Extending JASPER for Jammer-Angle Allocation Evaluation: Testing Algorithm Robustness Under Jammer Failures and Varying Resource Conditions
DOI:
https://doi.org/10.4108/eetiot.9702Keywords:
Simulation-based test and evaluation, Agent-based simulation, Jammer allocation algorithms, Threat evaluation and weapon allocation, Anti-drone systemsAbstract
JASPER is a scenario-driven simulation testbed for analyzing jammer-angle allocation (JAA) strategies in anti-UAV defense systems. It provides a modular simulation environment where users can run controlled experiments that reflect realistic anti-UAV scenarios. In this extended version, we introduce a new failure mechanism that allows jammers to fail dynamically during simulation. This addition enables the testing of algorithmic robustness under partial system degradation and is showcased through a newly designed case study focused on how algorithms recover and adapt after resource loss. We also conduct a sensitivity analysis by varying the number of jammers, exploring trade-offs between coverage, swivel workload, and algorithm runtime. Beyond enabling performance comparisons under realistic constraints, these experiments also reinforce the reliability and adaptability of the JASPER platform. Together, these additions make JASPER a more expressive and fault-aware testbed for evaluating directional jamming strategies under realistic conditions.
Downloads
References
[1] Shi, X., Yang, C., Xie, W., Liang, C., Shi, Z. and Chen, J. (2018) Anti-drone system with multiple surveillance technologies: Architecture, implementation, and challenges. IEEE Communications Magazine 56(4): 68–74. DOI: https://doi.org/10.1109/MCOM.2018.1700430
[2] Park, S., Kim, H.T., Lee, S., Joo, H. and Kim, H. (2021) Survey on anti-drone systems: Components, designs, and challenges. IEEE access 9: 42635–42659. DOI: https://doi.org/10.1109/ACCESS.2021.3065926
[3] Tyurin, V., Martyniuk, O., Mirnenko, V., Open’ko, P. and Korenivska, I. (2019) General approach to counter unmanned aerial vehicles. In 2019 IEEE 5th International Conference Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD) (IEEE): 75–78. DOI: https://doi.org/10.1109/APUAVD47061.2019.8943859
[4] Carling, R.L. (1993) A knowledge-base system for the threat evaluation and weapon assignment process. Naval Engineers Journal 105(1): 31–41. DOI: https://doi.org/10.1111/j.1559-3584.1993.tb02704.x
[5] Karasakal, O. (2008) Air defense missile-target allocation models for a naval task group. Computers & Operations Research 35(6): 1759–1770. DOI: https://doi.org/10.1016/j.cor.2006.09.011
[6] Luke, S., Cioffi-Revilla, C., Panait, L., Sullivan, K. and Balan, G. (2005) Mason: A multiagent simulation environment. Simulation 81(7): 517–527. DOI: https://doi.org/10.1177/0037549705058073
[7] Balci, O. (1995) Principles and techniques of simulation validation, verification, and testing. In Proceedings of the 27th conference on Winter simulation: 147–154. DOI: https://doi.org/10.1145/224401.224456
[8] Choi, S.Y., Park, K., Yang, J.H. and Kang, H.I. (2015) Application of agent-based multimethod simulation approach to the simulation testbed prototype for the concept exploration and requirement analysis of ugv. In ECMS: 57–63. DOI: https://doi.org/10.7148/2015-0057
[9] Carson, J.S. (2005) Introduction to modeling and simulation. In Proceedings of the Winter Simulation Conference, 2005. (IEEE): 8–pp.
