Next Article in Journal
Hair Regeneration Effects of Lespedeza bicolor Extract In Vivo and In Vitro
Next Article in Special Issue
Optimal Unmanned Ground Vehicle—Unmanned Aerial Vehicle Formation-Maintenance Control for Air-Ground Cooperation
Previous Article in Journal
Considerations on Stellarator’s Optimization from the Perspective of the Energy Confinement Time Scaling Laws
Previous Article in Special Issue
UAV-Cooperative Penetration Dynamic-Tracking Interceptor Method Based on DDPG
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Distributed Grouping Cooperative Dynamic Task Assignment Method of UAV Swarm

1
School of Astronautics, Northwestern Polytechnical University, Xi’an 710072, China
2
Shannxi Aerospace Flight Vehicle Design Key Laboratory, Xi’an 710072, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(6), 2865; https://doi.org/10.3390/app12062865
Submission received: 18 January 2022 / Revised: 2 March 2022 / Accepted: 9 March 2022 / Published: 10 March 2022

Abstract

:
Aiming at the problem of UAV swarms with distributed subsets performing cooperative reconnaissance-and-attack tasks on multi-targets in complex and uncertain combat scenarios, a distributed grouping cooperative dynamic task assignment method is proposed based on extended contract network protocol. The dynamic task assignment model for the UAV swarm with the topology of distributed subsets is established considering multiple constraints such as task cooperation, performing sequence, dynamic environment, communication topology, payload model, and UAV capability. According to the characteristics of multi-participants and multi-tasks in the process of UAV swarm executing tasks, the determination mechanism on cooperators and the selection mechanism of sequential tasks are proposed, and then the contract network protocol is extended. On the basis of the above, an event-triggered task assignment strategy for dynamic tasks is designed. The simulated results show that the proposed method can achieve the cooperative dynamic assignment of the UAV swarm to perform reconnaissance-and-attack tasks to multi-targets in complex and uncertain combat scenarios, improve the adaptiveness of the swarm under the sudden circumstance, and realize the optimization for task execution efficiency of the UAV swarm.

1. Introduction

The advances of intelligent autonomous systems have led UAV swarm technology and its application to the current scientific research hotspot [1,2]. Cooperative task assignment stands out as an essential component and a precondition of task accomplishment and autonomous control of UAV swarm systems [3].
Cooperative task assignment is to assign a considerable number of different types of subtasks and their order to each UAV in the swarm while meeting the task requirements with UAV capabilities and the multiple constraints involved. In the past few decades, there have been several main sorts of assignment algorithms for UAV swarm cooperative task assignment: the heuristic algorithm and the market-based algorithm, for example [4]. Heuristic algorithms generally search a certain range of solution space in an acceptable time by simulating natural phenomena to obtain feasible solutions to optimization problems. Common methods include the genetic algorithm [5,6,7,8], the particle swarm optimization algorithm [9], the ant colony algorithm [10,11], and the wolf swarm algorithm [12]. For UAV swarms with distributed architecture, heuristic algorithms always need to obtain global information. This process consumes lots of communication and computing resources as well as time to achieve global consensus; it is not suitable to apply heuristic algorithms. Compared with heuristic algorithms, market-based approaches (such as contract network protocol), distinctively characterized by distributed computing of swarms, requires only local information of the swarm and have the advantages of flexibility, robustness, and high operation speed [13] and, hence, are more suitable for distributed UAV swarms. Meanwhile, with strong scalability, market-based approaches can well handle cooperative task assignments with complex constraints such as limited communication [14] and time windows [15] and have been applied to dynamic task assignments [16,17,18]. The algorithms adopted are a part of the assignment approaches for the task assignment in complex and changeable combat scenarios, which are usually modeled as constraints or objectives from different perspectives.
The crucial topics to be investigated in this field include cooperative task assignment with the trajectory coupled [19,20] as well as under dynamic resistant circumstances [21,22,23]. In [24], a scheme to assign tasks in UAV swarms based on the contract network protocol (CNP) is presented, in which an A* algorithm is applied in flight path planning and path length estimation with a no-fly zone and threat considered. Under this scheme, the coupling between task assignment and flight path planning can be solved. However, their work does not take into consideration either pop-up missions or UAV faults. A study [25] has proposed a novel model for UAV coalition and an algorithm derived from basic geometry that generates a path derived from the original Dubins curve for application in remote sensing missions of fixed-wing UAVs. Another study [26] proposed an unmanned air vehicle (UAV) swarm task and a resource dynamic assignment algorithm based on the task sequence mechanism. By establishing a task sequence, each UAV strictly separates the necessary task time and synchronization waiting time. For the newfound targets, each UAV quickly determines its available time period. According to the available time and task resources, an auction algorithm and a consensus algorithm are used to decompose the task assignment into the initial distributed assignment phase and the swarm consensus phase to develop real-time conflict-free task solutions for UAV swarms. However, their work does not take into account the communication topology and time constraints. In [27], a CNP-based approach to a multi-UAV task assignment is proposed, in which a flight path planning method based on PH curves is combined with cooperative particle swarm optimization (PSO), cooperative variables, and cooperative functions to achieve attack synchronization on certain targets. Nevertheless, it does not take into account no-fly zones, threats, communication topology, and time constraints in addition to the task reassignment in the case of UAV faults. On the basis of this, [27,28] introduced local communication constraints with communication distance and information hop times to determine whether other UAVs participate in the local task assignment; however, it neglected the communication constraint caused by the swarm specific topology, which is crucial for certain command structures so as to improve operational effectiveness.
Compared with [21,22,23,24,25,26,27,28], the problem investigated in this paper is the dynamic task assignment for the heterogeneous UAV swarm consisting of distributed subsets with specific topology. In this paper, common constraints such as time windows, the UAV capability model, as well as new constraints such as topology constraints are combined to build the complex model of dynamic task assignment. The key contribution of this paper is that it proposes a solution to rectify the problem of heterogeneous UAV swarm cooperative dynamic task assignments with specific hierarchical communication topologies and other multiple constraints. An extended-CNP-based distributed assignment approach is proposed, along with distributed heterogeneous UAV swarm executing reconnaissance and attack tasks as the main scenario. The swarm consists of several subsets. On the swarm discovering new targets, it firstly assigns each target to subsets according to communication topology, and then each subset assigns subtasks to the UAVs within the group. The modified artificial potential field method is adopted to preplan the threat avoidance flight path, and battlefield survivability and fuel consumption are introduced to describe the flight path’s impact on the task assignment. Correspondingly, the consumption penalty and threat penalty functions can be designed so as to solve the coupling between task assignment and path planning. Meanwhile, constraints on time and cooperation are introduced to adjust the task executing sequence.
The rest of paper is organized as follows. The description of distributed grouping UAV swarm task assignment problem with multiple constraints is presented in Section 2. In Section 3, combined with hierarchical communication topologies of the UAV swarm, the distributed assignment algorithm based on extended contract network protocol is thoroughly addressed. In Section 4, the dynamic cooperative task assignment scheme based on an event-trigger strategy is proposed. Section 5 demonstrates the approach’s effectiveness, both in uncertain environments and with UAV failure, by numerical examples, and the whole work is concluded in Section 6.

2. Problem Description

2.1. Mission Scenario Analysis

There are heterogeneous UAV swarms consisting of distributed subsets in the mission area. Each subset is composed of several reconnaissance UAVs, attack UAVs, and reconnaissance-attack UAVs. The procedure of task assignment includes target allocation and subtask assignment. The swarm accomplishes the initial assignment, and then the UAVs cooperatively perform tasks. If a UAV discovers a new target, it relays the target information to others within a limited range according to hierarchical communication topologies, which triggers dynamic task assignment and then updates each UAV’s task sequence.

