Open Access Paper
28 December 2022 Research on a new improved UAV anti-jamming and optimization model
Longqing Zhang, Xinwei Zhang, Lei Yang, Liwei Tian, Yungui Chen, Yanghong Zhang, Peipei Li
Author Affiliations +
Proceedings Volume 12506, Third International Conference on Computer Science and Communication Technology (ICCSCT 2022); 125062Z (2022) https://doi.org/10.1117/12.2662185
Event: International Conference on Computer Science and Communication Technology (ICCSCT 2022), 2022, Beijing, China
Abstract
In complex environments, UAV wireless sensing networks suffer from path loss, incomplete channels, swarm access security and other problems, and the signal fading and packet loss rates are very obvious. In order to solve the problem of user control data security, this paper gives full play to the characteristics of blockchain technology and builds a blockchain-based UAV cluster anti-interference communication network in UAV cluster applications to achieve antiinterference performance. Meanwhile, Markov decision process is used to optimize and realize the research of UAV airground integrated radio wave anti-interference.

1.

INTRODUCTION

In traditional wireless sensing networks, the wireless signal propagation path is not an ideal obstacle-free free space in most cases. Especially in complex environments, such as cities with tall buildings, mountainous areas with heavy mountains, and hills with thousands of rocks and ravines where there are multiple obstacles to block, reflections, scattering and bypassing are prone to occur, and the signal attenuation and packet loss rate will be very obvious. Usually, in complex environments, researchers achieve wireless transmission by deploying UAVs.

In the civilian sector, due to the limited communication distance of UAVs, repeaters are usually required for UAV communication in complex urban environments with many obstacles. The connection between the UAV and the relay is called a relay link, which has a longer communication distance, faces a more complex environment, and is more susceptible to interference1. In the process of UAV swarm link communication, the nodes within the UAV swarm often lose node functionality due to attacks, energy depletion, etc., when there is access control disorder within the swarm around the initial task of the swarm2. When a threat is encountered, one of the UAV nodes in the sub-swarm may be destroyed or lose its function, resulting in higher access control cost for the swarm. The massive, dynamic, distributed, and lightweight nature of the current UAV swarm likewise makes the UAV swarm access control mechanism suffer from insufficient stability, low performance of privilege judgments, and reduced security3-8. The complex urban environment has the problems of path loss, incomplete channel state, and swarm access security, therefore, it is important to study an air-space integrated radio wave swarm anti-interference communication.

According to the above analysis, UAV swarm communication brings new problems and challenges in complex urban environments. This topic introduces blockchain smart contracts for UAV swarm access control mechanism to make user control data more secure and realize UAV air-ground integrated radio wave anti-interference research.

2.

REVIEW

In complex environments, it is difficult to work with a single device while maintaining a continuous connection for a long time due to the mobility of UAVs, the fading effect of wireless transmission, and limited power supply. In this case, multiple relay UAVs need to be deployed in the path to form a swarm network in the sky by establishing an UAV-to- UAV link (UAV) between numerous source nodes and ground control stations. With its flexible mobility and strong battlefield adaptability, UAVs have been widely used in various fields9.

With the development of cooperative control system of multi-intelligence system, UAV radio wave swarm system has wide application prospects in military and civilian fields. In the conflict between Azerbaijan and Armenia, the performance of UAVs was remarkable, and UAVs may become the main force of future warfare10-13. However, UAVs also have an Achilles’ heel. Currently, UAV communication mainly relies on wireless communication means, and their signals are exposed to free space and are highly susceptible to various kinds of interference. In order to ensure that UAVs can effectively accomplish their missions, UAV communication systems need to have some necessary swarm link anti-jamming performance.

Since it is hard to entirely eradicate interference, UAV communication anti-jamming refers to adopting specific steps to reduce interference sources’ impact on UAV communication and ensure proper UAV communication14. Additionally, the radio wave swarm anti-interference for air-ground integrated unmanned aerial vehicles primarily focuses on military considerations.

In August 2015, the Defense Advanced Research Projects Agency (DARPA) announced the launch of the Distributed Low-Cost UAV Swarm “Pixie” research program, which plans to launch swarms of small, retrievable UAVs from large aircraft outside enemy defense ranges to suppress the enemy through swarming tactics15-16, and in April 2018, DARPA announced that the project had entered the flight test phase.

In January 2018, the National University of Defense Technology tested 20 fixed-wing UAVs for autonomous operations and successfully achieved the first domestic dual low-altitude drop and modal shift test of miniature folding-wing UAVs17. 2017 UAS Education and Development Workshop had proposed the decision of using multiple UAVs to form MAS and combining with Ethernet blockchain technology to build UAV communication system18.

