<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>November</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>for Reducing the UAV Swarm Radio Visibility</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>V.M. Glushkov Institute of Cybernetics of the NAS of Ukraine</institution>
          ,
          <addr-line>Akademika Hlushkova Ave, 40, Kyiv, 03187</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>2</volume>
      <fpage>0</fpage>
      <lpage>21</lpage>
      <abstract>
        <p>This work presents the developed set of improved data transmission algorithms with adaptive signal power for protection against radio-electronic warfare and reducing the radio visibility of a UAV swarm, the purpose of which is to minimize the power levels of swarm members (UAVs) transmitters, and to optimize data transmission routes within the swarm Relevance of this research is high because of heavy losses, that UAVs facing during the surveillance and strike missions during a full-scale military combat. The requirements to UnACs to ensure the possibility of the developed family of data transmission algorithms usage for protection against radio-electronic warfare and reducing the radio visibility of a UAV swarm are formulated. The data transmission with reduced signal power problem for protection against radio-electronic warfare and reducing the radio visibility of a UAV swarm was formulated as an optimization problem. The improved UAV swarm network initialization algorithm for data transmission and radio visibility reduction is developed. The improved algorithms that will support further operation of an UAV swarm for data transmission and radio visibility reduction during a mission are developed and practically tested. There were analyzed advantages and disadvantages of the improved algorithms compared to its previous version. UAV, unmanned aerial vehicle, unmanned aerial complex, swarm, radio visibility Proceedings</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        During the execution of combat missions using unmanned aerial complexes (UnAC, usually
containing one or a few UAVs, a ground control complex for an operator and any necessary additional
means) on the combat line (and behind it), a whole set of measures aimed at preserving both the
personnel and the UnAC components [
        <xref ref-type="bibr" rid="ref1">1, 2, 3</xref>
        ] must be carried out. They mostly depend on the UnAC
type [
        <xref ref-type="bibr" rid="ref14">4, 5, 6</xref>
        ]. A full consideration of all these measures (including, for example, different locations of
an operator and a transceiver antenna, position masking, etc.) is beyond the scope of this paper, but
partially were analyzed in authors’ previous works [7, 8, 9].
      </p>
      <p>
        This work describes a certain number of measures developed to reduce the probability of losing a
UAV swarm (whole or partially) during a combat mission. These
measures should include
cryptographic protection of information circulating between a UAV and its operator, ensuring privacy
protection [8, 9] – but are not limited to cryptography [
        <xref ref-type="bibr" rid="ref18 ref27 ref3 ref30 ref32 ref40 ref7">10</xref>
        ]. Cryptographic protection aimed against the
detection of an operator's position, the interception of the control over the UAV (access control means),
against the sending of false data to an operator (spoofing), etc. [
        <xref ref-type="bibr" rid="ref1">1, 9</xref>
        ].
      </p>
      <p>Relevance of this research is very high because of heavy losses, that UAVs facing during the
surveillance and strike missions during a full-scale military combat. They are caused by the enemy’s
electronic reconnaissance means, followed by various strikes (means of electronic warfare, means of</p>
      <p>2023 Copyright for this paper by its authors.
CEUR</p>
      <p>ceur-ws.org
physical damage, etc.). According to some sources these losses sometimes may be up to 60-80 percents
per mission. Additionally similar tasks are currently under attention from scientists all over the world
[11, 12, 13, 14]. The main proposed ways for solving this problem are:</p>
      <p> mixed-strategy Stackelberg Equilibrium, which is using finite and discretized power set in addition
to the hierarchical Q-learning based power control algorithm [11]</p>
      <p> scalable specific emitter identification neural network with SNR-aware adaptive precision
computation [12]</p>
      <p> successive convex approximation, based on Dinkelbach method and coordinates decent
techniques, plus usage of the iterative power control algorithm [13]</p>
      <p> algorithm, making each UAV rotate relatively to the position of its neighbouring UAVs, in order
to optimize its antenna radiation direction [14] (applicable only for stable relay positions).</p>
      <p>The main reason, that limits application of the mentioned solutions (and other existing options as
well) is great computational load on UAV’s system (or even computations, made beforehand on the
operator’s side), requiring high-productivity hardware or lots of time to compute (or just a lot of
resources) and therefore – greatly limiting application area of these solutions.</p>
      <p>This work presents the developed set of improved data transmission algorithms with adaptive signal
power for protection against radio-electronic warfare and reducing the radio visibility of a UAV swarm,
the purpose of which is to minimize the power levels of swarm members (UAVs) transmitters, and to
optimize data transmission routes within the swarm. Simulations provided on the basis of the V.M.
