{"title":"基于自主无人机群的恶意无人机跟踪性能评估","authors":"C. Arnold, Jason Brown","doi":"10.1109/UEMCON51285.2020.9298062","DOIUrl":null,"url":null,"abstract":"Recent instances of malicious Unmanned Aerial Vehicles (UAVs) causing service disruption or damage to critical infrastructure has prompted research into methods of mitigating and deterring such nefarious activities. One such countermeasure is to use a swarm of UAVs to track the malicious UAV back to its origin. In this paper, we evaluate different methods of swarm formation for the purposes of malicious UAV tracking via a bespoke OMNeT++ simulation. The simulation also evaluates the effect of the number of UAVs in the swarm, as well as the evasiveness of the malicious UAV in terms of its flight capabilities and flight path. The results demonstrate that encirclement type swarm formations such as Surround and Cone, in which the malicious UAV is surrounded by the swarm, perform better than a follow type swarm formation in their ability to continue to track the malicious UAV.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Performance Evaluation for Tracking a Malicious UAV using an Autonomous UAV Swarm\",\"authors\":\"C. Arnold, Jason Brown\",\"doi\":\"10.1109/UEMCON51285.2020.9298062\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent instances of malicious Unmanned Aerial Vehicles (UAVs) causing service disruption or damage to critical infrastructure has prompted research into methods of mitigating and deterring such nefarious activities. One such countermeasure is to use a swarm of UAVs to track the malicious UAV back to its origin. In this paper, we evaluate different methods of swarm formation for the purposes of malicious UAV tracking via a bespoke OMNeT++ simulation. The simulation also evaluates the effect of the number of UAVs in the swarm, as well as the evasiveness of the malicious UAV in terms of its flight capabilities and flight path. The results demonstrate that encirclement type swarm formations such as Surround and Cone, in which the malicious UAV is surrounded by the swarm, perform better than a follow type swarm formation in their ability to continue to track the malicious UAV.\",\"PeriodicalId\":433609,\"journal\":{\"name\":\"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UEMCON51285.2020.9298062\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UEMCON51285.2020.9298062","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Performance Evaluation for Tracking a Malicious UAV using an Autonomous UAV Swarm
Recent instances of malicious Unmanned Aerial Vehicles (UAVs) causing service disruption or damage to critical infrastructure has prompted research into methods of mitigating and deterring such nefarious activities. One such countermeasure is to use a swarm of UAVs to track the malicious UAV back to its origin. In this paper, we evaluate different methods of swarm formation for the purposes of malicious UAV tracking via a bespoke OMNeT++ simulation. The simulation also evaluates the effect of the number of UAVs in the swarm, as well as the evasiveness of the malicious UAV in terms of its flight capabilities and flight path. The results demonstrate that encirclement type swarm formations such as Surround and Cone, in which the malicious UAV is surrounded by the swarm, perform better than a follow type swarm formation in their ability to continue to track the malicious UAV.