Return to search

A game-theoretic analysis of electronic warfare tactics with applications to the World War II era

Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Political Science, 2004. / Includes bibliographical references (leaves 112-115). / This thesis considers electronic countermeasures as well thought-out signals sent by the "attacker" to a recipient, the "defender" in order to create uncertainty, and argues that tactics that incorporate the judicious use of bluffing further such uncertainty. I discuss two forms of bluffing, bluffing to create uncertainty as to the location of an attack (bluffing in space), and bluffing to create uncertainty as to the time of attack (bluffing in time). Two electronic warfare tactics used by the Allied air forces during World War II, representing an example of each, are modeled as dynamic zero-sum games with incomplete information. I show that in most instances, Perfect Bayesian Nash Equilibria dictate that the defender delay cuing his interceptors longer than he would so otherwise, and that in those situations where he should cue his interceptors, he must do so at random. Furthermore, except where the cost to bluff is prohibitive, the attacker always benefits from the use of tactics that incorporate bluffing, though bluffing in space is generally more effective than bluffing in time for a given set of detection probabilities. / by David M. Blum. / S.M.

Identiferoai:union.ndltd.org:MIT/oai:dspace.mit.edu:1721.1/28756
Date January 2004
CreatorsBlum, David M., 1979-
ContributorsJames M Snyder., Massachusetts Institute of Technology. Dept. of Political Science., Massachusetts Institute of Technology. Dept. of Political Science.
PublisherMassachusetts Institute of Technology
Source SetsM.I.T. Theses and Dissertation
Languageen_US
Detected LanguageEnglish
TypeThesis
Format115 leaves, 4106580 bytes, 4120692 bytes, application/pdf, application/pdf, application/pdf
RightsM.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission., http://dspace.mit.edu/handle/1721.1/7582

Page generated in 0.0016 seconds