Preview

Scientific and Technical Journal of Information Technologies, Mechanics and Optics

Advanced search

Method of spatial countering an intruder in a swarm of unmanned aerial vehicles

https://doi.org/10.17586/2226-1494-2025-25-6-1125-1133

Abstract

   The development of decentralized control technologies for swarms of Unmanned Aerial Vehicles requires the development of new methods for ensuring their resilience to internal threats. The emergence of an intruder agent within a swarm creates threats of energy or information attacks. The situation is especially critical when the intruder agent is located at the center of the swarm, with its influence on its neighbors being greatest. Existing research has focused primarily on detecting intruder agents, while countermeasures, particularly spatial exclusion of the intruder agent from the group, remain poorly understood. This study develops and analyzes a method for spatial countermeasures against the intruder agent that does not require its explicit detection or information exchange between agents. The proposed method is based on the original idea of analogizing the control of a swarm of unmanned aerial vehicles (agents) with the processes occurring in a semiconductor crystal. Countermeasures against the intruder agent are achieved through the temporary modification of certain swarm interaction parameters by the agents. As a result, the spatial structure of the swarm changes, and the intruder, who does not change its interaction parameters, begins to move relative to the other agents, ending up at the edge of the group. Three implementation options for the proposed countermeasure method, based on compression, expansion, and sequential restructuring of the swarm structure, are investigated. Simulation modeling of the behavior of a swarm of unmanned aerial vehicles in the presence of an intruder was performed. The success of the method was measured by the probability of the intruder agent having fewer than five neighboring unmanned aerial vehicles, i. e., being at the edge of the group. The best performance (probability close to 1.0) was demonstrated by the swarm compression option. The swarm expansion option showed lower performance (non-guaranteed option). The sequential restructuring option proved ineffective. It is shown that the degree of change in the distance between agents makes the main contribution to the effectiveness of the method. The proposed method implemented in the swarm
compression mode demonstrated effectiveness for swarm numbers ranging from 19 to 91. The proposed method reduces the likelihood of destructive intruder influence in a swarm of unmanned aerial vehicles, relying solely on the agents local navigation data, without resorting to intruder detection. This makes the method applicable to systems with limited communication capabilities. Some increase in energy consumption can be mitigated by optimizing the intrusion duration and maintaining the swarm structure.

About the Authors

P. Yu. Shamray
ITMO University
Russian Federation

Pavel Yu. Shamray, Leading Engineer

197101; Saint Petersburg

sc 56493192000



D. A. Zakoldaev
ITMO University
Russian Federation

Danil A. Zakoldaev, PhD, Associate Professor, Head of the Center

International Scientific and Academic Center “Security and Safety for Critical Digital Technologies”

197101; Saint Petersburg

sc 57021875400



A. M. Boyko
ITMO University; Ioffe Institute
Russian Federation

Andrey M. Boyko, PhD (Physics & Mathematics), Scientific Researcher, Senior Researcher

197101; 194021; Saint Petersburg



References

1. Phadke A., Medrano F.A., Sekharan C.N., Chu T. An analysis of trends in UAV swarm implementations in current research: simulation versus hardware. Drone Systems and Applications, 2024, vol. 12, pp. 1–10. doi: 10.1139/dsa-2023-0099

2. Cetinsaya B., Reiners D., Cruz-Neira C. From PID to swarms: A decade of advancements in drone control and path planning — A systematic review (2013–2023). Swarm and Evolutionary Computation, 2024, vol. 89, pp. 101626. doi: 10.1016/j.swevo.2024.101626

3. Dao N.-N., Pham Q., Tu N., Thanh T.T., Bao V.N.Q., Lakew D.S., Cho S. Survey on aerial radio access networks: toward a comprehensive 6G access infrastructure. IEEE Communications Surveys & Tutorials, 2021, vol. 23, no. 2, pp. 1193–1225. doi: 10.1109/comst.2021.3059644