2.2. Hierarchical Communication Topology

The UAV swarm is divided into several distributed subsets. Communication exists within each subset and among subsets, hence hierarchical communication topology is established. In the application process, the swarm can cooperate to assign and complete tasks through the two-layer mechanism of inter-group cooperation and intra-group coordination based on hierarchical communication topology. The structure of the distributed subsets adopted integrates the advantages of both centralized structure and fully distributed structure to realize “global centralization and local autonomy”, which avoids the problems of low redundancy and the heavy central load of the fully centralized structure as well as the disadvantages of high individual capability requirements, communication complexity, and the command conflicts of the fully distributed structure. The structure conforms to the actual combat scenario as well as the development status of UAV swarm technology and will become more normalized and practical [29,30,31,32].
The algebraic graph theory is used to describe the internal interaction of the UAV swarm system. Assume that the UAV swarm has N UAVs, and each UAV is regarded as a node, then the communication relationship is seen as an edge. A directed graph G = {V, E, W} which consists of the node set V = {v1,v2,…,vN}, the edge set E { ( v i , v j ) : v i , v j V , i j } and the adjacency matrix W = [ w i j ] N × N , with non-negative entries w i j . The entries in W are defined with w i j = 1 for ( v i , v j ) E and w i j = 0 otherwise. In addition, w i i = 0 for all i = 1 , 2 , , N . The neighbor set of node v i is described as N i = { v j : ( v i , v j ) E } .
There is a top leader, Nm group leaders, and Nf followers in UAV swarms with distributed subsets, as shown in Figure 1. Each subset i has Nfi followers. The top leader is the highest leader node and leads the initial task assignment. The group leader, which obtains information of each UAV in the subset, is the leader node of the subset, participates in target allocation on behalf of the subset, and leads subtask assignment; the followers are members of the subset and participate in subtask assignment and execution.
Each node is numbered in the UAV swarm, in which the top leader index is 1, the indexes of group leaders are i = 2, …, Nm + 1, and the indices of followers are i = Nm + 2,…, Nm + Nf + 1. The adjacency matrix W N × N has the following form:
W = [ 0 W T M 0 W M T W M 0 W M F 0 W F M W F 0 ] N × N
where W M T N m × 1 and W T M 1 × N m indicate the communication topology among the top leader and group leaders, W M 0 N m × N m expresses the communication topology among group leaders, the communication topology among group leaders, and their followers are denoted as W M 0 N m × N m , while W F 0 N f × N f is denoted as the communication topology among followers. Assuming that no direct communication exists between each follower and the top leader, the followers of each subset only communicate within UAVs in the subset:
W F M = d i a g { W F M 1 , W F M 2 , , W F M N m } W M F = d i a g { W M F 1 , W M F 2 , , W M F N m } W F 0 = d i a g { W F 1 , W F 2 , , W F N m }
where W F M i N f i × 1 and W M F i 1 × N f i express the communication topology among group leader and its followers in subset i, and W F i N f i × N f i is the topology among followers in subset i.

2.3. UAV and Payload Model

Denote UAV set V = {Vi| i = 1, 2, …, N}, in which any UAV Vi can be described as a seven-element combination < X i , h i , C i , P i , F i , D i , m a x , N v i , m a x > . X i = ( x i , y i , z i , v i , φ i , ψ i ) represents the kinetic parameters of UAV Vi, including position, velocity, flight path angle, and flight heading angle; h i [ 0 , 1 ] represents the survivability of UAV Vi, and h i = 0 indicates Vi is destroyed or has encountered faults and then completely loses its mission capability; Ci = {Ci1, Ci2, …, CinCi} expresses indices of UAVs that communicate with Vi; P i = { P i , s c o u t , P i , a t t a c k } is the executable task type of Vi, where P i , s c o u t { 0 , 1 } , and P i , a t t a c k { 0 , 1 } means reconnaissance capability and attack capability, respectively. When the capability is available, the value is 1, otherwise 0; F i is the fuel consumption rate per unit air-range of Vi; D i , max is the maximum air-range; N v i , m a x is the maximum number of executable tasks of Vi.
The condition that a reconnaissance UAV discovers and confirms the threat or target is that it is located in the detection area of the reconnaissance payload, as shown in Figure 2a. Reference [33] gives the typical mathematic model of the detection area. The condition that an attack UAV can strike a target is that the target is located in the available area of the attack payload, as shown in Figure 2b. References [33,34] give the typical mathematic model of the available area.

2.4. Threat Model

Any threat can be described by a five-element combination < q o , i , R o , i , R a , i , p o , i , F o , i > , where q o , i is the position vector of the threat O i center, R o . i is the no-fly zone radius of threat O i , and R a . i is the impact radius of threat O i . When a UAV flies into the no-fly zone, it will be destroyed; when the UAV enters the impact area, it will be affected by the threat. p o , i [ 0 , 1 ] expresses the estimation of threat impact. F o , i { 0 , 1 } indicates the detected status flag of the target, where the value 0 means the target is undetected; otherwise, the value is 1.
The estimation p o , i ( q ) of the threat O i impact on any point in space is denoted as
p o , i ( q ) = { 1   ,   0   <   q q o , i < R o , i A i ( q , q o , i ) ,   R o , i q q o , i R a , i 0   ,   q q o , i > R a , i
where A i ( q , q o , i ) ( 0 , 1 ) , which is a function of the distance between the point and the threat center, represents the effect evaluation within the threat range; for the convenience of the study, A i ( q , q o , i ) can be taken as a constant value. When the UAV approaches threat O i and enters the impact range, its survivability will decrease. We assume the survivability of UAV Vj is h j and the survivability becomes h j under the impact of threat O i , of which the process can be expressed as
h j = h j ( 1 A i )

