Next Article in Journal
An Efficient Drogue Detection Algorithm for Unmanned Aerial Vehicle Autonomous Refueling Docking Phase
Previous Article in Journal
An Interval Neural Network Method for Identifying Static Concentrated Loads in a Population of Structures
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Differential Game-Based Cooperative Interception Guidance Law with Collision Avoidance

by
Xueping Zhu
,
Xinxing Wang
*,
Yue Li
and
Jun Yang
School of Astronautics, Northwestern Polytechnical University, Xi’an 710072, China
*
Author to whom correspondence should be addressed.
Aerospace 2024, 11(9), 771; https://doi.org/10.3390/aerospace11090771
Submission received: 7 August 2024 / Revised: 13 September 2024 / Accepted: 14 September 2024 / Published: 19 September 2024
(This article belongs to the Section Aeronautics)

Abstract

:
To deal with the offense-defense confrontation problem of multi-missile cooperative intercepting a high-speed and large-maneuvering target, a differential game-based cooperative interception guidance law with collision avoidance is proposed, in which the offense-defense parties are the incoming target and the interceptors, respectively. Given that both offense-defense parties have uniformly decreasing speeds and first-order biproper dynamics, the relative motion models among the offense-defense parties are established, and the performance indices of the target and the interceptors are proposed. After that, the cooperative interception guidance law with collision avoidance is derived based on a differential game. The guidance law considers the effects of speed variations and rudder layouts on the motions of both offense-defense parties, ensuring excellent algorithmic real-time property and interception accuracy while introducing inter-missile collision avoidance constraints. In addition, the parameters of the target performance index are set according to the target acceleration information estimated by the interceptors. The simulation results verify the effectiveness of the guidance law designed in this paper, under various three-to-one scenarios, the interceptors could achieve collision-free interceptions with the interception accuracy of less than 5 m and the interception time difference of less than 0.1 s.

1. Introduction

Multi-missile cooperative interception has been a hot issue in the field of air defense in recent years. The main motivation is that the interception effect of a single missile is limited by its own performance, and it is difficult to cope with incoming targets with fast flight speed and high mobility [1]. Multi-missile cooperative interception breaks the traditional operation mode of single-missile independent operation, fuses multiple missiles into an integrated cluster with information sharing, functional complementation and tactical cooperation, and utilizes the cluster’s advantages to complete interception tasks that are difficult to accomplish with a single missile. As the key technology, the guidance design directly determines the interception effect of the missile swarm [2].
Multi-missile cooperative guidance is an important part of multi-agent cooperative control. However, compared with other agents such as unmanned aerial vehicles (UAVs) and unmanned ground vehicles (UGVs), missiles move faster and usually do not have abilities of speed control, which puts forward higher requirements for their guidance designs [3]. Specifically, for multi-missile cooperative interception, the guidance strategies aiming at high-speed and large-maneuvering targets are also different. For the former, the methods of multi-missile zoned interception, i.e., cooperative interception guidance laws based on coverage theory [4,5,6,7], are mainly adopted to make up for the lack of interceptors’ slow flight speeds. For the latter, the methods of multi-missile multi-directional interception, i.e., cooperative interception guidance laws with impact angle constraints [8,9,10], are mainly adopted to force the target to be unable to fully utilize its mobility. While the target has high-speed and large-maneuvering characteristics at the same time, it is necessary to design cooperative interception guidance laws based on differential games to carry out intelligent interceptions [11].
Differential games was proposed by Isaacs in the 1950s [12,13], and is mostly used to solve two-party dynamic confrontation problems. It combines game theory [14,15] and optimal control [16] to solve the optimal strategy that each party designs for itself in condition of the other taking optimal strategy, thus constituting the game equilibrium solution. Saridis [17] called the above process a “worst-case design.” Besides, differential games can also be used for optimal control of autonomous vehicle convoy [18], optimized power control in cognitive radio networks [19], and distributed energy trading for energy internet [20] and more.
In recent years, as the problem of multi-missile cooperative interception has received widespread attention, the research on differential games interception guidance law has gradually developed from one-to-one to many-to-one. Unfortunately, due to the more complex motion relations of cooperative interception, some motion characteristics of missiles considered in the context of one-to-one interception are simplified during the design processes of current differential games’ cooperative interception guidance laws [21,22,23,24,25]. For example, in the studies related to one-to-one interception, Refs. [26,27,28] describe the speed characteristics of missiles as variable-speed forms, and Ref. [29] approximates the dynamics of missiles in the first-order biproper form, taking into account the effect of rudder layouts, whereas Refs. [21,22,23,24,25] still adopt the constant-speed flight assumption and set missiles to have ideal or first-order inertial dynamics.
In addition, since both offense-defense parties cannot accurately know each other’s maneuvering intention, the complete information condition for studying differential games does not exist in the real confrontation process [30]. In fact, when designing a differential games interception guidance law, the defender always needs to rely on a certain degree of “imagination” to find the optimal strategy in some sense for intercepting a target that is not fully known. If the setting of a target is improper, the interception strategy designed based on that setting will almost certainly suffer some losses [31]. In this regard, it is necessary to investigate a feasible countermeasure.
Furthermore, for the problem of multi-missile cooperative interception, inter-missile collisions will cause the loss of operational power, which affects the success rate of interception, so it is necessary to consider collision avoidance when designing cooperative interception guidance laws based on differential games. The collision avoidance methods are mainly divided into three categories. The first one is to carry out path planning as shown in [32,33] to find the feasible path to reach the target point under the collision-free condition. However, its real-time property is poor because the path planning algorithms are generally computationally complex and cannot respond to the environmental changes quickly. The second such as [34,35,36,37] is to detect collisions during the guidance process, and take evasive measures when possible collisions are detected. Since the evasive measures are carried out after the detection, their effectiveness cannot be guaranteed, and they may cause guidance deviations. The third category as shown in [38,39,40,41,42] is to directly design guidance laws considering the collision avoidance, which simultaneously meets the requirements of algorithmic real-time property and guidance accuracy. Inspired by [42], this paper avoids inter-missile collisions by introducing an inter-missile distance constraint as the interior point constraint of optimal control.
Based on existing research, this paper proposes a differential game-based cooperative interception guidance law with collision avoidance. The main contributions are summarized as: (1) Establishment of a motion model of missiles with uniformly decreasing speeds and first-order biproper dynamics, which is more suitable for the real cooperative interception scenarios compared with the simplified models shown in [21,22,23,24,25] constant-speed flight and ideal or inertial dynamics are considered; (2) For the first time, the target acceleration information estimated by the interceptors is recommended to approximate the actual incoming target, avoiding the improper setting of target’s maneuvering intention; and (3) A inter-missile collision avoidance strategy is introduced in the design of cooperative interception guidance law based on differential games for the first time, which eliminates the potential inter-missile collision risks.
The rest of this paper is organized as follows: The problem studied in this paper is elaborated in Section 2 where the relative motion models of offense-defense confrontation and the guidance law design steps are established. The equilibrium solution of offense-defense confrontation game is solved in Section 3. The parameters of the target performance index are set in Section 4. Section 5 verifies the guidance effect of the guidance law designed in this paper through ballistic simulation. Section 6 concludes the work of this paper, and Section 7 presents the limitations of study and looks forward to future developments.
In the absence of special instructions, the symbol “(t)” used to indicate that the value of a variable is taken at the current moment, is omitted in this paper.

2. Problem Formulation

This paper investigates a differential game-based cooperative interception guidance law with collision avoidance, which applies to many operational scenarios of the key place air defense; for instance, the incoming target is a tactical ballistic missile attacking a specific ground building with preprogrammed maneuvers to increase penetration probability, and the defender launches multiple interceptor missiles expecting to achieve the terminal-phase interception of the target without inter-missile collisions.
The relative motion models of offense-defense confrontation and the guidance law design steps are established in this section based on the following assumptions.
  • The lateral perturbations of offense-defense confrontation motion are negligible, and the longitudinal motion is independent of the lateral motion.
  • Both offense-defense parties are considered as point masses and their rotations around center of mass are negligible.
  • Both offense-defense parties are considered to have first-order biproper dynamics.
  • Relative motions of offense-defense confrontation are linearized based on the small-perturbation method.
  • The changes in flight speed of both offense-defense parties are approximated as uniform deceleration.
  • The upper limits of normal available overload of both offense-defense parties are approximated as constants.
  • The interceptors can infer the attack location of the incoming target.
  • The interceptors can estimate the parameters related to dynamics characteristic of both offense-defense parties.
  • The interceptors can obtain the position and velocity information of both offense-defense parties.
Assumptions 1–9 are briefly summarized as: (1) Assumptions 1 and 2 are common settings for designing longitudinal planar guidance laws of missiles; (2) The reasonableness of Assumption 3 would be analyzed in Proposition 1; (3) The applicability of Assumptions 4–6 is reduced in real flight environments, the impact of which would be discussed in Section 5; and (4) In Assumptions 7–9, the information required by the missile swarm could be provided from the guidance station.

