Staying Hidden at Battlefields While Communicating via Unmanned Vehicles
DOI:
https://doi.org/10.26636/jtit.2025.FITCE2024.2086Keywords:
low probability detection, MANET, Prim algorithm, RSSI, UxVAbstract
History shows that information is one of the key factors in military conflicts. During military conflicts, there is a need to maintain a communication channel on the battlefield while staying hidden from the enemy. In this paper, we present a simulator that allows to use a communication network and minimize the risk of being detected by the enemy. The simulator, using the Prim algorithm and fine-tuning, shows how a mobile ad-hoc network established between soldiers with the aid of unmanned vehicles, i.e. drones, may become undetectable for the enemy by properly optimizing drone positions.
Downloads
References
[1] B. Sims, M. Zamani, and R. Hunjet, "Distributed Connectivity Control in Low Probability of Detection Operations", 2019 12th Asian Control Conference (ASCC), Kitakyushu, Japan, 2019.
View in Google Scholar
[2] M. Zhu, F. Liu, Z. Cai, and M. Xu, "Maintaining Connectivity of MANETs Through Multiple Unmanned Aerial Vehicles", Mathematical Problems in Engineering, art. no. 952069, 2015. DOI: https://doi.org/10.1155/2015/952069
View in Google Scholar
[3] Z. Han, A.L. Swindlehurst, and K.J.R. Liu, "Optimization of MANET Connectivity via Smart Deployment/movement of Unmanned Air Vehicles", IEEE Transactions on Vehicular Technology, vol. 58, pp. 3533-3546, 2009. DOI: https://doi.org/10.1109/TVT.2009.2015953
View in Google Scholar
[4] A. Coyle, "Using Directional Antenna in UAVs to Enhance Tactical Communications", 2018 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 2018. DOI: https://doi.org/10.1109/MilCIS.2018.8574110
View in Google Scholar
[5] C. Dixon and E.W. Frew, "Optimizing Cascaded Chains of Unmanned Aircraft Acting as Communication Relays", IEEE Journal on Selected Areas in Communications, vol. 30, no. 5, pp. 883-898, 2012. DOI: https://doi.org/10.1109/JSAC.2012.120605
View in Google Scholar
[6] J. Xie, B. Zhang, and C. Zhan, "A Novel Relay Node Placement and Energy Efficient Routing Method for Heterogeneous Wireless Sensor Networks", IEEE Access, vol. 8, pp. 202439-202444, 2020. DOI: https://doi.org/10.1109/ACCESS.2020.2984495
View in Google Scholar
[7] A. Coyle, A. Gupta, and B. Campbell, "RDMST- A Novel Distributed Topology Control Algorithm for Low Probability of Detection Mobile Communication Networks", Procedia Computer Science, vol. 205, pp. 68-77, 2022. DOI: https://doi.org/10.1016/j.procs.2022.09.008
View in Google Scholar
[8] A. Neumann et al., "Diversity Optimization for the Detection and Concealment of Spatially Defined Communication Networks", Proc. of the Genetic and Evolutionary Computation Conference, pp. 1436-1444, 2023. DOI: https://doi.org/10.1145/3583131.3590405
View in Google Scholar
[9] J. Yockey, B. Campbell, A. Coyle, and R. Hunjet, "Emulating Low Probability of Detection Algorithms", 2020 30th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, Australia, 2020. DOI: https://doi.org/10.1109/ITNAC50341.2020.9315105
View in Google Scholar
[10] J. Fan et al., "Area Surveillance with Low Detection Probability Using UAV Swarms", IEEE Transactions on Vehicular Technology, vol. 73, pp. 1736-1752, 2024. DOI: https://doi.org/10.1109/TVT.2023.3318641
View in Google Scholar
[11] D. Ramphull, A. Mungur, S. Armoogum, and S. Pudaruth, "A Review of Mobile Ad Hoc Network (MANET) Protocols and Their Applications", 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2021. DOI: https://doi.org/10.1109/ICICCS51141.2021.9432258
View in Google Scholar
[12] F. Safari et al., "A Review of AI-based MANET Routing Protocols", 2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Montreal, Canada, 2023. DOI: https://doi.org/10.1109/WiMob58348.2023.10187830
View in Google Scholar
[13] A. Nadeem and M.P. Howarth, "A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks", IEEE Communications Surveys & Tutorials, vol. 15, pp. 2027-2045, 2013. DOI: https://doi.org/10.1109/SURV.2013.030713.00201
View in Google Scholar
[14] R.C. Prim, "Shortest Connection Networks and Some Generalizations", The Bell System Technical Journal, vol. 36, pp. 1389-1401, 1957. DOI: https://doi.org/10.1002/j.1538-7305.1957.tb01515.x
View in Google Scholar
[15] H. Doppalapudi, C.K. Reddy N, V. Dagumati, and Vidhyasagar BS, "Modeling Prim’s Algorithm for Tourism Sites in India", 2022 IEEE International Symposium on Smart Electronic Systems (iSES), Warangal, India, 2022. DOI: https://doi.org/10.1109/iSES54909.2022.00140
View in Google Scholar
[16] F. Huang, P. Gao, and Y. Wang, "Comparison of Prim and Kruskal on Shanghai and Shenzhen 300 Index Hierarchical Structure Tree", 2009 International Conference on Web Information Systems and Mining, Shanghai, China, 2009. DOI: https://doi.org/10.1109/WISM.2009.56
View in Google Scholar
[17] Aishwarya, R. Maurya, and R. Sharma, "Comparison of Prim and Kruskal’s Algorithm", International Research Journal of Modernization in Engineering Technology and Science, vol. 5, 2023.
View in Google Scholar
[18] A. Mohan, W.X. Leow, and A. Hobor, "Functional Correctness of C Implementations of Dijkstra’s, Kruskal’s, and Prim’s Algorithms", Proc. of Computer Aided Verification CAV 2021, virtual event, 2021. DOI: https://doi.org/10.1007/978-3-030-81688-9_37
View in Google Scholar
[19] J. Chen, "The Analysis and Application of Prim Algorithm, Kruskal Algorithm, Boruvka Algorithm", Applied and Computational Engineering, vol. 19, pp. 84-89, 2023. DOI: https://doi.org/10.54254/2755-2721/19/20231012
View in Google Scholar
[20] A. Coyle, B. Campbell, and R. Hunjet, "Minimizing the Network Detection Probability Using Autonomous Vehicles", 2020 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 2020. DOI: https://doi.org/10.1109/MilCIS49828.2020.9282373
View in Google Scholar
[21] N. Li, J.C. Hou, and L. Sha, "Design and Analysis of an MST-based Topology Control Algorithm", IEEE Transactions on Wireless Communications, vol. 4, pp. 1195-1206, 2005. DOI: https://doi.org/10.1109/TWC.2005.846971
View in Google Scholar
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Karol Zientarski, Mykyta Muravytskyi, Kamil Chełminiak, Krzysztof Skos, Pawel Kulakowski

This work is licensed under a Creative Commons Attribution 4.0 International License.