AI and Game Theory based Autonomous UAV Swarm for Cybersecurity

被引:6
作者
Kusyk, Janusz [1 ]
Uyar, M. Umit [2 ]
Ma, Kelvin [2 ]
Plishka, Joseph [3 ]
Bertoli, Giorgio [3 ]
Boksiner, Jeffrey [3 ]
机构
[1] CUNY, NYC Coll Technol, Brooklyn, NY 11201 USA
[2] CUNY City Coll, New York, NY 10031 USA
[3] US Army CCDC C5ISR Ctr, Aberdeen Proving Ground, MD 21005 USA
来源
MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM) | 2019年
关键词
Autonomous UAV swarm; MANET; AI; game theory; cybersecurity; EM heatmap; CEMA;
D O I
10.1109/milcom47813.2019.9020811
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Uninterrupted communication is crucial for modern electromagnetic (EM) spectrum operations where successes of situational awareness, defensive and offensive missions necessitate continuous reliance on wireless transmission. Preventing an adversary from dominating cyberspace becomes challenging as rapid technological developments allow state and non-state actors to engage in a broad range of destructive cyber electromagnetic activities (CEMA). Digital threats to communication networks can range from eavesdropping and impersonation attempts to various forms of denial-of-service attacks. In this paper, we present bio-inspired and game theory based flight control algorithms for a swarm of autonomous EAvs. Each UAV considers MANET connectivity, overshadowed ground area coverage and signal strength from interfering mobile radio emitters. Our algorithms use 3D Voronoi tessellations and linear interpolation for EM mapping of local neighborhood as part of decision making process. Simulation experiments in OPNET show that autonomous EAvs require only limited near neighbor communications to maintain a high area coverage overshadowed by the swarm with uninterrupted MANET connectivity. By providing a lightweight solution for rapidly deployable swarm of autonomous EAvs, our flight control algorithms are good candidates for deployment in complex environments in presence of adaptive and mobile sources of EM interference.
引用
收藏
页数:6
相关论文
共 50 条
[31]   Game-based Learning Approach to Cybersecurity [J].
Tobarra, Llanos ;
Perez Trapero, Antonio ;
Pastor, Rafael ;
Robles-Gomez, Antonio ;
Hernandez, Roberto ;
Duque, Andres ;
Cano, Jesus .
PROCEEDINGS OF THE 2020 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON 2020), 2020, :1125-1132
[32]   A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints [J].
Anna Nagurney ;
Patrizia Daniele ;
Shivani Shukla .
Annals of Operations Research, 2017, 248 :405-427
[33]   A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints [J].
Nagurney, Anna ;
Daniele, Patrizia ;
Shukla, Shivani .
ANNALS OF OPERATIONS RESEARCH, 2017, 248 (1-2) :405-427
[34]   A swarm intelligence-based robotic search algorithm integrated with game theory [J].
Youssefi, Khalil Al-Rahman ;
Rouhani, Modjtaba ;
Mashhadi, Habib Rajabi ;
Elmenreich, Wilfried .
APPLIED SOFT COMPUTING, 2022, 122
[35]   FPGA based acceleration of game theory algorithm in edge computing for autonomous driving [J].
Du, Sen ;
Huang, Tian ;
Hou, Junjie ;
Song, Shijin ;
Song, Yuefeng .
JOURNAL OF SYSTEMS ARCHITECTURE, 2019, 93 :33-39
[36]   Game Theory and Genetic Algorithm Based Approach for Self Positioning of Autonomous Nodes [J].
Kusyk, Janusz ;
Urrea, Elkin ;
Sahin, Cem Safak ;
Uyar, M. Uemit .
AD HOC & SENSOR WIRELESS NETWORKS, 2012, 16 (1-3) :93-118
[37]   A game theory-based fusion algorithm for autonomous navigation of smart ships [J].
Zhou, Zhijie ;
Xu, Haixiang ;
Feng, Hui ;
Li, Wenjuan .
MEASUREMENT, 2023, 216
[38]   Charging Pricing for Autonomous Mobility-on-Demand Fleets Based on Game Theory [J].
Wang, Jiawei ;
Sheng, Yujie ;
Ge, Huaichang ;
Bai, Xiang ;
Su, Jia ;
Guo, Qinglai ;
Sun, Hongbin .
JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2024, 12 (06) :2006-2018
[39]   An AI-Based Cyber Ranges to Strengthen the Cybersecurity of Cyber Physical Systems [J].
Sisodiya, Deepa Singh ;
Tiwari, Ritu ;
Jain, Priyank ;
Aditya, Yashwant .
JOURNAL OF APPLIED SECURITY RESEARCH, 2025,
[40]   Cybersecurity of Connected Autonomous Vehicles A ranking based approach [J].
Burzio, Gianfranco ;
Cordella, Giuseppe Faranda ;
Colajanni, Michele ;
Marchetti, Mirco ;
Stabili, Dario .
2018 INTERNATIONAL CONFERENCE OF ELECTRICAL AND ELECTRONIC TECHNOLOGIES FOR AUTOMOTIVE, 2018,