2.1. Relative Motion Models

There are three kinds of relative motions concluded in the process of offense-defense confrontation, namely, the target-ground relative motion between the target and the ground building, the missile-target relative motion between each interceptor and the target, and the inter-missile relative motion between different interceptors.
The relative motion models established in this section are only used for the guidance law design.
Based on Assumptions 1 and 2, the motion relations of offense-defense confrontation are shown in Figure 1, in which the target is denoted as T, the ground building GB, the total number of effective cooperative interceptors n, the ith and the jth interceptors Mi and Mj, respectively, XOY is an inertial coordinate system with the ground building as origin, y, V, θ and a are the Y-direction coordinate, flight speed, ballistic inclination, and normal acceleration, respectively, RD the target-ground distance between the target and the ground building, Ri the missile-target distance between the ith interceptor and the target, Rij the inter-missile distance between the ith and the jth interceptors, and yD, yi and yij are the corresponding relative distances in the Y-direction, respectively.
Remark 1.
There are two kinds of conditions such that the number of interceptors will be reduced during the offense-defense confrontation: one is that some interceptors lose the operational capability due to colliding with other interceptors; and the other is that some interceptors which fail to intercept are no longer involved in cooperative interception.
To establish the relative motion models of offense-defense confrontation, the composition of normal accelerations is analyzed and the reasonableness of Assumption 3 is elaborated. The details are described in the following proposition.
Proposition 1.
Both the offense and defense parties are missiles, and their normal accelerations are made up of
a = a a + a r ,
where aa is the normal acceleration generated by missile attitude changes due to rudder deflections, the response process of which is approximated in the inertial form, and ar is the normal acceleration generated by rudders themselves, the response process of which can be ignored.
Denote the guidance command as u, and express the relationships between aa and ar with u as
a a u = 1 l τ s + 1 , a r u = l ,
where l represents the direct lift coefficient satisfying 0 < |l| < 1 and is positive for canard control and negative for tail control, and τ the first-order time constant.
From Equations (1) and (2), the relationship between normal acceleration a with guidance command u is
a u = a a + a r u = l τ s + 1 τ s + 1 ,
Equation (3) is a first-order biproper form, showing that Assumption 3 is reasonable.
Next, according to the motion relations of offense-defense confrontation as shown in Figure 1, the three relative motions can be transformed to the Y-directions by defining the terminal moment and terminal distance in each relative motion, and then the three corresponding relative motion equations are derived based on Assumption 4. The details are described in the following proposition.
Proposition 2.
For the offense-defense confrontation, the target-ground, missile-target and inter-missile relative motion equations are established as follows.
(1) For the target-ground relative motion, the moment when the X-direction coordinates of the target and the ground building are the same is defined as the target’s attack moment, and is approximated as
t D ( t ) = t + R D ( t ) / | R ˙ D ( t ) | ,
the target-ground relative distance in the Y-direction at this moment is defined as the target’s attack miss distance and notated as  y D ( t D ) .
The target-ground relative motion equation is
θ ˙ T = a T V T , y D = y T y G B , y ˙ D = V T s i n θ T , y ¨ D = V ˙ T s i n θ T + V T θ ˙ T c o s θ T = V ˙ T θ T + a T .
(2) For the missile-target relative motion, take the ith interceptor and the target as an example, the moment when X-direction coordinates of them are the same is defined as the ith interceptor’s interception moment, and is approximated as
t f i ( t ) = t + R i ( t ) / | R ˙ i ( t ) | ,
the missile-target relative distance between the ith interceptor and the target in the Y-direction at this moment is defined as the ith interceptor’s interception miss distance and notated as  y i ( t f i ) .
The missile-target relative motion equation between the ith interceptor and the target is
θ ˙ T = a T V T , θ ˙ M i = a M i V M i , y i = y T y M i , y ˙ i = V T s i n θ T V M i s i n θ M i , y ¨ i = V ˙ T θ T + a T V ˙ M i θ M i a M i .
(3) For the inter-missile relative motion, take the ith and the jth interceptors as an example, the moment when the X-direction coordinates of them are the same is defined as the approach moment of the ith and the jth interceptors, and is approximated as
t C i j ( t ) = t + R i j ( t ) / | R ˙ i j ( t ) | ,
the inter-missile relative distance between the ith and the jth interceptors in the Y-direction at this moment is defined as the approach distance of the ith and the jth interceptors and notated as  y i j ( t C i j ) .
The inter-missile relative motion equation between the ith and the jth interceptors is
θ ˙ M j = a M j V M j , θ ˙ M i = a M i V M i , y i j = y M j y M i , y ˙ i j = V M j s i n θ M j V M i s i n θ M i , y ¨ i j = V ˙ M j θ M j + a M j V ˙ M i θ M i a M i .
The relative motion between the ith and the jth interceptors is studied only in case of a possible collision between them, the definitions related to collision would be given in Definition 2.
Based on Propositions 1 and 2, the following lemma is provided to establish the relative motion models of offense-defense confrontation.
Lemma 1.
For the offense-defense confrontation, the target-ground, missile-target, and inter-missile relative motion models are established as follows.
(1) The target-ground relative motion model is
x D = [ y D y ˙ D a T a θ T ] T , u D = u T , x ˙ D = A D x D + B D u D , A D = [ 0 1 0 0 0 0 1 V ˙ T 0 0 1 / τ T 0 0 0 1 / V T 0 ] , B D = [ 0 l T ( 1 l T ) / τ T l T / V T ] ,
where  x D ,  u D ,  A D  and  B D  are the state variable, control input, state coefficient matrix and control coefficient matrix, respectively, of the target-ground relative motion.
(2) The missile-target relative motion model is
x I i = [ y i y ˙ i a M i a θ M i a T a θ T ] T , u I i = [ u M i u T ] T , x ˙ I i = A I i x I i + B I i u I i , A I i = [ 0 1 0 0 0 0 0 0 1 V ˙ M i 1 V ˙ T 0 0 1 / τ M i 0 0 0 0 0 1 / V M i 0 0 0 0 0 0 0 1 / τ T 0 0 0 0 0 1 / V T 0 ] , B I i = [ 0 0 l M i l T ( 1 l M i ) / τ M i 0 l M i / V M i 0 0 ( 1 l T ) / τ T 0 l T / V T ] ,
where i denotes the index of an arbitrary interceptor,  x I i ,  u I i ,  A I i  and  B I i  are the state variable, control input, state coefficient matrix and control coefficient matrix, respectively, of the missile-target relative motion between the ith interceptor and the target.
(3) The inter-missile relative motion model is
x C i j = [ y i j y ˙ i j a M i a θ M i a M j a θ M j ] T , u C i j = [ u M i u M j ] T , x ˙ C i j = A C i j x C i j + B C i j u C i j , A C i j = [ 0 1 0 0 0 0 0 0 1 V ˙ M i 1 V ˙ M j 0 0 1 / τ M i 0 0 0 0 0 1 / V M i 0 0 0 0 0 0 0 1 / τ M j 0 0 0 0 0 1 / V M j 0 ] , B C i j = [ 0 0 l M i l M j ( 1 l M i ) / τ M i 0 l M / V M i 0 0 ( 1 l M j ) / τ M j 0 l M j / V M j ] ,
where i and j denote the indices of arbitrary two interceptors,  x C i j ,  u C i j ,  A C i j  and  B C i j  are the state variable, control input, state coefficient matrix, and control coefficient matrix, respectively, of the inter-missile relative motion between the ith and the jth interceptors.
Remark 2.
Since the three relative motion models described by Equations (10)–(12) are relatively similar, the target-ground relative motion is taken as an example to illustrate the reason for selecting the normal acceleration generated by missile attitude changes as the state variable, while the remaining two relative motions will not be repeated.
From Equation (3), the derivative of the target’s normal acceleration  a T  with respect to time is
a ˙ T = 1 τ T a T + 1 τ T u T + l T u ˙ T .
u ˙ T  would be selected as a control input if  x D = [ y D y ˙ D a T θ T ] T  is selected as the state variable of target-ground relative motion, which is unfavorable for the guidance law design. Therefore, the state variable shown in Equation (10) is selected to avoid the above problem.
To take full advantage of cooperative operation, the scenario in which multiple interceptors intercept the target at the same time is considered in this paper, and the interception moment of missile swarm is defined as follows.
Definition 1.
The interception moment of missile swarm is
t f ( t ) = i = 1 n t f i ( t ) n ,
and the interception moment is taken as tf uniformly for each interceptor.
Based on Lemma 1 and Definition 1, the following lemma is provided to establish the scalar relative motion models of offense-defense confrontation, where the proof of Equations (15)–(17) is detailed in Appendix A.
Lemma 2.
For the offense-defense confrontation, the target-ground, missile-target, and inter-missile relative motion models in scalar form are established as follows.
(1) The scalar target-ground relative motion model is
Z D ( t ) = Γ D ( t , t D ) x D ( t ) , Z ˙ D ( t ) = φ D ( t , t D ) u T ( t ) ,
where  Z D ( t )  is the target’s zero-effort attack miss distance,  Γ D ( t , t D )  the state transition vector of  y D  from current to attack moment under zero-effort condition, and  φ D ( t , t D )  the target’s control coefficient function in the scalar target-ground relative motion model.
(2) The scalar missile-target relative motion model is
Z I i ( t ) = Γ I i ( t , t f ) x I i ( t ) , Z ˙ I i ( t ) = φ I T ( t , t f ) u T ( t ) φ I M i ( t , t f ) u M i ( t ) ,
where  Z I i ( t )  is the ith interceptor’s zero-effort interception miss distance,  Γ I i ( t , t f )  the state transition vector of  y i  from current to interception moment under zero-effort condition, and  φ I M i ( t , t f )  and  φ I T ( t , t f )  are the control coefficient functions of the ith interceptor and the target, respectively, in their scalar relative motion model.
(3) The scalar inter-missile relative motion model is
Z C i j ( t ) = Γ C i j ( t , t C i j ) x C i j ( t ) , Z ˙ C i j ( t ) = φ C i j M j ( t , t C i j ) u M j ( t ) φ C i j M i ( t , t C i j ) u M i ( t ) ,
where  Z C i j ( t )  is the zero-effort approach distance of the ith and the jth interceptors,  Γ C i j ( t , t C i j )  the state transition vector of  y i j  from current to approach moment under zero-effort condition, and  φ C i j M i ( t , t C i j )  and  φ C i j M j ( t , t C i j )  are the control coefficient functions of the ith and the jth interceptors respectively in their scalar relative motion model.
The scalar relative motion models shown in Lemma 2 are subsequently used to design the guidance law in this paper.
Finally, definitions related to collision are presented as follows to facilitate the study of inter-missile relative motions, and for the sake of simplicity, the possible collisions are directly called as collisions.
Definition 2.
Definitions related to collision are made as follows.
(1) The condition to determine a possible collision between the ith and the jth interceptors is
R ˙ i j < 0   a n d   t C i j < t f ,
i.e., the motion tendency of the ith and the jth interceptors is close to each other and their approach moment is earlier than the interception moment of missile swarm.
(2) The collision between the ith and the jth interceptors is notated as
{ Ω i j i f   i < j Ω j i i f   j < i .
(3) The total number of inter-missile collisions is notated as c.
(4) All collisions are sorted in the ascending order of the first subscripts, if the first subscripts of some collisions are the same, these collisions are sorted in the ascending order of the second subscripts, which constitutes the following collision set:
Ω = { Ω I 1 I I 1 , Ω I 2 I I 2 Ω I s I I s Ω I c I I c } { Ω 1 , Ω 2 Ω s Ω c } ,
where s denotes the index of an arbitrary collision,  I s  and  I I s  the first and the second subscripts of the sth collision, respectively, both  Ω I s I I s  and  Ω s  can denote the sth collision. The collision set will vary with the tendency of inter-missile motions.