2.5. Dynamic Task Allocation Problem

We adopt a seven-element combination {V, Sg, T, O, Mt, R, C} to describe the dynamic task assignment problem. V = {V1, V2, …, VN} is the set of UAVs and N represents the number of UAVs in the swarm; Sg = {Sg1, Sg2, …, SgNG} is the set of subsets and N G represents the number of UAV subsets in the swarm; T = {T1, T2, …, TNT} is the set of targets, where N T is the number of targets; O = {O1, O2, …, ONobs} is the set of obstacles, where Nobs is the number of obstacles; Mt = {Mt1, Mt2, …, Mt,Ntype} is the task type set of each target, where N t y p e is the number of the types. For the “Reconnaissance-Attack” mission scenario, the task type set includes the reconnaissance and attack of two elements, which can be expressed as M t = { S c o u t , A t t a c k } ; R = {R1, R2, …, RNtype} is the set of the maximum task values for the “Reconnaissance-Attack” mission scenario R = { R S , R A } ; C is the set of multiple constraints, mainly including UAV capacity constraint, time window constraint, sequential constraint, and cooperation constraint. These constraints are described as follows:
Definition 1 (UAV capability constraints).
The UAV capability constraints are mainly reflected in three aspects: the maximum range, the executable task types, and the maximum number of executable tasks.
(a) (The maximum range constraint) Assume that the initial state of UAV Vi is s i 0 , and the task sequence is Seqi = {si1, si2, …, si,Ns,i}, where N s , i is the number of tasks to be executed. From Section 2.3, the maximum range of UAV Vi is D i , m a x and the maximum range constraint can be expressed as
j = 1 N s , i L ( s i j , s i , j 1 )     D i , m a x
where L ( s i j , s i , j 1 ) , which relates to task s i , j 1 and task s i j , represents the air-range from the position of task s i , j 1 to the position of task s i j . That means the whole air-range couples with the task sequence.
(b) (The executable task type constraint) In the process of the swarm cooperative task execution, different sorts of UAVs perform different types of tasks. There is a mapping between the UAV capability P i = { P i , s c o u t , P i , a t t a c k } and M t = { S c o u t , A t t a c k } , which can be expressed as
P i = { P i , s c o u t , P i , a t t a c k } = { { 1 , } S c o u t { , 1 } A t t a c k
(c) (The task number constraint) The payload number and energy carried by UAVs have limits; thus, it is necessary to restrict the maximum number of tasks performed by the UAV. Assuming that the number of tasks assigned to UAV V i is N v t , i and the upper limit is N v i , max , the constraint is expressed as
N v t , i N v i , max
Definition 2 (Sequence constraint).
If there is a specific execution order between subtasks T a s k i and T a s k j , there is sequence constraint between T a s k i  and T a s k j . Reference [9] gives the concrete model of sequence constraint.
Definition 3 (Time window constraint).
The start time when task s i , j inSeqi= {si1, si2, …, si,Ns,i} is performed by UAV V i needs to be guaranteed to be in the time window t s i , j [ t b , j , t e , j ] , where t b , j is the earliest start time and t e , j is the latest one. The start time t s i , j has relations with the last task and the preplanned flight path of the UAV. Suppose t e , j 1 the time when UAV accomplishes the last task and the preplanning air-range from s i , j 1 to s i , j , then the time window constraint can be expressed as
{ t s i , j t e , i t s i , j = max { t b , i , t e , j 1 + L i V }
Definition 4 (Cooperation constraint).
For the process of several UAVs cooperatively performing reconnaissance or attack task T a s k j , the expected number of participants N p e , j is introduced, which means that T a s k j can be accomplished by N p e , j UAVs at most. The actual number of participants is N p , j and has
0 N p , j N p e , j
Definition 5 (The dynamic task allocation problem).
The objective is to find the best assignment. To be more concise is to optimize the swarm’s reward Bs during the task execution, such that:
B ^ s = max B s ( V , S g , T , O , M t , R ) = m a x i = 1 N j = 1 N s , i B i j ( h i , e s t ,   L i j ,   t t a s k j )
subject to the constraints:
{ j = 1 N s , i L ( s i j , s i , j 1 )     D i , m a x P i = { P i , s c o u t , P i , a t t a c k } = { { 1 , } S c o u t { , 1 } A t t a c k N v t , i N v i , max t s i , j t e , i t s i , j = max { t b , i , t e , j 1 + L i V } 0 N p , j N p e , j   ,   i V
where the value of B i j indicates the reward of UAV i performing the task j; the survivability estimation is h i , e s t , which means more loss to the UAV performing the task; the air-range performing T a s k j is L i j ; the start time of task j is t t a s k j .
Due to the objective function coupling with the process of contract net protocol, the detailed expression is designed in Section 3.2, where the bidding function of the market mechanism is introduced.

3. Task Assignment Algorithm Based on Extended CNP

This section designs a distributed dynamic task assignment algorithm based on extended contract network protocol. The core of contract net protocol (CNP) is to simulate the “bid–win” market mechanism and realize the optimization of task assignment based on the interaction of individuals. The classical CNP is not suitable for sequential task assignments with multiple constraints under multiple rounds, which means that it needs extending according to complex task constraints.

