1
How can a Radar Mask its Cognition?
Kunal Pattanayak, Student Member, IEEE, Vikram Krishnamurthy, Fellow, IEEE and Christopher Berry
Abstract—A cognitive radar is a constrained utility maximizer
that adapts its sensing mode in response to a changing envi-
ronment. If an adversary can estimate the utility function of a
cognitive radar, it can determine the radar’s sensing strategy and
mitigate the radar performance via electronic countermeasures
(ECM). This paper discusses how a cognitive radar can hide
its strategy from an adversary that detects cognition. The
radar does so by transmitting purposefully designed sub-optimal
responses to spoof the adversary’s Neyman-Pearson detector.
We provide theoretical guarantees by ensuring the Type-I error
probability of the adversary’s detector exceeds a pre-defined level
for a specified tolerance on the radar’s performance loss. We
illustrate our cognition masking scheme via numerical examples
involving waveform adaptation and beam allocation. We show
that small purposeful deviations from the optimal strategy of
the radar confuse the adversary by significant amounts, thereby
masking the radar’s cognition. Our approach uses novel ideas
from revealed preference in microeconomics and adversarial
inverse reinforcement learning. Our proposed algorithms pro-
vide a principled approach for system-level electronic counter-
countermeasures (ECCM) to mask the radar’s cognition, i.e. ,
hide the radar’s strategy from an adversary. We also provide
performance bounds for our cognition masking scheme when the
adversary has misspecified measurements of the radar’s response.
Index Terms—Cognitive Radar, Meta-cognition, Revealed Pref-
erence, Inverse Reinforcement Learning, Electronic Counter
Countermeasures, Bayesian Tracker, Afriat’s Theorem
I. INTRODUCTION
In abstract terms, a cognitive radar is a constrained utility
maximizer with multiple sets of utility functions and con-
straints that allow the radar to deploy different strategies
depending on changing environments. Cognitive radars adapt
their waveform scheduling and beam allocation by optimiz-
ing their utility functions in different situations. If a smart
adversary can estimate the utility function or constraints of
the cognitive radar, then it can exploit this information to
mitigate the radar’s performance (e.g., jam the radar with
purposefully designed interference). A natural question is: how
can a cognitive radar hide its cognition from an adversary?
Put simply, how can a smart sensor hide its strategy by
acting dumb? We term this cognition-masking functionality as
meta-cognition.1A meta-cognitive radar [1] switches between
Short versions containing partial results appear in the IEEE International
Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022,
International Conference of Information Fusion (FUSION), 2022 and IEEE
International Conference on Decision and Control (CDC), 2022.
V. Krishnamurthy and K. Pattanayak are with the School of Electrical and
Computer Engineering, Cornell University, Ithaca, New York, 14853 USA. e-
mail: vikramk@cornell.edu, kp487@cornell.edu. C. Berry is with Lockheed
Martin Advanced Technology Laboratories, Cherry Hill, NJ, 08002 USA. e-
mail: christopher.m.berry@lmco.com. This research was supported in part by
a research contract from Lockheed Martin, the Army Research Office grant
W911NF-21-1-0093 and the Air Force Office of Scientific Research grant
FA9550-22-1-0016.
1“Meta-cognition” [1] is used to describe a sensing platform that switches
between multiple objectives (constrained utility functions).
multiple objectives (plans) to maintain stealth; for example, it
can switch between the conflicting objectives of maximizing
the signal-to-noise ratio of a target to maximizing privacy of
its plan to maintain stealth.
A meta-cognitive radar pays a penalty for stealth - it de-
liberately transmits sub-optimal responses to keep its strategy
hidden from the adversary resulting in performance degrada-
tion. This paper investigates how a cognitive radar hide its
strategy when the adversary observes the radar’s responses.
Our meta-cognition results are inspired by privacy-preserving
mechanisms in differential privacy and adversarial obfuscation
in deep learning with related works discussed below. Although
this paper is radar-centric, we emphasize that the problem
formulation and algorithms also apply to adversarial inverse
reinforcement learning in general machine learning applica-
tions, namely, how to purposefully choose suboptimal actions
to hide a strategy.
Related Works
Cognitive radars are widely studied [2], [3]. More recently,
our papers [4], [5] deal with inverse reinforcement learning
(IRL) algorithms for cognitive radars, namely, how can an ad-
versary estimate the utility function of a cognitive radar by ob-
serving its decisions. Reconstructing a decision maker’s utility
function by observing its actions is the main focus of IRL [6],
[7], [8] in machine learning and revealed preference [9], [10]
in micro-economics literature. In the radar literature, such IRL
based adversarial actions to mitigate the radar’s operations
are called electronic countermeasures (ECM) [11], [12], [4].
This paper builds on [4], [5] and develops electronic counter-
countermeasures (ECCM) [13], [14], [15] to mitigate ECM.
This paper assumes that adversary’s ECM is unaware if the
radar has ECCM capability, which is consistent with state-of-
the-art ECCM literature. The central theme of this paper is
to apply results from revealed preference in micro-economics
theory [9], [16]. To the best of our knowledge, this approach
for ECCM to hide cognition is novel.
Several works in literature [17], [18], [19] highlight how an
adversary benefits from learning the radar’s utility function. In
[17], the adversary optimize its probes to increase the power
of its statistical hypothesis test for utility maximization. [18],
[19] show how revealed preference-based IRL techniques can
be used to manipulate consumer behavior.
In the radar context, [20] uses the Laplacian mechanism
for meta-cognition; the cognitive radar anonymizes its trajec-
tories via additive Laplacian noise. In our cognition masking
approach, the radar mitigates adversarial IRL via purposeful
perturbations from optimal strategy, where the perturbations
are computed via stochastic gradient algorithms (see Algo-
rithm 2 in Sec. IV-B).
arXiv:2210.11444v1 [eess.SP] 20 Oct 2022