2.2. Guidance Law Design Steps

The differential game-based cooperative interception guidance law with collision avoidance would be designed in the following three steps.
First, establish game principles for the target and the interceptors where the parameters of the target performance index need to be set based on the target information obtained by the interceptors, and then the interceptors’ complete information condition is constructed by combining with Assumptions 7–9, i.e., the interceptors know the motion information and maneuvering intentions of both offense-defense parties.
Then, according to the offense-defense game principles, solve the game equilibrium solution by the idea of “worst-case design” of differential games, which is a combination of the target optimal penetration strategy and the interceptor optimal interception strategy, both derived on the condition that the other adopt its optimal maneuvering strategy.
Finally, analyze the expression of aforementioned target optimal penetration strategy, and replace the target’s guidance command with its acceleration information estimated by the interceptors to set the parameters of the target performance index.
The above design steps are described in detail as follows.

2.2.1. Establish Offense-Defense Game Principles

The terminal moment of game is taken as the interception moment of missile swarm shown in Equation (14), and the game principles of the target and the interceptors are established, respectively, as follows.
On one hand, it follows from the target’s maneuvering intention that the target penetration strategy expects to attack the ground building, escape from the interception, and reduce the energy consumption. As a result, based on Proposition 2, the performance index of the target is set as
m i n J T = ω T D 2 y D 2 ( t D | t f ) i = 1 n ω T I i 2 y i 2 ( t f | t f ) + ω T E 2 t t f u T 2 ( σ ) d σ   = ω T D 2 Z D 2 ( t f ) i = 1 n ω T I i 2 Z I i 2 ( t f ) + ω T E 2 t t f u T 2 ( σ ) d σ ,
where Z D ( t f ) and Z I i ( t f ) are the zero-effort attack miss distance of the target and the zero-effort interception miss distance of the ith interceptor at the terminal moment, u T the target’s guidance command, ω T D , ω T I i and ω T E are positive weight coefficients corresponding to attacking the ground building, escaping from the interception, and reducing the energy consumption, respectively, and their detailed values are shown in Equations (36) and (43).
On the other hand, the interceptors expect to successfully intercept the incoming target and avoid inter-missile collisions, and thus, the constraints on the interception strategy are proposed to be zero interception miss distance of each interceptor and enough inter-missile distance more than the safety distance between each pair of interceptors, which are called the interception constraint and collision avoidance constraint, respectively. Based on Proposition 2, the two constraints are denoted as
Z I i ( t f ) y i ( t f ) = 0 , | Z C i j ( t C i j ) | | y i j ( t C i j ) | r ,
where r is the safety inter-missile distance. The setting of collision avoidance constraint is useful in eliminating inter-missile collision risks of multi-missile cooperative interception.
In addition, to reduce the total energy consumption of the missile swarm, the following performance index of the interceptors is set.
m i n J M = i = 1 n ω M i E 2 t t f u M i 2 ( σ ) d σ ,
where u M i is the ith interceptor’s guidance command, ω M i E is the corresponding positive weight coefficient, and the weight coefficient for an interceptor with higher energy consumption should be set higher. Considering that the energy consumption of an interceptor is positively correlated with its remaining flight time and overload capacity, it follows from Assumption 6 that the value of ω M i E should be set as
ω M i E ( t ) = R i ( t ) | R ˙ i ( t ) | a M i max ,
where a M i max is the upper limit of normal acceleration of the ith interceptor.
Equation (21) and Equations (22)–(24) are the game principles of the target and the interceptors, respectively.

2.2.2. Solve Game Equilibrium Solution

According to the idea of differential games “worst-case design”, the game equilibrium solution is solved by the following steps: first, derive the optimal maneuvering strategies of the target and the interceptors based on the classical variational method, and then, design the methods of taking values of Z I f and Z ¯ C f to calculate the above strategies, where Z I f defined in Equation (A20) is the vector of actual interception miss distances, and Z ¯ C f defined in Equation (A42) is the vector of approach distances required by collision avoidance constraint. The final obtained game equilibrium solution notated as ( u T * , u M * ) satisfies
J T ( u T * , u M * ) J T ( u T , u M * ) , J ¯ M ( u T * , u M * ) J ¯ M ( u T * , u M ) ,
where u M = [ u M 1 u M n ] T , u T * and u M * denote the target optimal penetration strategy and the interceptor optimal interception strategy, u T and u M denote non-optimal strategies of the target, and the interceptors, J ¯ M is the augmented performance index of the interceptors introducing the interception and collision avoidance constraints presented in Equation (22) into the original performance index shown in Equation (23) whose explicit expression would be shown in Equation (30).
The above will be described in detail in Section 3.

2.2.3. Set Parameters of the Target Performance Index

If the setting of the target’s maneuvering intention is close enough to the real target, it can be considered that the cooperative interception guidance law designed on this basis can achieve the expected guidance effect.
Therefore, the parameters of the target performance index are set based on the target acceleration information estimated by the interceptors in this paper, such that the optimal penetration strategy u T * ( t ) satisfies
u T * ( t ) = a T e s t ( t ) ,
where a T e s t is the target acceleration information estimated by all interceptors’ measurements of the target.
The interceptors’ cooperative interception guidance law is derived from the above setting, and the design details are shown in Section 4.

3. Derivation of Game Equilibrium Solution

After establishing the relative motion models of offense-defense confrontation and the guidance law design steps, the game equilibrium solution will be derived and discussed in this section to obtain the main result of this paper as follows.
Theorem 1.
The game equilibrium solution of both offense-defense parties is
u T * ( t ) = φ D ( t ) ω T E / ω T D + κ D D Z D ( t ) + ( φ I T ( t ) φ D ( t ) κ D I T ω T E / ω T D + κ D D ) ω T I ω T E Z I f ,
u M * ( t ) = ( ω M E ) 1 [ Φ I M Φ C ] G [ H I H C * ] ,
where  ω T I = [ ω T I 1 ω T I n ] ,  ω T D ,  ω T I i  and  ω T E  are defined in Equation (21),  Z D  in Equation (15),  Z I f ,  κ D D  and  κ D I T  in Equation (A20),  φ D  and  φ I T  in Equations (15) and (16),  ω M E ,  Φ I M  and  Φ C  in Equation (A30),  G  in Equation (A45),  H I  in Equation (A36) and  H C *  in Equation (34).
Proof. 
The procedures on how to derive the game equilibrium solution are carried out in four steps, firstly, derive the target optimal penetration strategy, then derive the interceptor optimal interception strategy, and discuss the methods of taking values of Z I f and Z ¯ C f , respectively.
Step 1: Derive the target optimal penetration strategy
Denote k as the kth interceptor for any k in { 1 , 2 n } . Recall the state equations and performance index related to the target optimal control problem described in Lemma 2 and Equation (21), which are
Z ˙ D ( t ) = φ D ( t , t D ) u T ( t ) φ D ( t ) u T ( t ) , Z ˙ I k ( t ) = φ I T ( t , t f ) u T ( t ) φ I M k ( t , t f ) u M k ( t ) φ I T ( t ) u T ( t ) φ I M k ( t ) u M k ( t ) , J T = ω T D 2 Z D 2 ( t f ) k = 1 n ω T I k 2 Z I k 2 ( t f ) + ω T E 2 t t f u T 2 ( σ ) d σ .
Based on the classical variational method, the target optimal penetration strategy is
u T * ( t ) = φ D ( t ) ω T E / ω T D + κ D D Z D ( t ) + ( φ I T ( t ) φ D ( t ) κ D I T ω T E / ω T D + κ D D ) ω T I ω T E Z I f ,
where κ D D and κ D I T are parameters related to the motion characteristics of the target and defined in Equation (A20), the derivation of which is detailed in Appendix B. In Equation (29), Z I f is the vector of actual interception miss distances associated with strategies of both parties, and the method of taking its value will be explained in Step 3.
Step 2: Derive the interceptor optimal interception strategy
Denote k as the kth interceptor for any k in { 1 , 2 n } , s as the sth collision as defined in Definition 2. Recall the state equations and performance index related to the interceptor optimal control problem described in Lemma 2 and Equation (23), which are
Z ˙ I k ( t ) = φ I T ( t , t f ) u T ( t ) φ I M k ( t , t f ) u M k ( t ) φ I T ( t ) u T ( t ) φ I M k ( t ) u M k ( t ) , Z ˙ C i j ( t ) = φ C i j M j ( t , t C i j ) u M j ( t ) φ C i j M i ( t , t C i j ) u M i ( t ) φ C i j M j ( t ) u M j ( t ) φ C i j M i ( t ) u M i ( t ) , J M = i = 1 n ω M i E 2 t t f u M i 2 ( σ ) d σ .
The augmented performance index of the interceptors is
J ¯ M = k = 1 n λ I M k N I k + Ω s Ω λ C i j N C i j + k = 1 n ω M k E 2 t t f u M k 2 ( σ ) d σ ,
where N I k denotes the interception constraint on the kth interceptor, N C i j the collision avoidance constraint between the ith and the jth interceptors, λ I M k and λ C i j are the corresponding Lagrange multipliers. N I k and N C i j are expressed as
N I k = Z I k ( t f ) = 0 , N C i j = Z C i j ( t C i j ) s i g n ( Z C i j ( t ) ) r = 0 .
Equation (31) is set based on Equation (22). In Equation (31), the interception constraint is a terminal constraint, and the collision avoidance constraint is an interior point constraint. Moreover, the terminal state of an inter-missile relative motion is negligible when its collision avoidance constraint is satisfied.
Based on the classical variational method [31], the interceptor optimal interception strategy is
u M * ( t ) = ( ω M E ) 1 [ Φ I M Φ C ] G [ H I H C ] ,
where ω M E = d i a g ( ω M 1 E , ω M n E ) , Φ I M and Φ C are matrices consist of control coefficient functions of the missile-target and inter-missile relative motions and defined in Equation (A30), H I and H C are function vectors related to the interception and collision avoidance constraints and defined in Equation (A36) and Equation (A42), respectively, G is a matrix used to calculate the Lagrange multipliers and defined in Equation (A45).
The detailed derivation on how to get Equation (32) is given in Appendix C. In Equation (32), H I is a function vector associated with Z I f , the vector of actual interception miss distances, the method of taking whose value will be explained in Step 3, and H C is a function vector associated with Z ¯ C f , the vector of approach distances required by collision avoidance constraint, the method of taking whose value will be derived in Step 4.
Step 3: Predict the value of Z I f
Under the unconstrained control condition, the interceptors adopting the interception strategy (32) derived based on the classical variational method can realize the interception constraint presented in Equation (22), that is, the interception miss distance of each interceptor in the missile swarm is zero.
However, in the real process of offense-defense confrontation, upper limits exist on normal available overloads for interceptors, and thus the interception strategy shown in Equation (32) is often unattainable. Accordingly, the interception miss distance of each interceptor is not necessarily zero, so the value of Z I f , the vector of actual interception miss distances, needs to be predicted.
It is worth noting that the prediction of Z I f can be omitted for the cooperative interception guidance law design by ingenious setting of the target as described in Section 4, which could reduce the guidance law complexity.
Step 4: Optimize the value of Z ¯ C f
To reduce the total energy consumption of the missile swarm to a lower extent, an optimization method of taking the value of Z ¯ C f is proposed, and the optimal value is shown the following proposition, which is detailed in Appendix D.
Proposition 3.
The optimal value of  Z ¯ C f  is
( Z ¯ C f ) * = [ ( Z ¯ C 1 f ) * ( Z ¯ C c f ) * ] T , ( Z ¯ C s f ) * = { Z V s | Z V s | r s i g n ( Z V s ) r | Z V s | < r ,
where  ( Z ¯ C s f ) *  is the sth component of  ( Z ¯ C f ) * ,  Z V s  is defined in Equation (A48). Replacing  Z ¯ C f  with ( Z ¯ C f ) * ,  H C  in Equation (32) is rewritten as
H C = Z C Z ¯ C f = Z C ( Z ¯ C f ) * H C * ,
where  Z C  is defined in Equation (A42).
Combining the above four steps, the game equilibrium solution of both offense-defense parties is obtained as shown in Theorem 1.
The proof is thus completed. □