3.1. Distributed Multi-Constraint Dynamic Task Assignment Algorithm

The algorithm includes four steps: target information release, bidding scheme generation, bid winning authorization, and task execution. The process is shown in Figure 3. The following describes the algorithm process in turn.
Step 1: Release the information of targets
Assume that the UAV detects a sudden target T k and reports the target information to the subset leader UAV V i , which becomes the tendering UAV on behalf of the subset, and sends a bidding invitation to each subset in the local communication network.
According to the hierarchical communication topology, the set of other subset leaders interacting with V i is V p , i = { V j | w i j = w j i = 1 , j [ 2 , 1 + N m ] j i } . V p , i composes the potential bidders of assignment for target T k . Tendering UAV V i releases tendering information I i to each UAV in set V p , i , and I i is expressed as
I i = ( V i , T k , { T a s k k } , t n o w , H b )
where V i is the index of tendering UAV; T k is the index of the sudden target; { T a s k k } is denoted as the subtask set of target T k ; t n o w is the releasing time; H b is the information state flag, of which value 0 means no relay, otherwise 1. The information structure of T a s k k can be denoted as:
T a s k k = { M t , k , q t , k , T i m e B a r k , R x , k , N p e , j , T h k }
where M t , k means task type; q t , k is the position coordinates; T i m e B a r k = [ t b , k , t e , k ] is the time window; R x , k is the maximum task value; N p e , j is the expected number of participants; T h k is the negotiation threshold.
As attached information during the subtask T a s k k assignment process, negotiation threshold T h k is applied to preselect bidders from the potential bidder set { V p , i } , reducing the negotiation scale as well as the consumption of communication resources and improving assignment efficiency. To adjust the threshold adaptively, the reward of subtask T a s k k in performing the subset to which UAV V i belongs is selected as T h k . If the bidder’s bidding value is greater than T h k , it indicates that the swarm efficiency will be optimized and improved after T a s k k is assigned to the bidder.
In the process of information release, different UAV groups with intersections of local communication topologies may discover the same target, causing multiple bidding UAVs to release information at the same time in their respective local communication topologies, resulting in system conflict and resource waste. In order to avoid this problem, it is necessary to ensure that different UAV subsets reach a consensus on tendering UAVs and tendering information, which is realized by Algorithm 1.
Algorithm 1: Release tendering information and achieve information consensus.
1: if   I i is not empty
2:   if   I i . H b = 0
3:    broadcast   I i   to   { V p , i }
4:  endif
5:endif
6: for j = 1   to   number   of   tendering   T a s k k invitation received
7:    if   I i . T a s k k . T h k < I j . T a s k k . T h k
8:     I i = I j
9:     broadcast   StopCmd   to   { V p , i } { V p , j }
10:   endif
11:endfor
In Algorithm 1, “StopCmd” means to abort the negotiation command, and the operation “.” represents the reference to elements in the information structure. For any UAV V i in the local communication topology, the tendering information related to subtask T a s k k will be released to its directly connected UAV if it is not empty and has not been transmitted (Line 1–4). Meanwhile, the UAV can also receive the tendering information related to T a s k k transmitted by others directly connected with it (Line 6–11).
If UAV V i finds that the negotiation threshold of UAV V j about T a s k k is greater, V i saves the tendering information I j and issues commands to other UAV groups interacted with V i but not interacted with V j to stop the negotiation so as to make them exit the assignment dominated by UAV V j .
After Step 1, the tendering information released in the local communication network achieves consensus, that is I i = I j .
Step 2: Generate bidding scheme
On the basis of the target information and various constraints, each potential bidder first determines the bidding scheme for the target of the group, including whether the subset participates in the bidding for target T k , subtasks that can be performed and the corresponding UAVs, and the reward for performing each subtask, and so forth.
Through the contract network in subsets, each subtask of target T k is preassigned to form the bidding scheme for target T k . The specific process is as follows:
① A subset leader UAV V j releases subtask information to each follower UAV. In order to improve the assignment efficiency and shorten the time, the task concurrency mechanism is introduced to publish the information of each subtask at the same time;
② For subtask T a s k k , the follower UAV V m judges whether it has the corresponding type of payload, whether the number of payloads can meet the task execution requirements, and whether it meets the time window T i m e B a r k according to the subtask information. If any constraint is not satisfied, UAV V m will not bid for subtask T a s k k ;
③ If the above constraints are met, UAV V m preplans the flight path of T a s k k based on the modified artificial potential field (MAP) method and substitutes the preplanned range L m k and survivability estimation h m , e s t into the individual bidding function to calculate the bidding value B m k ;
④ Compare the bidding value B m k with the subtask negotiation threshold T h k . If B m k < T h k , it means that the system efficiency has not been improved when UAV V m is used to perform subtask T a s k k , and V m actively abandons pre-assignment bidding for T a s k k ; otherwise, V m participates in the bidding;
⑤ Each follower UAV respectively performs steps ②–④ to complete the pre-assignment of each subtask. The subset leader UAV V j generates the subset’s bidding scheme for target T k according to the pre-assignment results.
The above is the basic process of bidding scheme generation. Due to the existence of multi-UAV cooperatively performing subtasks and the introduction of the task concurrency mechanism, the generation of the bidding scheme needs to solve a “multi-participants–multi-tasks” assignment optimization subproblem.
In order to solve the subproblem, an assignment mechanism based on the contract network within subsets is constructed. For the subtasks that need to be executed by multiple UAVs, a cooperator determination mechanism is introduced to complete the task allocation; for the sequential subtasks with time windows, a sequential task selection mechanism is introduced. Details are as follows:
(1) The determination mechanism on cooperators
The process of the determination mechanism on cooperators is shown in Figure 4. To simplify the assignment process, give the tenderee the initiative, expand the set of bidders, and provide more feasible pre-assignment schemes, the tenderee bidding mechanism is introduced, that is, when the subtask tenderee (subset leader UAV V j ) meets conditions such as capability constraints and time constraints, it can participate in bidding.
If V j meets the constraints for performing T a s k k and decides to bid with the bidding value B j k , then T h is chosen as B j k . UAV V j sends T a s k k information and negotiation threshold B j k to each follower UAV. The bidding value of follower UAV V m for T a s k k is B m k . If B m k > B j k , V m decides to bid and feedback B m k to V j . At the time, the set of all bidders participating in the T a s k k assignment is
V b , k = { V m | w j m = w m j = 1 , j m   ; B m k > B j k } { V j }
If tenderee V j does not participate in the bidding, i.e., B j k = ,
V b , k = { V m | w j m = w m j = 1 , j m   ; B m k > 0 }
To sum up, after preselection of negotiation threshold, all bidders participating in the assignment for T a s k k can be represented as
V b , k = { { V m | w j m = w m j = 1 , j m ; B m k > 0 } , B j k =   { V m | w j m = w m j = 1 , j m ; B m k > B j k } { V j } , B j k
Consider the cooperative constraints of subtask T a s k k , assume T a s k k requires the participation of N p , k UAVs, and quickly sort the bidding value set { B j k } . The greedy algorithm is used to select the N p , k largest bidding values in the set to form the winning bidding value set (reward set) B k
B k = { B ( 1 ) , k ,   B ( 2 ) , k ,   ,   B ( N p , k ) , k }
where B ( x ) , k represents the x -th order element of { B m k } in descending order. The winner set W i n n e r k is correspondingly:
W i n n e r k = I n d e x ( B ( 1 ) , k ,   B ( 2 ) , k ,   ,   B ( N p , k ) , k )
(2) Sequential task selection mechanism
Take the sequential task assignment process of a single follower UAV as an example. After receiving the task information, the bidder determines the executable tasks according to the negotiation threshold, UAV capability constraints, and the execution sequence and combines them to generate an alternative sequence without a time window conflict. Based on the bid winning situation, the optimal sequence is selected as the final signing one. The operation process is shown in Figure 5.
Assume that the concurrent task set T a s k n e w = { T a s k 1 n e w , , T a s k N t a s k n e w } is received by the follower UAV V m . The set of tasks that V m can execute and determine to participate in bidding is expressed as
T a s k a , m = { T a s k k a , m | k = 1 , 2 , , N a , m } T a s k n e w
where N a , m is the element number of T a s k a , m . Denote C o m b n ( N a , m , N v m , n ) as the combination which consists of random N v m , n elements from set {1, 2, …, Na,m}, where N v m , n N a , m .
Definition 6 (Task Sequence Alternative).
If  k C o m b n ( N a , m , N v m , n ) , k ¯ C o m b n ( N a , m , N v m , n ) { k } , there is T i m e B a r k T i m e B a r k ¯ = . Then, C o m b n ( N a , m , N v m , n ) is called a sequence alternative. T i m e B a r k is the time window of subtask T a s k k a , m . The corresponding task sequence alternative is defined as
S e q n m = { T a s k k a , m | k C o m b n ( N a , m , N v m , n ) } , n N s m , S e q n m T a s k a , m
where N s j is the number oftask sequence alternatives.
After the bidding is completed, the set of losing bidding tasks is denoted by T a s k d e , m . After the sequences containing losing bidding tasks are eliminated, the set composed of the remaining sequence alternatives is
S e q S e t m = { S e q n m | n N s m ; T a s k k a , m S e q n m , T a s k k a , m T a s k d e , m }
Assuming that the bidding value of V m for any subtask T a s k k a , m in S e q n m is B m k , where S e q n m S e q S e t m , the sum of bidding value for each task in S e q n m is
B m , n = k B m , k ,   k C o m b n ( N a , m , N v m , n )
and the final signing sequence of follower UAV V m is
S e q w i n , m = S e q n b e s t m , n b e s t = arg max n ( B m , n )
Through the above mechanism, the subtask pre-assignment scheme of the subset in which V j is located is generated, that is, the bidding scheme of the subset
B i d S c h j = { S e q w i n , m | m G j }
After that, UAV V j calculates the bidding function of the subset according to the bidding scheme and bids to the tenderee V i .
Step 3: Determine the winners
After the bidding scheme generation and bidding application in Step 2, the tendering UAV V i selects the scheme of which the efficiency is greatest according to the bidding value of each group so as to determine which subset executes subtasks of target T k .
The set of bidding values of subsets is { B g , j k } . Apply the greedy algorithm and select the greatest value and corresponding subset as the winning value (reward) B g , k and the winner W i n n e r g , k . The process can be expressed mathematically as
B g , k = max { B g , j k , W i n n e r g , k = argmax j ( B g , j k )
After determining the winner, UAV V i authorizes the subset W i n n e r g , k to perform each subtask of target T k .
Step 4: Perform the tasks
The winner subset formally authorizes each follower UAV in the subset to perform the subtasks, and the pre-assignment scheme in Step 2 becomes the formal assignment scheme. Follower UAV V m will add the signing subtask sequence S e q w i n , m to its task sequence to be executed, that is:
A m = A m S e q w i n , m
where A m is the task sequence to be executed, expresses the operation that it adds the sequence S e q w i n , m to the sequence A m . Each UAV performs each task according to sequence A m and the preplanning flight path in the specific time window.
The pseudo-code of the whole algorithm 2 process described above is as follows:
Algorithm 2: The extended Contract Network Protocol.
Input:Task assignment combination {V, Sg, T, O, Mt, R, C}; Topology G0; time tnow
Output: Task execution sequence set {Am}
1:/* Step 1: Release the information of targets */
2:for i from the first index of leader UAVs to the last one
3.  if Vi is a target tenderee UAV
4:    {Vp,i} = detTargetPotentialBidders(G0,C) /* determine the set of potential bidder subsets. */
5:    for k = 1 to number of targets
6:      if Tk is tendered by leader UAV i
7:       {Taskk} = generateSubtasks(Tk) /* Tenderee UAV i generates subtask information. */
8:      end if
9:    end for
10:    Ii = releaseTargetInfo ({Tk}, {Taskk}, tnow, {Vp,i}}  /* Tenderee UAV i releases target information. */
11:  end if
12:end for
13:/* Step 2: Generate bidding scheme */
14:for j from the first index of leader UAVs to the last one
15:  for i from the first index of tenderee leader UAVs to the last one
16:    if Vj belongs to {Vp,i}
17:      Receive Ii and broadcast it to Vj ‘s followers
18:    end if
19:  end for
20:  for m from the first index of followers of Vj to the last one
21:    {Taska,m} = checkTaskConstaints({Ii.Taskk})   /* Select the executable subtasks from {Taskk} */
22:    { S e q n m } = combineTasks({Taska,m })   /* Generate the set of alternative sequence */
23:    {Bm,n} = biddingFuncCal({SeqSetm})   /* Calculate the bidding function of each sequence */
24:    Seqwin,m = S e q n b e s t m , nbest =  argmax n ( B m , n )    /* Determine the sequence to execute */
25:  end for
26:  Bg,jk = m max ( B m , n )
27:end for
28:/*  Step 3: Determine the winners*/
29:for i = 1 to number of tenderee leader UAV i
30:  for k = 1 to number of targets tendered by leader UAV i
31:    Bg,k = max{Bg,jk}, Winnerg,k = argmax j ( B g , j k )  /* Determine winner of tendering for Target k */
32:  end for
33:end for
34:/* Step 4: Perform the tasks */
35:for n = 1 to number of subsets
36:  for m = 1 to number of follower UAV m of Subset n
37:    Am = Am   Seqwin,m  /* Add the signing subtask sequence to task execution sequence Am. */
38:  end for
39:end for
Analyze the worst time complexity of the algorithm and take the case of task assignment by the top leader as an example:
The time complexity of the top leader issuing NT targets with subtasks bidding information to NG subset leaders is O(NTNG), the complexity of the initial evaluation of 4 types of constraints presented in Section 2.5 by NG subset leaders is 4O(NTNG), the complexity of the bidding of potential bidder subsets {Vp,i} is O(K), where K is the number of elements in {Vp,i}; after K potential bidder subsets are determined, each potential bidder subset needs to pre-assign the subtasks and generate the bidding scheme of the subset.
Assume that each target has Nt subtasks, each subtask needs the most Np participants and each subset consists of (Nf + 1) UAVs. Each subset will generate the target scheme based on the CNP within the subset. The time complexity of the subset leaders issuing Nt subtasks to their Nf followers is O(NTNtNf). The sequential task selection is an arrangement–combination problem, of which the time complexity is NTO(Nt3), and the time complexity of bidding to the subset leader in each subset is O(NTNtNf). Subset-leader-selecting cooperators can be regarded as a sorting problem, and the quick sort algorithm can be adopted so that the time complexity is NTNtO(Nplog2Np). Therefore, the time complexity of the subtask pre-assignment is 2O(NTNtNf) + NTO(Nt3) + NTNtO(Nplog2Np).
After the bidding schemes of each subset are generated, the bidding winner subset will be determined. It is a quick sort process, so the time complexity is NTO(NGlog2NG).
To conclude, the whole worst time complexity is 2O(NTNtNf) + NTO(Nt3) + NTNtO(Nplog2Np) + NTO(NGlog2NG). It indicates that the algorithm is a polynomial one.

