This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
An unmanned aerial vehicle (UAV) swarm is an airmobile system composed of a certain number of single-function or multi-function UAVs [1]. After this concept was put forward, relevant theoretical research and verification tests emerged in an endless stream during the past decade. In 2012, the strategic capability Office of the U. S. Department of Defense proposed the “PARTRIDGE” project, which aimed to achieve the air coordination of multiple low-cost small UAVs through wireless Ad Hoc networks [2]. In 2015, the Defense Advanced Research Projects Agency of the U. S. (DAPAR) released the “GREMLINS” program, hoping to improve the UAV swarm capability through key technologies such as air recycling [3]. In 2017, the “OFFSET” project under the responsibility of DAPAR focused on urban operations on the basis of the accumulation of UAV swarm technology. Its reconnaissance capability and network robustness are the keys to the realization of combat tasks. In the same year, Yanjie Zhao’s team of China Electronics Technology Group completed the flight test and networking of 119 fixed-wing UAVs, and preliminarily conducted the ground reconnaissance mission test [4]. In 2020, Zhao’s team expanded the scale of UAVs, realized the networking flight and operational function verification of 200 UAVs.
On the basis of technology accumulation in the past decade, UAVs and UAV swarms have played an increasingly prominent role in recent local wars. On September 27th, 2020, a new round of armed conflict broke out between Azerbaijan and Armenia in the Naka region. Azerbaijan destroyed Armenia's air defense system through the comprehensive use of multiple UAVs such as AN-2 modified UAV and TB-2 Reconnaissance/Strike UAV [5]. This regional conflict has subverted people’s concept of local war, and it is also the first time that UAVs have appeared on the battlefield as the main combat equipment. While the first operational use of a UAV swarm took place in 2021, according to the Russian Satellite News Agency, in May 2021, during Israel's air strike against Hamas, the Israeli air force used an artificial intelligence-assisted UAV swarm to carry out reconnaissance and strike. These UAV swarms deployed near Gaza communicate with each other and share the situation through the communication network to accurately locate the target.
The UAV swarm depends deeply on its communication network when it performs aerial reconnaissance, target positioning, cooperative strike, and other combat tasks [6, 7]. The UAV swarm network is formed by connecting the UAV nodes through high-speed data link, which can realize the global situation sharing and data collaborative processing of UAVs in the network [8]. Communication network is the basic support of UAV swarm capability generation [9–11].
In order to reduce the dependence on ground facilities and improve the autonomous combat capability of UAV swarm, a self-organizing network is the preferred network mode for UAV swarm communication. In this networking mode, each UAV can be used as a network node of a mobile UAV swarm, and each node relies on the wireless communication device module to realize the independent management of wireless communication. Xiao et al. applied the complex network theory to design the UAV swarm self-organizing communication network and developed the network node control software, which provided a practical method for realizing the efficient autonomous communication of UAV swarm [12]. Wang and Gao analyzed the main characteristics and applicable environment of typical algorithms for autonomous management of UAV swarm communication based on summarizing the topology reconstruction of the UAV swarm communication network [13].
UAV swarm warfare requires high reliability of data transmission. However, there are some problems in the self-organizing network applied to UAV swarm, such as wireless multihop routing, changeable network topology, limited bandwidth, and so on [14]. From the conclusion of theoretical reasoning and the results of many experiments in recent years, these problems may cause the failure of the UAV swarm network due to the damage to some UAV nodes. Liu and Zhang studied the connectivity of the UAV swarm Ad Hoc network, and pointed out that the communication connectivity between UAVs will greatly affect the ability of UAV swarm to perform tasks [15]. In addition, some nodes of UAV swarm may be attacked by the enemy in combat operations, causing cascading effects, affecting the generation of combat capability, and even leading to network collapse. Therefore, it has important theoretical significance and application value to establish the cascading failure model of the UAV swarm communication network and analyze its recovery ability. Cui et al. proposed a network elasticity analysis model based on node repair [16]. Referring to the classical “capacity & load model” invented by Motter and Lai (M-L model), this model constructs the main indicators such as recovery probability and average repair time. This new model can be applied to the evaluation of network elasticity. Wang et al. established a complex network model including a communication subnet, structure subnet, and task subnet. Later, he studied the invulnerability of UAV swarm networks with different configurations after being attacked from the perspective of network dynamics [17]. Khan et al. proposed an intelligent networking method. The UAV swarm communication network built according to this method can realize intelligent selection of connection mode. In this way, communication efficiency and network survivability are significantly improved compared with the traditional mode [18]. Based on the invulnerability theory and elasticity theory of complex networks, Gu et al. simulated the failure of some nodes due to the attack of a UAV swarm. This work explained the importance of the elasticity index to UAV swarm and proposed the elasticity optimization strategy for the network [19]. Sun et al. proposed a multidomain cooperative method for UAV swarm. Compared with the previous research results, this method can significantly improve the communication network elasticity of UAV swarm when they perform reconnaissance tasks, and make the disturbed UAV swarm performance quickly recover above the capability baseline [20].