Duke et al. also calculated coverage probability and area spectral efficiency (ASE) by taking into account both line-of-sight (LoS) and non-line-of-sight (NLoS) transmissions between aerial base stations and ground users19. Three path loss models—the high-altitude, low-altitude, and ultra-low-altitude models—are researched and contrasted. The simulation findings reveal that while the ultra-low-altitude model deviates greatly from the network performance of the two models above, the high-altitude and low-altitude models display comparable patterns in terms of network performance.

Smart contract is an assembly language programmed on blockchain,which is applied in blockchain 2.0.Smart contract is essentially a computational program that records the node state and requires multiple approvals to update the state. As long as specific writing conditions are met, the smart contract can respond automatically20-22. The combination of smart contracts and various methods such as consensus algorithms fundamentally solves the traditional security problem23-24.

Smart contracts are currently mostly used on the decentralized trading platform of Ether, and CellETF is a typical application scenario of smart contracts. all transactions on CellETF are executed through smart contracts, and at the same time CellETF, as a decentralized exchange on Ether25, eCell is the basic governance pass and core function token of the platform, which is created through Ether smart contracts token, which is an ERC20 token. It will aggregate decentralized protocols such as ETF clearing, automatic market making, liquidity pooling, liquidity mining, and cross-chain price fact prophecy machine for smart contracts to provide users with diverse derivatives and strategy options.

3.

MODEL BUILDING

In order to give full play to the characteristics of blockchain technology and highlight the excellent performance of anti-interference in UAV cluster applications, this paper builds a blockchain-based UAV cluster anti-interference communication network, and the specific anti-interference communication network is shown in Figure 1.

Figure 1.

Diagram of anti-interference communication network.

00115_PSISDG12506_125062Z_page_3_1.jpg

Among them, the anti-interference communication network operates as follows.

  • When the communication network starts to operate, the UAV on-board terminals send interrogation messages with their own terminal verification codes (on-board terminal ID numbers) to each other and answer the interrogation signals from the remaining on-board terminals, so that the number of terminals participating in the network during this communication can be confirmed, and a new block is created for each UAV on-board terminal.

  • When the ground station sends operational commands or flight data via the communication system, the nearest communication airborne terminal is selected to receive the sent commands, and the terminal sends the sent inquiry message with the terminal’s authentication code (airborne terminal ID number) to other airborne terminals in the form of webcast, and the other terminals receive the inquiry signal and reply. During the query process, the blockchain nodes decide on the access rights of the drone nodes according to a predefined access control logic. Therefore, an attacker cannot tamper with the access rights of a node simply by compromising a single node. The message is sent only when the number of responding terminals is greater than (n-l)/2, which increases the difficulty of attacking nodes and improves the security of distributed access control in the UAV cluster network.

  • Whenever a node in this network performs data transmission or data reception, a new block is generated and the new block is chained into the existing block chain, and the block chain of the terminal that performs data transmission or data reception is defined as the global block chain. During data communication, the elliptic matrix encryption algorithm is used for encrypted transmission. Each on-board terminal stores, in addition to the complete blockchain, a log chain consisting of only the checksum information of each block, which will all be stored in the behavior database. Combined with the group voting decision mechanism, every certain time, each terminal will broadcast its own log chain to the rest of the terminals, and if the received log chain information is different from the one stored in this terminal, it will reply its own block chain to the sender of the log chain. Similarly, when a terminal receives a number of blockchain replies greater than(n-1)/2, it updates its own blockchain to the global blockchain.

According to the provided UAV swarm communication network model, it is deployed in the UAV swarm, and the communication between each UAV node in this communication network model is realized through the improved Modlink communication protocol, and the specific Modlink protocol format is shown in Figure 2. The CRC checksum in the UAV Modlink communication protocol is a 16-bit CRC checksum to ensure high security of data transmission.

Figure 2.

Improved Modlink communication protocol.

00115_PSISDG12506_125062Z_page_4_1.jpg

4.

MODEL OPTIMIZATION

In this topic, the process of interaction between an intelligent body and its environment is described as a Markovian decision process through optimization theory, and based on the above modeling, the following definitions are made in this paper.

Suppose user nodes marked N in the scene, the observation vector o is the distance di,k between an intelligent body i and a node for a certain intelligent body k

00115_PSISDG12506_125062Z_page_3_2.jpg

Correspondingly, the action space u is defined as the direction of flight and the flight step per unit time slot, using polar coordinates to represent the movement of the UAV at the moment.

00115_PSISDG12506_125062Z_page_4_2.jpg

where 00115_PSISDG12506_125062Z_page_4_7.jpg is the direction and step in flight and φ is the azimuth.

