Survey in Operations Research and Management Science
The Weapon-Target Assignment Problem

https://doi.org/10.1016/j.cor.2018.10.015Get rights and content

Highlights

  • The various formulations for the static and dynamic WTA problems are defined.

  • Exact algorithms used to solve the WTA are explored.

  • Heuristic algorithms used to solve the WTA are explored.

  • An exposition on the evolution of the WTA and its future is given.

Abstract

Research addressing the Weapon Target Assignment (WTA) Problem, the problem of assigning weapons to targets while considering their effective probability of kill, began with Manne’s seminal work in 1958. In the years following, improved modeling and solution techniques have been developed, along with improvements in computing power, which have enabled researchers to consider more complex variants of the problem, to include models with fewer assumptions and models in which time is a parameter. Herein, we review the various model formulations, exact algorithms, and heuristic algorithms for the static and dynamic WTA. We place the formulations into a comparable form and use this form to provide insight into the evolution of the defense-related WTA problem. The solution methods are comparatively analyzed and an analysis of the influence of past work is conducted. More recent developments are introduced and discussed.

Introduction

Projectile weapons have been a consistent threat of hostilities throughout history. Military advantage has always been aided by the capacity to inflict damage from a distance. In the 20th century, missile technology advanced to the point that an adversary had the potential to attack a protected asset from great distances. To neutralize this stand off threat, the concept of air defense evolved. However, as the ability to reduce a missile threat increased, so too did the quantity and quality of missiles available, and research into the effective allocation of air defense resources emerged.

Originally introduced into the field of operations research by Manne (1958), the Weapon Target Assignment (WTA) Problem, or Missile Allocation Problem (MAP) as it is sometimes known, seeks to assign available interceptors to incoming missiles so as to minimize the probability of a missile destroying a protected asset. While much of the literature on the WTA focuses on the defensive perspective, some have considered the offensive perspective (Sikanen, 2008), wherein the objective is to maximize the probability of destroying enemy protected assets.

There are two distinct categories of the WTA: the Static WTA (SWTA) and the Dynamic WTA (DWTA). Originally modeled by Manne (1958), the SWTA defines a scenario wherein a known number of incoming missiles (targets) are observed and a finite number of interceptors (weapons), with known probabilities of successfully destroying the targets (probabilities of kill), are available for a single exchange. The solution to the SWTA informs the defense on how many of each weapon type to shoot at each target. In the SWTA, no subsequent engagements are considered since time is not a dimension considered in the problem.

By contrast, the DWTA includes time as a dimension. Variants of the DWTA include the two stage DWTA and the shoot-look-shoot DWTA. The two stage DWTA replicates the SWTA in its first stage, but includes a second stage wherein a number of targets of various types are known only to a probability distribution. In this variant, the solution to the DWTA informs the defense on how to allocate the weapons in the first stage and how many to reserve for the second stage in order to minimize the probability of destruction. The shoot-look-shoot variant also replicates the SWTA, however it enables the defense to observe which targets may have survived the engagement (leakers) and allows for a subsequent engagement opportunity. The solution to this variant similarly informs the defense on how to allocate the weapons and how many weapons to reserve to reengage any leakers.

The WTA has been solved to optimality with exact algorithms. However, as Lloyd and Witsenhausen (1986) showed that the WTA is NP-Complete, the majority of solution techniques seek to find near optimal solutions in real-time, or “fast enough to provide an engagement solution before the oncoming targets reached their goals” (Leboucher et al., 2013). These real-time solution techniques are products of heuristic algorithms or are solved using exact algorithms applied to transformations of the formulation.

The rest of this paper proceeds as follows. In Section 2, we review the various formulations for both the SWTA and DWTA. We examine the basic formulations of each and explore the transformations which have been implemented. We also review novel formulations which have sought to model and solve the problem in unique settings. In Section 3, we review the exact algorithms that have been used to solve the SWTA and DWTA. Some of these algorithms provide optimal solutions to the original formulations whereas others refer to the transformed formulations identified in Section 2. In Section 4, we review the heuristic and metaheuristic solution techniques for the SWTA and DWTA. In Section 5, we discuss the state of the WTA and present a metric with which we focused this examination of the literature.

Section snippets

Formulations

There have been many different formulations of the WTA. Early literature sought to transform the nonlinear formulation from Manne (1958) due to the computational limitations with nonlinear programming. As computational power increased, transformations which were better suited to global optimization tools emerged. Burr et al. (1985) introduced the DWTA which captured the value of subsequent engagements. Similar to the SWTA, variations to the original DWTA occur throughout the literature.

Herein,

Exact algorithms

There are few cases in the literature of exact algorithmic solutions to the WTA. The problem suffers due to its complexity as an NP-Complete problem (Lloyd and Witsenhausen, 1986) and, like routing problems, are simply hard to solve. For the SWTA, the number of possible permutations of assigning m weapons to n targets is nm, assuming that all weapons must be assigned, which, as the number of weapons and targets increases, grows exponentially and searching all possible solutions quickly becomes

Heuristic algorithms

Due to the computational complexity of the WTA, much of the literature focuses on heuristic algorithms which provide real time solutions rather than guaranteed optimal solutions. Many of these are of well known heuristic algorithms, such as the very large scale neighborhood (VLSN) search or the Genetic Algorithm (GA), but others are of new design, seeking to exploit the special structure of the WTA.