Although the existing researches on the invulnerability and elasticity of UAV swarm communication networks are rich in content, there are still some theoretical and practical problems, which can be summarized as follows:
(a) Most researches on network invulnerability and elasticity focus on single-layer networks. However, when UAV swarms perform tasks, they often have regional division or network layering, and each layer is connected with others. This kind of network belongs to the category of interdependent network research. Single layer network can not accurately simulate the operation of a communication network when large-scale UAV swarm action. Especially, when the network is attacked, the invulnerability and elasticity of interdependent networks are greatly affected by their interdependent links [21].
(b) The research on invulnerability and elasticity of UAV swarm communication networks is often carried out separately. In order to avoid conceptual conflict, most scholars chose to study only one of the characteristics between network invulnerability and elasticity. For the recoverable UAV swarm communication network, invulnerability is the upstream performance of elasticity. In fact, these two properties should be studied at the same time, so as to comprehensively grasp the influencing factors of network elasticity [22].
(c) In most studies, the generation of UAV swarm communication networks refers to the traditional complex network model topology, rather than the connection mode in actual combat. Therefore, the simulation results have little guiding significance for combat application. Scholars are used to using classical regular networks, small world networks, random networks, and other models to carry out research. However, the UAV swarm network in combat often adopts the method of setting the connection probability to connect neighbor nodes considering the length of the links. This network topology is more conducive to the implementation of efficient communication. At the same time, some nodes have better invulnerability after being attacked [23].
This paper focuses on the UAV swarm reconnaissance mission and applies complex network theory and elasticity theory to study the invulnerability and elasticity of the UAV swarm communication network. We generate three UAV swarm communication subnets through scale-free network rules. Each subnet contains about 100 nodes. Then, according to the principle of maximum degree, three subnetworks are connected to form a three-layer interdependent network. The improved M-L model is applied to establish the cascading failure model of the interdependent network. Random attacks are carried out on network nodes. The effects of initial size, capacity coefficient, load coefficient, and other parameters on the network cascading invulnerability are observed. On this basis, the degree priority recovery rule is set to recover the network connection, then the relationship between network elasticity and various parameters is studied by observing the network performance.
The simulation results show that the interdependent network has better elasticity than the isolated network. For interdependent networks, increasing the number of interdependent nodes has a great impact on the network elasticity. At the same time, moderately increasing the network capacity coefficient and controlling the scale of UAVs can also improve the elasticity of UAV swarm communication network.
2. Construction of UAV Swarm Communication Network
2.1. Interdependent Network Model of Reconnaissance UAV Swarm
There is unidirectional coupling between the networks of each layer of the RTU network model. The main characteristics of the network are extracted, and the RTU network model is constructed as shown in the Figure 1.
Carrying out battlefield reconnaissance missions is an important application form of UAV swarm in combat. UAV swarm also has significant advantages in reconnaissance operations because of its flexibility, good concealment, and low cost. According to the characteristics of UAV swarm to a ground reconnaissance mission, a UAV swarm is dispatched to target groups composed of three reconnaissance areas on average. The UAV swarm can be divided into three subgroups. In order to ensure the air coordination and intelligence sharing of the UAV swarm, the communication within each subgroup needs to be kept smooth, that is, the communication network is stably connected. At the same time, in order to ensure that the UAVs in the whole swarm share the battlefield situation, the three subgroups should also maintain smooth communication. Thus, connections between three layers of networks should be established. As shown in Figure 1, we build the model and divide the UAV swarm into three subgroups, namely UAVS1, UAVS2, and UAVS3, to conduct reconnaissance on three areas Ω 1, Ω 2, and Ω 3 respectively.
[figure(s) omitted; refer to PDF]
We build a three-layer complex network mathematical model to represent the complex node motion behavior and connection topology of the UAV swarm communication network effectively. Because of the connection between subnets, the three-layer network is an interdependent network [24–26]. Each UAV is regarded as a node of this interdependent network, and its connection relationship is regarded as the link of the network. Assuming that a total of
The network model of the
In the reconnaissance UAV swarm communication network model, the sum of nodes is
Furthermore, the interlayer coupling relationship between the three subnetworks is established, as shown in Figure 2. In order to increase the communication efficiency of interlayer connections as much as possible, the nodes with a large degree of subnetworks are selected to establish interlayer connections. In Figure 2, TE
[figure(s) omitted; refer to PDF]
2.2. Generation Rules of UAV Swarm Interdependent Network
To build the model of a real network, it is necessary to consider the main characteristics of the network and the interaction between nodes. In the early research of complex networks, people used to build regular network models, such as ring networks, star networks, and so on. However, because the physical network is often more complex than the regular network, this modeling method is gradually replaced by other network models. At present, Erd s-Rény (ER) random network, small-world network, and scale-free network are several commonly used network models [30–32].
