Analysis of mutual assured destruction-like scenario with swarms of non-recallable autonomous robots

This paper considers the implications of the creation of an autonomous robotic fighting force without recall-ability which could serve as a deterrent to a ‘total war’ magnitude attack. It discusses the technical considerations for this type of robotic system and the limited enhancements required to current technologies (particularly UAVs) needed to create such a system. Particular consideration is paid to how the introduction of this type of technology by one actor could create a need for reciprocal development. Also considered is the prospective utilization of this type of technology by non-state actors and the impact of this on state actors.

[1]  Jody M. Prescott Autonomous decision-making processes and the responsible cyber commander , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[2]  Satyandra K. Gupta,et al.  Trajectory planning with look-ahead for Unmanned Sea Surface Vehicles to handle environmental disturbances , 2011, 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[3]  Jason D. Jolley Article 2(4) and Cyber Warfare: How do Old Rules Control the Brave New World? , 2013 .

[4]  Andrew Lee,et al.  Malware is called malicious for a reason: The risks of weaponizing code , 2014, 2014 6th International Conference On Cyber Conflict (CyCon 2014).

[5]  Enn Tyugu,et al.  Command and control of cyber weapons , 2012, 2012 4th International Conference on Cyber Conflict (CYCON 2012).

[6]  Xiling Luo,et al.  A Novel Cluster-Based Location-Aided Routing Protocol for UAV Fleet Networks , 2012 .

[7]  Alonzo Kelly,et al.  Receding Horizon Model-Predictive Control for Mobile Robot Navigation of Intricate Paths , 2009, FSR.

[8]  Y. Volkan Pehlivanoglu,et al.  A new vibrational genetic algorithm enhanced with a Voronoi diagram for path planning of autonomous UAV , 2012 .

[9]  Henrik I. Christensen,et al.  Cooperative 3D and 2D mapping with heterogenous ground robots , 2012, Defense, Security, and Sensing.

[10]  Eckart Michaelsen,et al.  Stochastic reasoning for structural pattern recognition: An example from image-based UAV navigation , 2014, Pattern Recognit..

[11]  Isaac Kaminer,et al.  Optimal Motion Planning for Searching for Uncertain Targets , 2014 .

[12]  Jian Yang,et al.  Comparison of Optimal Solutions to Real-Time Path Planning for a Mobile Vehicle , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[13]  Rongbo Zhu,et al.  Efficient Intelligent Optimized Algorithm for Dynamic Vehicle Routing Problem , 2011, J. Softw..

[14]  Molly McNab,et al.  Clarifying the Law Relating to Unmanned Drones and the Use of Force: The Relationships between Human Rights, Self-Defense, Armed Conflict, and International Humanitarian Law , 2011 .

[15]  Alexander Chanock Fixing the War Powers Resolution in the Age of Predator Drones and Cyber-Warfare , 2013 .

[16]  Caitriona H. Heinl,et al.  Artificial (intelligent) agents and active cyber defence: Policy implications , 2014, 2014 6th International Conference On Cyber Conflict (CyCon 2014).

[17]  Jeremy Straub,et al.  A Characterization of the Utility of Using Artificial Intelligence to Test Two Artificial Intelligence Systems , 2013, Comput..

[18]  Jeffrey L. Caton Exploring the prudent limits of automated cyber attack , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[19]  Xin Chen,et al.  A Wolf Colony Search Algorithm Based on the Complex Method for Uninhabited Combat Air Vehicle Path Planning , 2014 .

[20]  N. Kshetri Pattern of Global Cyber War and Crime: A Conceptual Framework , 2005 .

[21]  Arko Lucieer,et al.  Assessing the Accuracy of Georeferenced Point Clouds Produced via Multi-View Stereopsis from Unmanned Aerial Vehicle (UAV) Imagery , 2012, Remote. Sens..

[22]  David P. Fidler Was Stuxnet an Act of War? Decoding a Cyberattack , 2011, IEEE Security & Privacy.

[23]  Yoshiaki Kuwata,et al.  Flight Demonstrations of Cooperative Control for UAV Teams , 2004 .

[24]  Frederic Megret The Humanitarian Problem with Drones , 2013 .

[25]  Trey Herr,et al.  PrEP: A Framework for Malware & Cyber Weapons , 2013 .

[26]  Haibin Duan,et al.  Chaotic predator–prey biogeography-based optimization approach for UCAV path planning , 2014 .

[27]  Thomas Fincannon,et al.  The influence of camouflage, obstruction, familiarity and spatial ability on target identification from an unmanned ground vehicle , 2013, Ergonomics.

[28]  Nicholas Ernest,et al.  UAV Swarm Cooperative Control Based on a Genetic-Fuzzy Approach , 2012 .

[29]  Hai-Won Yang,et al.  The optimal design scheme of an SUGV for surveillance and reconnaissance missions in urban and rough terrain , 2012 .

[30]  Mweemba Kasongo,et al.  The use of force under international law , 2009 .

[31]  Gai-Ge Wang,et al.  A modified firefly algorithm for UCAV path planning , 2012 .

[32]  Nengcheng Chen,et al.  Efficient UAV Path Planning with Multiconstraints in a 3D Large Battlefield Environment , 2014 .

[33]  Christophe Guettier,et al.  Automatic vehicle navigation with bandwidth constraints , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[34]  David Silver,et al.  Applied Imitation Learning for Autonomous Navigation in Complex Natural Terrain , 2009, FSR.

[35]  Gaige Wang,et al.  A Bat Algorithm with Mutation for UCAV Path Planning , 2012, TheScientificWorldJournal.

[36]  Christopher M. Clark,et al.  Multi-robot boundary tracking with phase and workload balancing , 2010, 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems.

[37]  Richard Garcia,et al.  Multi-UAV Simulator Utilizing X-Plane , 2010, J. Intell. Robotic Syst..

[38]  Xiaoyan Hong,et al.  Hierarchical routing for multi-layer ad-hoc wireless networks with UAVs , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).

[39]  Haibin Duan,et al.  Receding horizon control for multiple UAV formation flight based on modified brain storm optimization , 2014, Nonlinear Dynamics.

[40]  B. Koch,et al.  UAV-BASED PHOTOGRAMMETRIC POINT CLOUDS – TREE STEM MAPPING IN OPEN STANDS IN COMPARISON TO TERRESTRIAL LASER SCANNER POINT CLOUDS , 2013 .

[41]  Anders Henriksen Jus ad bellum and American Targeted Use of Force to Fight Terrorism Around the World , 2014 .

[42]  Toru Kaneko,et al.  Path selection based on local terrain feature for unmanned ground vehicle in unknown rough terrain environment , 2013, 2013 IEEE International Conference on Robotics and Biomimetics (ROBIO).

[43]  M. Schmitt Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework , 1999 .

[44]  Chris Jenks,et al.  Law from Above: Unmanned Aerial Systems, Use of Force, and the Law of Armed Conflict , 2010 .

[45]  Li Yu VEHICLE EXTRACTION USING HISTOGRAM AND GENETIC ALGORITHM BASED FUZZY IMAGE SEGMENTATION FROM HIGH RESOLUTION UAV AERIAL IMAGERY , 2008 .