Evaluating Trail Formation in Collaborative UAV Networks with Lethal Threats
Aerial vehicles are widely used for missions in hostile environments. Some of these missions can benefit from the use of unmanned aerial vehicles (UAVs) working collaboratively to achieve a common goal. In such scenarios, the use of stealth approaches is essential for mission success, because it allows missions to be conducted in the proximity of threat radars and also reduces the probability of a UAV being spotted by enemies by enemies. In this direction, we extend a model that allows autonomous UAVs to dynamically and collaboratively reduce their exposure to threats by adopting a stealth policy in which they turn off their communication radars once a threat is detected. The model also encompasses strategies for UAVs leaving the threat regions as quickly as possible and estimating the future position of others UAVs, thus trying to regroup to formation. The model was evaluated in simulations using different hostility and weapon range distributions. The results demonstrated that the proposed model is able to significantly improve the number of UAVs that are able to complete the mission without being hit by any threat. In addition, the proposed approach for calculating the goal position when a UAV is exposed to a threat proves to be a key factor for missions performed in hostile environments as its significantly reduces the fraction of UAVs hit by threats.
KeywordsUnmanned aerial vehicles Trail formation Leave threat region Hitting probability
The authors thank CAPES (Social Demands Program) and FAPESP (proc. no. 2017/02055-8) for the financial support to carry out this research.
- 2.Borges, N.P., Ghedini, C.G., Ribeiro, C.H.C.: A local communication model for improving stealth in collaborative UAV networks. An. do Comput. Beach 249–258 (2017)Google Scholar
- 4.Wållberg, K.: Method of fire control for gun-based anti-aircraft defence (2017). US Patent 9,625,236Google Scholar
- 5.Adamy, D.: EW 102: A Second Course in Electronic Warfare. Artech House, Boston (2004)Google Scholar
- 6.Gee, W.A.: Radar warning receiver (RWR) time-coincident pulse data extraction and processing. In: 2012 IEEE Radar Conference, pp. 0752–0757 (2012). https://doi.org/10.1109/RADAR.2012.6212238
- 7.Turgut, D., Turgut, B., Bölöni, L.: Stealthy dissemination in intruder tracking sensor networks. In: 2009 IEEE 34th Conference on Local Computer Networks, pp. 22–29 (2009). https://doi.org/10.1109/LCN.2009.5355150
- 9.LaValle, S.M.: Rapidly-exploring random trees: a new tool for path planning (1998)Google Scholar
- 10.He, P., Dai, S.: Stealth coverage multi-path corridors planning for UAV fleet. In: Proceedings of the 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), pp. 2922–2926. IEEE (2013)Google Scholar