When modeling ER random network, it is no longer simple connection rule like regular network, but a certain connection probability is given to describe the relationship between nodes. The connection probability of ER random network follows the following rules:
The small world network is derived from a famous paper published by Watts and Strogatz in Nature. This paper has epoch-making significance for the research and development of complex network science. This network model filled the research gap between “regular network” and “random network.” The small world network describes the network form of a certain regular network after adding random links, but it has not yet reached the random state. This kind of network is more accurate than a regular network and random network in describing various network relationships.
As the research goes deeper, people found that using small-world network model to study interpersonal networks and public opinion communication network has unique advantages. However, the “small world” characteristics of many real networks are not significant. In their research, Barabasi and Albert found that the degree of most networks, in reality, obeys power-law distribution, and they called this characteristic “scale-free.” Based on this discovery, they proposed a new network model, the scale-free network model. Scholars gradually discovered that the degree distribution of the Ad Hoc network that realizes the swarm communication will show significant scale-free. Therefore, using a scale-free network model to simulate the UAV swarm communication network is more in line with the actual situation [33].
The core of scale-free network modeling is to define the network connection rules. Tran et al. proposed a method to build a scale-free network using a preference connection algorithm [34]. At the same time, considering the cost of network connection and reconnection, the different network connection modes are compared. Assuming that the number of initially fully connected nodes is
Considering the self-organization and self-adaptive characteristics of UAV swarm, Bai proposed a new network model [36]. He pointed out that if there are isolated nodes or branches in UAV swarm, the overall performance of the swarm will be reduced. The connection probability equation for this model is as follows [37–39].
The function
Based on the network generation rules of equations (8) and (9), the simulation software is used to generate three complex UAV swarm communication networks with different parameters. The network generation parameters are shown in Table 1. In order to ensure that the experimental data conform to the actual scale of future UAV swarm operations, 100 UAVs are set in each swarm to form three UAV swarm networks to scout the target area, as shown in Figures 3–5.
Table 1
Parameters of UAV communication network.
Parameter | Meaning | Value |
N | Swarm size | 100 |
m | Number of connections with original nodes in the network | 2 |
m0 | Initial full connections | 5 |
D | UAV mission area | 100 × 100 |
ε | Adjustment factor of node degree value | 1 |
rc | Communication distance | 20 |
η | Distance influence factor | 0.25 |
[figure(s) omitted; refer to PDF]
The interlayer communication among the three networks depends on the five nodes with high node degree in each subnetwork. The first and third networks are respectively connected with the second, while the first and third networks rely on the second network for information exchange. Therefore, the three UAV networks are connected into a three-layer interdependent network, as shown in Figure 6.
[figure(s) omitted; refer to PDF]
3. Cascading Failure Model of UAV Swarm Interdependent Network
When the UAV swarm communication network is attacked or some UAV nodes fail because of their own breakdowns, the faults will spread through the network due to the connection relationship. In order to accurately describe the propagation of faults, the network cascading failure model is selected. Based on the classical model, it can accurately describe the failure propagation process in three-layer swarm communication interdependent network.
3.1. Cascading Failure Model
The M-L model proposed by Motter and Lai is a classical model for cascading failure of complex networks [45]. According to the model establishment rules, set the capacity of node
When a node fails, the load of the failed node is distributed to the node directly connected to the failed node. The load obtained by the node directly connected to the failed node after one load distribution is as follows:
Based on the M-L model of single-layer network, the cascading failure model of three-layer interdependent network is considered. If node
(a) When node
(b) When all the interdependent nodes of node
(c) When the load of node
In the swarm communication interdependent network studied in this paper, the failure propagation from network B to network C is the same as that from network A to network B. And the failure can spread two-way between the three layers of networks. In particular, when node
3.2. Cascading Failure Experiment
Attacks on complex networks can be divided into random attacks and targeted attacks. Random attack refers to the equal probability attack on each node in the network, which does not distinguish the importance of nodes. Targeted attacks are attacks on nodes according to certain rules, such as attacking nodes from high to low degrees. Considering that the reconnaissance UAV swarm communication network is not easy to be identified by the enemy. The enemy attacks the swarm at random mostly. Therefore, in this experiment, random attack is used to attack the UAV swarm communication network. First, when the three-layer interdependent network is not connected, the network is randomly attacked by setting a single parameter change. Observe the performance change trend of the UAV swarm communication network after three isolated networks are attacked, and analyze its invulnerability. Then, the interdependent links are introduced to construct the interdependent network, and the whole swarm network is attacked randomly. Observe the performance change trend of the network and conduct a comparative analysis. The initial experimental parameter settings are shown in Table 2.
Table 2
Initial parameters of cascading failure propagation experiment.
