{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:37:11Z","timestamp":1760060231201,"version":"build-2065373602"},"reference-count":30,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T00:00:00Z","timestamp":1754611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computation"],"abstract":"<jats:p>This work formulates and solves the actual problem of studying the logistics of unmanned aerial vehicle (UAV) operations in facility security planning. The study is related to security tasks, including perimeter control, infrastructure condition monitoring, prevention of unauthorized access, and analysis of potential threats. Thus, the topic of the proposed publication is relevant as it examines the sequence of logistical actions in the large-scale application of a swarm of drones for facility protection. The purpose of the research is to create a set of mathematical and simulation models that can be used to analyze the capabilities of a drone swarm when organizing security measures. The article analyzes modern problems of using a drone swarm: formation of the swarm, assessment of its potential capabilities, organization of patrols, development of monitoring scenarios, planning of drone routes and assessment of the effectiveness of the security system. Special attention is paid to the possibilities of wave patrols to provide continuous surveillance of the object. In order to form a drone swarm and possibly divide it into groups sent to different surveillance zones, the necessary UAV capacity to effectively perform security tasks is assessed. Possible security scenarios using drone waves are developed as follows: single patrolling with limited resources; two-wave patrolling; and multi-stage patrolling for complete coverage of the protected area with the required number of UAVs. To select priority monitoring areas, the functional potential of drones and current risks are taken into account. An optimization model of rational distribution of drones into groups to ensure effective control of the protected area is created. Possible variants of drone group formation are analyzed as follows: allocation of one priority surveillance zone, formation of a set of key zones, or even distribution of swarm resources along the entire perimeter. Possible scenarios for dividing the drone swarm in flight are developed as follows: dividing the swarm into groups at the launch stage, dividing the swarm at a given navigation point on the route, and repeatedly dividing the swarm at different patrol points. An original algorithm for the formation of drone flight routes for object surveillance based on the simulation modeling of the movement of virtual objects simulating drones has been developed. An agent-based model on the AnyLogic platform was created to study the logistics of security operations. The scientific novelty of the study is related to the actual task of forming possible strategies for using a swarm of drones to provide integrated security of objects, which contributes to improving the efficiency of security and monitoring systems. The results of the study can be used by specialists in security, logistics, infrastructure monitoring and other areas related to the use of drone swarms for effective control and protection of facilities.<\/jats:p>","DOI":"10.3390\/computation13080193","type":"journal-article","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T11:41:53Z","timestamp":1754653313000},"page":"193","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Modeling Strategies for Conducting Wave Surveillance Using a Swarm of Security Drones"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7883-1144","authenticated-orcid":false,"given":"Oleg","family":"Fedorovich","sequence":"first","affiliation":[{"name":"Computer Sciences and Information Technologies Department, National Aerospace University \u201cKharkiv Aviation Institute\u201d, 61070 Kharkiv, Ukraine"}]},{"given":"Mikhail","family":"Lukhanin","sequence":"additional","affiliation":[{"name":"Central Research Institute of Weapons and Military Equipment, 03049 Kyiv, Ukraine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4919-0194","authenticated-orcid":false,"given":"Dmytro","family":"Krytskyi","sequence":"additional","affiliation":[{"name":"Computer Sciences and Information Technologies Department, National Aerospace University \u201cKharkiv Aviation Institute\u201d, 61070 Kharkiv, Ukraine"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4680-4082","authenticated-orcid":false,"given":"Oleksandr","family":"Prokhorov","sequence":"additional","affiliation":[{"name":"Computer Sciences and Information Technologies Department, National Aerospace University \u201cKharkiv Aviation Institute\u201d, 61070 Kharkiv, Ukraine"}]}],"member":"1968","published-online":{"date-parts":[[2025,8,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"012044","DOI":"10.1088\/1742-6596\/1738\/1\/012044","article-title":"Drone Presence Detection by the Drone\u2019s RF Communication","volume":"1738","author":"Lv","year":"2021","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"49696","DOI":"10.1109\/ACCESS.2022.3172787","article-title":"RF-UAVNet: High-Performance Convolutional Network for RF-based Drone Surveillance Systems","volume":"10","author":"Pham","year":"2022","journal-title":"IEEE Access"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Soto, M., Nava, P., and Alvarado, L. (2017). Drone Formation Control System Real-Time Path Planning. Collection of Technical Papers\u2014Proceedings of the 2007 AIAA InfoTech at Aerospace Conference, Rohnert Park, CA, USA, 7\u201310 May 2007, American Institute of Aeronautics and Astronautics.","DOI":"10.2514\/6.2007-2770"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Guo, J., Wang, L., and Wang, X. (2022). A Group Maintenance Method of Drone Swarm Considering System Mission Reliability. Drones, 6.","DOI":"10.3390\/drones6100269"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"102848","DOI":"10.1016\/j.futures.2021.102848","article-title":"The future of unmanned combat aerial vehicles: An analysis using the Three Horizons framework","volume":"134","author":"Jordan","year":"2021","journal-title":"Futures"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Morge-Rollet, L., Le Jeune, D., Le Roy, F., Canaff, C., and Gautier, R. (2022). Drone Detection and Classification Using Physical-Layer Protocol Statistical Fingerprint. Sensors, 22.","DOI":"10.3390\/s22176701"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Chao, Y., Augenstein, P., Roennau, A., Dillmann, R., and Xiong, Z. (2023). Brain inspired path planning algorithms for drones. Front. Neurorobot., 17.","DOI":"10.3389\/fnbot.2023.1111861"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Yu, R., Liu, Y., Meng, Y., Guo, Y., Xiong, Z., and Jiang, P. (2024). Optimal Configuration of Heterogeneous Swarm for Cooperative Detection with Minimum DOP Based on Nested Cones. Drones, 8.","DOI":"10.3390\/drones8010011"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Yang, Y., Xiong, X., and Yan, Y. (2023). UAV Formation Trajectory Planning Algorithms: A Review. Drones, 7.","DOI":"10.3390\/drones7010062"},{"key":"ref_10","unstructured":"National Academies of Sciences, Engineering, and Medicine (2018). Counter-Unmanned Aircraft System (CUAS) Capability for Battalion-and-Below Operations: Abbreviated Version of a Restricted Report, The National Academies Press."