Staying Hidden at Battlefields While Communicating via Unmanned Vehicles
DOI:
https://doi.org/10.26636/jtit.2025.FITCE2024.2086Keywords:
low probability detection, MANET, Prim algorithm, RSSI, UxVAbstract
History shows that information is one of the key factors in military conflicts. During military conflicts, there is a need to maintain a communication channel on the battlefield while staying hidden from the enemy. In this paper, we present a simulator that allows to use a communication network and minimize the risk of being detected by the enemy. The simulator, using the Prim algorithm and fine-tuning, shows how a mobile ad-hoc network established between soldiers with the aid of unmanned vehicles, i.e. drones, may become undetectable for the enemy by properly optimizing drone positions.
Downloads
References
[1] B. Sims, M. Zamani, and R. Hunjet, "Distributed Connectivity Control in Low Probability of Detection Operations", 2019 12th Asian Control Conference (ASCC), Kitakyushu, Japan, 2019.
View in Google Scholar
[2] M. Zhu, F. Liu, Z. Cai, and M. Xu, "Maintaining Connectivity of MANETs Through Multiple Unmanned Aerial Vehicles", Mathematical Problems in Engineering, art. no. 952069, 2015.
View in Google Scholar
[3] Z. Han, A.L. Swindlehurst, and K.J.R. Liu, "Optimization of MANET Connectivity via Smart Deployment/movement of Unmanned Air Vehicles", IEEE Transactions on Vehicular Technology, vol. 58, pp. 3533-3546, 2009.
View in Google Scholar
[4] A. Coyle, "Using Directional Antenna in UAVs to Enhance Tactical Communications", 2018 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 2018.
View in Google Scholar
[5] C. Dixon and E.W. Frew, "Optimizing Cascaded Chains of Unmanned Aircraft Acting as Communication Relays", IEEE Journal on Selected Areas in Communications, vol. 30, no. 5, pp. 883-898, 2012.
View in Google Scholar
[6] J. Xie, B. Zhang, and C. Zhan, "A Novel Relay Node Placement and Energy Efficient Routing Method for Heterogeneous Wireless Sensor Networks", IEEE Access, vol. 8, pp. 202439-202444, 2020.
View in Google Scholar
[7] A. Coyle, A. Gupta, and B. Campbell, "RDMST- A Novel Distributed Topology Control Algorithm for Low Probability of Detection Mobile Communication Networks", Procedia Computer Science, vol. 205, pp. 68-77, 2022.
View in Google Scholar
[8] A. Neumann et al., "Diversity Optimization for the Detection and Concealment of Spatially Defined Communication Networks", Proc. of the Genetic and Evolutionary Computation Conference, pp. 1436-1444, 2023.
View in Google Scholar
[9] J. Yockey, B. Campbell, A. Coyle, and R. Hunjet, "Emulating Low Probability of Detection Algorithms", 2020 30th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, Australia, 2020.
View in Google Scholar
[10] J. Fan et al., "Area Surveillance with Low Detection Probability Using UAV Swarms", IEEE Transactions on Vehicular Technology, vol. 73, pp. 1736-1752, 2024.
View in Google Scholar
[11] D. Ramphull, A. Mungur, S. Armoogum, and S. Pudaruth, "A Review of Mobile Ad Hoc Network (MANET) Protocols and Their Applications", 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2021.
View in Google Scholar
[12] F. Safari et al., "A Review of AI-based MANET Routing Protocols", 2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Montreal, Canada, 2023.
View in Google Scholar
[13] A. Nadeem and M.P. Howarth, "A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks", IEEE Communications Surveys & Tutorials, vol. 15, pp. 2027-2045, 2013.
View in Google Scholar
[14] R.C. Prim, "Shortest Connection Networks and Some Generalizations", The Bell System Technical Journal, vol. 36, pp. 1389-1401, 1957.
View in Google Scholar
[15] H. Doppalapudi, C.K. Reddy N, V. Dagumati, and Vidhyasagar BS, "Modeling Prim’s Algorithm for Tourism Sites in India", 2022 IEEE International Symposium on Smart Electronic Systems (iSES), Warangal, India, 2022.
View in Google Scholar
[16] F. Huang, P. Gao, and Y. Wang, "Comparison of Prim and Kruskal on Shanghai and Shenzhen 300 Index Hierarchical Structure Tree", 2009 International Conference on Web Information Systems and Mining, Shanghai, China, 2009.
View in Google Scholar
[17] Aishwarya, R. Maurya, and R. Sharma, "Comparison of Prim and Kruskal’s Algorithm", International Research Journal of Modernization in Engineering Technology and Science, vol. 5, 2023.
View in Google Scholar
[18] A. Mohan, W.X. Leow, and A. Hobor, "Functional Correctness of C Implementations of Dijkstra’s, Kruskal’s, and Prim’s Algorithms", Proc. of Computer Aided Verification CAV 2021, virtual event, 2021.
View in Google Scholar
[19] J. Chen, "The Analysis and Application of Prim Algorithm, Kruskal Algorithm, Boruvka Algorithm", Applied and Computational Engineering, vol. 19, pp. 84-89, 2023.
View in Google Scholar
[20] A. Coyle, B. Campbell, and R. Hunjet, "Minimizing the Network Detection Probability Using Autonomous Vehicles", 2020 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 2020.
View in Google Scholar
[21] N. Li, J.C. Hou, and L. Sha, "Design and Analysis of an MST-based Topology Control Algorithm", IEEE Transactions on Wireless Communications, vol. 4, pp. 1195-1206, 2005.
View in Google Scholar
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Karol Zientarski, Mykyta Muravytskyi, Kamil Chełminiak, Krzysztof Skos, Pawel Kulakowski

This work is licensed under a Creative Commons Attribution 4.0 International License.