4. Parameter Settings of the Target Performance Index

The application condition of differential games is that the set target can approximate the actual maneuvering target. In this section, the parameters of the target performance index are set based on the target acceleration information estimated by the interceptors. Subsequently, according to Theorem 1, the differential game-based cooperative interception guidance law with collision avoidance for the interceptors is derived as follows.
Theorem 2.
The differential game-based cooperative interception guidance law with collision avoidance is
u M g l ( t ) = ( ω E M ) 1 [ Φ I M Φ C ] G [ H I * H C * ] ,
where  H I *  is defined in Equation (45).
Proof. 
Theorem 1 shows that the calculation of the game equilibrium solution needs the ratio of ω T D to ω T E , and the ratio of ω T I to ω T E , where ω T D , ω T E and ω T I are weight coefficients of the target performance index.
(1) For ω T D / ω T E setting
Considering that the proportional navigation guidance (PNG) is a classical guidance law used to attack stationary targets and is suitable for the incoming target expected to attack ground buildings in this paper, the following approximation is taken according to the design condition ω T D ω T E of PNG.
ω T E / ω T D = 0 .
Remark 3.
If the target is not concerned with escaping from interceptions, Equation (27) would be rewritten as follows based on the constant-speed flight and ideal dynamics assumptions.
ω T I = 0 , γ T = 0 , l T = 0 , τ T = 0 , u T * ( t ) = t D t ω T E ω T D + ( t D t ) 3 3 [ y D ( t ) + y ˙ D ( t ) ( t D t ) ] ,
where  γ T  is the target’s axial drag acceleration.
Substituting Equation (36) into Equation (37) yields
u T * ( t ) = 3 y D ( t ) + y ˙ D ( t ) ( t D t ) ( t D t ) 2 = 3 V D q ˙ D ,
where   V D  and   q ˙ D  are the target-ground approach speed and line-of-sight angular rate, which is PNG.
It follows from Equation (36) that the game equilibrium solution of both offense-defense parties in Theorem 1 can be further expressed as
u T * ( t ) = φ D ( t ) κ D D Z D ( t ) + ( φ I T ( t ) φ D ( t ) κ D I T κ D D ) ω T I ω T E Z I f ,
u M * ( t ) = ( ω M E ) 1 [ Φ I M Φ C ] G [ H I * H C * ] ,
where
H I * = Z I Z ¯ I f N [ κ I T D κ D D Z D ( t ) + ( κ I T D κ D I T κ D D κ I T I T ) ω T I ω T E Z I f ] ,
with κ I T D and κ I T I T being defined in Equation (A34), N , Z I and Z ¯ I f in Equation (A36), κ I T D and κ I T I T are parameters related to the motion characteristics of the target.
(2) For ω T I / ω T E setting
The analysis of Equations (39)–(41) shows that the prediction of Z I f can be omitted by directly setting the whole value of ω T I Z I f ω T E when calculating the interceptor optimal interception strategy. In this paper, the target acceleration information estimated by the interceptors is considered the optimal penetration strategy adopted by the target, i.e.,
u T * ( t ) = a T e s t ( t ) ,
then it is obtained from Equations (39) and (42) that
ω T I Z I f ω T E = a T e s t ( t ) + φ D ( t ) κ D D Z D ( t ) φ I T ( t ) φ D ( t ) κ D I T κ D D ε I .
Substituting Equation (43) into Equation (41), the interceptor optimal interception strategy shown as Equation (40) is rewritten as
u M * ( t ) = ( ω E M ) 1 [ Φ I M Φ C ] G [ H I * H C * ] u M g l ,
where
H I * = Z I Z ¯ I f N [ κ I T D κ D D Z D ( t ) + ( κ I T D κ D I T κ D D κ I T I T ) ε I ] ,
The interceptors can estimate the target acceleration by filtering the measurement information of the incoming target. On this basis, the target adopting the optimal penetration strategy (42) can approximate the actual maneuvering target. Consequentially, the optimal interception strategy obtained in Equation (44) is the interceptors’ differential game-based cooperative interception guidance law with collision avoidance designed in this paper.
The proof is completed. □
Eventually, considering the upper limit of normal acceleration, the guidance command and normal acceleration of the ith interceptor are obtained as
u M i = a M i m a x s a t ( u M i g l / a M i m a x ) , a M i u M i = l M i τ M i s + 1 τ M i s + 1 ,
where u M i g l is the ith component of the proposed guidance law u M g l .

5. Results and Discussion

According to the engineering experience, when the miss distance is less than 5 m, the interceptor warhead can cause effective damage to the target and its interception is considered successful; and when the distance between two interceptors is less than 3 m, they can be considered to have collided.
This paper verifies the effectiveness of the proposed guidance law (44) through the ballistic simulations under a three-to-one scenario, where the three interceptors are homogeneous missiles with similar initial motion states, the motion and relative motion models of offense-defense confrontation are established as the real nonlinear motion systems, and the simulation parameters are listed in Table 1.

5.1. Ideal Flight Environment

Based on a relatively ideal flight environment, Section 5.1 shows the realization of guidance law design intentions and compare it to PNG, the most classical homing guidance law in engineering applications, to demonstrate its superiority.
The ballistic simulation conditions are set as: (1) Ignoring the filtering error of the target acceleration information; (2) As stated in Assumption 5, the axial drag accelerations of offense-defense parties are both constants listed in Table 1; and (3) As stated in Assumption 6, the upper limits of normal acceleration of offense-defense parties are both constants listed in Table 1, which represent the structural limitations of the missiles.
The penetration strategy for the actual maneuvering target is set as a combination of generalized PNG and preprogrammed jumping maneuver, whose specific form is
u T = a T m a x s a t [ ( 3 V D q ˙ D c o s ( θ T q D ) + u P ) / a T m a x ] , u P = a T m a x η , η = { 0 t < T 0 1 t [ T 0 + ( m 1 ) δ , T 0 + m δ ) , m = 1 , 2 1 t [ T 0 + m δ , T 0 + ( m + 1 ) δ ) , m = 1 , 2 a T u T = l T τ T s + 1 τ T s + 1 ,
where T 0 = 2 , δ = 3 , V D , q D and q ˙ D are the approach speed, line-of-sight angle and line-of-sight angular rate of the actual target to the ground building, respectively, a T m a x , u P , u T and a T are the upper limit of normal acceleration, preprogrammed command, guidance command, and normal acceleration of the actual target, respectively.
Figure 2 shows the ballistic trajectories of the three interceptors and the target, and Figure 3 shows the inter-missile distances. It can be observed from Figure 2 that the miss distances of the three interceptors are all less than 5 m at 8.248 s, implying effectively cooperative interception. Moreover, Figure 3 shows that the nearest inter-missile distance is more than 3 m, which means no collision occurred in the interception.
Figure 4 and Figure 5 show the ballistic trajectories and the inter-missile distances without collision avoidance ( r = 0 m) respectively. The figures demonstrate that interceptors 1 and 3 collide at 8.157 s, while interceptor 2 intercepts the target with a miss distance of 14.724 m.
Figure 6 shows the ballistic trajectories of both offense-defense parties with all interceptors using PNG, the interceptors 1 and 3 collide at 8.027 s, and the interceptor 2 fails to intercept the target with a miss distance of 96.057 m.
The above simulation results show that the proposed guidance law can successfully intercept the target while eliminating inter-missile collision risks under the condition that (1) the interceptor speeds are lower than the target and, (2) there are no obvious advantages in overload capacity. However, if the three interceptors use PNG individually, collision is difficult to avoid, and since the interceptors do not have significant performance advantages over the target, the interception effect is poor.