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1351","DOI":"10.1109\/TAES.2020.3034020","article-title":"Extraction of Global and Local m-DS features from FMCW Radar Returns for UAV Detection","volume":"57","author":"Oh","year":"2020","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Siemiatkowska, B., and Stecz, W. (2021). A Framework for Planning and Execution of Drone Swarm Missions in a Hostile Environment. Sensors, 21.","DOI":"10.3390\/s21124150"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Balamurugan, G., Valarmathi, J., and Naidu, V.P.S. (2016, January 3\u20135). Survey on UAV navigation in GPS denied environments. Proceedings of the 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi, India.","DOI":"10.1109\/SCOPES.2016.7955787"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Castrillo, V.U., Manco, A., Pascarella, D., and Gigante, G. (2022). A Review of Counter-UAS Technologies for Cooperative Defensive Teams of Drones. Drones, 6.","DOI":"10.3390\/drones6030065"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1093\/jcsl\/kry008","article-title":"Combat Drones: Hives, Swarms, and Autonomous Action?","volume":"23","author":"Grimal","year":"2018","journal-title":"J. Confl. Secur. Law"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"88844","DOI":"10.1109\/ACCESS.2021.3089590","article-title":"Recognition of UAV Video Signal Using RF Fingerprints in the Presence of WiFi Interference","volume":"9","author":"Zuo","year":"2021","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"68791","DOI":"10.1109\/ACCESS.2023.3293124","article-title":"CNN-Based UAV Detection and Classification Using Sensor Fusion","volume":"11","author":"Lee","year":"2023","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/j.trpro.2021.11.121","article-title":"Military autonomous drones (UAVs)-from fantasy to reality. Legal and Ethical implications","volume":"59","author":"Konert","year":"2021","journal-title":"Transp. Res. Procedia"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"101929","DOI":"10.1016\/j.jairtraman.2020.101929","article-title":"Managing the drone revolution: A systematic literature review into the current use of airborne drones and future strategic directions for their effective control","volume":"89","author":"Merkert","year":"2020","journal-title":"J. Air Transp. Manag."},{"key":"ref_20","first-page":"31","article-title":"Counter-drone activity as a system","volume":"3","author":"Csengeri","year":"2019","journal-title":"Secur. Future"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Coluccia, A., Parisi, G., and Fascista, A. (2020). Detection and Classification of Multirotor Drones in Radar Sensor Networks: A Review. Sensors, 20.","DOI":"10.3390\/s20154172"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1080\/13675567.2021.1981273","article-title":"Drones for supply chain management and logistics: A review and research agenda","volume":"26","author":"Rejeb","year":"2023","journal-title":"Int. J. Logist. Res. Appl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"100218","DOI":"10.1016\/j.iot.2020.100218","article-title":"Security analysis of drones systems: Attacks, limitations, and recommendations","volume":"11","author":"Yaacoub","year":"2020","journal-title":"Internet Things"},{"key":"ref_24","unstructured":"Martins, B.O., Michel, A.H., and Silkoset, A. (2020). Countering the Drone Threat Implications of C-UAS Technology for Norway in an EU and NATO Context, PRIO."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"576","DOI":"10.1080\/13523260.2023.2262792","article-title":"Drones have boots: Learning from Russia\u2019s war in Ukraine","volume":"44","author":"Kunertova","year":"2023","journal-title":"Contemp. Secur. Policy"},{"key":"ref_26","unstructured":"Petrovski, A., Radovanovi\u0107, M., and Behli\u0107, A. (2022, January 13\u201314). Application of drones with artificial intelligence for military purposes. Proceedings of the 10th International Scientific Conference on Defensive Technologies (OTEH), Belgrade, Serbia."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1016\/j.ast.2018.01.026","article-title":"Formation flight of unmanned aerial vehicles using track guidance","volume":"76","author":"Lee","year":"2018","journal-title":"Aerosp. Sci. Technol."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Sun, H., Qi, J., Wu, C., and Wang, M. (2020, January 27\u201329). Path Planning for Dense Drone Formation Based on Modified Artificial Potential Fields. Proceedings of the 2020 39th Chinese Control Conference (CCC), Shenyang, China.","DOI":"10.23919\/CCC50068.2020.9189345"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"2268153","DOI":"10.1080\/21642583.2023.2268153","article-title":"Leader-Follower UAV formation flight control based on feature modelling","volume":"11","author":"Chen","year":"2023","journal-title":"Syst. Sci. Control Eng."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Solaiman, S., Alsuwat, E., and Alharthi, R. (2023). Simultaneous Tracking and Recognizing Drone Targets with Millimeter-Wave Radar and Convolutional Neural Network. Appl. Syst. Innov., 6.","DOI":"10.20944\/preprints202306.0621.v1"}],"container-title":["Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-3197\/13\/8\/193\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:26:21Z","timestamp":1760034381000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-3197\/13\/8\/193"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,8]]},"references-count":30,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["computation13080193"],"URL":"https:\/\/doi.org\/10.3390\/computation13080193","relation":{},"ISSN":["2079-3197"],"issn-type":[{"type":"electronic","value":"2079-3197"}],"subject":[],"published":{"date-parts":[[2025,8,8]]}}}