour time (TDT) denotes the average time interval between forced path changes of the threat group, computed as , where is the angular change in threat velocity at step i, and I is an indicator function.
Figure 6 presents the temporal evolution of these four metrics during the adaptive barrier defense process. The results demonstrate exceptional defensive performance.
Figure 6a shows that the defense success rate stays at 100% throughout the simulation.
Figure 6b illustrates the core area intrusion probability remains at 0%.
Figure 6c shows that the defense resource utilization has three distinct phases: dormant (0–50 s), activation (50–100 s), and stabilization (100–200 s). In
Figure 6d, the threat detour time increases progressively, indicating growing barrier effectiveness. The DSR (100%) and zero CAIP throughout the simulation validate the model’s core objective of protecting the innermost layer. These metrics confirm that no threat agent successfully penetrated the core defense zone, demonstrating the robustness of the adaptive barrier mechanism. The progressive increase in TDT from 0 to 20 steps reveals another critical aspect of the defense strategy. As the barrier solidifies and adapts to threat movements, it forces the attacking group to change direction more frequently, effectively increasing the “cost” of attempting penetration. This metric quantifies the barrier’s deterrent effect beyond simple blocking. Notably, the DRUR stabilization at 55% rather than 100% reflects an important design principle: efficient defense does not require total mobilization. The model achieves complete protection (DSR = 100%) while utilizing only essential resources, demonstrating both effectiveness and efficiency. This partial activation strategy maintains reserve capacity for potential multi-directional threats while minimizing energy expenditure. These quantitative results provide objective evidence that the proposed symmetry-breaking mechanism successfully transforms a passive, symmetric structure into an active, adaptive defense system.
In order to gain a more profound understanding of the underlying mechanisms driving the aforementioned macro-level behaviors, a quantitative analysis of the key adaptive parameters in the simulation process was conducted. As demonstrated in
Figure 7, this analysis meticulously delineated a causal sequence of “perception-decision-action”:
Figure 7a shows that the number of threats perceived by the defense cluster increases as engagement distance decreases. In
Figure 7b, the perceived compactness of the threat cluster remains consistently high, indicating a concentrated attack formation. Collectively, these two metrics form the defensive party’s quantitative assessment of the current threat landscape.
Figure 7c shows the adaptive repulsive force scaling factor—a key defense decision parameter—exhibiting a positive correlation with perceived threat intensity. The repulsion scaling factor grows linearly. This indicates the physical resistance strength of the defensive barrier dynamically intensifies according to threat severity.
Figure 7d represents the number of barrier factors deployed for defensive actions, rapidly scaling to the necessary level determined by the adaptive barrier ratio. This demonstrates that the scale of defensive resource allocation is precisely regulated based on threat levels.
This simulation demonstrates the macro-level effectiveness of the defense model and reveals the underlying logic of its adaptive capabilities. This phenomenon elucidates a lucid and explicable decision-making process, whereby a more substantial threat (i.e., a greater number of concentrated forces) invariably precipitates a more robust defense response (i.e., augmented repulsive force and more substantial barriers), thereby ensuring the efficient utilization of resources and the maximization of defense efficacy.
Simulation 4: Symmetry quantification analysis verification. To quantitatively verify the symmetry characteristics of the model, we introduced an improved radial distribution symmetry index
. This index was defined as the weighted sum of the radial symmetry index
and the angular symmetry index
:
where
and
are the weighting coefficients for radial and angular symmetry, respectively, satisfying
. The radial symmetry
was calculated based on the coefficient of variation of the radial distance, defined as:
where
is a positive sensitivity factor used to adjust the extent to which the exponential function responds to the dispersion of the radial distribution.
The angular symmetry
was calculated based on the variance of angular intervals:
The simulation results are illustrated in
Figure 8, with the four subfigures demonstrating various aspects of the symmetry analysis.
Figure 8a illustrates the dynamic evolution of the radial symmetry of the defensive group. The figure illustrates the temporal evolution of the comprehensive symmetry index of the defensive group. The red solid line signifies the gradual increase in the comprehensive symmetry index from an initial low level to a high symmetry state. This increase is followed by a decline at a specific time point, after which the index remains at a relatively stable level. The black dashed line functions as a baseline symmetry reference line, thereby establishing a standard for comparison. The regions demarcated by dense orange circles correspond to symmetry-breaking phases, which are concentrated during the period when the system perceives threats and begins to respond.
