Modeling of an attack mission by strike drones under active enemy counteraction

Oleg Fedorovich, Oleksandr Prokhorov, Dmytro Krytskyi, Olga Malyeyeva, Oleksandr Leshchenko, Roman Trishch

Abstract


The rapid growth of innovation in modern warfare has led to the need to consider the enemy's ability to build defenses using modern anti-drone measures when planning offensive missions with strike drones. Therefore, researching preventive actions is relevant when planning a massive attack aimed at overcoming obstacles to the movement of strike drones to enemy targets. The publication focuses on the development of analytical and simulation models to plan an attack while minimizing the risks posed by enemy anti-drone actions. The goal of this research is to develop a set of mathematical and simulation models for planning the movement of a swarm of attack drones under active enemy countermeasures. The tasks that need to be solved are as follows: systematically analyse actions for planning an attack mission in conditions of dynamic changes in the battlefield; select a subset from a set of relevant enemy targets for attack; create the required number of strike drones for attack in conditions of limited capabilities; create confusing trajectories for strike drones to successfully hit enemy targets; develop an algorithm for forming a flight route with minimal risk of drones being shot down (lost); and create a simulation model to simulate the movement of a swarm of strike drones towards targets under active enemy countermeasures. Mathematical methods and models used: system analysis to create a logical sequence of actions for conducting an attack with strike drones; qualitative and quantitative assessment of the characteristics of possible enemy targets; lexicographic ordering of options for selecting a subset of relevant enemy targets; integer (Boolean)  to calculate the number of strike drones that will be involved in the attack; agent-based simulation modeling to form the movement of strike drones in enemy countermeasure conditions. The following results were obtained: a proposed systematic representation of the planning of an attack mission with strike drones under conditions of dynamic changes in circumstances on the battlefield; a justified selection of a subset of relevant targets for a massive attack; the required number of attacking drones was calculated under conditions of limited capabilities; an algorithm was developed to create a route for strike drones with minimal flight risks; and an agent-based model was created to simulate the flight of a swarm of strike drones for various scenarios of active countermeasures by the breacher. Conclusions: The results of the study provide a scientific basis for developing a plan for an attack mission by a swarm of strike drones under active enemy countermeasures, thereby facilitating the integration of air and ground combat operations and enabling the successful execution of the planned military operation. The novelty of the proposed approach lies in the scientific justification of the plan for an attack mission using strike drones in the face of active enemy countermeasures and dynamic battlefield conditions, supported by a developed set of original analytical and simulation models.

Keywords


attack drone swarm; attack mission; current enemy targets; minimization of drone movement risks; optimization of the number of attack drones; simulation-based multi-agent modeling of attack drone movement

Full Text:

PDF

References


Castrillo, V. U., Manco, A., Pascarella, D., & Gigante, G. A. Review of Counter-UAS Technologies for Cooperative Defensive Teams of Drones. Drones, 2022, no. 6(3), article no. 65. DOI: 10.3390/drones6030065.

Zhang, J., Campbell, J., Sweeney, D., & Hupman, A. Energy consumption models for delivery drones: A comparison and assessment. Transportation Research. Part D: Transport and Environment, 2023, vol. 90, article no. 102668. DOI: 10.1016/j.trd.2020.102668.

Asaamoning, G., Mendes, P., Rosário, D., & Cerqueira, E. Drone swarms as networked control systems by integration of networking and computing. Sensors, 2021, vol. 21, no. 8, article no. 2642. DOI:10.3390/s21082642.

Fedorovich, O., Krytskyi, D., Lukhanin, M., Prokhorov, O., & Leshchenko, Y. Modeling of strike drone missions for conducting wave attacks in conditions of enemy anti-drone actions. Radioelectronic and Computer Systems, 2025, no. 1, pp. 29-43. DOI: 10.32620/reks.2025.1.02.

Chiper, F.-L., Martian, A., Vladeanu, C., Marghescu, I., Craciunescu, R., & Fratu, O. Drone Detection and Defense Systems: Survey and a Software-Defined Radio-Based Solution. Sensors, 2022, vol. 22, no. 4, article no. 1453. DOI: 10.3390/s22041453.

Chauhan, D., Kagathara, H., Mewada, H., Patel, S., Kavaiya, S., & Barb, G. Nation’s Defense: A Comprehensive Review of Anti-Drone Systems and Strategies. IEEE Access, 2025, vol. 13, pp. 53476-53505. DOI: 10.1109/ACCESS.2025.3550338.

