Page 15 - Read Online
P. 15

Page 460                         Phadke et al. Intell Robot 2023;3:453-78  https://dx.doi.org/10.20517/ir.2023.27
               2.1. Adversarial environment applications
               An adversarial environment is broadly defined as an environment where an agent may encounter any kind
               of resistance to its activity or danger to its well-being. In such an environment, UAV swarms are expected to
               face disruptions. However, an adversarial environment in military-specific applications is further
               constructively defined as an environment where the swarm may be attacked by physical agents, such as
               ground-based vehicles, projectiles, or other UAVs, in an attempt to impede its progress. Network attacks,
               such as takeover and hacking attempts, or attempted swarm attacks by network jamming are also included.
               Figure 8 shows a heterogeneous UAV swarm that consists of a high-altitude fixed-wing aircraft that acts as a
























                         Figure 8. Examples of adversarial environments an unmanned aerial vehicle (UAV) swarm might encounter.

               relay node for a swarm of low-altitude recon quadcopters. The fixed-wing provides a connection relay
               service to base stations beyond the line of sight of the low-altitude swarm. Adversarial environment
               functions include signal jammers, enemy UAVs, and surface-to-air anti-aircraft defense systems.

               Table 3 organizes the referenced works by the primary resiliency module they focus on. Swarms working in
               adversarial environments, in general, require thorough provisioning for intrusion detection in both physical
               and cyberspace, along with the implementation of secure encrypted network protocols for data
               transmission. Resilient networking protocols for UAV swarms are important links to other agents and
               ground control. Once a UAV swarm enters hostile territory, the enemy will try both physical and
               cyberattack approaches to deter the swarm from accomplishing its goal. Network security, such as an IDS
               (Intrusion Detection System), should be incorporated into the development of network topology and
               routing protocols. There is a complete taxonomy of network IDS  that can be incorporated based on the
                                                                       [39]
               capability of the swarm and mission scenarios.

               The other form of swarm security, physical agent security, is necessary for environments where adversarial
               activity is expected. Commonly explored approaches use onboard sensors, such as vision and LiDAR, to
                                                                                       [40]
               effectively detect physical space intrusions by external non-swarm entities. Article  proposes the use of
               LiDAR as a means for obstacle recognition and physical space intrusion detection. A model proposed by
                        [41]
               authors in  takes inspiration from shoal formations in the real world, such as bees and fish, to demonstrate
               a cooperative hunting strategy for a swarm. Such techniques can be used to both hunt targets, evade enemy
               agents, and address multiple swarm components and modules. Bio-inspired algorithms are proving to
               provide solutions to multiple challenges faced by UAV swarms. Based on group hunting behavior in
                     [42]
               nature , provides a reinforcement learning-based decision scheme for attack and defense maneuvers for
               the swarm.
   10   11   12   13   14   15   16   17   18   19   20