415 research outputs found

    Routing Unmanned Vehicles in GPS-Denied Environments

    Full text link
    Most of the routing algorithms for unmanned vehicles, that arise in data gathering and monitoring applications in the literature, rely on the Global Positioning System (GPS) information for localization. However, disruption of GPS signals either intentionally or unintentionally could potentially render these algorithms not applicable. In this article, we present a novel method to address this difficulty by combining methods from cooperative localization and routing. In particular, the article formulates a fundamental combinatorial optimization problem to plan routes for an unmanned vehicle in a GPS-restricted environment while enabling localization for the vehicle. We also develop algorithms to compute optimal paths for the vehicle using the proposed formulation. Extensive simulation results are also presented to corroborate the effectiveness and performance of the proposed formulation and algorithms.Comment: Publised in International Conference on Umanned Aerial System

    Routing Vehicles with Motion, Resource and Mission Constraints: Algorithms and Bounds

    Get PDF
    Unmanned Aerial Vehicles (UAVs) are used for several military and civil applications such as reconnaissance, surveillance etc. The UAVs, due to their design and size limitations, have inherent kinematic constraints, communication constraints etc. This thesis considers the path planning problems for UAVs while satisfying a class of constraints. We consider a multiple depot UAV routing problem, where the vehicles have motion constraints due to bound on their yaw-rate. For a given set of targets, it is required that each target should be on the path of at least one of the vehicles. This problem is hard to solve and currently there are no algorithm that could find an optimal solution. We aim to find tight lower bounds for this problem via Lagrangian relaxation. The complicating constraints of the problem are relaxed, and the cost function is penalized whenever those constraints are violated. This reduces the original problem to a known problem - a standard multiple traveling salesmen problem (MTSP). Simulation results are presented to show that this method significantly improved the existing lower bounds. The second problem we consider is the routing of UAVs in GPS denied environments and with limited communication range. Two different architectures for navigation assisted by an array of Unattended Ground Sensors (UGSs) are considered. In the first case, when an UAV localizes itself by communicating with an UGS, the second UAV can orbit around the first UAV. Contact with UGS allows them to act as beacons for relative navigation eliminating the need for GPS. A randomized algorithm with approximation ratio of 9/2 and a transformation technique are developed to solve this problem. In the second architecture, when two UAVs are located at two different UGSs, the third UAV localizes by triangulation using range measurements from the first two UAVs. This three UAV case is solved using a graph transformation technique to pose it as an one-in-a-set TSP. The solutions produced by these algorithms were used to simulate the UAV routing on AMASE, a simulation tool for routing UAVs developed by the Air Force Research Laboratories

    Thesis title: Feasibility study of using collaborative UAVs for Emergency Response in Road Tunnels

    Get PDF
    Utilizing UAVs for assisting in emergency response missions is already a fact, both in open landscapes like forests and in restricted areas like sewers. However, using them in road tunnels has not yet been realised, and could possibly provide a huge help for the first responders in the form of surveillance, providing network coverage or announcing self-help assistance to the victims. There are certain challenges for this to be possible, some of them being lack of signal coverage, battery life and positional navigation in a GPS-denied environment. In this thesis the feasibility of this will be put into consideration by surveying available software and hardware for this utilization, as well as setting up a generalised energy consumption model to check where the different drone configurations can be used. The results implies that the state-of-the-art drone configurations are very capable of being used to assist in emergency situations in road tunnels, both when it comes to response time and length coverage. However, the main restricting factor will be cost, as modern drone swarm configurations with a reasonable battery capacity and sophisticated sensors comes at a high cost.Utilizing UAVs for assisting in emergency response missions is already a fact, both in open landscapes like forests and in restricted areas like sewers. However, using them in road tunnels has not yet been realised, and could possibly provide a huge help for the first responders in the form of surveillance, providing network coverage or announcing self-help assistance to the victims. There are certain challenges for this to be possible, some of them being lack of signal coverage, battery life and positional navigation in a GPS-denied environment. In this thesis the feasibility of this will be put into consideration by surveying available software and hardware for this utilization, as well as setting up a generalised energy consumption model to check where the different drone configurations can be used. The results implies that the state-of-the-art drone configurations are very capable of being used to assist in emergency situations in road tunnels, both when it comes to response time and length coverage. However, the main restricting factor will be cost, as modern drone swarm configurations with a reasonable battery capacity and sophisticated sensors comes at a high cost

    A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions

    Full text link
    Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to complete a number of tasks in cooperation with each other without need for human intervention. In recent years, UAVs, which are widely utilized in military missions, have begun to be deployed in civilian applications and mostly for commercial purposes. With their growing numbers and range of applications, UAVs are becoming more and more popular; on the other hand, they are also the target of various threats which can exploit various vulnerabilities of UAV systems in order to cause destructive effects. It is therefore critical that security is ensured for UAVs and the networks that provide communication between UAVs. In this survey, we aimed to present a comprehensive detailed approach to security by classifying possible attacks against UAVs and flying ad hoc networks (FANETs). We classified the security threats into four major categories that make up the basic structure of UAVs; hardware attacks, software attacks, sensor attacks, and communication attacks. In addition, countermeasures against these attacks are presented in separate groups as prevention and detection. In particular, we focus on the security of FANETs, which face significant security challenges due to their characteristics and are also vulnerable to insider attacks. Therefore, this survey presents a review of the security fundamentals for FANETs, and also four different routing attacks against FANETs are simulated with realistic parameters and then analyzed. Finally, limitations and open issues are also discussed to direct future wor

    A systematic literature review on Security of Unmanned Aerial Vehicle Systems

    Full text link
    Unmanned aerial vehicles (UAVs) are becoming more common, and their operational range is expanding tremendously, making the security aspect of the inquiry essential. This study does a thorough assessment of the literature to determine the most common cyberattacks and the effects they have on UAV assaults on civilian targets. The STRIDE assault paradigm, the challenge they present, and the proper tools for the attack are used to categorize the cyber dangers discussed in this paper. Spoofing and denial of service assaults are the most prevalent types of UAV cyberattacks and have the best results. No attack style demands the employment of a hard-to-reach gadget, indicating that the security environment currently necessitates improvements to UAV use in civilian applications.Comment: 10 Pages, 4 Figure
    • …
    corecore