Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Tethered UAV-active defense against intelligent cluster

View through CrossRef
Purpose With the development of wireless networks and artificial intelligence technology, unmanned aerial vehicle (UAV) clusters are widely used in various fields and cluster intelligence attacks are more harmful. However, most methods defending against UAV clusters produce consumption of non-reusable resources. To address this problem, a tethered UAV is adopted to perform active defense against adversary UAV clusters in this article, which can reduce the consumption of nonreusable resources. Design/methodology/approach Using tethered UAV to enter the opponent’s UAV cluster and analyze the flow of packets in adversary UAV cluster to find and occupy the central node. The tethered UAV can acquire and analyze key packets by deploying a grayhole attack at the location of the central node, after which the packets are selectively tampered with and discarded to cripple the opposing UAV cluster. Findings Comparing packet loss rate and delay with a normal network and the network that suffered from grayhole attack, it can be seen that the proposed scheme makes the tethered UAV close to the normal nodes in the UAV cluster and difficult to be detected. In addition, the tethered UAV is able to capture more packets compared to the other two networks, and the average deviation of the tethered UAV in capturing packets is around 5% in repeated experiments. Originality/value This article proposes an active defense method assisted by tethered UAV, which can minimize the consumption of nonreusable resources. The tethered UAV is converged to ordinary nodes of the opponent’s cluster, in which it is not easily detected. It provides a new direction for point-air defense technology.
Title: Tethered UAV-active defense against intelligent cluster
Description:
Purpose With the development of wireless networks and artificial intelligence technology, unmanned aerial vehicle (UAV) clusters are widely used in various fields and cluster intelligence attacks are more harmful.
However, most methods defending against UAV clusters produce consumption of non-reusable resources.
To address this problem, a tethered UAV is adopted to perform active defense against adversary UAV clusters in this article, which can reduce the consumption of nonreusable resources.
Design/methodology/approach Using tethered UAV to enter the opponent’s UAV cluster and analyze the flow of packets in adversary UAV cluster to find and occupy the central node.
The tethered UAV can acquire and analyze key packets by deploying a grayhole attack at the location of the central node, after which the packets are selectively tampered with and discarded to cripple the opposing UAV cluster.
Findings Comparing packet loss rate and delay with a normal network and the network that suffered from grayhole attack, it can be seen that the proposed scheme makes the tethered UAV close to the normal nodes in the UAV cluster and difficult to be detected.
In addition, the tethered UAV is able to capture more packets compared to the other two networks, and the average deviation of the tethered UAV in capturing packets is around 5% in repeated experiments.
Originality/value This article proposes an active defense method assisted by tethered UAV, which can minimize the consumption of nonreusable resources.
The tethered UAV is converged to ordinary nodes of the opponent’s cluster, in which it is not easily detected.
It provides a new direction for point-air defense technology.

Related Results

Swarm-based Counter UAV Defense System
Swarm-based Counter UAV Defense System
Abstract Unmanned Aerial Vehicles (UAVs) have quickly become one of the promising Internet-of-Things (IoT) devices for smart cities thanks to their mobility, agility, and o...
Mixed-reality for unmanned aerial vehicle operations in near earth environments
Mixed-reality for unmanned aerial vehicle operations in near earth environments
Future applications will bring unmanned aerial vehicles (UAVs) to near Earth environments such as urban areas, causing a change in the way UAVs are currently operated. Of concern i...
Constructing a VANET based on cluster chains
Constructing a VANET based on cluster chains
SUMMARYThe paper proposes a scheme on constructing a vehicular ad‐hoc network based on cluster chains. In the cluster construction algorithm, the distance from a potential cluster ...
Research on Autonomous Behavior Decision of UAV Cluster with Limited Communication Bandwidth
Research on Autonomous Behavior Decision of UAV Cluster with Limited Communication Bandwidth
Abstract Communication is the basis of UAV(Unmanned Aerial Vehicle,UAV) cluster cooperative decision control. In the battlefield environment with scarce communication resou...
Evaluation of genetic divergence in Barley (Hordeum vulgare L.) germplasms
Evaluation of genetic divergence in Barley (Hordeum vulgare L.) germplasms
Thirty genotypes of wheat were evaluated for assessing genetic divergence among eleven different characters across one environment for exploitation in a breeding programme for impr...
Quantifying corn emergence using UAV imagery and machine learning
Quantifying corn emergence using UAV imagery and machine learning
Corn (Zea mays L.) is one of the important crops in the United States for animal feed, ethanol production, and human consumption. To maximize the final corn yield, one of the criti...
ACOUSTIC FIELD CHARACTERISTICS UAV SCREW
ACOUSTIC FIELD CHARACTERISTICS UAV SCREW
Unmanned aerial vehicles (UAVs) began to be actively used in civil and military spheres. During flight, UAV nodes emit noise into the environment, while the main radiation node is ...
Regional directions of the cluster development strategy in the field of tourism and hospitality
Regional directions of the cluster development strategy in the field of tourism and hospitality
The monograph consists of an introduction, 5 chapters, lists of used sources for each chapter separately; contains 31 tables and 37 figures. The monograph examines the theoretical ...

Back to Top