A coalition formation algorithm is presented with limited communication ranges and delays in unknown environment,for the performance of multiple heterogeneous unmanned aerial vehicles(UAVs)in cooperative search and at...A coalition formation algorithm is presented with limited communication ranges and delays in unknown environment,for the performance of multiple heterogeneous unmanned aerial vehicles(UAVs)in cooperative search and attack missions.The mathematic model of coalition formation is built on basis of the minimum attacking time and the minimum coalition size with satisfying resources and simultaneous strikes requirements.A communication protocol based on maximum number of hops is developed to determine the potential coalition members in dynamic network.A multistage sub-optimal coalition formation algorithm(MSOCFA)with polynomial time is established.The performances of MSOCFA and particle swarm optimization(PSO)algorithms are compared in terms of complexity,mission performance and computational time.A complex scenario is deployed to illustrate how the coalitions are formed and validate the feasibility of the MSOCFA.The effect of communication constraints(hop delay and max-hops)on mission performance is studied.The results show that it is beneficial to determine potential coalition members in a wide and deep range over the network in the presence of less delay.However,when the delays are significant,it is more advantageous to determine coalitions from among the immediate neighbors.展开更多
This paper focuses on the solution to the dynamic affine formation control problem for multiple networked underactuated quad-rotor unmanned aerial vehicles(UAVs)to achieve a configuration that preserves collinearity a...This paper focuses on the solution to the dynamic affine formation control problem for multiple networked underactuated quad-rotor unmanned aerial vehicles(UAVs)to achieve a configuration that preserves collinearity and ratios of distances for a target configuration.In particular,it is investigated that the quad-rotor UAVs are steered to track a reference linear velocity while maintaining a desired three-dimensional target formation.Firstly,by integrating the properties of the affine transformation and the stress matrix,the design of the target formation is convenient and applicable for various three-dimensional geometric patterns.Secondly,a distributed control method is proposed under a hierarchical framework.By introducing an intermediary control input for each quad-rotor UAV in the position loop,the necessary thrust input and the desired attitude are extracted.In the attitude loop,the desired attitude represented by the unit quaternion is tracked by the designed torque input.Both conditions of linear velocity unavailability and mutual collision avoidance are also tackled.In terms of Lyapunov theory,it is prooved that the overall closed-loop error system is asymptotically stable.Finally,two illustrative examples are simulated to validate the effectiveness of the proposed theoretical results.展开更多
A space called Unmanned Aerial Vehicle(UAV)cyber is a new environment where UAV,Ground Control Station(GCS)and business processes are integrated.Denial of service(DoS)attack is a standard network attack method,especia...A space called Unmanned Aerial Vehicle(UAV)cyber is a new environment where UAV,Ground Control Station(GCS)and business processes are integrated.Denial of service(DoS)attack is a standard network attack method,especially suitable for attacking the UAV cyber.It is a robust security risk for UAV cyber and has recently become an active research area.Game theory is typically used to simulate the existing offensive and defensive mechanisms for DoS attacks in a traditional network.In addition,the honeypot,an effective security vulnerability defense mechanism,has not been widely adopted or modeled for defense against DoS attack UAV cyber.With this motivation,the current research paper presents a honeypot game theorymodel that considersGCS andDoS attacks,which is used to study the interaction between attack and defense to optimize defense strategies.The GCS and honeypot act as defenses against DoS attacks in this model,and both players select their appropriate methods and build their benefit function models.On this basis,a hierarchical honeypot and G2A network delay reward strategy are introduced so that the defender and the attacker can adjust their respective strategies dynamically.Finally,by adjusting the degree of camouflage of the honeypot for UAV network services,the overall revenue of the defender can be effectively improved.The proposed method proves the existence of a mixed strategy Nash equilibrium and compares it with the existing research on no delay rewards and no honeypot defense scheme.In addition,this method realizes that the UAV cyber still guarantees a network delay of about ten milliseconds in the presence of a DoS attack.The results demonstrate that our methodology is superior to that of previous studies.展开更多
This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks onWireless Sensor Networks(WSNs).Jamming is a type of Denial of Service(DoS)attack and intentional ...This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks onWireless Sensor Networks(WSNs).Jamming is a type of Denial of Service(DoS)attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly.To defend and prevent such attacks,the first step is to detect them.The current detection approaches use centralized techniques to detect jamming,where each node collects information and forwards it to the base station.As a result,overhead and communication costs increased.In this work,we present a jamming attack and classify nodes into different categories based on their location to the jammer by employing a single node observer.As a result,we introduced a machine learning model that uses distance ratios and power received as features to detect such attacks.Furthermore,we considered several types of jammers transmitting at different power levels to evaluate the proposed metrics using MATLAB.With a detection accuracy of 99.7%for the k-nearest neighbors(KNN)algorithm and average testing accuracy of 99.9%,the presented solution is capable of efficiently and accurately detecting jamming attacks in wireless sensor networks.展开更多
基金partially sponsored by the Fundamental Research Funds for the Central Universities(No.3102015ZY092)
文摘A coalition formation algorithm is presented with limited communication ranges and delays in unknown environment,for the performance of multiple heterogeneous unmanned aerial vehicles(UAVs)in cooperative search and attack missions.The mathematic model of coalition formation is built on basis of the minimum attacking time and the minimum coalition size with satisfying resources and simultaneous strikes requirements.A communication protocol based on maximum number of hops is developed to determine the potential coalition members in dynamic network.A multistage sub-optimal coalition formation algorithm(MSOCFA)with polynomial time is established.The performances of MSOCFA and particle swarm optimization(PSO)algorithms are compared in terms of complexity,mission performance and computational time.A complex scenario is deployed to illustrate how the coalitions are formed and validate the feasibility of the MSOCFA.The effect of communication constraints(hop delay and max-hops)on mission performance is studied.The results show that it is beneficial to determine potential coalition members in a wide and deep range over the network in the presence of less delay.However,when the delays are significant,it is more advantageous to determine coalitions from among the immediate neighbors.