3.2. Bidding Function Design

As the core of extended CNP, the bidding function, which needs to be designed on the basis of the concrete task assignment problem in CNP, is a sort of objective function. According to the method process described above, the whole task assignment is divided into the target assignment and the subtask assignment. Both the target assignment and the subtask assignment are based on the extended CNP. Hence, the bidding function of each subset is designed for the target assignment, while the individual bidding function within the group is designed for the subtask assignment.

3.2.1. Individual Bidding Function

The individual bidding function Bij consists of value function Reij and penalty function Peij. Based on the analysis for the UAV swarm task assignment model in Section 2, the individual bidding function mainly relates to: ① the maximum task values, which is denoted in Section 2.5; ② the flight path; ③ the time windows and start time of each subtask.
Since the UAV task assignment couples with path planning, the bidding function needs to be designed in combination with the UAV flight path. By analyzing the scenario, it can be seen that the impact of the flight path on task assignment is mainly reflected in UAV survivability estimation h i , e s t and air-range L i j (fuel consumption), as shown in Figure 6.
Supposing that UAV V i participates in the bidding process of subtask T a s k j with time window t t a s k j [ t s , j , t e , j ] , where t t a s k j is the start time of task execution, of which the mathematical expression is given in Section 2.5, t s , j is the earliest start time, and t e , j is the latest one.
To evaluate the impact of threats {Ok | k = 1, 2, …, Nobs} on UAV V i performing tasks, it introduces the survivability estimation of V i , which can be expressed as
h i , e s t = h i k = 1 N a p p ( 1 A k , a p p )
where h i is the current survivability of V i , A k , a p p is the impact of threats O k , a p p { O k } approached by V i , A k , a p p ( 0 , 1 ) , and N a p p is the number of threats approached.
(1) Value function Reij
In the actual scenario, the value of UAVs performing any task is generally related to the start time when the UAV performs the task. The nearer the start time t t a s k j to the time window T i m e B a r k , the greater the value for UAV V i to perform the task; otherwise, the smaller the value; hence, the item related to the start time t t a s k j is introduced. The value function of V i performing T a s k j is designed as
R e i j ( h i , e s t , t t a s k j ) = h i , e s t R x , j e λ t t a s k j t s , j t e , j t t a s k j
where R x , j is the maximum value of T a s k j ; λ is the attenuation factor of the start time t t a s k j on the task value. Apparently, R e i j is a monotonic increasing function of battlefield survivability h i , e s t and decreases monotonically with the start time t t a s k j . When h i , e s t : 1 0 , t t a s k j : t s , j t e , j , there is R e i j :   R x , j 0 .
(2) Penalty function Peij
The penalty function is composed of the consumption penalty and the threat penalty. Assuming that the per-unit fuel consumption of UAV V i is F i , the air-range performing T a s k j is L i j , the estimation of survivability is h i , e s t , and the penalty function is designed as
P e i j ( h i , e s t , L i j ) = 1 h i , e s t F i L i j
Obviously, R e i j is a monotonic function of battlefield survivability h i , e s t . When h i , e s t : 1 0 + , there is P e i j :   F i L i j + .
The penalty indicates the coupling impact of flight path planning on task assignment. On one hand, the fuel consumption of performing subtask T a s k j is directly related to the preplanned air-range L i j ; on the other hand, the more threats approached by UAV V i during the task execution, the lower the survivability estimation h i , e s t , which means more loss when the UAV performs the task.
Combining the value function and the penalty function, the individual bidding function B i j of UAV V i for T a s k j is denoted by
B i j ( h i , e s t ,   L i j ,   t t a s k j ) = R e i j P e i j = h i , e s t R x , j e λ t t a s k j t s , j t e , j t t a s k j 1 h i , e s t F i L i j
where a greater value of B i j indicates the reward of performing the task. B i j monotonically increases with h i , e s t and decreases with L i j and t t a s k j , which agrees with the actual scenario, which suggests that B i j has practical significance.

