Figure 14: Tunnel crossing duration for each simulated
configuration, normalized by the duration of tunnel
crossing by a single UAV by the shortest path at
maximum speed.
As expected, tunnels of shape b and c show the
same trend even if the largest one is crossed quicker.
We note that in the case of several UAVs and
tunnel of shape b to e, the crossing duration is longer
than for a single UAV. This is due to the attractive-
repulsive forces between the UAVs which are not in
the direction of their target.
For the tunnel shape d, the crossing duration
follows the trend of tunnel shapes b and c until 4
UAVs and skyrockets for 5 UAVs. This is due to the
creation of additional links between the UAVs
during the travel through the linear parts which have
to be broken to pass over the corner.
In the case of the tunnel shape e, we can notice a
strong increase of the crossing duration from 4
UAVs, due to the two obstacles which are too close
to allow a biconnectivity. For that reason, some links
between the UAVs have to be broken, while an
attractive force between them is still applied. From 4
UAVs, two links have to be broken and only one in
the case of 3 UAVs.
Moreover, in all the simulations, the connectivity
of the swarm was maintained in the tunnel.
7 CONCLUSIONS AND FUTURE
WORK
In this paper we propose original mobility strategies
based on virtual forces for a swarm of autonomous
UAVs. Following these strategies, the UAVs, all
having equivalent roles, can autonomously fulfill a
surveillance mission of two AoIs separated by a
narrow passage. To travel from the initial AoI to the
other, the swarm organizes itself as a compact
formation favoring communication links between
the UAVs, which travel through the tunnel while
avoiding obstacles unknown prior to the mission.
We have run many simulations and evaluated
them using a number of criteria. Our results show
that our approach gives very good results.
Nevertheless, numerous topics have to be further
explored. First of all, the UAV safety distance
should depend on the range of the embedded sensor
used to detect the obstacles, as well as on the speed
of the UAVs. Furthermore, each UAV that detects
an obstacle should share its location with the other
aircrafts of the swarm. Thanks to this information,
the UAVs could calculate a new target points taking
the obstacle into consideration. The presence of
obstacles on the AoI could also be considered. A
wide subject of study could be the self-organization
of the swarm in order to make up a compact
formation depending on the tunnel width, instead of
the deterministic configuration presented in this
work. Finally, magnitudes of the three forces could
be defined by other functions, as polynomial or
exponential. This could improve the model strategies
by speeding up surveillance or tunnel crossing.
REFERENCES
Al Redwan Newaz, A., Lee, G., Adi Pratama, F. & Young
Chong, N., 2013. 3D Exploration Priority Based
Flocking of UAVs. Takamatsu, Japan, IEEE, pp. 1534-
1589.
Autefage, V., Chaumette, S. & Magoni, D., 2015. A
Mission-Oriented Service Discovery Mechanism for
Highly Dynamic Autonomous Swarms of Unmanned
Systems. s.l., IEEE, pp. 31-40.
Bekmezci, I., Sahingoz, O. K. & Temel, S., 2013. Flying
Ad-Hoc Networks (FANETs): A survey. Ad Hoc
Networks, May, 11(3), pp. 1254-1270.
Boonyarak, S. & Prempraneerach, P., 2014. Real-Time
Obstacle Avoidance for Car Robot Using Potential
Field and Local Incremental Planning. Nakhon
Ratchasima, Thailand, IEEE.
Bouvry, P. et al., 2016. Using heterogeneous multilevel
swarms of UAVs and high-level data fusion to support
situation management in surveillance scenarios.
Baden-Baden, IEEE, pp. 424-429.
Cakir, M., 2015. 2D Path Planning of UAVs with Genetic
Algorithm in a Constrained Environment. Istanbul,
Turkey, IEEE.
Camp, T., Boleng, J. & Davies, V., 2002. A survey of
mobility models for ad hoc network research. Wireless
Communications and Mobile Computing, August,
2(5), pp. 483-502.
Casteigts, A., 2015. JBotSim: a Tool for Fast Prototyping
of Distributed Algorithms in Dynamic Networks.
Athens, Greece, s n.