Immune network-based swarm intelligence and its application to unmanned aerial vehicle (UAV) swarm coordination

2014 ◽  
Vol 125 ◽  
pp. 134-141 ◽  
Author(s):  
Liguo Weng ◽  
Qingshan Liu ◽  
Min Xia ◽  
Y.D. Song
2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Ran Zhen ◽  
Yating Jin ◽  
Xiaojing Wu ◽  
Xueli Wu ◽  
Xuan Lv

This paper investigates fault-tolerant time-varying formation tracking control problems for unmanned aerial vehicle (UAV) swarm systems with switching topologies. Actuator faults such as loss of effectiveness and bias fault are mainly considered. Firstly, based on graph theory, an adaptive fault-tolerant time-varying formation tracking control protocol is constructed with adaptive updating parameters and the relative information of the neighboring UAVs, and the feasibility condition for formation tracking is given. The control protocol does not depend on the information of the actuator fault boundary by using adaptive technology. Then, by constructing a reasonable Lyapunov function and solving the algebraic Riccati equation, the stability of the designed controller is proved. For UAV swarm systems with switching topologies and actuator faults, the formation tracking control protocol designed is adopted to enable the followers form the desired time-varying formation and track the leader’s status at the same time. Finally, the simulation examples are given to illustrate the effectiveness of the theoretical results.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Xinyu Huang ◽  
Yunzhe Tian ◽  
Yifei He ◽  
Endong Tong ◽  
Wenjia Niu ◽  
...  

With the rapid development of wireless communication technology and intelligent mobile devices, unmanned aerial vehicle (UAV) cluster is becoming increasingly popular in both civilian and military applications. Recently, a swarm intelligence-based UAV cluster study, aiming to enable efficient and autonomous collaboration, has drawn lots of interest. However, new security problems may be introduced with such swarm intelligence. In this work, we perform the first detailed security analysis to a kind of flocking-based UAV cluster with 5 policies, an upgrade version of the well-known Boids model. Targeting a realistic threat in a source-to-destination flying task, we design a data spoofing strategy and further perform complete vulnerability analysis. We reveal that such design and implementation are highly vulnerable. After breaking through the authentication of ad hoc on-demand distance vector (AODV) routing protocol by rushing attack, an attacker can masquerade as the first-arrival UAV within a specific scope of destination and generate data spoofing of arrival status to the following UAVs, so as to interfere with their normal flying paths of destination arrival and cause unexpected arrival delays amid urgent tasks. Experiments with detailed analysis from the 5-UAV cluster to the 10-UAV cluster are conducted to show specific feature composition-based attack effect and corresponding average delay. We also discuss promising defense suggestions leveraging the insights from our analysis.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Fengtao Xiang ◽  
Keqin Chen ◽  
Jiongming Su ◽  
Hongfu Liu ◽  
Wanpeng Zhang

Unmanned aerial vehicles (UAVs) are gradually used in logistics transportation. They are forbidden to fly in some airspace. To ensure the safety of UAVs, reasonable path planning and design is one of the key factors. Aiming at the problem of how to improve the success rate of unmanned aerial vehicle (UAV) maneuver penetration, a method of UAV penetration path planning and design is proposed. Ant colony algorithm has strong path planning ability in biological swarm intelligence algorithm. Based on the modeling of UAV planning and threat factors, improved ant colony algorithm is used for UAV penetration path planning and design. It is proposed that the path with the best pheromone content is used as the planning path. Some principles are given for using ant colony algorithm in UAV penetration path planning. By introducing heuristic information into the improved ant colony algorithm, the convergence is completed faster under the same number of iteratives. Compared with classical methods, the total steps reduced by 56% with 50 ant numbers and 200 iterations. 62% fewer steps to complete the first iteration. It is found that the optimal trajectory planned by the improved ant colony algorithm is smoother and the shortest path satisfying the constraints.


2020 ◽  
Vol 20 (4) ◽  
pp. 332-342
Author(s):  
Hyung Jun Park ◽  
Seong Hee Cho ◽  
Kyung-Hwan Jang ◽  
Jin-Woon Seol ◽  
Byung-Gi Kwon ◽  
...  

2018 ◽  
pp. 7-13
Author(s):  
Anton M. Mishchenko ◽  
Sergei S. Rachkovsky ◽  
Vladimir A. Smolin ◽  
Igor V . Yakimenko

Results of experimental studying radiation spatial structure of atmosphere background nonuniformities and of an unmanned aerial vehicle being the detection object are presented. The question on a possibility of its detection using optoelectronic systems against the background of a cloudy field in the near IR wavelength range is also considered.


Author(s):  
Amir Birjandi ◽  
◽  
Valentin Guerry ◽  
Eric Bibeau ◽  
Hamidreza Bolandhemmat ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document