Vulnerability Analysis of UAV Swarm Network with Emergency Tasks
With the rapid development of Unmanned Aerial Vehicle (UAV) technology, UAV swarms are used for emergency tasks in various scenarios such as area detection, fire rescue, logistics, and transportation. However, for complex scenarios, UAV swarms are prone to environmental interference that damages the...
Gespeichert in:
Veröffentlicht in: | Electronics (Basel) 2024-06, Vol.13 (11), p.2005 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 11 |
container_start_page | 2005 |
container_title | Electronics (Basel) |
container_volume | 13 |
creator | Li, Jinglei Yue, Qingfeng Huang, Zijia Xie, Xiaoyu Yang, Qinghai |
description | With the rapid development of Unmanned Aerial Vehicle (UAV) technology, UAV swarms are used for emergency tasks in various scenarios such as area detection, fire rescue, logistics, and transportation. However, for complex scenarios, UAV swarms are prone to environmental interference that damages their equipment or disrupts their communication links, affecting the normal execution of tasks. In this paper, an information–communication interdependent network model is designed for the vulnerability analysis of UAV swarm networks with emergency tasks. Firstly, from the perspective of network functions of a UAV swarm, we introduce the theory of interdependent networks to abstract the relationship between the UAV swarm’s communication network and its information network, where the communication network represents its communication topology and the information network is related to the function of each UAV individual in the UAV swarm. Then, the vulnerability of the UAV swarm is analyzed according to the relationship between network construction costs and network connectivity under environmental interference. Finally, the effectiveness of the vulnerability analysis method is verified through simulation. |
doi_str_mv | 10.3390/electronics13112005 |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_journals_3067424705</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A797900413</galeid><sourcerecordid>A797900413</sourcerecordid><originalsourceid>FETCH-LOGICAL-c241t-ddc05b1a2a73c7fb4b92abf51d9ce9c553f78717e99531505c5d55a0abcdf7983</originalsourceid><addsrcrecordid>eNptUE1LAzEUDKJgqf0FXgKet74kG9PcXEr9gKIH216XbDapaXc3NUkp--9dqQcPvjm8x2NmGAahWwJTxiTcm8boFHzndCSMEArAL9CIgpCZpJJe_rmv0STGHQwjCZsxGKHHzbHpTFCVa1zqcdGppo8uYm_xutjgj5MKLX4z6eTDHp9c-sSL1oSt6XSPVyru4w26sqqJZvK7x2j9tFjNX7Ll-_PrvFhmmuYkZXWtgVdEUSWYFrbKK0lVZTmppTZSc86smAkijJScEQ5c85pzBarStRVyxsbo7ux7CP7raGIqd_4YhrixZPAgcpoL4ANremZtVWNK11mfgtIDatM67Ttj3fAvhBQSICdsELCzQAcfYzC2PATXqtCXBMqfest_6mXfIv9wBw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3067424705</pqid></control><display><type>article</type><title>Vulnerability Analysis of UAV Swarm Network with Emergency Tasks</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>MDPI - Multidisciplinary Digital Publishing Institute</source><creator>Li, Jinglei ; Yue, Qingfeng ; Huang, Zijia ; Xie, Xiaoyu ; Yang, Qinghai</creator><creatorcontrib>Li, Jinglei ; Yue, Qingfeng ; Huang, Zijia ; Xie, Xiaoyu ; Yang, Qinghai</creatorcontrib><description>With the rapid development of Unmanned Aerial Vehicle (UAV) technology, UAV swarms are used for emergency tasks in various scenarios such as area detection, fire rescue, logistics, and transportation. However, for complex scenarios, UAV swarms are prone to environmental interference that damages their equipment or disrupts their communication links, affecting the normal execution of tasks. In this paper, an information–communication interdependent network model is designed for the vulnerability analysis of UAV swarm networks with emergency tasks. Firstly, from the perspective of network functions of a UAV swarm, we introduce the theory of interdependent networks to abstract the relationship between the UAV swarm’s communication network and its information network, where the communication network represents its communication topology and the information network is related to the function of each UAV individual in the UAV swarm. Then, the vulnerability of the UAV swarm is analyzed according to the relationship between network construction costs and network connectivity under environmental interference. Finally, the effectiveness of the vulnerability analysis method is verified through simulation.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics13112005</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Communication ; Communications equipment ; Communications networks ; Construction costs ; Cost analysis ; Data transmission ; Drone aircraft ; Failure ; Interference ; Simulation methods ; Topology ; Unmanned aerial vehicles</subject><ispartof>Electronics (Basel), 2024-06, Vol.13 (11), p.2005</ispartof><rights>COPYRIGHT 2024 MDPI AG</rights><rights>2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c241t-ddc05b1a2a73c7fb4b92abf51d9ce9c553f78717e99531505c5d55a0abcdf7983</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>315,781,785,27929,27930</link.rule.ids></links><search><creatorcontrib>Li, Jinglei</creatorcontrib><creatorcontrib>Yue, Qingfeng</creatorcontrib><creatorcontrib>Huang, Zijia</creatorcontrib><creatorcontrib>Xie, Xiaoyu</creatorcontrib><creatorcontrib>Yang, Qinghai</creatorcontrib><title>Vulnerability Analysis of UAV Swarm Network with Emergency Tasks</title><title>Electronics (Basel)</title><description>With the rapid development of Unmanned Aerial Vehicle (UAV) technology, UAV swarms are used for emergency tasks in various scenarios such as area detection, fire rescue, logistics, and transportation. However, for complex scenarios, UAV swarms are prone to environmental interference that damages their equipment or disrupts their communication links, affecting the normal execution of tasks. In this paper, an information–communication interdependent network model is designed for the vulnerability analysis of UAV swarm networks with emergency tasks. Firstly, from the perspective of network functions of a UAV swarm, we introduce the theory of interdependent networks to abstract the relationship between the UAV swarm’s communication network and its information network, where the communication network represents its communication topology and the information network is related to the function of each UAV individual in the UAV swarm. Then, the vulnerability of the UAV swarm is analyzed according to the relationship between network construction costs and network connectivity under environmental interference. Finally, the effectiveness of the vulnerability analysis method is verified through simulation.