基金supported by the National Natural Science Foundation of China(61673327)the Industrial Development and Foster Project of Yangtze River Delta Research Institute of NPU,Taicang(CY20210202)+1 种基金the Fundamental Research Funds for the Central Universities(G2021KY05116,G2022WD01026)the Basic Research Programs of Taicang(TC2021JC28)。
文摘This paper focuses on the solution to the dynamic affine formation control problem for multiple networked underactuated quad-rotor unmanned aerial vehicles(UAVs)to achieve a configuration that preserves collinearity and ratios of distances for a target configuration.In particular,it is investigated that the quad-rotor UAVs are steered to track a reference linear velocity while maintaining a desired three-dimensional target formation.Firstly,by integrating the properties of the affine transformation and the stress matrix,the design of the target formation is convenient and applicable for various three-dimensional geometric patterns.Secondly,a distributed control method is proposed under a hierarchical framework.By introducing an intermediary control input for each quad-rotor UAV in the position loop,the necessary thrust input and the desired attitude are extracted.In the attitude loop,the desired attitude represented by the unit quaternion is tracked by the designed torque input.Both conditions of linear velocity unavailability and mutual collision avoidance are also tackled.In terms of Lyapunov theory,it is prooved that the overall closed-loop error system is asymptotically stable.Finally,two illustrative examples are simulated to validate the effectiveness of the proposed theoretical results.
基金Basic Scientific Research program of China JCKY2020203C025 funding is involved in this study.
文摘A space called Unmanned Aerial Vehicle(UAV)cyber is a new environment where UAV,Ground Control Station(GCS)and business processes are integrated.Denial of service(DoS)attack is a standard network attack method,especially suitable for attacking the UAV cyber.It is a robust security risk for UAV cyber and has recently become an active research area.Game theory is typically used to simulate the existing offensive and defensive mechanisms for DoS attacks in a traditional network.In addition,the honeypot,an effective security vulnerability defense mechanism,has not been widely adopted or modeled for defense against DoS attack UAV cyber.With this motivation,the current research paper presents a honeypot game theorymodel that considersGCS andDoS attacks,which is used to study the interaction between attack and defense to optimize defense strategies.The GCS and honeypot act as defenses against DoS attacks in this model,and both players select their appropriate methods and build their benefit function models.On this basis,a hierarchical honeypot and G2A network delay reward strategy are introduced so that the defender and the attacker can adjust their respective strategies dynamically.Finally,by adjusting the degree of camouflage of the honeypot for UAV network services,the overall revenue of the defender can be effectively improved.The proposed method proves the existence of a mixed strategy Nash equilibrium and compares it with the existing research on no delay rewards and no honeypot defense scheme.In addition,this method realizes that the UAV cyber still guarantees a network delay of about ten milliseconds in the presence of a DoS attack.The results demonstrate that our methodology is superior to that of previous studies.
基金funded by the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia through the Project Number (IF-PSAU-2021/01/18707).
文摘This paper presents a machine-learning method for detecting jamming UAVs and classifying nodes during jamming attacks onWireless Sensor Networks(WSNs).Jamming is a type of Denial of Service(DoS)attack and intentional interference where a malicious node transmits a high-power signal to increase noise on the receiver side to disrupt the communication channel and reduce performance significantly.To defend and prevent such attacks,the first step is to detect them.The current detection approaches use centralized techniques to detect jamming,where each node collects information and forwards it to the base station.As a result,overhead and communication costs increased.In this work,we present a jamming attack and classify nodes into different categories based on their location to the jammer by employing a single node observer.As a result,we introduced a machine learning model that uses distance ratios and power received as features to detect such attacks.Furthermore,we considered several types of jammers transmitting at different power levels to evaluate the proposed metrics using MATLAB.With a detection accuracy of 99.7%for the k-nearest neighbors(KNN)algorithm and average testing accuracy of 99.9%,the presented solution is capable of efficiently and accurately detecting jamming attacks in wireless sensor networks.