Figure 8b presents a decomposition of radial and angular symmetry. This figure separately displays the contributions of radial symmetry and angular symmetry, thereby revealing the fundamental mechanisms underlying barrier formation. The blue solid line (radial symmetry) remains at a high and relatively stable level throughout the process, indicating that the integrity of the layered structure is maintained. The green solid line (angular symmetry) rapidly rises from a low level to a high symmetry state, then undergoes a significant decline at a critical time point and remains at a markedly reduced level. The red dashed line (combined symmetry) reflects the weighted combined effect of the two. This finding indicates a substantial decline in angular symmetry, while radial symmetry maintains stability or exhibits a modest increase, thereby substantiating the theoretical prediction that barrier formation predominantly occurs through the modulation of angular distribution, while preserving the integrity of the layered structure.
Figure 8c displays the relationship between symmetry breaking and threat perception. This figure substantiates the causal relationship between symmetry breaking and threat perception. The red line (left axis) indicates the trajectory of changes in the symmetry index, while the blue line (right axis) displays the abrupt transition in the proportion of threat perception, jumping suddenly from the zero baseline to a state close to full value. The findings demonstrate a complete synchronization between symmetry breaking and threat perception, thereby substantiating the causal relationship “threat perception → symmetry breaking” and validating the sensitivity and immediacy of the system’s response.
Figure 8d presents a comparison of symmetry statistics at different stages. This figure provides a quantitative comparison of the symmetry characteristics between the normal stage and the breaking stage. In the normal stage, all three symmetry indices (radial, angular, and comprehensive) remain at elevated levels and are closely aligned. In the breaking stage, radial symmetry remains at a high level, angular symmetry significantly decreases, and comprehensive symmetry lies between the two.
The present study employed a symmetry quantification analysis to successfully verify the phase transition process of the system from continuous rotational symmetry to directional defense. The substantial decline in angular symmetry, concomitant with the consistent preservation of radial symmetry, mirrors the theoretically postulated barrier formation mechanism. This mechanism posits that the system can attain directional defense functionality by modulating the uniformity of angular distribution while preserving the integrity of its fundamental layered structure. This finding not only substantiates the viability of symmetry theory in the context of collective defense but also unveils the underlying mathematical principles that underpin efficient defense systems.
Simulation 5: A thorough examination of the adaptive barrier defense process in response to alterations in threat groups was conducted. The objective of that simulation was to verify the core adaptive capability of the proposed model more intuitively. Specifically, the simulation assessed whether the defense barrier could track and respond to dynamic changes in threat vectors in real time. The ensuing discussion focuses on the simulation process and its subsequent outcomes, as illustrated in
Figure 9:
Figure 9a illustrates a symmetrical equilibrium state (step = 100). The defense side has formed a stable, radially symmetrical layered structure, and the threat side has begun to move toward it.
Figure 9b illustrates the process of symmetry breaking and barrier pre-formation (step = 130). Upon entering the perception range of outer-layer individuals, threat information disseminates rapidly within the group (individuals perceiving the threat darken in color). Individuals in the outer layer initiate tangential maneuvers in the direction of the perceived threat, leading to local symmetry breaking in the angle of the barrier formation along the initial threat direction.
Figure 9c shows the threat turn and barrier repositioning (step = 160). The threat group has undergone a substantial shift in its operational trajectory, guided under the direction of its virtual leader. In response, the individuals forming the defensive barrier reposition themselves almost simultaneously, ensuring that the geometric center and orientation of the entire barrier remain aligned with the latest threat direction.
Figure 9d displays the new directional symmetry state (step = 180). In the event that the threat group, having altered its trajectory, initiates another offensive, the barrier, which has been repositioned, comes into direct contact with it. The system effectively establishes a stable directional defensive structure in the new threat direction. The robust, regulated repulsive forces among individuals are once again in effect, effectively impeding the threat’s penetration.
Figure 9e shows successful defense (step = 210). Confronted with this formidable obstacle, the insurgent group is compelled to divide its forces and undertake an attempt to circumvent the defensive line from the flanks. During that process, the defensive barrier demonstrates significant elasticity and morphological adaptability, continuously dynamically fine-tuning its shape and position in response to the threat’s movement, consistently blocking the threat outside the core area, and completing the defensive task. The system’s efficacy is confirmed by the robust performance of its symmetric dynamic regulation.
As demonstrated by simulation 5, the model possesses the capability of achieving self-organizing layering stably. Furthermore, the model was shown to possess the capability of dynamically adjusting the deployment of defense resources in response to real-time threat information when faced with an intrusion. This results in the formation of an accurate and effective defense barrier that effectively prevents penetration of the core area and maintains the integrity of its structure.