</description><subject>Communication</subject><subject>Communications equipment</subject><subject>Communications networks</subject><subject>Construction costs</subject><subject>Cost analysis</subject><subject>Data transmission</subject><subject>Drone aircraft</subject><subject>Failure</subject><subject>Interference</subject><subject>Simulation methods</subject><subject>Topology</subject><subject>Unmanned aerial vehicles</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptUE1LAzEUDKJgqf0FXgKet74kG9PcXEr9gKIH216XbDapaXc3NUkp--9dqQcPvjm8x2NmGAahWwJTxiTcm8boFHzndCSMEArAL9CIgpCZpJJe_rmv0STGHQwjCZsxGKHHzbHpTFCVa1zqcdGppo8uYm_xutjgj5MKLX4z6eTDHp9c-sSL1oSt6XSPVyru4w26sqqJZvK7x2j9tFjNX7Ll-_PrvFhmmuYkZXWtgVdEUSWYFrbKK0lVZTmppTZSc86smAkijJScEQ5c85pzBarStRVyxsbo7ux7CP7raGIqd_4YhrixZPAgcpoL4ANremZtVWNK11mfgtIDatM67Ttj3fAvhBQSICdsELCzQAcfYzC2PATXqtCXBMqfest_6mXfIv9wBw</recordid><startdate>20240601</startdate><enddate>20240601</enddate><creator>Li, Jinglei</creator><creator>Yue, Qingfeng</creator><creator>Huang, Zijia</creator><creator>Xie, Xiaoyu</creator><creator>Yang, Qinghai</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>20240601</creationdate><title>Vulnerability Analysis of UAV Swarm Network with Emergency Tasks</title><author>Li, Jinglei ; Yue, Qingfeng ; Huang, Zijia ; Xie, Xiaoyu ; Yang, Qinghai</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c241t-ddc05b1a2a73c7fb4b92abf51d9ce9c553f78717e99531505c5d55a0abcdf7983</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Communication</topic><topic>Communications equipment</topic><topic>Communications networks</topic><topic>Construction costs</topic><topic>Cost analysis</topic><topic>Data transmission</topic><topic>Drone aircraft</topic><topic>Failure</topic><topic>Interference</topic><topic>Simulation methods</topic><topic>Topology</topic><topic>Unmanned aerial vehicles</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Jinglei</creatorcontrib><creatorcontrib>Yue, Qingfeng</creatorcontrib><creatorcontrib>Huang, Zijia</creatorcontrib><creatorcontrib>Xie, Xiaoyu</creatorcontrib><creatorcontrib>Yang, Qinghai</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Jinglei</au><au>Yue, Qingfeng</au><au>Huang, Zijia</au><au>Xie, Xiaoyu</au><au>Yang, Qinghai</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Vulnerability Analysis of UAV Swarm Network with Emergency Tasks</atitle><jtitle>Electronics (Basel)</jtitle><date>2024-06-01</date><risdate>2024</risdate><volume>13</volume><issue>11</issue><spage>2005</spage><pages>2005-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>With the rapid development of Unmanned Aerial Vehicle (UAV) technology, UAV swarms are used for emergency tasks in various scenarios such as area detection, fire rescue, logistics, and transportation. However, for complex scenarios, UAV swarms are prone to environmental interference that damages their equipment or disrupts their communication links, affecting the normal execution of tasks. In this paper, an information–communication interdependent network model is designed for the vulnerability analysis of UAV swarm networks with emergency tasks. Firstly, from the perspective of network functions of a UAV swarm, we introduce the theory of interdependent networks to abstract the relationship between the UAV swarm’s communication network and its information network, where the communication network represents its communication topology and the information network is related to the function of each UAV individual in the UAV swarm. Then, the vulnerability of the UAV swarm is analyzed according to the relationship between network construction costs and network connectivity under environmental interference. Finally, the effectiveness of the vulnerability analysis method is verified through simulation.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics13112005</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2079-9292 |
ispartof | Electronics (Basel), 2024-06, Vol.13 (11), p.2005 |
issn | 2079-9292 2079-9292 |
language | eng |
recordid | cdi_proquest_journals_3067424705 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; MDPI - Multidisciplinary Digital Publishing Institute |
subjects | Communication Communications equipment Communications networks Construction costs Cost analysis Data transmission Drone aircraft Failure Interference Simulation methods Topology Unmanned aerial vehicles |
title | Vulnerability Analysis of UAV Swarm Network with Emergency Tasks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-14T04%3A49%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Vulnerability%20Analysis%20of%20UAV%20Swarm%20Network%20with%20Emergency%20Tasks&rft.jtitle=Electronics%20(Basel)&rft.au=Li,%20Jinglei&rft.date=2024-06-01&rft.volume=13&rft.issue=11&rft.spage=2005&rft.pages=2005-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics13112005&rft_dat=%3Cgale_proqu%3EA797900413%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3067424705&rft_id=info:pmid/&rft_galeid=A797900413&rfr_iscdi=true |