Abstract

As a kind of game-changing combat style, the operation of the UAV swarm in cyberspace is characterized by high effective cost and high concealment, which make it play an important role in the future competition of cyberspace. Due to the lack of actual combat experience and high confidentiality of the cyberspace operation and the UAV swarm operation, the modeling and simulation (M and S) of the operation of the UAV swarm in cyberspace is the vital method for planning the UAV swarm system architecture and designing the tactical methods of the UAV swarm. At present, the research on the M and S of the operation of the UAV swarm in cyberspace is just starting from home and abroad, and there is no corresponding modeling method and concrete model. Taken the Integrated Air Defense System (IADS) as the object, the guiding ideology of the M and S of the operation of the UAV swarm in cyberspace was researched from the height of the joint operations, which includes the characteristics of the individual autonomy, the group cooperation, the offensive and defensive antagonism and the electromagnetic-cyber the operation. Then, the model characteristic and elements was analyzed, such as the model system architecture, the rule and the algorithm. On this basis, the model pool, operational rule pool and intelligent algorithm pool would be constructed. Afterwards, the modeling method of the operation of the UAV swarm in cyberspace which based the “Rule+ Respond+ Algorithm” (RRA) is proposed, including the modeling framework and main process method of the RRA. The main process included the military concept modeling stage, the rules refining stage, the rules judgment stage, the action model response stage and the algorithm solution stage, that the five stages were in sequence, also the main work in each stage was analyzed. At the level of system of system M and S, the modeling focused of the abstraction, extraction and description of the rules of the UAV swarm in cyberspace. The description and construction methods of the rule are researched, such as the BNF format, the process format, and the rules tree graph. Finally, based on the future joint operations, an example of the operation of the UAV swarm in cyberspace is given, then the effectiveness is analyzed. The example showed that using nine UAV Swarms to attack IADS in cyberspace would reduce the normal power range of the sensor network by 90% and the warning time by 80.3%.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call