4. Wang X., Zhao Z., Yi L., Ning Z., Guo L., Richard Yu F., Guo S. A Survey on security of UAV swarm networks: attacks and countermeasures. ACM Computing Surveys, 2024, vol. 57, no. 3, pp. 1–37. doi: 10.1145/3703625

5. Boyko A., Girgidov R. Maintaining the spatial stability of a swarm of autonomous unmanned aerial vehicles. Robotics and Technical Cybernetics, 2021, vol. 9, no. 2, pp. 85–90. doi: 10.31776/rtcj.9201

6. Nie Z., Zhang Q., Wang X., Wang F., Hu T. Triangular lattice formation in robot swarms with minimal local sensing. IET Cyber-Systems and Robotics, 2023, vol. 5, no. 2, pp. e12087. doi: 10.1049/csy2.12087

7. Yao Y. (Elaine), Dash P., Pattabiraman K. Poster: may the swarm be with you: sensor spoofing attacks against drone swarms. Proc. of the ACM SIGSAC Conference on Computer and Communications Security, 2022, pp. 3511–3513. doi: 10.1145/3548606.3563535

8. Zikratov I.A., Zikratova T.V., Lebedev I.S. Trust model for information security of multi-agent robotic systems with a decentralized management. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2014, vol. 2, no. 90, pp. 47–52. (in Russian)

9. Petrenko V.I., Tebueva F.B., Struchkov I.V., Ryabtsev S.S. Model of trusted interaction of agents in decentralized cyber-physical environmentv. Herald of Dagestan State Technical University. Technical Sciences, 2023, vol. 50, no. 2, pp. 134–141. (in Russian). doi: 10.21822/2073-6185-2023-50-2-134-141

10. Subbarayalu V., Vensuslaus M.A. An intrusion detection system for drone swarming utilizing timed probabilistic automata. Drones, 2023, vol. 7, no. 4, pp. 248. doi: 10.3390/drones7040248

11. Bi S., Li K., Hu S., Ni W., Wang C., Wang X. Detection and mitigation of position spoofing attacks on cooperative UAV swarm formations. IEEE Transactions on Information Forensics and Security, 2024, vol. 19, pp. 1883–1895. doi: 10.1109/tifs.2023.3341398

12. Mughal U.A., Hassler S.C., Ismail M. Machine learning-based intrusion detection for swarm of unmanned aerial vehicles. Proc. of the IEEE Conference on Communications and Network Security (CNS), 2023, pp. 1–9. doi: 10.1109/cns59707.2023.10288962

13. Novák F. Walter V., Petráček P., Báča T., Saska M. Fast collective evasion in self-localized swarms of unmanned aerial vehicles. Bioinspiration and Biomimetics, 2021, vol. 16, no. 6, pp. 066025. doi: 10.1088/1748-3190/ac3060

14. Pfann W.G. Principles of zone-melting. Journal of Metals, 1952, vol. 4, no. 7, pp. 747–753. doi: 10.1007/bf03398137

15. Son J.-H., Ahn H.-S., Cha J. Lennard-jones potential field-based swarm systems for aggregation and obstacle avoidance. Proc. of the 17<sup>th</sup> International Conference on Control, Automation and Systems (ICCAS), 2017, pp. 1068–1072. doi: 10.23919/iccas.2017.8204374

16. Boyko A., Girgidov R. Key features of a swarm assemlby algorythm for autonomous unmanned aerial vehicles (UAVs) in absence of GNSS and stable radio communication. Robotics and Technical Cybernetics, 2022, vol. 10, no. 1, pp. 25–31. doi: 10.31776/rtcj.10103


Review

For citations:


Shamray P.Yu., Zakoldaev D.A., Boyko A.M. Method of spatial countering an intruder in a swarm of unmanned aerial vehicles. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 2025;25(6):1125-1133. (In Russ.) https://doi.org/10.17586/2226-1494-2025-25-6-1125-1133

Views: 61


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2226-1494 (Print)
ISSN 2500-0373 (Online)