5.2. Complex Flight Environment

The applicability of Assumptions 4–6 presented in Section 2 is reduced in real flight environments. In addition, the guidance information errors will affect interception accuracy. To verify the effectiveness of the proposed guidance law, the above factors are analyzed in Section 5.2 under a more complex flight environment.
As shown in Figure 7, Figure 8 and Figure 9, the ballistic simulation conditions are set as: (1) The filtering error of the target acceleration information is approximated by a random noise; (2) Introducing the drag coefficients, and the axial drag accelerations of the interceptors are changed from constants to time-varying parameters; and (3) Introducing the lift coefficients and constraining the normal accelerations of the interceptors by aerodynamic conditions, in addition to satisfying the structural limitations of the missiles.
A ballistic simulation is performed based on the simulation parameters listed in Table 1 and the target’s maneuver form shown in Equation (47). The three interceptors successfully intercept the target at 8.241 s, 8.238 s, and 8.247 s with miss distances of 1.2621 m, 4.0513 m, and 3.4692 m, respectively. The ballistics trajectories are shown in Figure 10.
Figure 8 and Figure 9 show that Assumptions 5 and 6 are largely valid under the conditions of considering the aerodynamic characteristics of missiles. From the ballistic trajectories shown in Figure 10, the small ballistic inclinations required by Assumption 4 are difficult to ensure during the offense-defense confrontations. However, in general, the proposed guidance law is robust enough to overcome a certain degree of guidance information errors and model linearization biases and basically achieve the expected collision-free simultaneous interception.

5.3. Various Target’s Maneuver Forms

Since the target’s maneuver forms during the interception process is unknown to the missile swarm, based on Section 5.2, three special target’s maneuver forms shown in Figure 11 are set up for ballistic simulations to further verify the interception performance of the proposed guidance law.
The simulation results are shown in Table 2 and Figure 12, under the three scenarios, the missile swarm all realizes the effective near-simultaneous interceptions, which suggests that, within the maximum range of the target’s preprogrammed command, the proposed guidance law could ensure the interception capability of the missile swarm. If the target does not set up an escape maneuver, the missile swarm can identify its intention.
After the above analysis and discussion, a method for evaluate the interception success rate of guidance law is proposed as follows combining with the engineering experience: Establish simulation models that can simulate more real flight environments, such as those with deviations in aerodynamic coefficients, atmospheric parameters and target position and velocity measurements, etc., and then perform Monte Carlo stochastic simulations considering various possible maneuver forms of the actual target. Based on the minimum miss distances of the multiple interceptors to determine whether a single simulation is successful or not, and then the interception success rate could be calculated.

6. Conclusions

To solve offense-defense confrontation problems of multi-missile cooperative intercepting a high-speed and large-maneuvering target, a differential game-based cooperative interception guidance law with collision avoidance is proposed. Based on the ballistic simulations in Section 5, the main conclusions of the study are summarized as follows.
  • Compared to the classical homing guidance law PNG, when the interceptors do not have speed and significant overload advantages over the target, the proposed guidance law has superior guidance performance and is capable of achieving simultaneous interceptions without inter-missile collisions.
  • Some of the assumptions for guidance law design proposed in Section 2 are not ideal in real flight environments, slightly affecting the interception time consensus, while the interception accuracy could still be guaranteed.
  • The setting method for the parameters of the target performance index proposed in Section 4 enables the missile swarm to correctly identify the incoming target’s maneuvering intention and then to cope with various target’s maneuver forms.

7. Limitation of Study

As with the majority of studies, the study in this paper is subject to some limitations. On one hand, in the process of establishing relative motion models used for the guidance law design, the linearization steps carried out in (5), (7) and (9) request small values of the ballistic inclinations, On the other hand, the theoretical derivation of the proposed guidance law does not consider model uncertainties and disturbances, as well as the control saturation phenomena.
Due to the above limitations, the interception time consensus will be slightly affected in real flight environments, while the interception accuracy could still be guaranteed, which is reflected in the simulations of Section 5. To reduce the impact of deviations between ideal and real systems on the guidance performance, the fuzzy systems or fuzzy time series [43] would be considered in subsequent works to improve the guidance law design.

Author Contributions

Conceptualization, methodology, software and validation, X.Z. and X.W.; writing—original draft preparation, X.W. and Y.L.; writing—review and editing, Y.L.; Supervision, J.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Proof of Lemma 2

The scalar target-ground relative motion model is
Z D ( t ) = Γ D ( t , t D ) x D ( t ) , Z ˙ D ( t ) = φ D ( t , t D ) u T ( t ) .
Since the coefficient matrix A D of the state equation x ˙ D = A D x D + B D u D is non-constant, it is needed to derive Γ D ( t , t D ) from the physical meaning of state transition matrix, and then, the explicit expression of φ D ( t , t D ) can be obtained.
Based on Assumption 5, the speed function of the target is set as
V T ( t ) = V T ( t 0 ) + γ T t ,
where γ T is the target’s axial drag acceleration.
From the homogeneous state equation x ˙ D = A D x D , the state variables are obtained as
a T a ( t D | t ) = a T a ( t ) e t D t τ T , θ T ( t D | t ) = θ T ( t ) + a T a ( t ) f 1 T ( t , t D ) , y ˙ D ( t D | t ) = y ˙ D ( t ) a T a ( t ) [ τ T ( e t D t τ T 1 ) f 2 T ( t , t D ) ] + θ T ( t ) γ T ( t D t ) , y D ( t D | t ) = y D ( t ) + y ˙ D ( t ) ( t D t ) + a T a ( t ) [ τ T 2 ( e t D t τ T 1 ) + τ T ( t D t ) + f 3 T ( t , t D ) ] + θ T ( t ) γ T ( t D t ) 2 2 y D ( t ) + y ˙ D ( t ) ( t D t ) + a T a ( t ) h T ( t , t D ) + θ T ( t ) g T ( t , t D ) ,
where
f 1 T ( t , t D ) = t t D e t D σ τ T V T ( σ ) d σ , f 2 T ( t , t D ) = t t D V ˙ T ( σ ) f 1 T ( σ , t D ) d σ , f 3 T ( t , t D ) = t t D f 2 T ( σ , t D ) d σ , h T ( t , t D ) = τ T 2 ( e t D t τ T 1 ) + τ T ( t D t ) + f 3 T ( t , t D ) , g T ( t , t D ) = γ T ( t D t ) 2 2 .
From Equation (A3), the target’s zero-effort attack miss distance and its differential expression are obtained as
Z D ( t ) = y D ( t ) + y ˙ D ( t ) ( t D t ) + a T a ( t ) h T ( t , t D ) + θ T ( t ) g T ( t , t D ) ,
Z ˙ D ( t ) = y ¨ D ( t ) ( t D t ) + a ˙ T a ( t ) h T ( t , t D ) + a T a ( t ) h ˙ T ( t , t D ) + θ ˙ T ( t ) g T ( t , t D ) + θ T ( t ) g ˙ T ( t , t D ) .
From the original state equation x ˙ D = A D x D + B D u D , Equation (A6) is rewritten as
Z ˙ D ( t ) = ( a T a + V ˙ T θ T + l T u T ) ( t D t ) + ( a T a τ T + 1 l T τ T u T ) h T ( t , t D ) + a T a h ˙ T ( t , t D ) + ( a T a V T + l T V T u T ) g T ( t , t D ) + θ T g ˙ T ( t , t D ) ,
where a T a is the normal acceleration generated by target attitude changes and the response process of which is approximated in the inertial form. Considering the short response time, the steady-state value of a T a is used for the subsequent derivation.
Substituting a T a = ( 1 l T ) u T into Equation (A7) yields
Z ˙ D ( t ) = [ ( t D t ) + ( 1 l T ) h ˙ T ( t , t D ) + γ T ( t D t ) 2 / ( 2 V T ) ] u T ( t ) ,
where h ˙ T ( t , t D ) = τ T ( e t D t τ T 1 ) f 2 T ( t , t D ) .
From Equations (A5) and (A8), it can be obtained that
Γ D ( t , t D ) = [ 1 t D t h T ( t , t D ) γ T ( t D t ) 2 2 ] , φ D ( t , t D ) = ( t D t ) + ( 1 l T ) h ˙ T ( t , t D ) + γ T ( t D t ) 2 / ( 2 V T ) .
The scalar target-ground relative motion model is established by Equation (A9).
Similarly, the state transition vectors and control coefficient functions in the scalar missile-target and inter-missile relative motion models are
Γ I i ( t , t f ) = [ 1 t f t h M i ( t , t f ) γ M i ( t f t ) 2 / 2 h T ( t , t f ) γ T ( t f t ) 2 / 2 ] , φ I T ( t , t f ) = ( t f t ) + ( 1 l T ) h ˙ T ( t , t f ) + γ T ( t f t ) 2 / ( 2 V T ) , φ I M i ( t , t f ) = ( t f t ) + ( 1 l M i ) h ˙ M i ( t , t f ) + γ M i ( t f t ) 2 / ( 2 V M i ) ,
Γ C i j ( t , t C i j ) = [ 1 t C i j t h M i ( t , t C i j ) γ M i ( t C i j t ) 2 / 2 h M j ( t , t C i j ) γ M j ( t C i j t ) 2 / 2 ] , φ C i j M j ( t , t C i j ) = ( t C i j t ) + ( 1 l M j ) h ˙ M j ( t , t C i j ) + γ M j ( t C i j t ) 2 / ( 2 V M j ) , φ C i j M i ( t , t C i j ) = ( t C i j t ) + ( 1 l M i ) h ˙ M i ( t , t C i j ) + γ M i ( t C i j t ) 2 / ( 2 V M i ) .
The proof is completed. □

