Proceedings Article | 31 August 2018
KEYWORDS: Unmanned aerial vehicles, Cognitive modeling, Instrument modeling, Warfare, Carbon monoxide, Modeling and simulation, Systems modeling, Detection and tracking algorithms, Process modeling, Space operations
As a kind of game-changing combat style, the operation of the UAV swarm in cyberspace is characterized by high effective cost and high concealment, which make it play an important role in the future competition of cyberspace. Due to the lack of actual combat experience and high confidentiality of the cyberspace operation and the UAV swarm operation, the modeling and simulation (M and S) of the operation of the UAV swarm in cyberspace is the vital method for planning the UAV swarm system architecture and designing the tactical methods of the UAV swarm. At present, the research on the M and S of the operation of the UAV swarm in cyberspace is just starting from home and abroad, and there is no corresponding modeling method and concrete model. Taken the Integrated Air Defense System (IADS) as the operational object, the guiding ideology of the M and S of the operation of the UAV swarm in cyberspace was researched from the height of the joint operations, which includes the characteristics of the individual autonomy, the group cooperation, the offensive and defensive antagonism and the electromagnetic-cyber the operation. Then, the model characteristic and elements was analyzed, such as the model system architecture, the operational rule and the intelligent algorithm. On this basis, the "action model pool", "operational rule pool" and "intelligent algorithm pool" would be constructed. Afterwards, the modeling method of the operation of the UAV swarm in cyberspace which based the “Rule+ Respond+ Algorithm” (RRA) is proposed, including the modeling framework and main process method of the RRA. The main process included the military concept modeling stage, the operational rules refining stage, the operational rules judgment stage, the action model response stage and the intelligent algorithm solution stage, that the five stages were in sequence, also the main work in each stage was analyzed. At the level of system of system M and S, the modeling focused of the abstraction, extraction and description of the operational rules of the UAV swarm in cyberspace. The description and construction methods of the operational rule are researched, such as the BNF format, the process format, and the operational rules tree graph. Finally, based on the future joint operations, an example of the operation of the UAV swarm in cyberspace is given, then the operational effectiveness is analyzed. The example showed that using nine UAV Swarms to attack IADS in cyberspace would reduce the normal power range of the sensor network by 90% and the warning time by 80.3%.