AI and Game Theory based Autonomous UAV Swarm for Cybersecurity

被引:6
作者
Kusyk, Janusz [1 ]
Uyar, M. Umit [2 ]
Ma, Kelvin [2 ]
Plishka, Joseph [3 ]
Bertoli, Giorgio [3 ]
Boksiner, Jeffrey [3 ]
机构
[1] CUNY, NYC Coll Technol, Brooklyn, NY 11201 USA
[2] CUNY City Coll, New York, NY 10031 USA
[3] US Army CCDC C5ISR Ctr, Aberdeen Proving Ground, MD 21005 USA
来源
MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM) | 2019年
关键词
Autonomous UAV swarm; MANET; AI; game theory; cybersecurity; EM heatmap; CEMA;
D O I
10.1109/milcom47813.2019.9020811
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Uninterrupted communication is crucial for modern electromagnetic (EM) spectrum operations where successes of situational awareness, defensive and offensive missions necessitate continuous reliance on wireless transmission. Preventing an adversary from dominating cyberspace becomes challenging as rapid technological developments allow state and non-state actors to engage in a broad range of destructive cyber electromagnetic activities (CEMA). Digital threats to communication networks can range from eavesdropping and impersonation attempts to various forms of denial-of-service attacks. In this paper, we present bio-inspired and game theory based flight control algorithms for a swarm of autonomous EAvs. Each UAV considers MANET connectivity, overshadowed ground area coverage and signal strength from interfering mobile radio emitters. Our algorithms use 3D Voronoi tessellations and linear interpolation for EM mapping of local neighborhood as part of decision making process. Simulation experiments in OPNET show that autonomous EAvs require only limited near neighbor communications to maintain a high area coverage overshadowed by the swarm with uninterrupted MANET connectivity. By providing a lightweight solution for rapidly deployable swarm of autonomous EAvs, our flight control algorithms are good candidates for deployment in complex environments in presence of adaptive and mobile sources of EM interference.
引用
收藏
页数:6
相关论文
共 50 条
[41]   Coalition Formation Game for Reconnaissance and Attack Task Allocation in Heterogeneous UAV Swarm [J].
Chen, Jiaxin ;
Fang, Tao ;
Li, Qingwei ;
He, Jiafan ;
Xia, Zhijie ;
Mao, Yiming .
PROCEEDINGS OF 2023 11TH CHINA CONFERENCE ON COMMAND AND CONTROL, C2 2023, 2024, 1124 :337-346
[42]   Game based Cybersecurity Training for High School Students [J].
Jin, Ge ;
Tu, Manghui ;
Kim, Tao-Hoon ;
Heffron, Justin ;
White, Jonathan .
SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, 2018, :68-73
[43]   Review of the Existing Game Based Learning System in Cybersecurity [J].
Awojana, Tolulope ;
Chou, Te-Shun ;
Nicholas, Hempenius .
SIGITE'18: PROCEEDINGS OF THE 19TH ANNUAL SIG CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION, 2018, :144-144
[44]   Research on lane-changing decision and control of autonomous vehicles based on game theory [J].
Li, Guozhen ;
Shi, Wankai .
PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART D-JOURNAL OF AUTOMOBILE ENGINEERING, 2025, 239 (05) :1566-1576
[45]   Game Theory-Based Risk Assessment of the Use of Autonomous Cars in an Urbanized Area [J].
Adamova, Vasilena ;
Popov, Stoyan ;
Todorova, Simona ;
Baeva, Silvia ;
Hinov, Nikolay .
MATHEMATICS, 2025, 13 (04)
[46]   Longitudinal autonomous driving based on game theory for intelligent hybrid electric vehicles with connectivity [J].
Cheng, Shuo ;
Li, Liang ;
Chen, Xiang ;
Fang, Sheng-nan ;
Wang, Xiang-yu ;
Wu, Xiu-heng ;
Li, Wei-bing .
APPLIED ENERGY, 2020, 268
[47]   Unfreezing autonomous vehicles with game theory, proxemics, and trust [J].
Camara, Fanta ;
Fox, Charles .
FRONTIERS IN COMPUTER SCIENCE, 2022, 4
[48]   Power allocation scheme for selfish cooperative communications based on game theory and particle swarm optimizer [J].
ZHANG GuoPengYANG Kun DING EnJie School of Computer Science and TechnologyChina University of Mining and TechnologyXuzhou ChinaSchool of Computer Science and Electronic EngineeringUniversity of Essex Wivenhoe ParkColchester CO SQUKSchool of Information and Electrical EngineeringChina University of Mining and TechnologyXuzhou China .
Science China(Information Sciences), 2010, 53 (09) :1908-1912
[49]   Digital Health: The Cybersecurity for AI-Based Healthcare Communication [J].
Algarni, Abdullah M. ;
Thayananthan, Vijey .
IEEE ACCESS, 2025, 13 :5858-5870
[50]   Game Theory based Electric Price Tariff and Salp Swarm Algorithm for Demand Side Management [J].
Khalid, Adia ;
Khan, Zahoor Ali ;
Javaid, Nadeem .
2018 FIFTH HCT INFORMATION TECHNOLOGY TRENDS (ITT): EMERGING TECHNOLOGIES FOR ARTIFICIAL INTELLIGENCE, 2018, :99-103