Paper
31 August 2018 Research on the modeling method of UAV swarm operation in cyberspace
Author Affiliations +
Proceedings Volume 10835, Global Intelligence Industry Conference (GIIC 2018); 1083514 (2018) https://doi.org/10.1117/12.2504209
Event: Global Intelligent Industry Conference 2018, 2018, Beijing, China
Abstract
As a kind of game-changing combat style, the operation of the UAV swarm in cyberspace is characterized by high effective cost and high concealment, which make it play an important role in the future competition of cyberspace. Due to the lack of actual combat experience and high confidentiality of the cyberspace operation and the UAV swarm operation, the modeling and simulation (M and S) of the operation of the UAV swarm in cyberspace is the vital method for planning the UAV swarm system architecture and designing the tactical methods of the UAV swarm. At present, the research on the M and S of the operation of the UAV swarm in cyberspace is just starting from home and abroad, and there is no corresponding modeling method and concrete model. Taken the Integrated Air Defense System (IADS) as the operational object, the guiding ideology of the M and S of the operation of the UAV swarm in cyberspace was researched from the height of the joint operations, which includes the characteristics of the individual autonomy, the group cooperation, the offensive and defensive antagonism and the electromagnetic-cyber the operation. Then, the model characteristic and elements was analyzed, such as the model system architecture, the operational rule and the intelligent algorithm. On this basis, the "action model pool", "operational rule pool" and "intelligent algorithm pool" would be constructed. Afterwards, the modeling method of the operation of the UAV swarm in cyberspace which based the “Rule+ Respond+ Algorithm” (RRA) is proposed, including the modeling framework and main process method of the RRA. The main process included the military concept modeling stage, the operational rules refining stage, the operational rules judgment stage, the action model response stage and the intelligent algorithm solution stage, that the five stages were in sequence, also the main work in each stage was analyzed. At the level of system of system M and S, the modeling focused of the abstraction, extraction and description of the operational rules of the UAV swarm in cyberspace. The description and construction methods of the operational rule are researched, such as the BNF format, the process format, and the operational rules tree graph. Finally, based on the future joint operations, an example of the operation of the UAV swarm in cyberspace is given, then the operational effectiveness is analyzed. The example showed that using nine UAV Swarms to attack IADS in cyberspace would reduce the normal power range of the sensor network by 90% and the warning time by 80.3%.
© (2018) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Yang Zhang Sr., Guangya Si, and Yanzheng Wang "Research on the modeling method of UAV swarm operation in cyberspace", Proc. SPIE 10835, Global Intelligence Industry Conference (GIIC 2018), 1083514 (31 August 2018); https://doi.org/10.1117/12.2504209
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Unmanned aerial vehicles

Cognitive modeling

Instrument modeling

Warfare

Carbon monoxide

Modeling and simulation

Detection and tracking algorithms

Back to Top