Evolution of WTA

Research on the WTA has evolved since the work of Manne (1958) with developments in both the formulation of the problem and the solution techniques implemented. In the earliest works, reference to the limited capacity to solve large nonlinear problems (Day, 1966) resulted in attention on simplified formulations of the SWTA (denBroeder et al., 1959) and solution techniques capable given the computational capacity of the day (i.e., (Lemus and David, 1963), (Day, 1966)). Eckler and Burr (1972)

Conclusion

The WTA has a rich breadth of literature which serves to improve upon the theory and techniques necessary to efficiently solve these complex problems. Early works sought to find methods to transform the problem into a simpler form, assume many of the complexities away, or do both in order to generate a formulation which was manageable with the computational capacity of the day. The theories and techniques proposed by the earliest researchers, such as Manne (1958) and denBroeder et al. (1959),

References (80)

  • D.K. Ahner et al.

    Optimal multi-stage allocation of weapons to targets using adaptive dynamic programming

    Optim. Lett.

    (2015)
  • R.K. Ahuja et al.

    Exact and heuristic algorithms for the weapon-target assignment problem

    Oper. Res.

    (2007)
  • M. Alighanbari

    Task Assignment Algorithms for Teams of UAVs in Dynamic Environments

    (2004)
  • D.P. Bertsekas et al.

    Missile defense and interceptor allocation by neuro-dynamic programming

    IEEE Trans. Syst. ManCybern. Part A

    (2000)
  • L.F. Bertuccelli et al.

    Active exploration in robust unmanned vehicle task assignment

    J. Aerosp. Comput. Inf.Commun.

    (2011)
  • N.T. Boardman et al.

    Heterogeneous surface-to-air missile defense battery location: a game theoretic approach

    J. Heuristics

    (2017)
  • Z. Bogdanowicz et al.

    Sensor-target and weapon-target pairings based on auction algorithm

    Proceedings of the 11th WSEAS International Conference on Applied Mathematics

    (2007)
  • Z.R. Bogdanowicz

    Advanced input generating algorithm for effect-based weapon–target pairing optimization

    IEEE Trans. Syst. ManCybern. Part A

    (2012)
  • Z.R. Bogdanowicz et al.

    Optimization of weapon–target pairings based on kill probabilities

    IEEE Trans. Cybern.

    (2013)
  • S.A. Burr et al.

    Integer prim-read solutions to a class of target defense problems

    Oper. Res.

    (1985)
  • E. Çetin

    A queuing theoretical model for anticancer tool selection.

    International Mathematical Forum

    (2007)
  • S.-c. Chang et al.

    Assignment algorithm for kinetic energy weapons in boost phase defence

    26th IEEE Conference on Decision and Control, 1987

    (1987)
  • J. Chen et al.

    Evolutionary decision-makings for the dynamic weapon-target assignment problem

    Sci. China Ser. F

    (2009)
  • R.H. Day

    Allocating weapons to target complexes by means of nonlinear programming

    Oper. Res.

    (1966)
  • G. denBroeder et al.

    On optimum target assignments

    Oper. Res.

    (1959)
  • A.R. Eckler et al.

    Mathematical Models of Target Coverage and Missile Allocation

    Technical Report AD-A953 517

    (1972)
  • T.-p. Fu et al.

    Improved genetic and ant colony optimization algorithm for regional air defense WTA problem

    Innovative Computing, Information and Control, 2006. ICICIC’06. First International Conference on

    (2006)
  • E. Gelenbe et al.

    Fast distributed near-optimum assignment of assets to tasks

    Comput. J.

    (2010)
  • B. Golany et al.

    Allocating multiple defensive resources in a zero-sum game setting

    Ann. Oper. Res.

    (2015)
  • R.R. Hill et al.

    Heuristics and Their use in Military Modeling

    (2010)
  • P.A. Hosein

    A Class of Dynamic Nonlinear Resource Allocation Problems

    Technical Report LIDS-TH-1922

    (1989)
  • P.A. Hosein et al.

    The Dynamic Weapon-Target Assignment Problem

    Technical Report LIDS-P-1887

    (1989)
  • P.A. Hosein et al.

    Dynamic Weapon-Target Assignment Problems with Vulnerable C2Nodes

    Technical Report LIDS-P-1786

    (1988)
  • S.-c. Huang et al.

    Research of ant colony algorithm for solving target assignment problem

    Syst. Eng. Electron.

    (2005)
  • W. Jian et al.

    Sensor-weapon joint management based on improved genetic algorithm

    34th Chinese Control Conference (CCC), 2015

    (2015)
  • F. Johansson et al.

    An empirical investigation of the static weapon-target allocation problem

    Proceedings of the 3rd Skövde Workshop on Information Fusion Topics

    (2009)
  • F. Johansson et al.

    Real-time allocation of defensive resources to rockets, artillery, and mortars

    2010 13th Conference on Information Fusion

    (2010)
  • B.A. Julstrom

    String-and permutation-coded genetic algorithms for the static weapon-target assignment problem

    Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers

    (2009)
  • D. Khosla

    Hybrid genetic approach for the dynamic weapon-target allocation problem

    Battlespace Digitization and Network-Centric Warfare

    (2001)
  • A. Kline

    Real-Time Heuristic Algorithms for the Static Weapon-Target Assignment Problem

    (2017)
  • Cited by (0)

    View full text