Parameter | Meaning | Value |
N | Swarm size | 100 |
Nh | Number of damage UAVs in a single attack | 20 |
m | Number of connections with original nodes in the network | 2 |
m0 | Initial full connections | 5 |
D | UAV mission area | 100 × 100 |
ε | Adjustment factor of node degree value | 1 |
rc | Communication distance | 20 |
η | Distance influence factor | 0.25 |
λ | Capacity factor | 0.2 |
μ | Load factor | 0.2 |
3.3. Results and Analysis of Cascading Failure Experiment
The three-layer interdependent network model established in this paper is attacked randomly to observe the network invulnerability under different parameters. Considering that the communication performance is the most important capability of swarm communication network, this paper chooses network communication performance as the measure of network invulnerability.
Node state
The network communication performance is the sum of the performance of each node, expressed in
The experimental results are shown in the following figures. It can be seen from (13) and (14) that
Random attacks are carried out on the three-layer UAV swarm network. The average communication performance changes of the three subnetworks in the interdependent network are shown in Figures 7–9.
[figure(s) omitted; refer to PDF]
Figure 7 shows the impact of the number of attacked nodes on the network communication performance. It can be seen from the figure, after being attacked, cascading failure occurs in the three-layer interdependent network. As the number of damaged nodes increases after being attacked, the time of cascading failure process increases, and the network communication performance decreases gradually. The more the damage, the worse the network performance is after random attack.
Figures 8 and 9 show the trend of network communication performance as parameter λ and parameter μ change, respectively. It can be observed that during the initial stage of cascading failure, there is no obvious rule between capacity factor and load on the rate of network performance degradation. However, after the cascading failure, the larger the capacity factor and load value factor, the better the network communication performance of the UAV swarm network will be the more destructive they will be.
4. Elasticity of Swarm Communication Network
4.1. Establishment of Elasticity Index
Elasticity generally refers to the performance of an individual or system to restore its original ability and state after being disturbed. For the reconnaissance UAV swarm communication network, after the network is disturbed, it will experience three stages: performance degradation, performance recovery, and performance stability. The specific performance changes are shown in Figure 10 below [50].
[figure(s) omitted; refer to PDF]
At time
The quantitative measurement of network elasticity mainly includes the definition of elasticity index based on network topology parameters, the definition of elasticity index based on cumulative performance changes, and the elasticity index considering invulnerability and rapidity. Defining the elasticity index with the network topology parameters needs to calculate the maximum connectivity subgraph size after the network is attacked or disturbed. This method is more intuitive and can reflect the change trend of relevant parameters of the network after being disturbed. However, this index is only applicable to the rough analysis of the performance of simple network models. Therefore, this index can not accurately analyze the elasticity of large-scale UAV swarm network with complex structures [50, 51].
Elasticity index defined by cumulative performance change interprets the elasticity index as the overall performance change of the network during the observation period, which is expressed in the form of integral as follows:
The dynamic performance of the network can reflect the dynamic change of the performance through the elastic index. However, the simple index value can not accurately reflect the invulnerability and rapidity, which needs to be investigated in combination with the performance change curve [52].
The elasticity index considering invulnerability and rapidity is evolved from the definition of elasticity index based on the cumulative change of performance. Based on the performance change curve, the index comprehensively considers the overall performance change
For elastic analysis, the perturbation and recovery phases are considered. The
Tran et al. considered the volatility of the network, proposed the volatility factor
For the case of multiple disturbances, the total elastic value can be obtained by weighting the system elasticity value at each disturbance [53]. This kind of index can completely and accurately reflect the definition of UAV swarm elasticity. Therefore, this index is selected to test the elasticity of UAV swarm communication network in this paper.
4.2. Elasticity Experiment of UAV Swarm Communication Network
First, a single network without interlayer connection relationship is randomly attacked according to the parameters in Table 2. Then, a three-layer interdependent network with interlayer connection based on the network generation rules in this paper (the network shown in Figure 6) is randomly attacked. The network elasticity under different structures and different parameters is compared and analyzed.
Observe the network performance degradation and recovery process after an attack when three subnetworks are not connected to interdependent networks. The test results are shown in Figures 11–13:
[figure(s) omitted; refer to PDF]
The initial number of UAVs in swarm communication network in Figure 11 is 100. When 20 UAVs are attacked randomly, the communication performance of the UAV network is degraded to 53.0% of the initial state. The number of UAVs damaged due to cascading failure was 27, accounting for 57.5% of the total damage. Conduct network recovery after the attack process. When 10 UAVs are restored, the network communication performance reaches 76.0% of its initial state, and the network elasticity R = 0.9947.
The initial number of UAVs in swarm communication network in Figure 12 was 100. Some nodes were not connected when the network was generated, and 94 UAVs were successfully connected. When 20 UAVs were attacked randomly, the UAV network communication performance was degraded to 54.0% of the initial state. The number of UAVs damaged due to cascading failure is 20, accounting for 50.0% of the total damage. Conduct network recovery after the attack process. After 15 UAVs are recovered, the UAV network communication performance reaches 76.0% of the initial state, and the network elasticity R = 1.0933.