Zheng, D., Zhang, Y., Li, F., & Cheng, P. UAVs cooperative task assignment and trajectory optimization with safety and time constraints. Defence Technology, 2023, vol. 20, pp. 149-161, DOI: 10.1016/j.dt.2022.01.011.

Bao, J., Yang, Y., Wang, Y., Yang X. & Du, Z. Path Planning for Cellular-connected UAV using Heuristic Algorithm and Reinforcement Learning. Proceedings of the 25th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Republic of Korea, 2023, pp. 454-459, DOI: 10.23919/ICACT56868.2023.10079278.

Fedorovich, O., Krytskyi, D., Leshchenko, O., Yashina, O., & Malieieva, Y. Modeling waves of a strike drones swarm for a massive attack on enemy targets. Radioelectronic and Computer Systems, 2024, no. 2, pp. 203-212. DOI: 10.32620/reks.2024.2.16.

Guerber, Ch., Royer, M., & Larrieu, N. Machine Learning and Software Defined Network to secure communications in a swarm of drones. Journal of Information Security and Applications, 2021, vol. 61, article no. 102940. DOI: 10.1016/j.jisa.2021.102940.

Wang, X., Zhao, Zh, Yi, L., Ning, Zh, Guo, L., Yu, F. R., & Guo, S. A Survey on Security of UAV Swarm Networks: Attacks and Countermeasures. ACM Computing Surveys, 2024, vol. 57, no. 3, article no. 74. DOI: 10.1145/3703625.

Llinas, J. & Sentz, K. Knowing the Enemy, Dealing with Deception, and Situation/Threat Estimation. IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), Montreal, QC, Canada, 2024, pp. 31-38. DOI: 10.1109/CogSIMA61085.2024.10554049.

Yang, Y., Xiong, X., & Yan, Y. UAV Formation Trajectory Planning Algorithms: A Review. Drones, 2023, vol. 7, no. 1, article no. 62. DOI: 10.3390/drones7010062.

Ouyang, Q., Wu, Z., Cong,Y., & Wang, Z. Formation Control of Unmanned Aerial Vehicle Swarms: A Comprehensive Review. Asian Journal of Control, 2023, no. 25, pp. 570-593. DOI: 10.1002/asjc.2806.

Alisson, R. S., Boukerche, A., Ruiz, L. B., & Loureiro, A. A. F. Trajectory Matters: Impact of Jamming Attacks Over the Drone Path Planning on the Internet of Drones. Ad Hoc Networks, 2023, vol. 146, article no. 103179, DOI: 10.1016/j.adhoc.2023.103179.

Wang, X. & Gursoy, M. C. Resilient Path Planning for UAVs in Data Collection Under Adversarial Attacks, IEEE Transactions on Information Forensics and Security, 2023, vol. 18, pp. 2766-2779. DOI: 10.1109/TIFS.2023.3266699.

Zhang, J., Cui Y., & Ren, J. Dynamic Mission Planning Algorithm for UAV Formation in Battlefield Environment, IEEE Transactions on Aerospace and Electronic Systems, 2023, vol. 59, no. 4, pp. 3750-3765. DOI: 10.1109/TAES.2022.3231244.

Kim, G. S., Lee, S., Woo T., & Park, S. Cooperative Reinforcement Learning for Military Drones over Large-Scale Battlefields, IEEE Transactions on Intelligent Vehicles, 2024, pp. 1-11. DOI: 10.1109/TIV.2024.3472213.

Guitton, M. J. Fighting the locusts: Implementing military countermeasures against drones and drone swarms. Scandinavian Journal of Military Studies, 2021, vol. 4, no. 1, pp. 26-36. DOI: 10.31374/sjms.53.

Fedorovich, O., Krytskyi, D., Hubka, O., & Popov, A. Modeling the series of military actions to plan an attack mission of a swarm drones. Radioelectronic and Computer Systems, 2025, no. 2, pp. 46-63. DOI: 10.32620/reks.2025.2.03.

Khalil, H., & Rafique, U. Clustering of modified-gaussian UAVs swarm using machine learning approach. IET Conference Proceedings, 2022, vol. 2022, iss. 26, pp. 390-393. DOI: 10.1049/icp.2023.0636.