Then the distance reward function is constructed as

00115_PSISDG12506_125062Z_page_4_3.jpg

where, k1 is the discount factor, which means that the closer to the node k, the less points will be deducted.

Also, for a connectable user, we define the communication vector cx,t, which can be expressed as ci = [bi,k]. where bi,k is the signal-to-noise ratio determination in Eq. (1.4). Based on the service time δi,k defined in equation, the service time vector τi = [δi,k] can be defined similarly.

Therefore the service reward function is constructed as follows:

00115_PSISDG12506_125062Z_page_4_4.jpg

where, k2 is the discount factor, which means the longer the service node time, the higher the score reward.

Considering the UAV range, we define the UAV offshore penalty function. We assume that the distance from shore is l, and that the further offshore the greater the risk. rl = –k3 · l

The optimization problem is reduced to the following form.

00115_PSISDG12506_125062Z_page_4_5.jpg

Ultimately, the complete state in the Markov decision is represented as equation (1):

00115_PSISDG12506_125062Z_page_4_6.jpg

where bKn indicates whether the user and the UAV meet the transmission signal-to-noise ratio, and cK,n indicates whether the user has been served, and xn, yn denotes the coordinates of the UAV, and ζη is the residual state information from the previous time step.

5.

CONCLUSION

In view of the problems that the massive, dynamic, distributed and lightweight characteristics of the current UAV group making the access control mechanism of the UAV group unstable, the low authority judgment performance, and the reduced security, this paper introduces the blockchain intelligent access control mechanism to the UAV group communication in the complex urban environment, and optimizes the Markov decision process to realize the anti-interference research of the UAV air ground integration radio wave.

ACKNOWLEDGMENTS

This research was financially supported by Special Projects in Key Areas for General Universities in Guangdong ProvinceNO.2021ZDZX1077,in part of Natural Science Foundation of Guangdong Province of China with the Grant No.2020A1515010784,also supported by Guangdong Provincial Innovation and Entrepreneurship Training Program Project NO.201713719017, Innovation and Improve School Project from Guangdong University of Science and Technology NO. GKY-2019CQYJ-3 College Students Innovation Training Program held by Guangdong University of Science and Technology NO.1711034, 1711080, and NO.202013719006X.

REFERENCES

[1] 

Dong, Y. and Song, X., “Australian bushfires in the background-UAV optimization allocation model,” International Journal of Higher Education Teaching Theory, 3 (3), (2022). Google Scholar

[2] 

Wang, J. J., Zhang, Y. Y., Ma, J., Hou, J., Wang, F. M. and Li, N., “Operational effectiveness evaluation of UAV cluster based on Bayesian networks,” Journal of Physics: Conference Series, 2282 (1), (2022). Google Scholar

[3] 

Yan, L., Webber, J. L., Mehbodniya, A., Moorthy, B., Sivamani, S., Nazir, S. and Shabaz, M., “Distributed optimization of heterogeneous UAV cluster PID controller based on machine learning,” Computers and Electrical Engineering, 101 (2022). https://doi.org/10.1016/j.compeleceng.2022.108059 Google Scholar

[4] 

Zuo, L., Gao, S., Li, Y., Li, L., Li, M. and Lu, X., “A fast and robust algorithm with reinforcement learning for large UAV cluster mission planning,” Remote Sensing, 14 (6), (2022). https://doi.org/10.3390/rs14061304 Google Scholar

[5] 

Du, Z., Shi, J. and Wu, Z., “Quantized consensus control for multi-UAVs based on prescribed performance,” International Journal of Control, Automation and Systems, 20 (1), (2022). https://doi.org/10.1007/s12555-021-0010-7 Google Scholar

[6] 

Siddiqi Murtaza, A., Iwendi, C., Jaroslava, K. and Anumbe, N., “Analysis on security-related concerns of unmanned aerial vehicle: attacks, limitations, and recommendations,” Mathematical Biosciences and Engineering: MBE, 19 (3), (2022). Google Scholar

[7] 

Wang, H., “Collaborative task offloading strategy of UAV cluster using improved genetic algorithm in mobile edge computing,” Journal of Robotics, (2021). https://doi.org/10.1155/2021/3965689 Google Scholar

[8] 

Liu, B., Li, A., Guo, Y. and Wang, C., “Adaptive distributed finite-time formation control for multi-UAVs under input saturation without collisions,” Aerospace Science and Technology, 120 (2022). https://doi.org/10.1016/j.ast.2021.107252 Google Scholar

[9] 

Qiao, R., Xu, G., Cheng, Y., Ye, Z. and Huang, J., “Simulation and analysis of grid formation method for UAV clusters based on the 3 × 3 magic square and the chain rules of visual reference,” Applied Sciences, 11 (23), (2021). https://doi.org/10.3390/app112311560 Google Scholar