The initial number of UAVs in swarm communication network in Figure 13 is 100. When 20 UAVs are attacked randomly, the communication performance of the UAV network is degraded to 64.0% of the initial state. The number of UAVs damaged due to cascading failure was 16, accounting for 44.4% of the total damage. Conduct network recovery after the attack process. After 15 UAVs are recovered, the UAV network communication performance reaches 81.0% of the initial state, and the network elasticity R = 1.1184.
Add interdependent links to three isolated networks to form a three-layer interdependent network. The elasticity of the interdependent network is observed after being attacked through experiments.
We select five nodes with the largest degree in each of the three subnetworks UAVS1, UAVS2, and UAVS3, and establish interlayer links between these nodes. In this way, the UAV swarm communication network is established. The initial number of UAVs in swarm communication network in Figure 14 is 300. Except for some isolated nodes, a total of 294 have been connected. When 60 UAVs are attacked randomly, the communication performance of UAV network is degraded to 56.1% of the initial state, which is close to that of a single layer. The number of UAVs damaged due to cascading failure is 69, accounting for 53.5% of the total damage, which is similar to that of single layer. After the restoration of 40 UAVs, the communication performance of UAVs reached 86.1% of the initial state, which was significantly higher than that of single-layer network. It shows that the establishment of three-layer interdependent network is helpful to improve the performance of swarm communication network. The elasticity of the three-layer network is R = 1.1151, which is higher than the average value of the three single-layer elasticity, indicating that the three-layer interdependent network helps to improve the network elasticity.
[figure(s) omitted; refer to PDF]
We further studied the elastic changes of UAV swarm communication interdependent networks under different network sizes and parameters. The test results are shown in Figures 15–18.
[figure(s) omitted; refer to PDF]
It can be clearly seen from the above figure that the elasticity of the UAV swarm is declining with the increase in network scale. When the number of UAVs in the swarm is 50, the network elasticity is 1.483, while when the number of UAVs increases to 250, the network elasticity is only 0.863. This is because, with the increase of the network scale, the nodes are easier to be attacked when the swarm is attacked. After the number of attacked nodes increases, it takes more time to recover nodes, so the elasticity becomes lower and lower.
It can be seen from the above figure that with the increase of capacity coefficient, the elasticity of UAV swarm network gradually increases, but the rising rate gradually decreases. When the capacity coefficient increases to 0.9, the elasticity no longer increases and decreases slowly. This indicates that when the node capacity is too large, the elasticity will appear extreme value instead of increasing all the time.
Figure 17 shows the variation of network elasticity with the number of damaged nodes. As the number of destroyed nodes increases, the swarm elasticity decreases gradually. The increase in the number of damage directly increases the impact on the network, making it more difficult to recover, so the elasticity is lower.
Furthermore, according to the characteristics of interdependent networks, the effect of interdependent nodes’ number on the network elasticity is observed. As the number of interdependent nodes increases, the network is more closely connected, and the network elasticity increases quasi-linear. Thus, increasing the number of network interdependent links can promote the network to complete reconnection more quickly after being destroyed.
5. Summary and Outlook
In this paper, the performance of swarm communication is studied based on the background of the UAV swarm reconnaissance mission. A three-layer interdependent network model is constructed by setting the scale-free network generation rules. The M-L model is improved and applied to describe the cascading failure process in the interdependent network. Through simulation experiments, it is found that when random attacks are carried out on three-layer interdependent network, with the increase of capacity coefficient and load value coefficient, the communication performance retention of the UAV swarm network gradually increases, and the invulnerability is improved. The influence of different network generation parameters and rules on the network elasticity is explored. We conclude that the interdependent network has higher elasticity than the three single-layer networks. And the more interdependent nodes the network has, the higher the swarm network elasticity will be.
The integrity of the communication network is an important guarantee for UAV swarm to carry out operational tasks. When the UAV swarm is attacked, the resilience of the communication network, that is, network elasticity, is particularly critical.
It can be seen from the research conclusion of this paper, in order to ensure the maximum recovery of communication ability after the reconnaissance UAV swarm is attacked, the swarm network should be dissociated into subnetworks according to the reconnaissance areas. Then the interdependent network should be constructed by establishing the links between layers. Furthermore, the interdependent network elasticity can be enhanced by controlling the swarm size, appropriately increasing the capacity coefficient, and increasing the number of interdependent links, so as to obtain better communication reliability and improve the reconnaissance operation capability of the swarm.
Authors’ Contributions
The authors confirm their contribution to the paper as follows. Boyu Feng and Zhihao Zhang conceptualized and designed the study; Zhihao Zhang collected the data; Lin Zhou and Boyu Feng analysed and interpretated the results; Lin Zhou prepared the original draft. All authors reviewed the results and approved the final version of the manuscript.