Appendix B. Proof of the Target’s Optimal Penetration Strategy

Based on Equations (15), (16) and (21), the target Hamiltonian function is established as
H T = ω T E 2 u T 2 ( t ) + p D ( t ) Z ˙ D ( t ) + k = 1 n p I T k ( t ) Z ˙ I k ( t ) = ω T E 2 u T 2 ( t ) + p D ( t ) φ D ( t ) u T ( t ) + k = 1 n p I T k ( t ) [ φ I T ( t ) u T ( t ) φ I M k ( t ) u M k ( t ) ] ,
where p D ( t ) and p I T k ( t ) are the costate variables introduced corresponding to the target-ground and missile-target relative motion respectively.
The costate equation and boundary condition of the target-ground relative motion are
p ˙ D ( t ) = H T Z D = 0 , p D ( t f ) = J T Z D ( t f ) = ω T D Z D ( t f ) ,
the boundary conditions discussed in this paper are established on the basis of fixed terminal moment, t f is a time-varying parameter rather than a variable to be solved.
From Equation (A13), it can be obtained that
p D ( t ) = ω T D Z D ( t f ) .
The costate equation and boundary condition of the missile-target relative motion are
p ˙ I T k ( t ) = H T Z I k = 0 , p I T k ( t f ) = J T Z I k ( t f ) = ω T I k Z I k ( t f ) .
From Equation (A15), it can be obtained that
p I T k ( t ) = ω T I k Z I k ( t f ) .
The extremum condition of the target optimal control is
H T u T = ω T E u T ( t ) + p D ( t ) φ D ( t ) + k = 1 n p I T k ( t ) φ I T ( t ) = 0 .
Based on Equations (A14), (A16) and (A17), the target optimal control is derived as
u T ( t ) = ω T D Z D ( t f ) ω T E φ D ( t ) + k = 1 n ω T I k Z I k ( t f ) ω T E φ T ( t ) .
In Equation (A18), the zero-effort attack miss distance at the terminal moment notated as Z D ( t f ) cannot be directly used to calculation, and it is converted to the current moment according to the differential expression of the zero-effort attack miss distance.
Integrating Equation (15) and substituting Equation (A18) yields
Z D ( t f ) = Z D ( t ) + t t f φ D ( σ ) u T ( σ ) d σ = Z D ( t ) t t f [ ω T D Z D ( t f ) ω T E φ D 2 ( σ ) ] d σ + t t f [ k = 1 n ω T I k Z I k ( t f ) ω T E φ D ( σ ) φ I T ( σ ) ] d σ Z D ( t ) κ D D ω T D ω T E Z D f + κ D I T ω T I ω T E Z I f ,
where
ω T I = [ ω T I 1 ω T I n ] , Z D f = Z D ( t f ) , Z I f = [ Z I 1 ( t f ) Z I n ( t f ) ] T , κ D D = t t f φ D 2 ( σ ) d σ , κ D I T = t t f [ φ D ( σ ) φ I T ( σ ) ] d σ .
Equation (A19) is rewritten as
Z D f = Z D ( t ) 1 + κ D D ( ω T D / ω T E ) + κ D I T ( ω T I / ω T E ) Z I f 1 + κ D D ( ω T D / ω T E ) .
Substituting Equation (A21) into Equation (A18), the target optimal penetration strategy is derived as
u T * ( t ) = φ D ( t ) ω T D ω T E Z D f + φ I T ( t ) ω T I ω T E Z I f = φ D ( t ) ω T E / ω T D + κ D D Z D ( t ) + ( φ I T ( t ) φ D ( t ) κ D I T ω T E / ω T D + κ D D ) ω T I ω T E Z I f .
The proof is completed. □

Appendix C. Proof of the Interceptor Optimal Interception Strategy

Based on Equations (16), (17) and (30), the interceptor Hamiltonian function is established as
H M = k = 1 n ω M k E 2 u M k 2 ( t ) + k = 1 n p I M k ( t ) Z ˙ I k ( t ) + Ω s Ω p C i j ( t ) Z ˙ C i j ( t ) = k = 1 n ω M k E 2 u M k 2 ( t ) + k = 1 n p I M k ( t ) [ φ I T ( t ) u T ( t ) φ I M k ( t ) u M k ( t ) ] + Ω s Ω p C i j ( t ) [ φ C i j M j ( t ) u M j ( t ) φ C i j M i ( t ) u M i ( t ) ] ,
where p I M k ( t ) and p C i j ( t ) are the costate variables introduced corresponding to the missile-target and inter-missile relative motion respectively.
The costate equation and boundary condition of the missile-target relative motion are
p ˙ I M k ( t ) = H M Z I k = 0 , p I M k ( t f ) = J ¯ M Z I k ( t f ) = λ I M k .
From Equation (A24), it can be obtained that
p I M k ( t ) = λ I M k ,
The costate equation, boundary condition and interior point constraint condition of the inter-missile relative motion are
p ˙ C i j ( t ) = H M Z C i j = 0 , p C i j ( t f ) = J ¯ M Z C i j ( t f ) = 0 , p C i j ( t C i j ) = p C i j ( t C i j + ) + N C i j Z C i j ( t C i j ) λ C i j = p C w v ( t C i j + ) + λ C i j .
From Equation (A26), it can be obtained that
p C i j ( t ) = { λ C i j t [ 0 , t C i j ) 0 t [ t C i j , t f ] λ C i j T C i j ( t ) , T C i j ( t ) = { 1 t [ 0 , t C i j ) 0 t [ t C i j , t f ] .
According to Equation (8), t C i j > t is consistently true, i.e., T C i j is always equal to 1.
The extremum condition of the interceptor optimal control is
H M u M k = ω M k E u M k ( t ) p I M k ( t ) φ I M k ( t ) v = k + 1 Ω k v Ω n p C k v ( t ) φ C k v M k ( t ) + w = 1 Ω w k Ω k 1 p C w k ( t ) φ C w k M k ( t ) = 0 .
where Ω k v ( k < v ) and Ω w k ( w < k ) denote collisions associated with the kth interceptor.
Based on Equations (A25), (A27) and (A28), the interceptor optimal control is derived as
u M k ( t ) = p I M k ( t ) ω M k E φ I M k ( t ) + v = k + 1 Ω k v Ω n p C k v ( t ) ω M k E φ C k v M k ( t ) w = 1 Ω w k Ω k 1 p C w k ( t ) ω M k E φ C w k M k ( t ) , u M ( t ) = ( ω M E ) 1 [ Φ I M Φ C ] [ λ I M λ C T C ] = ( ω M E ) 1 [ Φ I M Φ C ] [ λ I M λ C ] ,
where
ω M E = [ ω M 1 E ω M n E ] , λ I M = [ λ I M 1 ( t ) M λ I M n ( t ) ] , λ C = [ λ C 1 ( t ) M λ C c ( t ) ] , T C = [ T C 1 ( t ) M T C c ( t ) ] , Φ I M = [ φ I M 1 ( t ) φ I M n ( t ) ] , Φ C = [ Φ k s ] n × c , Φ k s = { φ C s M k ( t ) I s = k φ C s M k ( t ) I I s = k 0 e l s e .
In Equation (A29), the Lagrange multipliers need to be solved according to the interceptors’ constraints. For ease of understanding, the following derivation introduces α and β to denote the index of an arbitrary interceptor and an arbitrary collision, respectively.
Integrating Equation (16) and substituting Equations (A18) and (A29) yields
Z I k ( t f ) = Z I k ( t ) + t t f [ φ I T ( σ ) u T ( σ ) φ I M k ( σ ) u M k ( σ ) ] d σ = Z I k ( t ) t t f [ ω D T Z D ( t f ) ω E T φ I T ( σ ) φ D ( σ ) ] d σ + t t f [ α = 1 n a T α Z I α ( t f ) ω E T φ I T 2 ( σ ) ] d σ t t f [ p I M k ( σ ) ω M k E φ I M k 2 ( σ ) ] d σ t t f [ v = k + 1 Ω k v Ω n p C k v ( σ ) ω M k E φ I M k ( σ ) φ C k v M k ( σ ) ] d σ + t t f [ w = 1 Ω w k Ω k 1 p C w k ( σ ) ω M k E φ I M k ( σ ) φ C w k M k ( σ ) ] d σ Z I k ( t ) κ I T D ω T D ω T E Z D f + κ I T I T ω T I ω T E Z I f κ I M k I M k λ I M k ω M k E v = k + 1 Ω k v Ω n κ I M k C k v M k λ C k v ω M k E + w = 1 Ω w k Ω k 1 κ I M k C w k M k λ C w k ω M k E .
According to Equations (31) and (A31), the interception constraint of the kth interceptor is expressed as
Z I k ( t f ) = Z I k ( t ) κ I T D ω T D ω T E Z D f + κ I T I T ω T I ω T E Z I f μ I M k I M k λ I M k + β = 1 c μ I M k C β λ C β = 0 ,
where
μ I M k I M k = κ I M k I M k ω M k E , μ I M k C β = { κ I M k C β M k ω M k E I β = k κ I M k C β M k ω M k E I I β = k , 0 e l s e
κ I T D = t t f φ I T ( σ ) φ D ( σ ) d σ , κ I T I T = t t f φ I T 2 ( σ ) d σ , κ I M k I M k = t t f φ I M k 2 ( σ ) d σ , κ I M k C β M k = t t C β φ I M k ( σ ) φ C β M k ( σ ) d σ .
According to Equation (A32), the matrix expression of the interceptors’ interception constraint is
I I λ I M + C I λ C = H I ,
where
I I = [ μ I M 1 I M 1 μ I M n I M n ] , C I = [ μ I M 1 C 1 μ I M 1 C c μ I M n C 1 μ I M n C c ] , H I = Z I Z ¯ I f N ( κ I T D ω T D ω T E Z D f κ I T I T ω T I ω T E Z I f ) , Z I = [ Z I 1 ( t ) Z I n ( t ) ] , N = [ 1 1 ] , Z ¯ I f = 0 ,
with Z ¯ I f denoting the vector of interception miss distances required by interception constraint.
Integrating Equation (17) and substituting Equation (A29) yields
Z C i j ( t C i j ) = Z C i j ( t ) + t t C i j [ φ C i j M j ( σ ) u M j ( σ ) φ C i j M i ( σ ) u M i ( σ ) ] d σ = Z C i j ( t ) + t t C i j [ p I M j ( σ ) ω M j E φ C i j M j ( σ ) φ I M j ( σ ) ] d σ t t C i j [ p I M i ( σ ) ω M i E φ C i j M i ( σ ) φ I M i ( σ ) ] d σ + t t C i j [ v = j + 1 Ω j v Ω n p C j v ( σ ) ω M j E φ C i j M j ( σ ) φ C j v M j ( σ ) ] d σ t t C i j [ w = 1 Ω w j Ω j 1 p C w j ( σ ) ω M j E φ C i j M j ( σ ) φ C w j M j ( σ ) ] d σ t t C i j [ v = i + 1 Ω i v Ω n p C i v ( σ ) ω M i E φ C i j M i ( σ ) φ C i v M i ( σ ) ] d σ + t t C i j [ w = 1 Ω w i Ω i 1 p C w i ( σ ) ω M i E φ C i j M i ( σ ) φ C w i M i ( σ ) ] d σ Z C i j ( t ) + κ C i j M j I M j λ I M j ω M j E κ C i j M i I M i λ I M i ω M i E + v = j + 1 Ω j v Ω n κ C i j M j C j v M j λ C j v ω M j E w = 1 Ω w j Ω v 1 κ C i j M j C w j M j λ C w j ω M j E v = i + 1 Ω i v Ω n κ C i j M i C i v M i λ C i v ω M i E + w = 1 Ω w i Ω w 1 κ C i j M i C w i M i λ C w i ω M i E ,
where Ω χ v ( χ χ = i , j < v ) and Ω w χ ( w < χ χ = i , j ) denote the collisions associated with the χ t h interceptor.
According to Equations (31) and (A37), the collision avoidance constraint of the ith and the jth interceptors is expressed as
Z C s ( t C s ) = Z C s ( t ) + α = 1 n μ C s I M α λ I M α + β = 1 c μ C s C β λ C β = s i g n ( Z C s ( t ) ) r ,
where s denotes the index of the collision between the ith and the jth interceptors, and
μ C s I M α = { κ C s M α I M α ω M α E α = s κ C s M α I M α ω M α E α = s 0 e l s e , μ C s C β = { κ C s M I I s C β M I I s ω M I I s E I β = I I s , Ω β Ω s κ C s M I I s C β M I I s ω M I I s E I I β = I I s , Ω β Ω s κ C s M I s C β M I s ω M I s E I β = I s , Ω β Ω s κ C s M I s C β M I s ω M I s E I I β = I s , Ω β Ω s κ C s M I I s C β M I I s ω M I I s E κ C s M I s C β M I s ω M I s E Ω β = Ω s 0 e l s e ,
κ C s M α I M α = t t C s φ C s M α ( σ ) φ I M α ( σ ) d σ , κ C s M I s C β M I s = t m i n ( t C s , t C β ) φ C s M I s ( σ ) φ C β M I s ( σ ) d σ , κ C s M I I s C β M I I s = t m i n ( t C s , t C β ) φ C s M I I s ( σ ) φ C β M I I s ( σ ) d σ .
According to Equation (A38), the matrix expression of the interceptors’ collision avoidance constraint is
I C λ I M + C C λ C = H C ,
where
I C = [ μ C 1 I M 1 μ C 1 I M n μ C c I M 1 μ C c I M n ] , C C = [ μ C 1 C 1 μ C 1 C c μ C c C 1 μ C c C c ] , H C = Z C Z ¯ C f , Z C = [ Z C 1 ( t ) M Z C c ( t ) ] , Z ¯ C f = [ s i g n ( Z C 1 ( t ) ) r s i g n ( Z C c ( t ) ) r ] ,
with Z ¯ C f denoting the vector of approach distances required by collision avoidance constraint.
From Equations (A35) and (A41), it can be obtained that
[ I I C I I C C C ] [ λ I M λ C ] = [ H I H C ] ,
[ λ I M λ C ] = [ I I C I I C C C ] 1 [ H I H C ] ,
where
[ I I C I I C C C ] 1 = [ I I 1 + I I 1 C I ( C C I C I I 1 C I ) 1 I C I I 1 I I 1 C I ( C C I C I I 1 C I ) 1 ( C C I C I I 1 C I ) 1 I C I I 1 ( C C I C I I 1 C I ) 1 ] [ G I I G C I G I C G C C ] G .
Substituting Equation (A44) into Equation (A29), the interceptor optimal interception strategy is derived as
u M * ( t ) = ( ω M E ) 1 [ Φ I M Φ C ] G [ H I H C ] .
The proof is completed. □

