Threat evaluation and weapons allocation in network-centric warfare

The concepts of threat evaluation and weapons allocation (TEWA) in the defense domain have traditionally been considered from the single platform perspective. However, with the current trend in defense towards network-centric warfare, that is the linking of sensors, engagement systems and decision-makers into an effective and responsive whole, it is becoming more appropriate to view these concepts at the force level. One approach to the challenge of developing force level TEWA functionality is to regard TEWA as a dynamic human decision-making process aimed at the successful exploitation of tactical resources (e.g. sensors and weapons) during the conduct of command and control activities. In this paper, the results of taking this approach to force level TEWA through the application of the applied cognitive work analysis methodology are presented. In particular, a functional abstraction network is described, which encapsulates the inferential transformation from sensor data acquisition to inferences about the identification, intent and level of threat for the given entities in the defense environment. Finally, emerging threat evaluation and weapons allocation concepts in network-centric warfare are outlined and an example is given to illustrate the ideas developed within the paper.

[1]  P.R.E. Cutler,et al.  Description of a rule-based model for the automatic allocation of airborne assets , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[2]  X. T. Nguyen Threat assessment in tactical airborne environments , 2002, Proceedings of the Fifth International Conference on Information Fusion. FUSION 2002. (IEEE Cat.No.02EX5997).

[3]  Jean Roy,et al.  Threat evaluation for impact assessment in situation analysis systems , 2002, SPIE Defense + Commercial Sensing.

[4]  W. Elm,et al.  Applied Cognitive Work Analysis: A Pragmatic Methodology for Designing Revolutionary Cognitive Affordances , 2003 .

[5]  Martin G. Oxenham,et al.  Using contextual information for extracting air target behavior from sensor tracks , 2003, SPIE Defense + Commercial Sensing.

[6]  Martin Oxenham,et al.  Information Fusion and Extraction Priorities for Australia's Information Capability , 2004 .

[7]  Subhash Challa,et al.  Decentralised Fusion of Disparate Identity Estimates for Shared Situation Awareness , 2004 .

[8]  Dale Lambert Grand challenges of information fusion , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[9]  Leoni Warne,et al.  The Network Centric Warrior: The Human Dimension of Network Centric Warfare , 2004 .

[10]  A.-C. Boury-Brisset,et al.  Ontology-based approach for information fusion , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[11]  Martin G. Oxenham Enhancing situation awareness for air defence via automated threat analysis , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[12]  W. P. Malcolm On the Character and Complexity of Certain Defensive Resource Allocation Problems , 2004 .

[13]  Han Tin French,et al.  Situation Awareness in a Networked Virtual Submarine , 2004 .

[14]  Michael J. Liebhaber,et al.  Air Threat Assessment: Research, Model, and Display Guidelines , 2002 .

[15]  Pierre Valin,et al.  Data Fusion for Situation Monitoring, Incident Detection, Alert and Response Management , 2005 .

[16]  M. G. Oxenham Automatic air target to airlane association , 2000, Proceedings of the Third International Conference on Information Fusion.

[17]  William C. Elm,et al.  A Pragmatic Cognitive System Engineering Approach to Model Dynamic Human Decision-Making Activities in Intelligent and Automated Systems , 2003 .

[18]  Pramod K. Varshney,et al.  Multisensor Data Fusion , 1997, IEA/AIE.