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China under Grants 05171101 and 71901216.
[1] O. Shrit, S. Martin, K. Alagha, "A new approach to realize drone swarm using ad-hoc network," ,DOI: 10.1109/Med-Hoc-Net41499.2017, .
[2] B. Sterling, "The hacker crackdown: law and disorder on the electronic Frontier," Open Road Media, 2020.
[3] L. Huang, "Summary of the status quo of the US smart UAV fleet project," Airborne Missile, vol. no. 07, pp. 44-47, DOI: 10.16338/j.issn.1009-1319.20170393, 2018.
[4] Piyush, "China Electronic Science and Technology Group successfully completed the flight test of unmanned aerial vehicle swarm," Robot Technology and Applications, vol. no. 4, 2017.
[5] H. Yanan, C. Kong, X. Guan, "Analysis of operational utilization and development situation of foreign unmanned aerial vehicles--reflection on Naka conflict event," Defense Science, Technology and Industry, vol. no. 02, pp. 50-53, 2021.
[6] Z. Fang, J. Wang, Y. Ren, Z. Han, H. V. Poor, L. Hanzo, "Age of information in energy harvesting aided massive multiple access networks," IEEE Journal on Selected Areas in Communications, vol. 40 no. 5, pp. 1441-1456, DOI: 10.1109/jsac.2022.3143252, 2022.
[7] P. Li, J. Xu, "Fundamental rate limits of UAV-enabled multiple access channel with trajectory optimization," IEEE Transactions on Wireless Communications, vol. 19 no. 1, pp. 458-474, DOI: 10.1109/twc.2019.2946153, 2020.
[8] J. Wang, C. Jiang, Z. Han, Y. Ren, R. G. Maunder, L. Hanzo, "Taking drones to the next level: cooperative distributed unmanned-aerial-vehicular networks for small and mini drones," IEEE Vehicular Technology Magazine, vol. 12 no. 3, pp. 73-82, DOI: 10.1109/mvt.2016.2645481, 2017.
[9] Y. Zou, X. Jiang, P. Yan, J. Zhu, "Next generation UAV collaborative communication network," Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), vol. 37 no. 03, pp. 43-51, 2017.
[10] S.. Zhou, "Research on UAN and its routing protocol based on ADHoc," Southwest Jiaotong University, 2007.
[11] L. Xinting, "Research on key technologies of multi-UAV cooperative operations," Nanjing University of Aeronautics and Astronautics, vol. 76 no. 15, 2009.
[12] H. Xiao, H. He, X. Hu, Y Deng, "Design and verification of self-organizing communication network for micro-UAV bee swarms," Control and Information Technology, vol. no. 02, pp. 91-94, 2020.
[13] L. Wang, C. Gao, "Research on topology reconfiguration and key technologies of UAV bee swarm communication network," Ship Electronics Engineering, vol. 41 no. 05, pp. 49-52, 2021.
[14] J. Wang, C. Jiang, Z. Wei, C. Pan, H. Zhang, Y. Ren, "Joint UAV hovering altitude and power control for space-air-ground IoT networks," IEEE Internet of Things Journal, 2018.
[15] C. Liu, Z. Zhang, "On connectivity of flying ad hoc networks in the presence of ground terminal," China Communications, vol. 18 no. 9,DOI: 10.23919/jcc.2021.09.001, 2021.
[16] Q. Cui, J. Li, H. Wang, M. Nan, "Elastic analysis model of networked command information system based on node repair," Computer Science, vol. 45 no. 04, pp. 117-121, 2018.
[17] X. Wang, Y. Zhang, L. Wang, D. Lu, G. Zeng, "Robustness evaluation method for unmanned aerial vehicle swarms based on complex network theory," Chinese Journal of Aeronautics, vol. 33 no. 1, pp. 352-364, DOI: 10.1016/j.cja.2019.04.025, 2020.
[18] A. Khan, S. Khan, A. S. Fazal, Z. Zhang, A. O. Abuassba, "Intelligent cluster routing scheme for flying ad hoc networks," Science China Information Sciences, vol. 64 no. 8, pp. 182305-182314, DOI: 10.1007/s11432-019-2984-7, 2021.
[19] L. Gu, M. He, G. Chen, J Minhui, J. Liu, "Study on flexibility of UAV bee colony system," System Engineering and Electronic Technology, vol. 43 no. 01, pp. 156-162, 2021.
[20] Q. Sun, H. Li, Y. Wang, L. Zhou, Y. Zhang, "Modeling and solving of flexible UAV cluster multi-domain collaboration method," Journal of Aeronautics, vol. 2022 no. 05, 2022.
