Share Email Print

Proceedings Paper

Research on the modeling method of UAV swarm operation in cyberspace
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

As a kind of game-changing combat style, the operation of the UAV swarm in cyberspace is characterized by high effective cost and high concealment, which make it play an important role in the future competition of cyberspace. Due to the lack of actual combat experience and high confidentiality of the cyberspace operation and the UAV swarm operation, the modeling and simulation (M and S) of the operation of the UAV swarm in cyberspace is the vital method for planning the UAV swarm system architecture and designing the tactical methods of the UAV swarm. At present, the research on the M and S of the operation of the UAV swarm in cyberspace is just starting from home and abroad, and there is no corresponding modeling method and concrete model. Taken the Integrated Air Defense System (IADS) as the operational object, the guiding ideology of the M and S of the operation of the UAV swarm in cyberspace was researched from the height of the joint operations, which includes the characteristics of the individual autonomy, the group cooperation, the offensive and defensive antagonism and the electromagnetic-cyber the operation. Then, the model characteristic and elements was analyzed, such as the model system architecture, the operational rule and the intelligent algorithm. On this basis, the "action model pool", "operational rule pool" and "intelligent algorithm pool" would be constructed. Afterwards, the modeling method of the operation of the UAV swarm in cyberspace which based the “Rule+ Respond+ Algorithm” (RRA) is proposed, including the modeling framework and main process method of the RRA. The main process included the military concept modeling stage, the operational rules refining stage, the operational rules judgment stage, the action model response stage and the intelligent algorithm solution stage, that the five stages were in sequence, also the main work in each stage was analyzed. At the level of system of system M and S, the modeling focused of the abstraction, extraction and description of the operational rules of the UAV swarm in cyberspace. The description and construction methods of the operational rule are researched, such as the BNF format, the process format, and the operational rules tree graph. Finally, based on the future joint operations, an example of the operation of the UAV swarm in cyberspace is given, then the operational effectiveness is analyzed. The example showed that using nine UAV Swarms to attack IADS in cyberspace would reduce the normal power range of the sensor network by 90% and the warning time by 80.3%.

Paper Details

Date Published: 31 August 2018
PDF: 9 pages
Proc. SPIE 10835, Global Intelligence Industry Conference (GIIC 2018), 1083514 (31 August 2018); doi: 10.1117/12.2504209
Show Author Affiliations
Yang Zhang Sr., National Defense Univ. (China)
Guangya Si, National Defense Univ. (China)
Yanzheng Wang, National Defense Univ. (China)

Published in SPIE Proceedings Vol. 10835:
Global Intelligence Industry Conference (GIIC 2018)
Yueguang Lv, Editor(s)

© SPIE. Terms of Use
Back to Top