Skip to main content

Effectiveness Analysis of UAV Offensive Strategy with Unknown Adverse Trajectory

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2021)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12939))

  • 1672 Accesses

Abstract

In this paper, we consider a scene of UAV confrontation, which has the same altitude, given channel width W and attack depth L. For the unknown adverse trajectory, we design an optimal interception strategy based on the UAV straight line breakthrough, and propose an effective breakout strategy for UAV clusters to break through its defending line. To verify the effectiveness of the breakout strategy, we provide a simulation example for UAV confrontation in a dynamic confrontation environment. The breakout region has reached 99% of all regions battlefield through simulation, which proves the effectiveness of the proposed breakout strategy.

The work was partially supported by the National Natural Science Foundation of China under Grant 61873106, Nature Science Foundation of Jiangsu Province for Distinguished Young Scholars under Grant BK20200049, Jiangsu Provincial Innovation and Entrepreneurship Training Program Key Project under Grant 20200419.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Crowther, T.W.: The emergence of trait-based approaches in fungal ecology. Fungal Ecol. 46, 100946 (2020)

    Article  Google Scholar 

  2. AL-Madani, B., Elkhider, S.M., El-Ferik, S.: DDS-based containment control of multiple UAV systems. Appl. Sci. 10(13), 4572 (2020)

    Article  Google Scholar 

  3. Weiwei, X., Zhang, H., Cao, X., Deng, R., Li, H., Zhang, J.: Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper. Inf. Sci. 546, 871–882 (2021)

    Article  MathSciNet  Google Scholar 

  4. Sun, J., et al.: Improving security performance of dual UAVs system with unknown eavesdropper location. In: Proceedings of the International Conference on Internet-of-Things Design and Implementation, pp. 257–258 (2021)

    Google Scholar 

  5. Wang, H., Tian, J., Wei, L., Zhuang, Y.: Multi-UAV collaborative search and tracking strategy for multiple moving targets. Control Theory Appl. 38(7), 971–978 (2021)

    Google Scholar 

  6. Liang, F., Yang, Y., Liu, G., Wan, B., Gao, W.: Research on collaborative reconnaissance planning algorithm for multi-UAV systems. Aerosp. Defense 4(1), 103–108 (2021)

    Google Scholar 

  7. Zhang, Y., Lin, D., Zheng, D., Cheng, Z., Tang, P.: Task allocation and trajectory optimization of multi-target space-time synchronized coordinated attack UAV. Acta Armamentarii 7, 1–14 (2021)

    Google Scholar 

  8. Xu, W., Li, H., Zhang, J., Zhu, Y., Zhang, H.: Trajectory tracking for underwater rescue salvage based on backstepping control. In: Chinese Control Conference, pp. 422–427 (2019)

    Google Scholar 

  9. Xu, W., Xiao, Y., Li, H., Zhang, J., Zhang, H.: Trajectory tracking for autonomous underwater vehicle based on model-free predictive control. In: IEEE 20th International Conference on High Performance Switching and Routing, pp. 1–6 (2019)

    Google Scholar 

  10. Li, H., Weiwei, X., Zhang, H., Zhang, J., Liu, Y.: Polynomial regressors based data-driven control for autonomous underwater vehicles. Peer-to-Peer Netw. Appl. 13(5), 1767–1775 (2020). https://doi.org/10.1007/s12083-020-00878-6

    Article  Google Scholar 

  11. Weiwei, X., et al.: Iterative trajectory optimization for dual-UAV secure communications. In: IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation, pp. 260–261 (2020)

    Google Scholar 

  12. Yang, W., Li, D., Zhang, H., Tang, Y., Zheng, W.X.: An encoding mechanism for secrecy of remote state estimation. Automatica 120, 109116 (2020)

    Article  MathSciNet  Google Scholar 

  13. Gan, R., Shao, J., Xiao, Y., Zhang, H., Zheng, W.X.: Optimizing attack schedules based on energy dispatch over two-Hop relay networks. IEEE Trans. Autom. Control 65(9), 3832–3846 (2020)

    Article  MathSciNet  Google Scholar 

  14. Wang, L., Cao, X., Sun, B., Zhang, H., Sun, C.: Optimal schedule of secure transmissions for remote state estimation against eavesdropping. IEEE Trans. Industr. Inf. 17(3), 1987–1997 (2020)

    Article  Google Scholar 

  15. Askari, A., Mortazavi, M., Talebi, H.A., Motamedi, A.: A new approach in UAV path planning using Bezier-Dubins continuous curvature path. Proc. Inst. Mech. Eng. Part G J. Aerosp. Eng. 230(6), 1103–1113 (2016)

    Article  Google Scholar 

  16. Lu, X., Pu, H., Zhen, Z., Chen, P.: UAV swarm saturation attack based on improved consensus algorithm. Electro-Opt. Control 1–6 (2021)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Heng Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yan, H. et al. (2021). Effectiveness Analysis of UAV Offensive Strategy with Unknown Adverse Trajectory. In: Liu, Z., Wu, F., Das, S.K. (eds) Wireless Algorithms, Systems, and Applications. WASA 2021. Lecture Notes in Computer Science(), vol 12939. Springer, Cham. https://doi.org/10.1007/978-3-030-86137-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-86137-7_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-86136-0

  • Online ISBN: 978-3-030-86137-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics