Page 16 - Read Online
P. 16

Phadke et al. Intell Robot 2023;3:453-78  https://dx.doi.org/10.20517/ir.2023.27    Page 461

               Table 3. Categorization of referenced studies by the major resilience module/component that they consider (adversarial
               environment)
                Resilience component/module highlighted                        Referenced study
                Area coverage                                                  [45]
                Agent security (physical)                                      [40,42,44]
                Path planning, collision avoidance                             [40,43]
                Agent property (heterogeneity)                                 [44,45,47]
                Resource allocation/task reassignment                          [44,45]
                Formation control                                              [41,46]
                Network security                                               [50]


               This technique can also be scaled and applied to swarm systems to track cooperative swarm agents for
               collision avoidance and external dynamic and static obstacle avoidance. A similar technique using visual
               sensing has been used in  to detect cooperative UAVs in swarms. This is an effective method for inter-
                                     [43]
               agent collision avoidance, and the technique can also be expanded to track any external UAV entering the
               proximity of the swarm. This is especially useful in perimeter protection and defense strategy, where a
               swarm of UAVs can effectively form a perimeter around an area to be protected. Any external UAV
               attempting entry can be detected and actively tracked for other defensive establishments to destroy. Pursue-
               evader applications using UAV agents are also a possibility in the military domain. Applications involve the
               use of UAV swarms to collectively pursue other UAV targets to jam their communications, impede
               progress, or intentionally collide with them to bring them down. Development in this field is ongoing, but
                                        [44]
               innovative work was done in  that combines evader-pursuer algorithms with the possibility that the two
               parties being tracked may be heterogeneous in terms of their flight capabilities and accounts for it by
               proposing Apollonius algorithms to efficiently detect evaders by resource allocation.


               Combination studies such as this comprehensively address agent heterogeneity, resource allocation, and
               swarm security components under one application scenario. A similar study conducted in  proposes
                                                                                               [45]
               autonomous unmanned heterogeneous vehicles for persistent monitoring in defense and monitoring high-
               value targets such as military installation camps. Using a variety of quadcopters and fixed-wing agents, the
               proposed framework can also track static and dynamic ground targets. When entering adversarial
               environments, it can be expected that UAV swarms may lose connection with ground control or space
               segments, resulting in temporary or permanent control or navigation signal loss. The key focus was the
               development of enabling technology to address task assignment, coverage, and swarm management policies
               in such scenarios. Bearing-based formation control methods, such as [46,47] , may use neighboring agents,
               ground control planes, and tertiary data to align themselves and prevent immediate mission failure. This
               allows both ground control and the swarm additional time to attempt signal reconnection. While some
               methods study single-space operational swarms only, certain approaches expand the formation control and
               management policies to multi-operational space heterogeneous agents . However, it cannot be assumed
                                                                            [47]
               that all heterogeneous agents are for support purposes. In problems such as these, the heterogeneous agents
               are the advertisers of the UAV swarm. With the rapid development of surface-to-air missiles, swarms also
               have to consider the occurrence of land-based malicious entities such as missiles and jammers that are
               focused on damaging aerial swarms. A consensus algorithm is proposed in  for a swarm of herding UAVs
                                                                              [48]
               that have to deal with land-based anti-aircraft vehicles. Continuous tracking of heterogeneous targets is
               such a broad domain that it requires additional development, as demonstrated in .
                                                                                   [49]

               While secure network communication is a basic requirement of all swarms, both energy-efficient and secure
               UAV communications are a primary concern during warfare. Working in conjunction with anomaly
   11   12   13   14   15   16   17   18   19   20   21