Glushkov Institute of Cybernetics of the NAS of Ukraine hardware show that the suggested family of
algorithms outperforms the results of the previously proposed works.</p>
    </sec>
    <sec id="sec-2">
      <title>2. The main issues considered in this work</title>
      <p>The main issues considered in this work are:
1. Formulation of requirements to UnACs to ensure the possibility of the developed family of data
transmission algorithms usage for protection against radio-electronic warfare and reducing the radio
visibility of a UAV swarm.</p>
      <p>2. Formulation of the data transmission with reduced signal power problem for protection against
radio-electronic warfare and reducing the radio visibility of a UAV swarm.</p>
      <p>3. Development of the improved UAV swarm network initialization algorithm for data transmission
and radio visibility reduction.</p>
      <p>4. Development of the improved algorithms that will support further operation of an UAV swarm
for data transmission and radio visibility reduction during a mission.</p>
      <p>5. Analysis of advantages and disadvantages of the improved algorithms compared to its previous
version.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Formulation of requirements to UnACs to ensure the possibility of the developed family of data transmission algorithms usage</title>
      <p>During the work on the reducing the UAV swarm radio visibility, there were formulated the main
requirements for the UAV swarm, which must be fulfilled to ensure the corresponding algorithms
performance. Let’s consider these requirements:</p>
      <sec id="sec-3-1">
        <title>Requirements for wireless signal transmitters and receivers:</title>
        <p>Since UAVs already have receivers and transmitters installed to establish communication with the
operator (both to transmit control signals to the UAV and to transmit back service information (GPS
coordinates, telemetry, battery charge, etc.) and photo/video signal), then by default they meet most of
the requirements for ensuring the operation of the proposed family of algorithms. The communication
system must have the ability to send high-frequency data packets (with a certain fixed interval) and at
the same time receive data over the radio channel (operate in duplex mode).</p>
        <p>The main requirement that must be met (and is met on most modern UAVs):
 Ability to programmatically control the signal power level transmitted from the UAV.</p>
        <p>Without fulfilling this requirement, it is impossible to ensure the operation of the proposed
algorithms. To ensure communication, it is recommended to use the frequency range of 2100 - 2400
MHz, OFDM</p>
        <p>modulation. It is desirable to use wide-band noise-like signals with support of the
possibility to switch the frequency in case of aiming interference (signal jamming).</p>
        <p>It is recommended to use the 860-930 MHz frequency range for telemetry transmission (additional
channel). An additional requirement (optional) is the possibility of directional signal transmission
(instead of the usual omnidirectional). It will make it possible to communicate with other elements of
the swarm with a directional signal, which will allow to reduce the radio visibility of the swarm as a
whole (and its individual elements), as well as to make it more difficult to jam the signals transmitted
between the nodes of the swarm by electronic warfare means.</p>
        <p>Of course, UAV should provide enough lifting power, which is different depending on the UAV
type [5]. For wing-type UAVs this lift is given by the equation
where CL is a coefficient that determines the ability of the wing of area S to deflect the airstream, ρ is
the reciprocal of the air density kg/m2, and the square of the reciprocal of the airspeed V m/s. From this
equation we may get the absolute minimum flight speed for the wing-type UAVs (allowing margin in
speed or in lift coefficient), which will be equal to</p>
        <p>= 0.5  2   ,
 
= (</p>
        <p>.)
,
expression
be met:
where v is the flow (air) speed; l is the characteristic length (e.g. wing chord) and υ is the kinematic
viscosity of the fluid and has a value of 1.47 × 10−5 m2/s for air under standard conditions.</p>
        <p>To ensure interaction of various types of UAVs as swarm elements, the following requirements must
where CLo (operating CL) has been chosen to have a value of about 0.2 less than the CL.max.</p>
        <p>Usually, the standard wing section offers a CL.max of about 1.2 for real-life UAVs (wing-typed)
without flaps. Therefore, a value of 1.0 has been used as a basis value.
(1)
(2)
(3)
(4)
(5)</p>
        <p>Program memory (hard disk, flash memory, etc.): 256 kB or higher.</p>
        <p>RAM/SRAM: 8 kB or higher.</p>
        <p>EEPROM non-volatile memory: 4 kB or higher.</p>
        <p>Clock frequency of the processor: 16 MHz or higher.</p>
        <p>Number of processor cores: from 1.</p>
        <p>Other factors also should be considered, especially UAVs aerodynamics NR is given by the
 
=
Equation (2) can be rewritten as:


= (2 /   )0.5 
[(
2
 0
)
0.5 
( )

0.5
] ,
where w is the aircraft wing loading in N/m2, ρ0 is the air density at sea-level standard conditions and
σ is the relative air density at altitude.</p>
        <p>For the rotary-wing UAVs different formulas should be used to found out their lifting power and
corresponding lift-induced drag. The UAV’s velocity induced by its rotor in the hover is given by:
  =   ( /2 )0.5,
where kn is a correction element for the efficiency of the UAVs lift distribution and the strength of the
tip vortices generated by the rotor blades. Usually, they vary between 1.05 and 1.2, so we will use 1.1</p>
        <p>The induced power for this UAVs type is then given by Pi = kn·Tvi, where T is the thrust produced
value.
