Method of spatial countering an intruder in a swarm of unmanned aerial vehicles
Annotation
The development of decentralized control technologies for swarms of Unmanned Aerial Vehicles requires the development of new methods for ensuring their resilience to internal threats. The emergence of an intruder agent within a swarm creates threats of energy or information attacks. The situation is especially critical when the intruder agent is located at the center of the swarm, with its influence on its neighbors being greatest. Existing research has focused primarily on detecting intruder agents, while countermeasures, particularly spatial exclusion of the intruder agent from the group, remain poorly understood. This study develops and analyzes a method for spatial countermeasures against the intruder agent that does not require its explicit detection or information exchange between agents. The proposed method is based on the original idea of analogizing the control of a swarm of unmanned aerial vehicles (agents) with the processes occurring in a semiconductor crystal. Countermeasures against the intruder agent are achieved through the temporary modification of certain swarm interaction parameters by the agents. As a result, the spatial structure of the swarm changes, and the intruder, who does not change its interaction parameters, begins to move relative to the other agents, ending up at the edge of the group. Three implementation options for the proposed countermeasure method, based on compression, expansion, and sequential restructuring of the swarm structure, are investigated. Simulation modeling of the behavior of a swarm of unmanned aerial vehicles in the presence of an intruder was performed. The success of the method was measured by the probability of the intruder agent having fewer than five neighboring unmanned aerial vehicles, i.e., being at the edge of the group. The best performance (probability close to 1.0) was demonstrated by the swarm compression option. The swarm expansion option showed lower performance (non-guaranteed option). The sequential restructuring option proved ineffective. It is shown that the degree of change in the distance between agents makes the main contribution to the effectiveness of the method. The proposed method implemented in the swarm compression mode demonstrated effectiveness for swarm numbers ranging from 19 to 91. The proposed method reduces the likelihood of destructive intruder influence in a swarm of unmanned aerial vehicles, relying solely on the agents local navigation data, without resorting to intruder detection. This makes the method applicable to systems with limited communication capabilities. Some increase in energy consumption can be mitigated by optimizing the intrusion duration and maintaining the swarm structure.
Keywords
Постоянный URL
Articles in current issue
- Ablation of bulk chalcogenide glass As2Se3 by high-repetition-rate femtosecond laser pulses
Modeling and study of FBG interrogator based on a two-dimensional image sensor
- Innovative method for measuring and calculating spectral characteristics of selective elements in optoelectronic systems
- Plasmon resonance and anomalous dispersion of the dielectric permittivity and refractive index of the porous laser-structured surface of anodized titanium
Photophysical, optical and luminescent characteristics of heterocyclic-substituted coumarins and their application in OLED-devices
Influence of the growth rate of a highly strained InGaAs quantum well on the photoluminescence of a heterostructures grown on GaAs substrate
Optimization of the resonant frequency MEMS pressure sensor based on numerical simulation
Adaptive compensation of unknown disturbances in MIMO linear systems with distinct input delays
Experimental study of a quasi-optimal mobile robot switching algorithm
Output predictor control for unstable linear systems with input delay
A multimodal approach for depression detection using semi-automatic data annotation and deterministic machine learning methods
Compound quality model for recommender system evaluation
ReflectivePrompt: Reflective evolution in autoprompting algorithms
Transformer-based automated coronary artery segmentation with domain-specific pretraining
A weighted ensemble model combining ARIMA, LSTM, and GBM for robust time series prediction
A method of collective analysis of the external environment by autonomous agents under incomplete data conditions based on the longhorn beetle algorithm
Optimization of the temperature profile in a chemical process using a genetic algorithm
Using a magnetic gradiometer in a borehole inclinometer to compensate for external magnetic interference
DeFs-CBDE: Clustering-guided binary mutation in multi-objective differential evolution for microarray gene selection
Machine-learning method for the development of a Vickers microhardness predictive model of a hydroxyapatite-multi-walled carbon nanotube ceramic composite material
Aerodynamic analysis of SD7037 airfoil with flex-skin flap at low angles of attack and low Reynolds numbers
Thermophysical aspects of phase transformations of the cooled melt of high-temperature corium in nuclear power plants
Design mechanisms at the microarchitectural level for embedded systems