[10] 

Tang, H. and Xu, Y., “Unmanned aerial vehicle cluster task assignment and related research review,” International Core Journal of Engineering, 7 (12), (2021). Google Scholar

[11] 

Fang, Y., Cheng, B., Kang, K. and Tan, H., “A self-adaptive deployment model of UAV cluster for emergency communication network,” International Journal of Distributed Sensor Networks, 17 (10), (2021). https://doi.org/10.1177/15501477211049327 Google Scholar

[12] 

Xu, D. and Chen, G., “The research on intelligent cooperative combat of UAV cluster with multi-agent reinforcement learning,” Aerospace Systems, (2021). Google Scholar

[13] 

Li, L., Wen, X., Lu, Z., Jing, W. and Zhang, H., “Energy-efficient multi-UAVs deployment and movement for emergency response,” IEEE Communications Letters, 25 (5), (2021). https://doi.org/10.1109/LCOMM.2021.3052230 Google Scholar

[14] 

Du, X., Guo, Q., Li, H. and Zhang, Y., “Multi-UAVs cooperative task assignment and path planning scheme,” Journal of Physics: Conference Series, 1856 (1), (2021). Google Scholar

[15] 

“TII’s SSRC Partners with Purdue University on UAV Security Project,” Manufacturing Close - Up, (2021). Google Scholar

[16] 

“Technology Innovation Institute’s SSRC Collaborates with Purdue University on UAV Security Project,” Manufacturing Close - Up, (2021). Google Scholar

[17] 

Kheireddine, C., Lagha, M. Laurent, D., “Design of search and rescue system using autonomous Multi-UAVs,” Intelligent Decision Technologies, 14 (4), (2021). Google Scholar

[18] 

Xu, Y., Ren, G., Chen, J., Zhang, X., Jia, L. and Kong, L., “Interference-aware cooperative anti-jamming distributed channel selection in UAV communication networks,” Applied Sciences, 8 (10), (2018). https://doi.org/10.3390/app8101911 Google Scholar

[19] 

Xu, Y., Ren, G., Chen, J., Luo, Y., Jia, L., Liu, X., Yang, Y. and Xu, Y., “A one-leader multi-follower Bayesian-Stackelberg game for anti-jamming transmission in UAV communication networks,” IEEE Access, 6 (2018). Google Scholar

[20] 

Shen, L., Wang, Y., Liu, K., Yang, Z., Shi, X., Yang, X., Jing, K., “Synergistic path planning of multi-UAVs for air pollution detection of ships in ports,” Transportation Research Part E, 144 (2020). https://doi.org/10.1016/j.tre.2020.102128 Google Scholar

[21] 

“Aviation - Unmanned Aerial Vehicle; Data on Unmanned Aerial Vehicle Detailed by Researchers at National University of Defense Technology (Dynamic Tasks Scheduling Model of UAV Cluster Based on Flexible Network Architecture),” Defense & Aerospace Week, (2020). Google Scholar

[22] 

“Science - Applied Sciences; Nanjing University of Aeronautics and Astronautics Researchers Have Provided New Study Findings on Applied Sciences (Novel Swarm Intelligence Algorithm for Global Optimization and Multi-UAVs Cooperative Path Planning: Anas Platyrhynchos …),” Science Letter, (2020). Google Scholar

[23] 

“Engineering; Researchers from Yantai University Provide Details of New Studies and Findings in the Area of Engineering (A Novel Hybrid Auction Algorithm for Multi-UAVs Dynamic Task Assignment),” Mathematics Week, (2020). Google Scholar

[24] 

“Science - Applied Sciences; Gyeongsang National University Researchers Report on Findings in Applied Sciences (Overlap Avoidance of Mobility Models for Multi-UAVs Reconnaissance),” Science Letter, (2020). Google Scholar

[25] 

“Technology; Studies Conducted at Nanjing University of Aeronautics and Astronautics on Technology Recently Reported (Adaptive Cascaded High-resolution Source Localization Based on Collaboration of Multi-UAVs),” Mathematics Week, (2020). Google Scholar
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Longqing Zhang, Xinwei Zhang, Lei Yang, Liwei Tian, Yungui Chen, Yanghong Zhang, and Peipei Li "Research on a new improved UAV anti-jamming and optimization model", Proc. SPIE 12506, Third International Conference on Computer Science and Communication Technology (ICCSCT 2022), 125062Z (28 December 2022); https://doi.org/10.1117/12.2662185
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Unmanned aerial vehicles

Optimization (mathematics)

Network security

Performance modeling

Signal attenuation

Telecommunications

Data transmission

Back to Top