[21] J. C. Whitson, J. E. Ramirez-Marquez, "Resiliency as a component importance measure in network reliability," Reliability Engineering & System Safety, vol. 94 no. 10, pp. 1685-1693, DOI: 10.1016/j.ress.2009.05.001, 2009.
[22] D. Freckleton, K. Heaslip, W. Louisell, J. Collura, "Evaluation of resiliency of transportation networks after disasters," Transportation Research Record, vol. 2284 no. 1, pp. 109-116, DOI: 10.3141/2284-13, 2012.
[23] D. J. Watts, S. H. Strogatz, "Collective dynamics of ‘small-world’networks," Nature, vol. 393 no. 6684, pp. 440-442, DOI: 10.1038/30918, 1998.
[24] J. X. Gao, S. V. Buldyrev, S. Havlin, H. E. Stanley, "Robustness of a network of networks," Physical Review Letters, vol. 107 no. 19, pp. 195701-203100, DOI: 10.1103/physrevlett.107.195701, 2011.
[25] J. X. Gao, S. V. Buldyrev, H. E. Stanley, S. Havlin, "Networks formed from interdependent networks," Nature Physics, vol. 8 no. 1, pp. 40-48, DOI: 10.1038/nphys2180, Feb. 2012.
[26] X. Q. Huang, J. X. Gao, S. V. Buldyrev, S. Havlin, H. E. Stanley, "Robustness of interdependent networks under targeted attack," Physical Review, vol. 83 no. 6, pp. 065101-065804, DOI: 10.1103/physreve.83.065101, Jun. 2011.
[27] C. D. Brummitt, R. M. D’Souza, E. A. Leicht, "Suppressing cascades of load in interdependent networks," Proceedings of the National Academy of Sciences of the United States of America, vol. 109 no. 12, pp. 680-689, DOI: 10.1073/pnas.1110586109, Jul. 2012.
[28] F. Tan, Y. Xia, W. Zhang, X. Jin, "Cascading failures of loads in interconnected networks under intentional attack," EPL, vol. 102 no. 2, pp. 28009-28014, DOI: 10.1209/0295-5075/102/28009, 2013.
[29] Y. Yang, B. Sun, S. Wang, Y. Li, X. Li, "Controllability robustness against cascading failure for complex logistics networks based on nonlinear load-capacity model," IEEE Access, vol. 8 no. 2, pp. 7993-8003, DOI: 10.1109/access.2020.2964143, 2020.
[30] D. E. Polk, D. S. Boudreaux, "Tetrahedrally coordinated random-network structure," Physical Review Letters, vol. 31 no. 2, pp. 92-95, DOI: 10.1103/physrevlett.31.92, 1973.
[31] A. Barrat, M. Weigt, "On the properties of small-world network models," The European Physical Journal B, vol. 13 no. 3, pp. 547-560, DOI: 10.1007/s100510050067, 2000.
[32] A. L. Barabási, E. Bonabeau, "Scale-free networks," Scientific American, vol. 288 no. 5, pp. 60-69, DOI: 10.1038/scientificamerican0503-60, 2003.
[33] L. W. Barsalou, "Ad hoc categories," Memory & Cognition, vol. 11 no. 3, pp. 211-227, DOI: 10.3758/bf03196968, 1983.
[34] H. T. Tran, M. Balchanos, J. C. Domerçant, D. N. Mavris, "A framework for the quantitative assessment of performance-based system resilience," Reliability Engineering & System Safety, vol. 158, pp. 73-84, DOI: 10.1016/j.ress.2016.10.014, 2017.
[35] M. Kivelä, A. Arenas, M. Barthelemy, J. P. Gleeson, Y. Moreno, M. A. Porter, "Multilayer networks," Journal of complex networks, vol. 2 no. 3, pp. 203-271, DOI: 10.1093/comnet/cnu016, 2014.
[36] G. Bai, Y. Li, Y. Fang, Y. A. Zhang, J. Tao, "Network approach for resilience evaluation of a UAV swarm by considering communication limits," Reliability Engineering & System Safety, vol. 193,DOI: 10.1016/j.ress.2019.106602, 2020.
[37] Y. Huang, J. Wu, W. Ren, C. K. Tse, Z. Zheng, "Sequential restorations of complex networks after cascading failures," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 51 no. 1, pp. 400-411, DOI: 10.1109/tsmc.2018.2874822, Jan. 2021.
[38] Q. Ba, K. Savla, "Computing optimal control of cascading failure in DC networks," IEEE Transactions on Automatic Control, vol. 65 no. 6, pp. 2402-2417, DOI: 10.1109/tac.2019.2930232, 2020.
[39] Y. Jin, Y. Chen, Z. Lu, Q. Zhang, R. Kang, "Cascading failure modeling for circuit systems using impedance networks: a current-flow redistribution approach," IEEE Transactions on Industrial Electronics, vol. 68 no. 1, pp. 632-641, DOI: 10.1109/tie.2020.2967672, Jan. 2021.