by the UAVs rotor [5].</p>
        <p>Also, in the process of laboratory experiments, the requirements for the hardware that will
implement the formation of data packets according to the proposed algorithms were formulated:</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Formulation of the data transmission with reduced signal power problem for reducing the radio visibility of a UAVs’ swarm</title>
      <p>Optimizing UAV routes during the mission is the other way of reducing the probability of their loss
– the less time the UAV spends in a dangerous area, the better chances it has to avoid air defense and
EW means – and the more likely the mission will be completed successfully and/or the UAV will return
to the controlled area intact [15]. In addition, due to the limited resource of UAV movement (maximum
flight range), the mission simply cannot be completed in certain conditions without optimizing routes.</p>
      <p>Also, it is possible to use a steganographic approach to the data transmission from/to UAVs – which
means hiding the very fact of transmitting some data [16, 17]. For this, in particular, noise-like
broadband signals can be used, but not only them. The UAVs contrast, size and shape must be
considered. For example, contrast C is defined as the ratio of the difference in luminance between an
object and its background to the luminance of its background:

= (
−  1) / 1 = 
/ 1,
(6)
where B is the luminance of the object and B1 is the luminance of the background in units of cd/m2 [5].</p>
      <p>Among the known factors that can affect the wireless network radio visibility reduction, we should
highlight the Doppler frequency shift, the height of obstacles to signal propagation (vegetation,
buildings, mountains etc.), and the curvature of the earth's surface [18]. But their practical application
is significantly limited, because usually the operator cannot choose the terrain on which the mission is
to be performed.</p>
      <p>One of the ways to increase the UAV movement resource is to save battery charge. This can be
achieved, in particular, by reducing the power of transmitted signals (for example, using other UAVs
as relay nodes). But at the same time, high-reliability communication should be ensured. This is
especially relevant in the case of UAV groups decentralized swarm application, because this mode
requires regular interaction between swarm elements [19, 20].</p>
      <p>The most common methods of UAV formation management are: "leader–follower", virtual leaders,
path following vector fields, fully decentralized approaches based on consensus, approaches based on
fuzzy logic [21, 22].</p>
      <p>But most known methods of radio transmitter power control are neither automated nor adaptive [23,
24]. Often, they involve manual adjustments to the mutual location of receivers and transmitters and,
accordingly, are not applicable to UAV swarms, where the situation and relative location of network
nodes can change rapidly and unpredictably.</p>
      <p>Thus, it is recommended to develop and use original algorithms for reducing special networks radio
visibility, which will consider the above-mentioned specifics.</p>
      <p>Formulation of the problem. This section describes the development of such algorithms which,
while minimizing the total power level of UAV swarm elements transmitters, would ensure a reliable
level of communication between any of the swarm elements.</p>
      <p>The first option considered is the use of a mesh network, which would provide direct communication
of any swarm element with all other swarm elements at the minimum power required for this, with or
without remote control of power from the control center. This option is considered inapplicable for
military applications because we will have centralized control of the network. Also, direct connection
to all other network nodes is not a necessary requirement for our task.</p>
      <p>Encryption must be always used to ensure data security of the dataset X during transmission and to
maximize their entropy (measure for randomness)
 ( ): =
− ∑  (
=  ) 
2
 (</p>
      <p>
        =  ),

where P(X = x) is the probability that the variable X takes on the value x. The bigger entropy is, the
harder it is for cryptanalytics to break the cryptographic key and to decipher the data [
        <xref ref-type="bibr" rid="ref18 ref27 ref3 ref30 ref32 ref40 ref7">10</xref>
        ].
      </p>
      <p>No data (including service packets) shall be transmitted over the air in an open, unencrypted form.
In addition, the power of signal transmission for each element of the swarm
must change
dynamically when their mutual location changes, adapting to their movement. So, the swarm elements
must independently determine the distance to each other (or the signal quality level). And line-of-sight
should be uninterrupted:

= √(2 × (
) ×  1
) +  12 + √2 × (
) ×  2) +  22
where H1 and H2 represent the heights of the sender and receiver radio antennas respectively.</p>
      <p>Thus, the task is characterized by the following parameters:
Incoming data:
(7)
(8)




</p>
      <sec id="sec-4-1">
        <title>Parameters:</title>
      </sec>
      <sec id="sec-4-2">
        <title>Output data:</title>
      </sec>
      <sec id="sec-4-3">
        <title>Criterion:</title>
        <p>number of UAVs – swarm elements
minimum possible signal power
maximum permissible signal power
routing table of each node with signal strength for each direction
minimization of the total power of all network nodes while ensuring reliable communication
The result of consideration of the above problem formulation was the approach "Your connection is
your business", according to which each UAV builds its own routing table and manages its own power,
being responsible for establishing a connection with at least some other network node. The operation
of the algorithms developed to implement this approach as an improvement of the algorithms presented
in [8, 9, 15, 25] is described below.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Development of the improved UAV swarm network initialization algorithm for data transmission and radio visibility reduction</title>
      <p>Let's consider the developed data transmission algorithms for protection against radio-electronic
warfare and reducing the radio visibility of a UAVs swarm.</p>
      <p>Algorithm I. Initialization stage. At this stage, the initial construction of the routing table and the
setting of the optimal power of the transmitters for each of the UAVs Ui, i=1…N take place. Procedure:
Phase 1 of initialization. Incomplete routing table.</p>
      <p>1. Before starting the task, each UAV Ui among group U that will perform the assigned task and
participate in the mission receives a list of these UAVs. So, at the beginning of the mission, each UAV
i knows how many UAVs N will participate in the mission, and what their identifiers are.
2. The minimum possible transmitter power of each UAV i is set.</p>
      <p>3. Each UAV i sends a broadcast service request RAi, to which all UAVs in its group, that received
this request, must respond. As a result:</p>
      <p>4. If no UAV from its group N responded to the RAi request, the power is increased, and the step 3
is repeated once more.</p>
      <p>5. If at least one UAV responded to the request, its identifier is noted in the routing table as directly
reachable, and the signal strength required to communicate with it is – also saved.</p>
      <p>This completes initialization phase 1. The example at the Figure 1 shows an example of table
construction during phase 1.</p>
      <p>UAV 1 at the first set minimum power value and was unable to establish contact with any of the
other swarm elements. According to step 4, it increased the power level and successfully established
communication with UAVs 5 and 7.</p>
      <p>Phase 2 of initialization. Routing tables exchange.</p>
      <p>6. If during phase 1 of initialization, UAV i has received responses from all other UAVs of group
U, and has fully filled routing table, then phases 2 and 3 of initialization are skipped.</p>
      <p>7. Each UAV i that does not have a fully populated routing table sends an RBi request to all UAVs
marked in its routing table as directly reachable This is a request to obtain their routing tables.</p>
      <p>8. Each UAV j that received this RBi request sends back its routing table TMj. All, excluding only
the line for the UAV i itself.</p>
      <p>9. After receiving the response from UAV j, UAV i compares its available UAVs for
communication with its routing table. If UAV k is absent in its table, but present in the received table,
then UAV i maintains that UAV k is not directly reachable, and communication with UAV k must be
established through UAV j. Also stored is the power level used by UAV j to communicate with UAV
k and whether it is directly or indirectly reachable. Otherwise, this route is saved as an alternative.</p>
      <p>10.If multiple UAVs have replied to UAV i that they can communicate with UAV k, then UAV i
stores all their IDs and power values in its routing table.</p>
      <p>11.Also, through the relay UAVs UAV i receives the routing tables of those UAVs that are indirectly
reachable – and, if necessary, repeats step 8 for them.</p>
      <p>Figure 2 illustrates the second phase of initialization. During the first phase, UAV 1 established
communication with UAVs 5 and 7. In the second phase, it exchanges routing tables with them. As a
result, it can communicate via relays with UAVs 2, 4, and 6. An example of a routing table after step 2
is shown in Table 1.</p>
      <p>As you can see, for some UAVs, we now have more than one route option leading to it.
Phase 3 of initialization. Complete routing table.</p>
      <p>1. If UAV i has built a fully populated routing table during initialization phase 2, then initialization
phase 3 is skipped.</p>
      <p>2. If, during phase 2 of initialization, UAV i received responses from all directly reachable UAVs
of group U, but some UAVs remained unreachable (both directly and through relay), this means that a
subgroup of UAVs Ft, t=1... M was formed (M ≤ N-1). That is, the members of this subgroup have
established communication with each other, but at their current power levels cannot communicate with
any other member of group U. Then UAV i starts successively increasing the power, step by step and
sending address requests similar to those in step 3. The only difference is that they are not broadcast,
but intended only for UAVs that are not in his routing table. Other UAVs of this subgroup will do the
same.</p>
      <p>3. If at some power value UAV i received a response from UAV f that is not in its routing table, it
stores it in the table as directly reachable along with the current power value.</p>
      <p>4. Next, UAV i broadcasts to all other directly reachable UAVs in its routing table that have
established contact with UAV f to add this information to their routing tables.</p>
      <p>5. UAV i then exchanges its routing tables with UAV f, adding to its table the nodes with which the
other had direct or indirect communication. Just as on phase 2 of initialization.</p>
      <p>6. If, after each UAV of group U has reached the maximum power level and exchanged all received
results with other UAVs of group U, but still has empty lines in the table (i.e., no direct or indirect UAV
of the group has been able to communicate with it/them) then this/these UAV is/are considered lost and
communication attempts with it/them are stopped.</p>
      <p>Figure 3 illustrates the situation after the completion of the initialization phase three.</p>
      <p>Increasing the power step by step, UAV 1 managed to establish communication with UAV 3 (which
made a corresponding entry in the routing table presented in Table 2). However, node 8 failed to
establish contact with any node due to damage to the transmitter during take-off – therefore it is marked
as unreachable.</p>
      <p>Transmission address (for unreachable, otherwise – 0)</p>
      <p>/ power (from a minimum of 1 to a maximum of 10)</p>
      <p>This completes the initialization stage. Each UAV i has now ready routing table that includes all
direct-range UAVs and all options for establishing communication with non-direct-range UAVs (with
preserved power level). At the next stage, the optimal route should be selected from the entire set of
available routes. Thus, we may solve this problem as the combinatorial optimization problem, which is
the main direction of further research for now. After the optimization UAV i has a constructed table
with optimized routes to all reachable members of group U.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Development of the improved algorithms that will support further operation of an UAV swarm for data transmission and radio visibility reduction during a mission</title>
      <p>Changes in the UAVs relative position are possible while moving along the route while performing
the assigned task. The "Pulse" algorithm is used to track them.</p>
      <p>"Pulse" algorithm. According to the Pulse algorithm, each UAV pings directly reachable UAVs in
its group on a regular basis (during the experiments conducted, once per second value was used). The
main principle is that the distance between UAVs does not change dramatically quickly. The algorithm
can work in two modes – Reliability and Safety. In Reliability mode, the emphasis is on maximum
communication support. If, when communication is lost with a swarm member, increasing the power
by 1 step does not lead to the restoration of communication, the UAV is considered lost. On the other
hand, in Safety mode – power increase step is not performed at all, it is assumed that the UAV with
which contact is lost will itself try to establish contact with at least some member of the UAV swarm.
