Evaluating Trail Formation in Collaborative UAV Networks with Lethal Threats

Aerial vehicles are widely used for missions in hostile environments. Some of these missions can benefit from the use of unmanned aerial vehicles (UAVs) working collaboratively to achieve a common goal. In such scenarios, the use of stealth approaches is essential for mission success, because it allows missions to be conducted in the proximity of threat radars and also reduces the probability of a UAV being spotted by enemies by enemies. In this direction, we extend a model that allows autonomous UAVs to dynamically and collaboratively reduce their exposure to threats by adopting a stealth policy in which they turn off their communication radars once a threat is detected. The model also encompasses strategies for UAVs leaving the threat regions as quickly as possible and estimating the future position of others UAVs, thus trying to regroup to formation. The model was evaluated in simulations using different hostility and weapon range distributions. The results demonstrated that the proposed model is able to significantly improve the number of UAVs that are able to complete the mission without being hit by any threat. In addition, the proposed approach for calculating the goal position when a UAV is exposed to a threat proves to be a key factor for missions performed in hostile environments as its significantly reduces the fraction of UAVs hit by threats.

[1]  David L. Adamy,et al.  EW 102: A Second Course in Electronic Warfare , 2004 .

[2]  Guray Yilmaz,et al.  Real-time Autonomous UAV Formation Flight with Collision and Obstacle Avoidance in Unknown Environment , 2016, J. Intell. Robotic Syst..

[3]  Ilker Bekmezci,et al.  Flying Ad-Hoc Networks (FANETs): A survey , 2013, Ad Hoc Networks.

[4]  Mario Innocenti,et al.  Autonomous formation flight , 2000 .

[5]  W. A. Gee Radar warning receiver (RWR) time-coincident pulse data extraction and processing , 2012, 2012 IEEE Radar Conference.

[6]  Damla Turgut,et al.  Stealthy dissemination in intruder tracking sensor networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.

[7]  S. LaValle Rapidly-exploring random trees : a new tool for path planning , 1998 .

[8]  Shuling Dai,et al.  Stealth coverage multi-path corridors planning for UAV fleet , 2013, Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC).