Skip to main navigation Skip to search Skip to main content

Unmanned aerial vehicle swarm mission reliability modeling and evaluation method oriented to systematic and networked mission

Research output: Contribution to journalArticlepeer-review

Abstract

With the development of Unmanned Aerial Vehicle (UAV) system autonomy, network communication technology and group intelligence theory, mission execution in the form of a UAV swarm will be an important realization of future applications. Traditional single-UAV mission reliability modeling methods have been unable to meet the requirements of UAV swarm mission reliability modeling. Therefore, the UAV swarm mission reliability modeling and evaluation method is proposed. First, aimed at the interdependence among the multiple layers, a multi-layer network model of a UAV swarm is established. At the same time, based on the system having the following characteristics—using a mission chain to complete the mission and applying the connectivity of the mission network—the mission network model of a UAV swarm is established. Second, vulnerability and connectivity are selected as two indicators to reflect the reliability of the mission, and aimed at random attack and deliberate attack, vulnerability and connectivity evaluation methods are proposed. Finally, the validity and accuracy of the constructed model are verified through simulations, and the model and selected indicators can meet the reliability requirements of the UAV swarm mission. In this way, this study provides quantitative reference for UAV-swarm-related decision-making work and supports the development of UAV-swarm-related work.

Original languageEnglish
Pages (from-to)466-478
Number of pages13
JournalChinese Journal of Aeronautics
Volume34
Issue number2
DOIs
StatePublished - Feb 2021

Keywords

  • Complex networks
  • Connectivity
  • Mission reliability
  • Unmanned Aerial Vehicles (UAV)
  • Vulnerability

Fingerprint

Dive into the research topics of 'Unmanned aerial vehicle swarm mission reliability modeling and evaluation method oriented to systematic and networked mission'. Together they form a unique fingerprint.

Cite this