Lee, D. H., Jeong, J. H., Ahn, H. J., & Lee, S. W. Design of an EEG-based Drone Swarm Control System using Endogenous BCI Paradigms. Proceedings of the 9th International Winter Conference on Brain-Computer Interface (BCI), Gangwon, Korea (South), 2021, pp. 1-5, DOI: 10.1109/BCI51272.2021.9385356.

Oli, A., & Mahalal, E. UAV Security: Attacks, Defenses, and Open Challenges. IEEE Access, 2025, vol. 13, pp. 215606-215635, DOI: 10.1109/ACCESS.2025.3647023.

Vasylenko, O. Metody matematychnoho modelyuvannya vykorystannya royiv udarnykh bezpilotnykh litalʹnykh aparativ [Methods of mathematical modeling of the use of swarms of strike unmanned aerial vehicles]. Povitryana mitʹ Ukrayiny – Air Power of Ukraine, 2025, vol. 1, no. 8, pp. 54-70. DOI: 10.33099/2786-7714-2025-1-8-54-70. (In Ukrainian).

Henchey, M, & Rosen, S. Emerging approaches to support dynamic mission planning: survey and recommendations for future research. The Journal of Defense Modeling and Simulation, 2020, vol. 18, no. 4, pp. 453-468. DOI: 10.1177/1548512919898750.

Zhang, Z., Wu, J., Dai, J. & He, C. A. Novel Real-Time Penetration Path Planning Algorithm for Stealth UAV in 3D Complex Dynamic Environment, IEEE Access, 2020, vol. 8, pp. 122757-122771. DOI: 10.1109/ACCESS.2020.3007496.

Fedorovich, O., Malyeyeva, O., Humennyi, A., Leshchenko, O., Leshchenko, Y., & Pliekhova, G. (2025). Modeling of defensive actions for protecting military and civilian facilities from massive wave attacks by enemy strike drones. Radioelectronic and Computer Systems, 2025(3), 3-20. doi:https://doi.org/10.32620/reks.2025.3.01

Najgebauer, A. Consideration of electronic warfare in the assessment and development of the operational capabilities of the armed forces. IET Radar, Sonar & Navigation, 2024, vol. 18, no. 11, pp. 2199-2211. DOI: 10.1049/rsn2.12629.

Horpenyuk, A. Ya., Luzhetska, N. M., & Horpenyuk, O. A. Analiz osoblyvostey zastosuvannya kryptohrafichnykh alhorytmiv ta protokoliv dlya zakhystu BPLA [Analysis of the features of of Using Cryptographic Algorithms and Protocols for Uav Protection]. Kompʺyuterni systemy ta merezhi – Computer systems and networks, 2025, vol. 7, no. 1, pp. 91-105. DOI: 10.23939/csn2025.01.091 (In Ukrainian).

Khan, N. A., Jhanjhi, N. Z., Brohi, S. N., Almazroi, A. A., & Almazroi, A. A. A secure communication protocol for unmanned aerial vehicles. Computers, Materials, & Continua, 2022, vol. 70, no. 1, pp. 601-618. DOI: 10.32604/cmc.2022.019419.

Li, H., Hao, Y., & Zhang, X. Offensive/Defensive Game Target Damage Assessment Mathematical Calculation Method between the Projectile and Target. Mathematics, 2022, vol. 10, no. 22, article no. 4291. DOI: 10.3390/math10224291.

Sundarraj, S., Reddy, R. V. K., Basam, M. B., Lokesh, G. H., Flammini, F., & Natarajan, R. Route Planning for an Autonomous Robotic Vehicle Employing a Weight-Controlled Particle Swarm-Optimized Dijkstra Algorithm. IEEE Access, 2023, vol. 11, pp. 92433-92442, DOI: 10.1109/ACCESS.2023.3302698.

Fedorovich, O., Lukhanin, M., Prokhorov, O., Slomchynskyi, O., Hubka, O., & Leshchenko, Y. Simulation of arms distribution strategies by combat zones to create military parity of forces. Radioelectronic and Computer Systems, 2023, no. 4, pp. 209-220. DOI: 10.32620/reks.2023.4.15.

Fedorovych, O., Kritskiy, D., Malieiev, L., Rybka, K., & Rybka, A. Military logistics planning models for enemy targets attack by a swarm of combat drones. Radioelectronic and Computer Systems, 2024, no. 1, pp. 207-216. DOI: 10.32620/reks.2024.1.16.




DOI: https://doi.org/10.32620/reks.2026.1.03

Refbacks

  • There are currently no refbacks.