Algorithm:</p>
      <p>1. UAV i sending request to all directly reachable UAVs from its routing table at a power level 1
step lower than stored in the routing table. If a response is received from any of these UAVs k, UAV i
stores the updated, lower power level in its routing table for UAV k.</p>
      <p>2. UAV i sends a request to all UAVs except direct-range UAVs at a power level 1 step lower than
the maximum among those it is currently using for direct communication. If some UAV k was
previously marked as not directly reachable, but responded to the request - now it is marked as directly
reachable, and the previous communication route with it is saved as an alternative.</p>
      <p>3. UAV i sends a request to all directly reachable UAVs in its routing table that did not respond in
step 1 at the power stored in the routing table. If one of these UAVs j did not respond, the
communication route with it must be rebuilt according to step 4 and forward. Otherwise, next steps are
skipped.</p>
      <p>4. If the routing table of UAV i has alternative route options to communicate with UAV j, then
UAV i sends them a service packet to attempt to establish communication with UAV j. After that, the
transmission routes can be optimized considering the updated data. Data about the updated route is
transmitted to other UAVs in communication with UAV i.</p>
      <p>If none of the saved routes allows to establish communication with UAV j, then the further step
depends on the selected algorithm mode.</p>
      <p>5. In the Security mode, no further attempts to communicate with the UAV j are made. According
to the principle "Your connection is your business", it is considered that UAV j itself should take care
of establishing a direct connection with at least one other node of the UAV swarm. If he does this, UAV
i will receive a notification about the updated route. If not, UAV j will be considered lost.</p>
      <p>6. In Reliability mode, UAV i increases the transmission power level to communicate with UAV j
by one step and tries to establish communication again. It is believed that since the “Pulse” algorithm
works regularly, UAV j could not move away fast enough to lose contact even at the power increased
by one step. If, even in this case, no response is received from UAV j, further attempts are terminated
according to the approach described in point 5.</p>
      <p>7. UAV i sends a request to all UAVs except direct range UAVs at the maximum power level among
those it is currently using to establish direct communication with j. If some UAV k was previously
marked as not directly reachable but responded to the request – now it is marked as directly reachable,
and the previous communication route with it is saved as an alternative.</p>
      <p>External adjustment. The external adjustment algorithm is applied if a request is received from a
UAV currently marked as unreachable or directly unreachable in the routing table.</p>
      <p>1. If the UAV swarm element i receives a request from UAV k, which is marked as not directly
reachable or unreachable in the routing table of UAV i, corresponding changes are made to the routing
table of UAV i – UAV k is now marked as directly reachable.</p>
      <p>2. UAV i sends updated information to all UAVs in direct range (except UAV k) so that they can
adjust their own routing tables to account the position changes.</p>
      <p>This is applied when any of the network nodes have joined the network (or come within direct link
distance) to account for this change.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Analysis of advantages and disadvantages of the improved algorithms compared to its previous version</title>
      <p>Algorithms testing for checking their pros and cons was provided in laboratory conditions on the
basis of two pairs of Ettus B200 and HackRF One software-controlled programmable radio stations,
shown on Figure 4. They are applicable because of their support of the signal power control.</p>
      <p>Applied tests has shown that algorithms are practically applicable. Further testing, using bigger
amount of programmable radio stations (preferably on the basis of real UAVs), is another direction of
further research, but this requires purchasing additional hardware.</p>
      <p>Comparing improved algorithms to their previous versions: main advantage of the improved
algorithms compared to the previous version is presence of the phase 2 – routing tables exchange. It
saves time during initialization, as reduces the number of requests to build routing tables. Additionally,
in many situations it gives alternative routes, which allows to optimize data transmission routes between
UAV swarm elements. A number of other changes have also been made that increase the performance
and/or reliability of the algorithm, or reduce the radio visibility of the UAVs swarm, in particular, the
Reliability and Safety modes have been added.</p>
      <p>Let's consider the results of the analysis of the advantages and disadvantages of the developed
improved algorithms for reducing the UAV swarm radio visibility. Let's start with the advantages:
 Due to power management and minimization of its overall level, the probability of detection of
the UAV swarm by the enemy during the mission is reduced – and therefore, the probability of the
destruction for every UAV is reduced. Thanks to this, the probability of successful mission completion
increases.</p>
      <p> By minimizing the power of the UAV transmitters, the battery charge is saved – and the flight
range of the UAV in swarm increases accordingly.</p>
      <p> The algorithms are resistant to changes in the mutual position and composition of UAVs within
the swarm during the execution of the assigned task.</p>
      <p>Disadvantages of the developed improved algorithms for reducing the radio visibility of the UAVs
swarm:</p>