Appendix D. Proof of Proposition 3

Based on Equations (A29) and (A44), the performance index of the interceptors is expressed as
2 J M = t t f ( u M T ω M E u M ) d σ = [ λ I M λ C ] T { t t f [ Φ I M T ( ω M E ) 1 Φ I M Φ I M T ( ω M E ) 1 Φ C Φ C T ( ω M E ) 1 Φ I M Φ C T ( ω M E ) 1 b C ] d σ } [ λ I M λ C ] = [ λ I M λ C ] T [ I I C I I C C C ] [ λ I M λ C ] = [ H I H C ] T [ G I I G C I G I C G C C ] [ H I H C ] = H I T G I I H I + Z C T G I C H I + H I T G C I Z C + Z C T G C C Z C ( G C C Z C + G I C H I ) T ( G C C ) 1 ( G C C Z C + G I C H I ) + ( Z ¯ C f Z C ( G C C ) 1 G I C H I ) T G C C ( Z ¯ C f Z C ( G C C ) 1 G I C H I ) ,
where the first five terms on the right of the equal sign are independent of Z ¯ C f , therefore, the optimal value of Z ¯ C f should satisfy
( Z ¯ C f ) * = a r g m i n Z ¯ C f S ( Z ¯ C f Z C ( G C C ) 1 G I C H I ) T G C C ( Z ¯ C f Z C ( G C C ) 1 G I C H I ) a r g m i n Z ¯ C f S ( Z ¯ C f Z V ) T G C C ( Z ¯ C f Z V ) ,
where Z V = Z C + ( G C C ) 1 G I C H I , S = { Z ¯ C f c | | Z ¯ C s f | r , Ω s Ω } , Z ¯ C s f is the sth component of Z ¯ C f .
The solution method of Equation (A48) is presented in [41], and due to the complexity of its computational steps, Z ¯ C f is optimized as follows in this paper.
( Z ¯ C 1 f ) * = { Z V s | Z V s | r s i g n ( Z V s ) r | Z V s | < r , ( Z ¯ C f ) * = [ ( Z ¯ C 1 f ) * ( Z ¯ C c f ) * ] T ,
where Z V s is the sth component of Z V .
The proof is completed. □

