Guidance Law for a Surveillance UAV Swarm Tracking a High Capability Malicious UAV

Jason Brown, N. Raj
{"title":"Guidance Law for a Surveillance UAV Swarm Tracking a High Capability Malicious UAV","authors":"Jason Brown, N. Raj","doi":"10.1109/APWiMob51111.2021.9435240","DOIUrl":null,"url":null,"abstract":"Significant research is currently focused on the issue of malicious UAVs or drones disrupting critical services (e.g. civilian airport operations). One mitigation is to track or pursue a malicious UAV back to its point of origin (and possibly its owner) using a swarm of surveillance UAVs. This becomes of particular academic interest when the malicious UAV has superior capabilities to the individual surveillance UAVs (e.g. in terms of maximum speed). In this paper, we deduce a guidance law (i.e. a rule for determining the direction of flight) for individual surveillance UAVs to maximize the tracking time of a highly capable malicious UAV. We then demonstrate the validity of the analysis using some examples with realistic contemporary UAV capability parameters. The significance of this research is that, in a networked swarm of surveillance UAVs which communicate with each other, if each surveillance UAV maximizes its tracking time, there is a higher probability that the next closest surveillance UAV can be in a position to assume tracking responsibilities when the malicious UAV moves out of tracking range of the original surveillance UAV. In order to demonstrate this, a simulation of a networked swarm of surveillance UAVs which track a high capability malicious UAV is undertaken under various scenarios.","PeriodicalId":325270,"journal":{"name":"2021 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Asia Pacific Conference on Wireless and Mobile (APWiMob)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APWiMob51111.2021.9435240","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Significant research is currently focused on the issue of malicious UAVs or drones disrupting critical services (e.g. civilian airport operations). One mitigation is to track or pursue a malicious UAV back to its point of origin (and possibly its owner) using a swarm of surveillance UAVs. This becomes of particular academic interest when the malicious UAV has superior capabilities to the individual surveillance UAVs (e.g. in terms of maximum speed). In this paper, we deduce a guidance law (i.e. a rule for determining the direction of flight) for individual surveillance UAVs to maximize the tracking time of a highly capable malicious UAV. We then demonstrate the validity of the analysis using some examples with realistic contemporary UAV capability parameters. The significance of this research is that, in a networked swarm of surveillance UAVs which communicate with each other, if each surveillance UAV maximizes its tracking time, there is a higher probability that the next closest surveillance UAV can be in a position to assume tracking responsibilities when the malicious UAV moves out of tracking range of the original surveillance UAV. In order to demonstrate this, a simulation of a networked swarm of surveillance UAVs which track a high capability malicious UAV is undertaken under various scenarios.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
监视无人机群跟踪高性能恶意无人机的制导律
目前重要的研究集中在恶意无人机或无人机破坏关键服务(例如民用机场运营)的问题上。一种缓解措施是使用一群监视无人机跟踪或追踪恶意无人机,使其回到其原点(可能还有其所有者)。当恶意无人机具有优于单个监视无人机的能力(例如在最大速度方面)时,这就成为特别的学术兴趣。在本文中,我们推导了单个监视无人机的制导律(即确定飞行方向的规则),以最大限度地提高高性能恶意无人机的跟踪时间。然后用一些具有现实的当代无人机性能参数的算例验证了分析的有效性。本研究的意义在于,在相互通信的网络监视无人机群中,如果每一架监视无人机的跟踪时间最大化,则当恶意无人机离开原监视无人机的跟踪范围时,下一架最近的监视无人机更有可能承担跟踪责任。为了证明这一点,在各种场景下进行了网络监视无人机群跟踪高能力恶意无人机的模拟。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Effect of Duration Heteroscedasticity to the Bottleneck in Business Process Discovered by Inductive Miner Algorithm Performance Evaluation of XGS-PON Optical Network Termination for Mobile Backhaul IoT Resiliency through Edge-located Container-based Virtualization and SDN Detection of the Key Actor of Issues Spreading Based on Social Network Analysis in Twitter Social Media Unsupervised Method for 3D Brain Magnetic Resonance Image Segmentation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1