      <p> It is necessary to form a UAV swarm in advance to perform the assigned task and upload their
identifiers to each UAV
 A rather complex scheme of routing tables distribution and update
 Additional exchanges of service data packets for power management slightly (although
experiments shown, that not very significantly) reduce the bandwidth of data transmission channels</p>
      <p>None of the identified shortcomings leads to a decrease in the value of the obtained results.</p>
    </sec>
    <sec id="sec-8">
      <title>8. Conclusions</title>
      <p>The result of the work carried out in this publication is an improved family of algorithms for reducing
the UAVs transmitters power during data transmission between nodes of a UAV swarm for military
applications (although civil application for saving swarm batteries is also possible). Its use will ensure
the necessary communication quality, minimizing radio visibility, and therefore, reduces the probability
of UAVs detection and destruction, while providing an opportunity to save the battery charge, thereby
increasing the UAVs operational time.</p>
      <p>The main direction of further research is solving the combinatorial optimization problem of building
optimal route for data transmission from the UAV i to any other UAV from its swarm, for which it has
more than one route in its routing table. Additional directions for further research:</p>
      <p> Further testing of the developed algorithms, using bigger amount of programmable radio stations
(preferably on the basis of real UAVs), is another direction of further research, but this requires
purchasing additional hardware.</p>
      <p> Determining (with real UAVs) the optimal value of the routing table reconstruction period.
 Determining the level of energy saving when applying the algorithm.</p>
    </sec>
    <sec id="sec-9">
      <title>9. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          - [1]
          <string-name>
            <given-names>R. E.</given-names>
            <surname>Weibel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. J.</given-names>
            <surname>Hansman</surname>
          </string-name>
          ,
          <article-title>Safety considerations for operation of unmanned aerial vehicles in</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Aeronautics</surname>
          </string-name>
          &amp; Astronautics Massachusetts Institute of Technology Cambridge, USA,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <source>doi:10.2514/6</source>
          .2004-
          <volume>6421</volume>
          . [2]
          <string-name>
            <surname>Otto</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Agatz</surname>
          </string-name>
          , J. Campbell,
          <string-name>
            <given-names>B.</given-names>
            <surname>Golden</surname>
          </string-name>
          , and
          <string-name>
            <surname>E. Pesch.</surname>
          </string-name>
          “
          <article-title>Optimization approaches for civil</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>applications of unmanned aerial vehicles (UAVs) or aerial drones: A survey</article-title>
          .
          <source>” Networks</source>
          ,
          <volume>72</volume>
          (
          <issue>4</issue>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          (
          <year>2018</year>
          ):
          <fpage>411</fpage>
          -
          <lpage>458</lpage>
          . [3]
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Duan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Liu</surname>
          </string-name>
          . “
          <article-title>Chaotic artificial bee colony approach to uninhabited combat air vehicle</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>(UCAV) path planning” Aerospace Science and Technology 14</source>
          ,
          <issue>8</issue>
          (
          <year>2010</year>
          ):
          <fpage>535</fpage>
          -
          <lpage>541</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>doi:10</source>
          .1016/j.ast.
          <year>2010</year>
          .
          <volume>04</volume>
          .008. [4]
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Ponda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. B.</given-names>
            <surname>Johnson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Geramifard</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J. P.</given-names>
            <surname>How</surname>
          </string-name>
          ,
          <article-title>Cooperative mission planning for multi-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>UAV teams</article-title>
          , in: Handbook of Unmanned Aerial Vehicles, Dordrecht, Springer,
          <year>2015</year>
          , pp.
          <fpage>1447</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          1490. doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -90-481-9707-1_
          <fpage>16</fpage>
          . [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Austin</surname>
          </string-name>
          ,
          <source>Unmanned Aircraft Systems. UAVs Design</source>
          , Development And Deployment. - West
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Sussex</surname>
          </string-name>
          : John Wiley and Sons,
          <year>2010</year>
          . - 365 p. doi:
          <volume>10</volume>
          .1002/9780470664797. [6]
          <string-name>
            <given-names>K.</given-names>
            <surname>Yereke</surname>
          </string-name>
          ,
          <article-title>UAV classification and their control method types</article-title>
          ,
          <source>Editorial Board</source>
          ,
          <year>2022</year>
          , p.