3.2.2. Bidding Function of Each Subset

The bidding function of subsets is based on the individual function. For target T j , supposing that the bidding value set is { B 1 , B 2 } after the subtask assignment in subset G i , B 1 , B 2 respectively express the bidding value of subset G i performing the reconnaissance subtask and the attack one. The bidding function of subsets is defined as the sum of elements in { B 1 , B 2 } , which is
B g , i j = B 1 + B 2

4. Dynamic Assignment Strategy Based on Event Triggering

4.1. Event Trigger Conditions for Dynamic Tasks

Due to the incomplete perception of the situation at the beginning and the occurrence of emergencies during the task execution, the initial assignment scheme needs to be adjusted. Therefore, the event trigger conditions are introduced to judge whether or not to carry out the dynamic task assignment. Event trigger conditions are the key to realizing dynamic task assignments, which need to be selected in combination with different scenarios. The dynamic task assignment process based on event triggering can be expressed as:
E : if   g ( s ( t ) , s t , j ( t ) ) 0 , then   T a r g e t j T a r g e t I n f o j , T a s k j , k T a s k I n f o j , k ( k = 1 ,   2 ,   ,   N f )
where   g ( s ( t ) , s t , j ( t ) ) 0 is the triggering condition, s ( t ) is the state of UAV (such as the position), s t , j ( t ) is the status of target T j .   T a r g e t j T a r g e t I n f o j expresses the update of the set of targets, and T a s k j , k T a s k I n f o j , k expresses the update of the set of subtasks.
(1) The unknown targets appear
The initial target assignment is based on the initial situation awareness information, which can only cover the known targets but is not guaranteed to cover all the targets in the mission area. After the reconnaissance UAV or reconnaissance-attack UAV V i flies near the unknown target T j during task execution, it will detect the target and obtains the target information T a r g e t I n f o n e w , j and then updates the target set and the subtask set. Event trigger conditions can be described as
  g ( s ( t ) , s t , j ( t ) ) = D A ( r i , r n t , j , R d e t e c t , i )
where D A ( r i , r n t , j , R d e t e c t , i ) is defined as the reconnaissance payload constraint, which is the constraint on the relative position and angle relations between UAV V i and target T j . The details are in reference [34]. When target T j is located in the detect area of the reconnaissance-attack UAV or reconnaissance UAV, D A ( r i , r n t , j , R d e t e c t , i ) 0 ; r i is the position vector of UAV V i ; r n t , j is the position vector of target T j ; R d e t e c t , i is the detection range of UAV V i . The event-triggering process can be expressed as
E 1 : if   D A ( r i , r n t , j , R d e t e c t , i ) 0 ,   then   T a r g e t N t a r g e t + j T a r g e t I n f o n e w , j , T a s k N t a r g e t + j , k T a s k I n f o N e w , j , k ( k = 1 , 2 , N n e w t a s k , j )
where T a r g e t N t a r g e t + j T a r g e t I n f o n e w , j indicates the update of target set, N t a r g e t is the number of targets; T a s k N t a r g e t + j , k T a s k I n f o N e w , j , k indicates the update of subtask set, N n e w t a s k , j is the number of subtasks of T j .
(2) The UAV encounters faults and cannot perform tasks
During task execution, UAVs may encounter non-cooperative behaviors such as collision and attack and lose mission capability. Its tasks that have not been executed will be reassigned. Event triggering conditions can be described as
  g ( s ( t ) , s t , j ( t ) ) = h i , b h i
where h i is the survivability of V i ; h i , b is the minimum survivability of V i with normal capability and is selected according to the concrete scenario. The event-triggering process can be expressed as
E 2 : if   h i , b h i 0 ,   then   T a s k j , k T a s k I n f o i , j , k   ( k = 1 ,   2 ,   ,   N i , j )
where T a s k j , k T a s k I n f o i , j , k is the reassignment for the subtasks that V i is to perform.

4.2. The Basic Process of Dynamic Task Assignment

Before describing the basic process of cooperative dynamic task assignment, the following assumptions are given for the scenario:
1. Based on the early situation awareness, several targets and pieces of threat information have been obtained, including target location, number of UAVs required to perform each subtask, threat location, and impact range;
2. Due to incomplete situational awareness, there are unknown targets and threats. After the UAV detects an unknown target or threat, it broadcasts the threat information, transmits the target information to the group leader, and triggers the assignment process.
Based on the scenario and assumptions above, the basic process of cooperative dynamic task assignment is shown in Figure 7. The concrete steps are as follows:
  • Assign the known targets. The top leader assumes the role of the tenderee, dominates the initial assignment, and releases the target information to each group leader based on the inter-group contract network.
  • Each group leader that has direct communication with the top leader receives the target information, releases the subtask information to their followers, and determines the group’s bidding scheme, which is obtained by subtasks pre-assignment based on the group’s internal contract network.
  • The top leader selects the group with the largest bidding value as the bid winner according to the bidding schemes of the group submitted by the group leaders and assigns the target to the group.
  • According to the assigned target, each subset performs tasks according to the corresponding subtask assignment scheme.
  • If a UAV fails to perform tasks due to sudden failure, the tasks shall be assigned to other UAVs in this subset first; if no UAV in the subset can continue to perform, the group leader will release the tasks to other subsets, and then others will determine the pre-assignment scheme based on the contract network within the group. The tendering group shall determine the assistance according to each bidding scheme.
  • If a UAV (including the group leader) detects a sudden target, it shall be reported to the group leader. After receiving the target information, the leader of this subset will release the target to other subsets. Each subset determines the pre-assignment scheme based on the contract network within the group, carries out the bidding based on the inter-group contract network, and, finally, completes the target and subtask assignment.
  • Repeat steps 4–6 until there is no dynamic change.

5. Numerical Simulation

It is assumed that the swarm consists of 1 top leader and 2 subsets, with a total of 11 UAVs, including 2 reconnaissance-attack UAVs, 4 reconnaissance UAVs, and 4 attack UAVs. Among them, reconnaissance-attack UAVs are the group leaders. Consider the UAV swarm communication topology G0, as shown in Figure 8.
Each UAV can perform no more than two subtasks, and each subtask is performed jointly by, at most, two UAVs. For flight path preplanning, the UAV kinematics model in reference [35] and the modified artificial potential field method [36,37,38] are used to realize the air-range estimation considering threat avoidance. The capability parameters of each UAV under the scenario are shown in Table 1, and the parameters of reconnaissance payload and attack payload are shown in Table 2 and Table 3, respectively.
The feasible area of UAV reconnaissance and attack for a target on the ground, based on the above parameter configuration, is shown in Figure 9.
Consider a 5 × 5 km mission scenario. The information of known targets and the time window constraints of subtasks randomly generated is shown in Table 4.

5.1. The Initial Task Assignment for Known Targets

Assume that the UAV swarm performs the reconnaissance-and-attack tasks at six enemy targets. The location of each UAV, threat, and target is shown in Figure 10.
Purple threats represent known threats, and blue threats represent unknown ones, all of which the coordinates are randomly generated. The targets are marked with “T”; Each UAV is marked with “V”, where “S” represents the reconnaissance UAV, “A” represents the attack UAV, and “SA” represents the reconnaissance–attack UAV.
In the simulation, the maximum value of the reconnaissance subtask is set at 100, the maximum value of the attack subtask is set at 150, and the attenuation factor λ is set at 0.9.
Adopting the designed UAV swarm cooperative dynamic task assignment approach, the sequential task assignment results for known targets are shown in Table 5. The task execution plan of each UAV is expressed in the format of (Target, Subtask type, Start time (s), Winning bidding value).
According to the known threat information and the unknown threat information detected by reconnaissance UAV during mission execution, the modified artificial potential field method is adopted to avoid local optimization, and the preplanning flight path considering threat avoidance during mission execution can be realized. Combined with the UAV swarm task assignment results, the preplanned path, and the task sequence, the swarm task execution diagram can be obtained, as shown in Figure 11.
As can be seen in Figure 11, the cooperative task assignment approaches can realize the “reconnaissance–attack” coverage of known targets under the consideration of flight path planning coupling and task time window constraints.

