Method of spatial countering an intruder in a swarm of unmanned aerial vehicles
https://doi.org/10.17586/2226-1494-2025-25-6-1125-1133
Abstract
The development of decentralized control technologies for swarms of Unmanned Aerial Vehicles requires the development of new methods for ensuring their resilience to internal threats. The emergence of an intruder agent within a swarm creates threats of energy or information attacks. The situation is especially critical when the intruder agent is located at the center of the swarm, with its influence on its neighbors being greatest. Existing research has focused primarily on detecting intruder agents, while countermeasures, particularly spatial exclusion of the intruder agent from the group, remain poorly understood. This study develops and analyzes a method for spatial countermeasures against the intruder agent that does not require its explicit detection or information exchange between agents. The proposed method is based on the original idea of analogizing the control of a swarm of unmanned aerial vehicles (agents) with the processes occurring in a semiconductor crystal. Countermeasures against the intruder agent are achieved through the temporary modification of certain swarm interaction parameters by the agents. As a result, the spatial structure of the swarm changes, and the intruder, who does not change its interaction parameters, begins to move relative to the other agents, ending up at the edge of the group. Three implementation options for the proposed countermeasure method, based on compression, expansion, and sequential restructuring of the swarm structure, are investigated. Simulation modeling of the behavior of a swarm of unmanned aerial vehicles in the presence of an intruder was performed. The success of the method was measured by the probability of the intruder agent having fewer than five neighboring unmanned aerial vehicles, i. e., being at the edge of the group. The best performance (probability close to 1.0) was demonstrated by the swarm compression option. The swarm expansion option showed lower performance (non-guaranteed option). The sequential restructuring option proved ineffective. It is shown that the degree of change in the distance between agents makes the main contribution to the effectiveness of the method. The proposed method implemented in the swarm
compression mode demonstrated effectiveness for swarm numbers ranging from 19 to 91. The proposed method reduces the likelihood of destructive intruder influence in a swarm of unmanned aerial vehicles, relying solely on the agents local navigation data, without resorting to intruder detection. This makes the method applicable to systems with limited communication capabilities. Some increase in energy consumption can be mitigated by optimizing the intrusion duration and maintaining the swarm structure.
Keywords
About the Authors
P. Yu. ShamrayRussian Federation
Pavel Yu. Shamray, Leading Engineer
197101; Saint Petersburg
sc 56493192000
D. A. Zakoldaev
Russian Federation
Danil A. Zakoldaev, PhD, Associate Professor, Head of the Center
International Scientific and Academic Center “Security and Safety for Critical Digital Technologies”
197101; Saint Petersburg
sc 57021875400
A. M. Boyko
Russian Federation
Andrey M. Boyko, PhD (Physics & Mathematics), Scientific Researcher, Senior Researcher
197101; 194021; Saint Petersburg
References
1. Phadke A., Medrano F.A., Sekharan C.N., Chu T. An analysis of trends in UAV swarm implementations in current research: simulation versus hardware. Drone Systems and Applications, 2024, vol. 12, pp. 1–10. doi: 10.1139/dsa-2023-0099
2. Cetinsaya B., Reiners D., Cruz-Neira C. From PID to swarms: A decade of advancements in drone control and path planning — A systematic review (2013–2023). Swarm and Evolutionary Computation, 2024, vol. 89, pp. 101626. doi: 10.1016/j.swevo.2024.101626
3. Dao N.-N., Pham Q., Tu N., Thanh T.T., Bao V.N.Q., Lakew D.S., Cho S. Survey on aerial radio access networks: toward a comprehensive 6G access infrastructure. IEEE Communications Surveys & Tutorials, 2021, vol. 23, no. 2, pp. 1193–1225. doi: 10.1109/comst.2021.3059644
4. Wang X., Zhao Z., Yi L., Ning Z., Guo L., Richard Yu F., Guo S. A Survey on security of UAV swarm networks: attacks and countermeasures. ACM Computing Surveys, 2024, vol. 57, no. 3, pp. 1–37. doi: 10.1145/3703625
5. Boyko A., Girgidov R. Maintaining the spatial stability of a swarm of autonomous unmanned aerial vehicles. Robotics and Technical Cybernetics, 2021, vol. 9, no. 2, pp. 85–90. doi: 10.31776/rtcj.9201
6. Nie Z., Zhang Q., Wang X., Wang F., Hu T. Triangular lattice formation in robot swarms with minimal local sensing. IET Cyber-Systems and Robotics, 2023, vol. 5, no. 2, pp. e12087. doi: 10.1049/csy2.12087
7. Yao Y. (Elaine), Dash P., Pattabiraman K. Poster: may the swarm be with you: sensor spoofing attacks against drone swarms. Proc. of the ACM SIGSAC Conference on Computer and Communications Security, 2022, pp. 3511–3513. doi: 10.1145/3548606.3563535
8. Zikratov I.A., Zikratova T.V., Lebedev I.S. Trust model for information security of multi-agent robotic systems with a decentralized management. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2014, vol. 2, no. 90, pp. 47–52. (in Russian)
9. Petrenko V.I., Tebueva F.B., Struchkov I.V., Ryabtsev S.S. Model of trusted interaction of agents in decentralized cyber-physical environmentv. Herald of Dagestan State Technical University. Technical Sciences, 2023, vol. 50, no. 2, pp. 134–141. (in Russian). doi: 10.21822/2073-6185-2023-50-2-134-141
10. Subbarayalu V., Vensuslaus M.A. An intrusion detection system for drone swarming utilizing timed probabilistic automata. Drones, 2023, vol. 7, no. 4, pp. 248. doi: 10.3390/drones7040248
11. Bi S., Li K., Hu S., Ni W., Wang C., Wang X. Detection and mitigation of position spoofing attacks on cooperative UAV swarm formations. IEEE Transactions on Information Forensics and Security, 2024, vol. 19, pp. 1883–1895. doi: 10.1109/tifs.2023.3341398
12. Mughal U.A., Hassler S.C., Ismail M. Machine learning-based intrusion detection for swarm of unmanned aerial vehicles. Proc. of the IEEE Conference on Communications and Network Security (CNS), 2023, pp. 1–9. doi: 10.1109/cns59707.2023.10288962
13. Novák F. Walter V., Petráček P., Báča T., Saska M. Fast collective evasion in self-localized swarms of unmanned aerial vehicles. Bioinspiration and Biomimetics, 2021, vol. 16, no. 6, pp. 066025. doi: 10.1088/1748-3190/ac3060
14. Pfann W.G. Principles of zone-melting. Journal of Metals, 1952, vol. 4, no. 7, pp. 747–753. doi: 10.1007/bf03398137
15. Son J.-H., Ahn H.-S., Cha J. Lennard-jones potential field-based swarm systems for aggregation and obstacle avoidance. Proc. of the 17<sup>th</sup> International Conference on Control, Automation and Systems (ICCAS), 2017, pp. 1068–1072. doi: 10.23919/iccas.2017.8204374
16. Boyko A., Girgidov R. Key features of a swarm assemlby algorythm for autonomous unmanned aerial vehicles (UAVs) in absence of GNSS and stable radio communication. Robotics and Technical Cybernetics, 2022, vol. 10, no. 1, pp. 25–31. doi: 10.31776/rtcj.10103
Review
For citations:
Shamray P.Yu., Zakoldaev D.A., Boyko A.M. Method of spatial countering an intruder in a swarm of unmanned aerial vehicles. Scientific and Technical Journal of Information Technologies, Mechanics and Optics. 2025;25(6):1125-1133. (In Russ.) https://doi.org/10.17586/2226-1494-2025-25-6-1125-1133