          <fpage>769</fpage>
          . [7]
          <string-name>
            <surname>Lagkas</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Argyriou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bibi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Sarigiannidis</surname>
          </string-name>
          . “
          <article-title>UAV IoT framework views</article-title>
          and challenges:
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <article-title>Towards protecting drones as “Things”</article-title>
          .
          <source>” Sensors</source>
          ,
          <volume>18</volume>
          (
          <issue>11</issue>
          ) (
          <year>2018</year>
          ):
          <fpage>4015</fpage>
          . doi:
          <volume>10</volume>
          .3390/s18114015. [8]
          <string-name>
            <surname>M. I. Ogurtsov</surname>
          </string-name>
          ,
          <article-title>Development of a cryptographic algorithm for the protection of UAV swarms</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>problems of applied mathematics and computer science APAMCS-2021"</source>
          , Ivan Franko National
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          University of Lviv, Lviv,
          <year>2021</year>
          pp.
          <fpage>133</fpage>
          -
          <lpage>136</lpage>
          . [9]
          <string-name>
            <surname>Ogurtsov</surname>
          </string-name>
          , Maksym. “
          <article-title>High-Reliability Data Transfer Algorithm with Reduced Transmitters'</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <issue>Volume 6</issue>
          ,
          <string-name>
            <surname>Number</surname>
            <given-names>1</given-names>
          </string-name>
          ,
          <year>2019</year>
          :
          <fpage>79</fpage>
          -
          <lpage>90</lpage>
          . (in Ukrainian). [10]
          <string-name>
            <given-names>N.</given-names>
            <surname>Ferguson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Schneier</surname>
          </string-name>
          , T. Kohno,
          <article-title>Cryptography engineering: design principles and practical</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>applications</surname>
          </string-name>
          , John Wiley &amp; Sons,
          <year>2011</year>
          . [11]
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Sha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Tu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L.</given-names>
            <surname>Yang</surname>
          </string-name>
          . “
          <article-title>Hierarchical Q-learning based UAV secure</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <source>Mobile Computing</source>
          <year>2020</year>
          (
          <year>2020</year>
          ):
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          . doi:
          <volume>10</volume>
          .1155/
          <year>2020</year>
          /8825120. [12]
          <string-name>
            <surname>Gan</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Kang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Qu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Yang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhou</surname>
          </string-name>
          . ”
          <string-name>
            <surname>SAS-SEINet: A SNR-Aware</surname>
          </string-name>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>High-Accuracy</surname>
          </string-name>
          and
          <article-title>Power-Efficient UAV Surveillance”</article-title>
          .
          <source>Sensors</source>
          ,
          <volume>22</volume>
          (
          <issue>17</issue>
          ), (
          <year>2022</year>
          ):
          <fpage>6532</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <source>doi:10</source>
          .3390/s22176532. [13]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Altaf</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Khan</surname>
          </string-name>
          . “
          <article-title>Power efficient UAV placement and resource</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <article-title>allocation for adaptive video streaming in wireless networks”</article-title>
          .
          <source>Ad Hoc Networks</source>
          ,
          <volume>150</volume>
          (
          <year>2023</year>
          ):
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          103260. doi:
          <volume>10</volume>
          .1016/j.adhoc.
          <year>2023</year>
          .
          <volume>103260</volume>
          . [14]
          <string-name>
            <surname>Matsuda</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kaneko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Hiraguri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Nishimori</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kimura</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. Nakao.</surname>
          </string-name>
          “Adaptive direction
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <article-title>control for UAV full-duplex relay networks using multiple directional antennas”</article-title>
          .
          <source>IEEE Access, 8</source>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          (
          <year>2020</year>
          ):
          <fpage>85083</fpage>
          -
          <lpage>85093</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2020</year>
          .
          <volume>2992293</volume>
          . [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Ogurtsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Korolyov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Khodzinskyi</surname>
          </string-name>
          ,
          <source>Improving the Productivity of UAV Operations Based</source>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <source>on Granular Computing and Fuzzy Sets</source>
          , in: 2021 IEEE 6th International Conference on Actual
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <article-title>Problems of Unmanned Aerial Vehicles Development</article-title>
          (APUAVD)
          <fpage>19</fpage>
          -
          <lpage>21</lpage>
          Oct.
          <year>2021</year>
          ,
          <year>2021</year>
          , pp.
          <fpage>33</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          36. doi:
          <volume>10</volume>
          .1109/APUAVD53804.
          <year>2021</year>
          .
          <volume>9615419</volume>
          . [16]
          <string-name>
            <surname>Cheddad</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Condell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Curran</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Mc</surname>
          </string-name>
          <string-name>
            <surname>Kevitt. “</surname>
          </string-name>
          <article-title>Digital image steganography: Survey and</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <article-title>analysis of current methods”</article-title>
          .
          <source>Signal processing</source>
          ,
          <volume>90</volume>
          (
          <issue>3</issue>
          ) (
          <year>2010</year>
          ): doi:
          <fpage>727</fpage>
          -
          <lpage>752</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          10.1016/j.sigpro.