[40] J. Qi, "Utility outage data driven interaction networks for cascading failure analysis and mitigation," IEEE Transactions on Power Systems, vol. 36 no. 2, pp. 1409-1418, DOI: 10.1109/tpwrs.2020.3015380, 2021.
[41] H. Jia, F. Li, L. Yang, Q. Luo, Y. Li, "Dynamic cascading failure analysis in congested urban road networks with self-organization," IEEE Access, vol. 8 no. 6, pp. 17916-17925, DOI: 10.1109/access.2020.2968048, 2020.
[42] B. Wang, Z. Zhang, X. Qi, L. Liu, "Identify critical nodes in network cascading failure based on data analysis," Journal of Network and Systems Management, vol. 28 no. 1, pp. 21-34, DOI: 10.1007/s10922-019-09499-8, Jan. 2020.
[43] S. Dong, T. Yu, H. Farahmand, A. Mostafavi, "Bayesian modeling of flood control networks for failure cascade characterization and vulnerability assessment," Computer-Aided Civil and Infrastructure Engineering, vol. 35 no. 7, pp. 668-684, DOI: 10.1111/mice.12527, Jul. 2020.
[44] J. Wang, N. Yang, Y. Zhang, Y. Song, "Modeling and simulation of the cascading failure of R and D network considering the community structure," Physica A: Statistical Mechanics and its Applications, vol. 522 no. 6, pp. 43-53, DOI: 10.1016/j.physa.2019.01.127, 2019.
[45] A. E. Motter, Y. C. Lai, "Cascade-based attacks on complex networks," Physical Review, vol. 66 no. 6,DOI: 10.1103/physreve.66.065102, 2002.
[46] J. Wu, Z. Chen, Y. Zhang, Y. Xia, X. Chen, "Sequential recovery of complex networks suffering from cascading failure blackouts," IEEE Transactions on Network Science and Engineering, vol. 7 no. 4, pp. 2997-3007, DOI: 10.1109/tnse.2020.3008799, 2020.
[47] M. W. Potts, P. A. Sartor, A. Johnson, S. Bullock, "A network perspective on assessing system architectures: robustness to cascading failure," Systems Engineering, vol. 23 no. 5, pp. 21551-21616, DOI: 10.1002/sys.21551, Sep. 2020.
[48] X. Fu, H. Yao, Y. Yang, "Modeling cascading failures for wireless sensor networks with node and link capacity," IEEE Transactions on Vehicular Technology, vol. 68 no. 8, pp. 7828-7840, DOI: 10.1109/tvt.2019.2925013, 2019.
[49] X. Fu, W. Li, Y. Yang, O. Postolache, "Cascading failures analysis of wireless sensor networks with varying routing schemes," IEEE Sensors Journal, vol. 21 no. 8, pp. 10193-10203, DOI: 10.1109/jsen.2021.3059731, 2021.
[50] Q. Liu, B. King, "A review of the mechanisms of network resilience and recovery," Journal of Information Security, vol. no. 4, 2021.
[51] X. Wang, Y. Liu, "Elasticity measurement and analysis of aviation multilayer network," Complex Systems and Complexity Science, vol. no. 2, 2020.
[52] P. groves, F. Ma, M. Dong, "Research on supply chain network elasticity under logistics information management system," Logistics Engineering and Management, vol. no. 10, 2019.
[53] J. Chen, G. Xu, B. Liu, J. Luo, "Summary of emergency logistics network elastic performance evaluation," Value Engineering, vol. no. 32, 2018.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2022 Boyu Feng et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/
Abstract
As an important new force in information warfare, the UAV swarm has attracted more and more attention from militarists and scholars of various countries. At present, large-scale and low-cost UAV swarms have been gradually applied to reconnaissance operations. The invulnerability and elasticity of its communication network are the key factors that determine whether the swarm can successfully complete the reconnaissance mission. The research object of this study is the UAV swarm communication network, which performs reconnaissance missions. The swarm network is extracted as a three-layer interdependent network model. We apply scale-free network theory and the new connection probability equation to establish three subnetworks. Then, a three-layer interdependent network is constructed by using the interlayer connection rules of the nodes with the largest degree. The classical M-L model is extended to an interdependent network. An interlayer load redistribution rule is proposed to simulate the cascading failure process of swarm networks. Then, we attack network nodes randomly and observe the invulnerability and elasticity of this network. The simulation results show that the performance of the interdependent network is better than that of the single-layer network due to the effect of the interdependent links. By analyzing the experimental results, some feasible suggestions are put forward to improve the invulnerability and elasticity of reconnaissance UAV swarm communication network.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details


1 Equipment Management and UAV Engineering College, Airforce Engineering University, Xian 710051, China
2 Air & Missile Defense College, Airforce Engineering University, Xian 710051, China
3 Air Traffic Control and Navigation College, Airforce Engineering University, Xian 710051, China