5.2. Dynamic TASK Assignment for Sudden Targets

Considering two unknown targets, T7 and T8, the swarm discovers targets through cooperative detection and then assigns tasks. The information of T7 and T8 is shown in Table 6, and the initial operational situation is shown in Figure 12.
The time when unknown targets are discovered by the UAVs and the corresponding subsets that discover the targets are shown in Table 7. The generated subtask time window constraints are shown in Table 7 as well. The sequential task assignment results for the unknown targets are shown in Table 8.
The swarm realizes the coverage of sudden targets through the distributed cooperative dynamic task allocation mechanism after the reconnaissance UAV V8, belonging to Subset 1, and the reconnaissance UAV V5, belonging to Subset 2, detect sudden targets T7 and T8, respectively, during task execution.
The concrete analysis is as follows: The reconnaissance UAV V4 and attack UAV V6, belonging to Subset 1, is assigned to perform the subtasks of sudden target T8 successively in the corresponding time window. The reconnaissance UAV V8 and reconnaissance-attack UAV V3, belonging to Subset 2, successively perform the subtasks of sudden target T7 in the corresponding time window so as to realize the “reconnaissance–strike” coverage of each sudden target.
We combine the assignment results with the preplanning flight path and task execution sequence based on the artificial potential field method. The diagrams of UAV swarm task execution and the execution sequence under sudden targets are shown in Figure 13.
Figure 13 indicates that through the dynamic task assignment approach based on the extended CNP, the swarm can mobilize the UAVs with task capability and the best execution effect obtained after bidding negotiation to complete tasks for each sudden target according to the time window.

5.3. Reassignment for Subtasks of Failed UAV

During the simulation, the reconnaissance UAV V5, belonging to Subset 1, fails and loses the capability to perform tasks. The failure time is 97.5 s.
According to the assignment results in Section 5.1, the reconnaissance UAV V5 prepares to perform the reconnaissance subtask. The fault of V5 triggers dynamic task assignment, and the tasks (T2, s, 117.5, 62.14)→(T6, s, 167.0, 59.20) of V5 become dynamic tasks. The bidding values of each group of potential bidders (including V2, V4, V3, and V8) are shown in Table 9. The reassignment results of failed UAV subtasks obtained by the designed assignment approach are shown in Table 10.
The task assignment results in Table 9 show that UAV V4 of Subset 1 and UAV V8 of Subset 2 replace UAV V5 and continue to perform the tasks, respectively.
Combined with the assignment results, the diagrams of UAV swarm task execution and the execution sequence under UAV V5 failure are shown in Figure 14.
The explanation of the assignment result is as follows: after the reconnaissance, UAV V5 loses its mission capability, and its subtasks shall be preferentially executed by other reconnaissance UAVs or reconnaissance UAVs (i.e., V2 and V4) in Subset 1. It can be seen from Figure 14a that after the initial assignment in Section 4.1, the number of tasks that can be performed by UAV V4 is 1. Therefore, through the contract network within the group, it can undertake one reconnaissance subtask of V5. At this time, V2 is executing the attack subtask T1(a) according to the initial allocation results. During this execution, it crosses several threat areas, resulting in low survivability estimation, and the bidding value is negative, which is not suitable to continue to perform the subtask. Therefore, the leader UAV V2 of Subset 1 releases the information to Subset 2 for assistance through the contract network among the groups. Subset 2 conducts bidding negotiation through the contract network within the group and finally assigns UAV V8 to assist Subset 1 to take over reconnaissance subtask T6 (s).

5.4. The Analysis of the Real-Time Performance of the Assignment Approach

All the simulation experiments have been implemented on a personal PC; the parameters are Intel Core i5-5350U CPU @ 1.80 GHz 8 GB RAM, and the programming environment is MATLAB 2018b.

5.4.1. Real-Time Performance with Different Problem Scales

The real-time performance of the assignment approach is mainly influenced by three factors: ① the number of subsets of the UAV swarm; ② the number of UAVs in each subset; ③ the number of targets.
To illustrate the impact of the factors above, the variable-controlling method is adopted. The details of simulation cases to be compared are in Table 11. Correspondingly, the comparison of assignment times in different cases is shown in Figure 15.
According to the comparison among the simulation, on one hand, due to the slowly increasing tendency of the assignment time in Figure 15a,b, it can be concluded that the real-time performance of the proposed approach has low sensitivity with the size of the UAV swarm. On the other hand, comparing (a) with (b), the task assignment time is more sensitive with the number of subsets than with the number of UAVs of each subset.
Moreover, according to Figure 15c, the task assignment time is sensitive to the number of targets, which indicates that the performance of the approach may become worse with the number of targets increasing.

5.4.2. Algorithm Comparison

In order to verify the effectiveness of the distributed approach based on contract network protocol (CNP) in solving the UAV swarm task assignment problem, it is compared with the centralized task assignment approach used in reference [10]. Scenarios are designed with different sizes of UAV swarm performing multiple task assignments. From the simulation results, both the centralized approach (ACO) and the distributed approach (CNP) are able to obtain the solution to the UAV swarm task assignment problem. However, the distributed approach (CNP) has an obvious advantage in terms of solution efficiency. The solution time for different sized assignment problems is shown in Table 12.
Remark:
Generally, a global optimal solution to such problems can rarely be obtained. Therefore, feasible solutions to the task assignment problem obtained in the solving process are considered in general.
As a heuristic algorithm, ACO searches in the solution space, learns from the results of each iteration, and finally converges to a feasible solution, which means that ACO requires a lot of computational resources and a much longer time. Simulation results show that this problem becomes more pronounced when the problem size (e.g., size of the UAV swarm, the number of targets) increases.
In contrast to heuristic algorithms such as ACO, CNP merely performs the optimization by bidding on each subset of UAVs as well as UAV individuals without the iterative process of searching for feasible solutions in a large solution space.
The results illustrate that, as a distributed assignment approach, the proposed method in this paper has advantages in real-time performance compared with the ACO proposed in reference [10], which proves the effectiveness of the method to some extent.

6. Conclusions

Aiming at the problem of the cooperative reconnaissance–attack task assignment of UAV swarms in complex environments, this paper proposes a distributed grouping cooperative dynamic task assignment approach by considering multiple constraints, realizes the effective assignment of cooperative reconnaissance–attack tasks to multiple targets, and optimizes the combat effectiveness of the swarm. The main conclusions include:
(1) The proposed extended CNP algorithm, which is based on the determination mechanism of cooperators and the selection mechanism of sequential tasks, with the bidding function considering the constraints of sequence, flight path, and threat; it can realize the reasonable assignment of reconnaissance and attack tasks on multiple targets under multiple constraints and the optimization of UAV swarm task execution efficiency.
(2) The proposed dynamic task assignment strategy based on the event-trigger mechanism constructs the overall architecture of cooperative dynamic task assignment for the distributed grouping of the UAV swarm and improves the adaptability of the swarm to the dynamic environment and sudden targets during task execution.
(3) Three typical simulation scenarios are designed. The simulation results show that the task assignment approach in this paper can solve the problem of cooperative sequential dynamic task assignment when the UAV swarm with subsets performs reconnaissance–attack tasks in a complex environment with incomplete situational awareness and sudden targets and realize reconnaissance and attack coverage on each target. Moreover, the real-time performance of the assignment approach has been analyzed, which indicates that the proposed approach has low sensitivity to the size of the UAV swarm.

Author Contributions

Conceptualization, B.Q. and D.Z.; methodology, B.Q.; software, B.Q.; validation, B.Q.; formal analysis, B.Q.; investigation, B.Q. and D.Z.; resources, D.Z. and S.T.; data curation, B.Q. and M.W.; writing—original draft preparation, B.Q.; writing—review and editing, B.Q.; visualization, B.Q.; supervision, D.Z. and S.T.; project administration, D.Z. and S.T; funding acquisition, D.Z. All authors have read and agreed to the published version of the manuscript.