          <year>2009</year>
          .
          <volume>08</volume>
          .010. [17]
          <string-name>
            <given-names>O.</given-names>
            <surname>Lavrynenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Taranenko</surname>
          </string-name>
          , I. Machalin,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gabrousenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Terentyeva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bakhtiiarov</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <article-title>Protected voice control system of UAV</article-title>
          , in: 2019 IEEE 5th International Conference Actual
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <article-title>Problems of Unmanned Aerial Vehicles Developments (APUAVD)</article-title>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>295</fpage>
          -
          <lpage>298</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <source>doi:10</source>
          .1007/978-3-
          <fpage>319</fpage>
          -78816-
          <issue>6</issue>
          _
          <fpage>9</fpage>
          . [18]
          <string-name>
            <surname>Maladyka</surname>
          </string-name>
          , Ihor, Stas Serhiy, Mykhailo Pustovit, and Oleksandr Dzhulay. “Application of UAV
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <source>Science and Technology</source>
          <volume>114</volume>
          (
          <year>2022</year>
          ):
          <fpage>27</fpage>
          -
          <lpage>39</lpage>
          . doi:
          <volume>10</volume>
          .4028/p-
          <fpage>7tt2j8</fpage>
          . [19] H. Hamann, Swarm robotics:
          <source>a formal approach</source>
          , Springer International Publishing,
          <year>2018</year>
          . 210 p.
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          <source>doi:10</source>
          .1007/978-3-
          <fpage>319</fpage>
          -74528-2. [20]
          <string-name>
            <given-names>N.</given-names>
            <surname>Correll</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schwager</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Otte</surname>
          </string-name>
          , Distributed Autonomous Robotic Systems: The 14th
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <string-name>
            <surname>International</surname>
            <given-names>Symposium</given-names>
          </string-name>
          , Springer Nature Switzerland AG,
          <year>2019</year>
          . 528 p. doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          05816-
          <fpage>6</fpage>
          . [21]
          <string-name>
            <surname>Zhou</surname>
            , Yongkun,
            <given-names>Bin</given-names>
          </string-name>
          <string-name>
            <surname>Rao</surname>
            , and
            <given-names>Wei</given-names>
          </string-name>
          <string-name>
            <surname>Wang</surname>
          </string-name>
          .
          <article-title>"UAV swarm intelligence: Recent advances</article-title>
          and future
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          <source>trends." Ieee Access</source>
          <volume>8</volume>
          (
          <year>2020</year>
          ):
          <fpage>183856</fpage>
          -
          <lpage>183878</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2020</year>
          .
          <volume>3028865</volume>
          . [22]
          <string-name>
            <surname>Campion</surname>
            , Mitch,
            <given-names>Prakash</given-names>
          </string-name>
          <string-name>
            <surname>Ranganathan</surname>
            , and
            <given-names>Saleh</given-names>
          </string-name>
          <string-name>
            <surname>Faruque</surname>
          </string-name>
          .
          <article-title>"A review and future directions of</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          <article-title>UAV swarm communication architectures." 2018 IEEE international conference on</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          <article-title>electro/information technology (EIT)</article-title>
          .
          <source>IEEE</source>
          (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1109/EIT.
          <year>2018</year>
          .
          <volume>8500274</volume>
          . [23]
          <string-name>
            <surname>Sahu</surname>
          </string-name>
          , Biranchinath, and Gabriel A.
          <string-name>
            <surname>Rincón-Mora</surname>
          </string-name>
          .
          <article-title>"Adaptive Power Management of Linear RF</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          <source>IEEE Asia Pacific Microwave Conference</source>
          . (
          <year>2004</year>
          ). doi:
          <volume>10</volume>
          .1109/MWSYM.
          <year>2001</year>
          .
          <volume>967189</volume>
          . [24]
          <string-name>
            <surname>Chen</surname>
          </string-name>
          , Xi, Ming Ma, and Anfeng Liu.
          <article-title>"Dynamic power management and adaptive packet size</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          <article-title>selection for IoT in e-Healthcare."</article-title>
          <source>Computers &amp; Electrical Engineering</source>
          <volume>65</volume>
          (
          <year>2018</year>
          ):
          <fpage>357</fpage>
          -
          <lpage>375</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          <source>doi:10</source>
          .1016/j.compeleceng.
          <year>2017</year>
          .
          <volume>06</volume>
          .010. [25]
          <string-name>
            <given-names>Maksym</given-names>
            <surname>Ogurtsov</surname>
          </string-name>
          . “
          <article-title>Review of Neural Networks Application in UAV Routing Problems</article-title>
          .”
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          <source>International Scientific Symposium «Intelligent Solutions» IntSol-2021, September 28-30</source>
          <year>2021</year>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          <string-name>
            <surname>Kyiv-Uzhhorod</surname>
          </string-name>
          (
          <year>2021</year>
          ):
          <fpage>45</fpage>
          -
          <lpage>54</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>