[10] Rothenberg, J. (1986) Object-oriented simulation: Where do we go from here? In Proceedings of the 18th conference on Winter simulation: 464–469. DOI: https://doi.org/10.1145/318242.318478
[11] Puzicha, A. and Buchholz, P. (2021) A simulation environment for autonomous robot swarms with limited communication skills. In Simulation Tools and Techniques: 12th EAI International Conference, SIMUtools 2020, Guiyang, China, August 28-29, 2020, Proceedings, Part II 12 (Springer): 206–226. DOI: https://doi.org/10.1007/978-3-030-72795-6_17
[12] Cai, W., Song, X., Liu, C., Jiang, D. and Huo, L. (2021) An adaptive and efficient network traffic measurement 9 A. B. Baraklı et al. method based on sdn in iot. In International Conference on Simulation Tools and Techniques (Springer): 64–74. DOI: https://doi.org/10.1007/978-3-030-97124-3_6
[13] Aramrattana, M., Larsson, T., Jansson, J. and Nåbo, A. (2019) A simulation framework for cooperative intelligent transport systems testing and evaluation. Transportation research part F: traffic psychology and behaviour 61: 268–280. DOI: https://doi.org/10.1016/j.trf.2017.08.004
[14] Alghodhaifi, H. and Lakshmanan, S. (2021) Autonomous vehicle evaluation: A comprehensive survey on modeling and simulation approaches. IEEE Access 9: 151531–151566. DOI: https://doi.org/10.1109/ACCESS.2021.3125620
[15] Hosein, P.A. (1989) A class of dynamic nonlinear resource allocation problems. Ph.D. thesis, Massachusetts institute of technology.
[16] Athans, M. (1987) Command and control (c2) theory: A challenge to control science. IEEE Transactions on automatic control 32(4): 286–293. DOI: https://doi.org/10.1109/TAC.1987.1104607
[17] Cai, H., Liu, J., Chen, Y. and Wang, H. (2006) Survey of the research on dynamic weapon-target assignment problem. Journal of Systems Engineering and Electronics 17(3): 559–565. DOI: https://doi.org/10.1016/S1004-4132(06)60097-2
[18] Johansson, F. and Falkman, G. (2008) A bayesian network approach to threat evaluation with application to an air defense scenario. In 2008 11th International conference on information fusion (IEEE): 1–7.
[19] Lloyd, S.P. and Witsenhausen, H.S. (1986) Weapons allocation is np-complete. In 1986 summer computer simulation conference: 1054–1058.
[20] Hosein, P.A., Athans, M. et al. (1990) Some analytical results for the dynamic weapon-target allocation problem. DOI: https://doi.org/10.21236/ADA219280
[21] Baraklı, A.B., Semiz, F. and Atasoy, E. (2023) The specialized threat evaluation and weapon target assignment problem: Genetic algorithm optimization and ilp model solution. In International Conference on the Applications of Evolutionary Computation (Part of EvoStar) (Springer): 19–34. DOI: https://doi.org/10.1007/978-3-031-30229-9_2
[22] Gül, K. (2018) Model and procedures for the jammer and target allocation problem. Master’s thesis, Middle East Technical University.
[23] Borshchev, A. and Filippov, A. (2004) From system dynamics and discrete event to practical agent based modeling: reasons, techniques, tools. In Proceedings of the 22nd international conference of the system dynamics society (Oxford, England), 22: 25–29.
[24] Macal, C. and North, M. (2014) Introductory tutorial: Agent-based modeling and simulation. In Proceedings of the winter simulation conference 2014 (IEEE): 6–20. DOI: https://doi.org/10.1109/WSC.2014.7019874
[25] Mualla, Y., Bai, W., Galland, S. and Nicolle, C. (2018) Comparison of agent-based simulation frameworks for unmanned aerial transportation applications. Procedia computer science 130: 791–796. DOI: https://doi.org/10.1016/j.procs.2018.04.137
[26] Lorig, F., Dammenhayn, N., Müller, D.J. and Timm, I.J. (2015) Measuring and comparing scalability of agentbased simulation frameworks. In Multiagent System Technologies: 13th German Conference, MATES 2015, Cottbus, Germany, September 28-30, 2015, Revised Selected Papers 13 (Springer): 42–60. DOI: https://doi.org/10.1007/978-3-319-27343-3_3
[27] Bellifemine, F., Poggi, A. and Rimassa, G. (1999) Jade–a fipa-compliant agent framework. In Proceedings of PAAM (London), 99: 33.
[28] North, M.J., Collier, N.T., Ozik, J., Tatara, E.R., Macal, C.M., Bragen, M. and Sydelko, P. (2013) Complex adaptive systems modeling with repast simphony. Complex adaptive systems modeling 1: 1–26. DOI: https://doi.org/10.1186/2194-3206-1-3
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Ahmet Burak Barakli, Okan Topçu, Halit Oğuztüzün

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 4.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.