References

  1. Yao, Y.; Yu, W.; Yang, L.; Chen, W. A Survey of Multi-Missile Cooperative Guidance Technology. Aerodyn. Missile J. 2021, 112–121. [Google Scholar]
  2. Zhou, M.; Wang, Y.; Guo, J.; Lu, X. A Survey of Multi-Missile Cooperative Terminal Guidance. Aero Weapon. 2023, 30, 17–25. [Google Scholar]
  3. Yang, J. Guidance and Control of Modern Missiles; Northwestern Polytechnical University Press: Xi’an, China, 2016. [Google Scholar]
  4. Wang, L. Study on Optimization and Design Approach for Multiple Flight Vehicles Cooperative Interception Based on Area Coverage. Ph.D. Thesis, Harbin Institute of Technology, Harbin, China, 2018. [Google Scholar]
  5. Liu, S.; Yan, B.; Zhang, T.; Zhang, X.; Yan, J. Coverage-Based Cooperative Guidance Law for Intercepting Hypersonic Vehicles with Overload Constraint. Aerosp. Sci. Technol. 2022, 126, 107651. [Google Scholar] [CrossRef]
  6. Su, W.; Li, K.; Chen, L. Coverage-Based Three-Dimensional Cooperative Guidance Strategy against Highly Maneuvering Target. Aerosp. Sci. Technol. 2019, 85, 556–566. [Google Scholar] [CrossRef]
  7. Liu, S.; Yan, B.; Zhang, T.; Zhang, X.; Yan, J. Three-Dimensional Coverage-Based Cooperative Guidance Law with Overload Constraints to Intercept a Hypersonic Vehicle. Aerosp. Sci. Technol. 2022, 130, 107908. [Google Scholar] [CrossRef]
  8. Liu, S.; Yan, B.; Liu, R.; Dai, P.; Yan, J.; Xin, G. Cooperative Guidance Law for Intercepting a Hypersonic Target with Impact Angle Constraint. Aeronaut. J. 2022, 126, 1026–1044. [Google Scholar] [CrossRef]
  9. Tan, S.; Lei, H.; Wang, B. Cooperative Guidance Law for Hypersonic Targets with Constrained Impact Angle. Trans. BeiJing Inst. Technol. 2019, 39, 597–602. [Google Scholar]
  10. You, H.; Chang, X.; Zhao, J.; Wang, S.; Zhang, Y. Three-Dimensional Impact-Angle-Constrained Fixed-Time Cooperative Guidance Algorithm with Adjustable Impact Time. Aerosp. Sci. Technol. 2023, 141, 108574. [Google Scholar] [CrossRef]
  11. Wei, M.; Cui, Z.; Li, Y. Review and Future Development of Multi-Missile Coordinated Interception. Acta Aeronaut. Astronaut. Sin. 2020, 41, 29–36. [Google Scholar]
  12. Isaacs, R. Differential Games; John Wiley & Sons: New York, NY, USA, 1965. [Google Scholar]
  13. Isaacs, R. Research Memoranda RM-1391, RM-1399, RM-1411, RM-1468; RAND Corporation: Santa Monica, CA, USA, 1956. [Google Scholar]
  14. von Neumann, J.; Morgenstern, O. Theory of Games and Economic Behaviour; Princeton University Press: Princeton, NJ, USA, 1944. [Google Scholar]
  15. Nash, J.F. Equilibrium Points in n -Person Games. Proc. Natl. Acad. Sci. USA 1950, 36, 48–49. [Google Scholar] [CrossRef]
  16. Bryson, A.E.; Ho, Y.-C. Applied Optimal Control: Optimization, Estimation, and Control; John Wiley & Sons: New York, NY, USA, 1975. [Google Scholar]
  17. Saridis, G.N. On a Class of Performance-Adaptive Self-Organizing Control Systems. In Pattern Recognition and Machine Learning; Fu, K.S., Ed.; Springer: Boston, MA, USA, 1971; pp. 204–220. [Google Scholar]
  18. Jond, H.B.; Platoš, J. Differential Game-Based Optimal Control of Autonomous Vehicle Convoy. IEEE Trans. Intell. Transport. Syst. 2023, 24, 2903–2919. [Google Scholar] [CrossRef]
  19. Zhao, S.; Qin, L.; Zhou, X.; Zhang, D. Optimized Power Control Algorithm Based on Differential Game Theory in Cognitive Radio Networks. In Proceedings of the 2022 41st IEEE Chinese Control Conference (CCC), Hefei, China, 25 July 2022; pp. 6951–6956. [Google Scholar]
  20. An, E.; Sun, Q.; Hu, J.; Wang, R. A Differential Game Approach to Distributed Energy Trading for Energy Internet. In Proceedings of the 2020 IEEE 4th Conference on Energy Internet and Energy System Integration (EI2), Wuhan, China, 30 October 2020; pp. 3608–3613. [Google Scholar]
  21. Guo, Z.; Zhou, S. Research on Cooperative Differential Game Guidance Law for Multi-Missile. J. Ordnance Equip. Eng. 2019, 40, 21–25. [Google Scholar]
  22. Guo, Z.; Zhou, S.; Yu, Y. Research of Cooperative Norm Differential Games Guidance Law for Intercepting a Maneuvering Target. Comput. Simul. 2020, 37, 23–26. [Google Scholar]
  23. Hua, W.; Zhang, Y.; Zhang, J.; Meng, Q. Differential Game Guidance Law for Double Missiles with Cooperative Intercept Angle. J. Chin. Inert. Technol. 2016, 24, 838–844. [Google Scholar]
  24. Shaferman, V.; Shima, T.Y. A Cooperative Differential Game for Imposing a Relative Intercept Angle. In Proceedings of the AIAA Guidance, Navigation, and Control Conference, Grapevine, TX, USA, 9 January 2017. [Google Scholar]
  25. Su, S.; Xie, Y.; Bai, Y.; Liu, Y.; Shan, Y. Research on Differential Game Cooperative Confrontation Guidance Law Method. Air Space Def. 2022, 5, 58–64. [Google Scholar]
  26. Shima, T.; Shinar, J. Time-Varying Linear Pursuit-Evasion Game Models with Bounded Controls. J. Guid. Control Dyn. 2002, 25, 425–432. [Google Scholar] [CrossRef]
  27. Hua, W.; Chen, X. Nonlinear Bounded-Control Differential Game Guidance Law for Variable-Speed Missiles. Control Decis. 2011, 26, 1886–1890. [Google Scholar]
  28. Mishley, A.; Shaferman, V. Linear Quadratic Guidance Laws with Intercept Angle Constraints and Varying Speed Adversaries. J. Guid. Control Dyn. 2022, 45, 2091–2106. [Google Scholar] [CrossRef]
  29. Gutman, S. Superiority of Canards in Homing Missiles. IEEE Trans. Aerosp. Electron. Syst. 2003, 39, 740–746. [Google Scholar] [CrossRef]
  30. Zhu, D.; Zheng, Y.; Ren, Q.; Sun, P. Differential Game Guidance Law for 3-Party Game with Incomplete Information. In Proceedings of the 2021 IEEE China Automation Congress (CAC), Beijing, China, 22 October 2021; pp. 2003–2008. [Google Scholar]
  31. Zhang, J.; Wang, F. Optimal Control: Mathematical Theory and Intelligent Methods; Tsinghua University Press: Beijing, China, 2017. [Google Scholar]
  32. Hao, G.; Lv, Q.; Huang, Z.; Zhao, H.; Chen, W. UAV Path Planning Based on Improved Artificial Potential Field Method. Aerospace 2023, 10, 562. [Google Scholar] [CrossRef]
  33. Liu, C.; Xie, F.; Ji, T. Fixed-Wing UAV Formation Path Planning Based on Formation Control: Theory and Application. Aerospace 2023, 11, 1. [Google Scholar] [CrossRef]
  34. Fiorini, P.; Shiller, Z. Motion Planning in Dynamic Environments Using Velocity Obstacles. Int. J. Robot. Res. 1998, 17, 760–772. [Google Scholar] [CrossRef]
  35. Chakravarthy, A.; Ghose, D. Obstacle Avoidance in a Dynamic Environment: A Collision Cone Approach. IEEE Trans. Syst. Man Cybern.—Part A Syst. Hum. 1998, 28, 562–574. [Google Scholar] [CrossRef]
  36. Han, S.-C.; Bang, H.; Yoo, C.-S. Proportional Navigation-Based Collision Avoidance for UAVs. Int. J. Control Autom. Syst. 2009, 7, 553–565. [Google Scholar] [CrossRef]
  37. Tony, L.A.; Ghose, D.; Chakravarthy, A. Precision UAV Collision Avoidance Using Computationally Efficient Avoidance Maps. In Proceedings of the 2018 AIAA Guidance, Navigation, and Control Conference, Kissimmee, FL, USA, 8 January 2018. [Google Scholar]
  38. Chen, S.; Ma, D.; Yao, Y.; Wang, X.; Li, C. Cooperative Polynomial Guidance Law with Collision Avoidance and Flight Path Angle Coordination. Aerosp. Sci. Technol. 2022, 130, 107809. [Google Scholar] [CrossRef]
  39. Mylvaganam, T.; Sassano, M.; Astolfi, A. A Differential Game Approach to Multi-Agent Collision Avoidance. IEEE Trans. Autom. Control 2017, 62, 4229–4235. [Google Scholar] [CrossRef]
  40. Weiss, M.; Shima, T. Linear Quadratic Optimal Control-Based Missile Guidance Law with Obstacle Avoidance. IEEE Trans. Aerosp. Electron. Syst. 2019, 55, 205–214. [Google Scholar] [CrossRef]
  41. Kumar, S.R.; Weiss, M.; Shima, T. Minimum-Effort Intercept Angle Guidance with Multiple-Obstacle Avoidance. J. Guid. Control Dyn. 2018, 41, 1355–1369. [Google Scholar] [CrossRef]
  42. Jha, B.; Tsalik, R.; Weiss, M.; Shima, T. Cooperative Guidance and Collision Avoidance for Multiple Pursuers. J. Guid. Control Dyn. 2019, 42, 1506–1518. [Google Scholar] [CrossRef]
  43. Bajestani, N.S.; Kamyad, A.V.; Zare, A. A Piecewise Type-2 Fuzzy Regression Model. IJCIS 2017, 10, 734. [Google Scholar] [CrossRef]
Figure 1. The motion relations of offense-defense confrontation.
Figure 1. The motion relations of offense-defense confrontation.
Aerospace 11 00771 g001
Figure 2. Ballistics trajectories.
Figure 2. Ballistics trajectories.
Aerospace 11 00771 g002
Figure 3. Inter-missile distances.
Figure 3. Inter-missile distances.
Aerospace 11 00771 g003
Figure 4. Ballistics trajectories without collision avoidance.
Figure 4. Ballistics trajectories without collision avoidance.
Aerospace 11 00771 g004
Figure 5. Inter-missile distances without collision avoidance.
Figure 5. Inter-missile distances without collision avoidance.
Aerospace 11 00771 g005
Figure 6. Ballistics trajectories with PNG.
Figure 6. Ballistics trajectories with PNG.
Aerospace 11 00771 g006
Figure 7. Normal acceleration of the target with a random noise.
Figure 7. Normal acceleration of the target with a random noise.
Aerospace 11 00771 g007
Figure 8. Flight speeds of the three interceptors in the complex flight environment.
Figure 8. Flight speeds of the three interceptors in the complex flight environment.
Aerospace 11 00771 g008
Figure 9. Normal accelerations of the three interceptors in the complex flight environment.
Figure 9. Normal accelerations of the three interceptors in the complex flight environment.
Aerospace 11 00771 g009
Figure 10. Ballistics trajectories in the complex flight environment.
Figure 10. Ballistics trajectories in the complex flight environment.
Aerospace 11 00771 g010
Figure 11. Three special target’s maneuver forms.
Figure 11. Three special target’s maneuver forms.
Aerospace 11 00771 g011
Figure 12. Ballistics trajectories under the three special target’s maneuver forms.
Figure 12. Ballistics trajectories under the three special target’s maneuver forms.
Aerospace 11 00771 g012
Table 1. Simulation parameters.
Table 1. Simulation parameters.
Three InterceptorsTarget
τ M = 0.3 / 0.3 / 0.3 τ T = 0.3
l M = 0.02 / 0.02 / 0.02 l T = 0.02
V M 0 = 1230 / 1200 / 1210   m / s V T 0 = 1500   m / s
γ M = 9.8 / 9.8 / 9.8   m / s 2 γ T = 9.5   m / s 2
θ M 0 = 33 / 36 / 30 ° θ T 0 = 20 °
x M 0 = 20,000 / 20,300 / 20,000   m x T 0 = 40,000   m
y M 0 = 20,000 / 20,000 / 20,300   m y T 0 = 30,000   m
a M m a x = 125 / 125 / 125   m / s 2 a T m a x = 100   m / s 2
r = 150   m
Table 2. Simulation results under the three special target’s maneuver forms.
Table 2. Simulation results under the three special target’s maneuver forms.
ScenarioMiss DistanceInterception Time
1 M 1 : 2.4286   m M 2 : 2.1373   m M 3 : 0.4972   m M 1 : 8.478   s M 2 : 8.491   s M 3 : 8.479   s
2 M 1 : 0.3841   m M 2 : 0.3133   m M 3 : 2.0854   m M 1 : 8.444   s M 2 : 8.428   s M 3 : 8.490   s
3 M 1 : 1.1476   m M 2 : 1.4829   m M 3 : 1.6220   m M 1 : 8.182   s M 2 : 8.173   s M 3 : 8.195   s
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhu, X.; Wang, X.; Li, Y.; Yang, J. Differential Game-Based Cooperative Interception Guidance Law with Collision Avoidance. Aerospace 2024, 11, 771. https://doi.org/10.3390/aerospace11090771

AMA Style

Zhu X, Wang X, Li Y, Yang J. Differential Game-Based Cooperative Interception Guidance Law with Collision Avoidance. Aerospace. 2024; 11(9):771. https://doi.org/10.3390/aerospace11090771

Chicago/Turabian Style

Zhu, Xueping, Xinxing Wang, Yue Li, and Jun Yang. 2024. "Differential Game-Based Cooperative Interception Guidance Law with Collision Avoidance" Aerospace 11, no. 9: 771. https://doi.org/10.3390/aerospace11090771

APA Style

Zhu, X., Wang, X., Li, Y., & Yang, J. (2024). Differential Game-Based Cooperative Interception Guidance Law with Collision Avoidance. Aerospace, 11(9), 771. https://doi.org/10.3390/aerospace11090771

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop