Coupled-Map-Lattices-Based Vulnerability Assessment of UAV Network in Interference Scenarios

On the modern information battlefield, UAV have been widely used due to the advantages of no casualties and good maneuverability. However, during the UAV swarm combat, the UAV network will be interfered by the enemy, which will damage some key UAV nodes or communication links and affect the connecti...

Full description

Saved in:
Bibliographic Details
Published inWireless communications and mobile computing Vol. 2022; pp. 1 - 14
Main Authors Xie, Xiaoyu, Li, Jinglei, Huang, Zijia, Yang, Qinghai, Kwak, Kyung Sup
Format Journal Article
LanguageEnglish
Published Oxford Hindawi 21.10.2022
Hindawi Limited
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:On the modern information battlefield, UAV have been widely used due to the advantages of no casualties and good maneuverability. However, during the UAV swarm combat, the UAV network will be interfered by the enemy, which will damage some key UAV nodes or communication links and affect the connectivity of the entire network, thus leading to the fact that the entire network becomes more vulnerable. Therefore, it is necessary to study the network vulnerability of UAV networks in interference scenarios. In this paper, a coupled map lattice (CML) model which is a dynamic system with discrete time, discrete space, and continuous state variables is proposed to assess the vulnerability of UAV networks. The CML model integrates multiple topological indicators such as node degree, node betweenness, and node clustering coefficient, and reflects the node state change of the UAV network in the interference scenario from the topological point of view. When changing the strategy of interfering UAV nodes in different interfering scenarios, the relative network efficiency and failure proportion are used as indicators to study the change of network vulnerability. The studies show that precisely interfering important UAV nodes in a network can cause more damage to the UAV network. We also discover that as the intensity of external interference increases, the entire network will become increasingly vulnerable and the vulnerability of the network will also have different manifestations under different interfering strategies.
ISSN:1530-8669
1530-8677
DOI:10.1155/2022/5212560