Funding

The research was funded by the National Natural Science Foundation of China, grant number (61933010) and (61903301).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available upon request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhang, Y.F.; Lin, D.F.; Zheng, D.; Cheng, Z.H.; Tang, P. Task Allocation and Trajectory Optimization of UAV for Multi-target Time-space Synchronization Cooperative Attack. Acta Armamentarii 2021, 42, 1482–1495. (In Chinese) [Google Scholar]
  2. Jiang, X.; Zeng, X.L.; Sun, J.; Chen, J. Research status and prospect of distributed optimization for multiple aircraft. Acta Aeronaut. Astronaut. Sin. 2021, 42, 90–105. (In Chinese) [Google Scholar]
  3. Zhang, J.; Xing, J.H. Cooperative task assignment of multi-UAV system. Chin. J. Aeronaut. 2020, 33, 2825–2827. [Google Scholar] [CrossRef]
  4. Duan, H.B.; Zhao, J.X.; Deng, Y.M.; Shi, Y.H. Dynamic Discrete Pigeon-Inspired Optimization for Multi-UAV Cooperative Search-Attack Mission Planning. IEEE Trans. Aerosp. Electron. Syst. 2020, 57, 706–720. [Google Scholar] [CrossRef]
  5. Ye, F.; Chen, J.; Tian, Y.; Jiang, T. Cooperative Task Assignment of a Heterogeneous Multi-UAV System Using an Adaptive Genetic Algorithm. Electronics 2020, 9, 687. [Google Scholar] [CrossRef] [Green Version]
  6. Jia, Z.Y.; Yu, J.Q.; Ai, X.L.; Xu, X.; Yang, D. Cooperative multiple task assignment problem with stochastic velocities and time windows for heterogeneous unmanned aerial vehicles using a genetic algorithm. Aerosp. Sci. Technol. 2018, 76, 112–125. [Google Scholar] [CrossRef]
  7. Wu, W.N.; Wang, X.G.; Cui, N.G. Fast and coupled solution for cooperative mission planning of multiple heterogeneous unmanned aerial vehicles. Aerosp. Sci. Technol. 2018, 79, 131–144. [Google Scholar] [CrossRef]
  8. Wang, Z.; Liu, L.; Long, T.; Wen, Y.L. Multi-UAV recon-naissance task allocation for heterogeneous targets using an opposition-based genetic algorithm with double chromosome encoding. Chin. J. Aeronaut. 2018, 31, 339–350. [Google Scholar] [CrossRef]
  9. Wei, C.; Ji, Z.; Cai, B. Particle Swarm Optimization for Cooperative Multi-Robot Task Allocation: A Multi-Objective Approach. IEEE Robot. Autom. Lett. 2020, 5, 2530–2537. [Google Scholar] [CrossRef]
  10. Su, F.; Chen, Y.; Shen, L.C. UAV Cooperative Multi-task Assignment Based on Ant Colony Algorithm. Acta Aeronaut. Astronaut. Sin. 2008, 29, 184–191. (In Chinese) [Google Scholar]
  11. Zhen, Z.; Xing, D.; Gao, C. Cooperative search-attack mission planning for multi-UAV based on intelligent self-organized algorithm. Aerosp. Sci. Technol. 2018, 76, 402–411. [Google Scholar] [CrossRef]
  12. Chen, Y.B.; Yang, D.; Yu, J.Q. Multi-UAV Task Assignment with Parameter and Time-Sensitive Uncertainties Using Modified Two-Part Wolf Pack Search Algorithm. IEEE Trans. Aerosp. Electron. Syst. 2018, 54, 2853–2872. [Google Scholar] [CrossRef]
  13. Gerkey, B.P.; Mataric, M.J. Sold!: Auction methods for multirobot coordination. IEEE Trans. Robot. Autom. 2002, 18, 758–768. [Google Scholar] [CrossRef] [Green Version]
  14. Choi, H.L.; Brunet, L.; How, J.P. Consensus-Based De-8kcentralized Auctions for Robust Task Allocation. IEEE Trans. Robot. 2009, 25, 912–926. [Google Scholar] [CrossRef] [Green Version]
  15. Luo, L.Z.; Chakraborty, N.; Sycara, K. Distributed Algorithms for Multirobot Task Assignment with Task Deadline Constraints. IEEE Trans. Autom. Sci. Eng. 2015, 12, 876–888. [Google Scholar] [CrossRef]
  16. Farinelli, A.; Iocchi, L.; Nardi, D. Distributed on-line dynamic task assignment for multi-robot patrolling. Auton. Robot. 2016, 41, 1–25. [Google Scholar] [CrossRef]
  17. Oh, G.; Kim, Y.; Ahn, J.; Choi, H.L. Market-Based Task Assignment for Cooperative Timing Missions in Dynamic Environments. J. Intell. Robot. Syst. 2017, 87, 1–27. [Google Scholar] [CrossRef]
  18. Moore, B.J.; Passino, K.M. Distributed Task Assignment for Mobile Agents. IEEE Trans. Autom. Control. 2007, 52, 749–753. [Google Scholar] [CrossRef] [Green Version]
  19. Yang, H.Z.; Wang, Q. A multi-AUV dynamic task allocation method based on ant colony labor division model. Control. Decis. 2021, 36, 1911–1919. (In Chinese) [Google Scholar]
  20. Li, X.M.; TANG, J.Y.; DAI, J.J.; Bo, N. Dynamic Coalition Task Allocation of Heterogeneous Multiple Agents. J. Northwestern Polytech. Univ. 2020, 38, 1094–1104. (In Chinese) [Google Scholar] [CrossRef]
  21. Ni, J.J.; Tang, M.; Chen, Y.N.; Cao, W.D. An Improved Cooperative Control Method for Hybrid Unmanned Aerial-Ground System in Multitasks. Int. J. Aerosp. Eng. 2020, 2020, 1–14. [Google Scholar] [CrossRef]
  22. Yao, W.R.; Qi, N.M.; Wan, N.; Liu, Y.B. An iterative strategy for task assignment and path planning of distributed multiple unmanned aerial vehicles. Aerosp. Sci. Technol. 2019, 86, 455–464. [Google Scholar] [CrossRef]
  23. Zhan, C.; Zeng, Y. Aerial–Ground Cost Tradeoff for Multi-UAV-Enabled Data Collection in Wireless Sensor Networks. IEEE Trans. Commun. 2020, 68, 1937–1950. [Google Scholar] [CrossRef]
  24. Wang, R.R.; Wei, W.L.; Yang, M.C.; Liu, W. Task allocation of multiple UAVs considering cooperative route planning. Acta Aeronaut. Et Astronaut. Sin. 2020, 41, 24–35. (In Chinese) [Google Scholar]
  25. Ismail, A.; Bagula, B.A.; Tuyishimire, E. Internet-Of-Things in Motion: A UAV Coalition Model for Remote Sensing in Smart Cities. Sensors 2018, 18, 2184. [Google Scholar] [CrossRef] [Green Version]
  26. Fu, X.W.; Feng, P.; Gao, X. Swarm UAVs Task and Resource Dynamic Assignment Algorithm Based on Task Sequence Mechanism. IEEE Access 2019. [Google Scholar] [CrossRef]
  27. Yan, F.; Zhu, X.P.; Zhou, Z.; Tang, Y. Real-time task allocation for a heterogeneous multi-UAV simultaneous attack. SCIENTIA SINICA Inf. 2019, 49, 555–569. (In Chinese) [Google Scholar] [CrossRef]
  28. Chen, P.; Yan, F.; Liu, Z.; Cheng, G.D. Heterogeneous unmanned aerial vehicles task allocation with communication constraints. Acta Aeronaut. Et Astronaut. Sin. 2021, 42, 525844. (In Chinese) [Google Scholar]
  29. Jia, G.W.; Wang, J.F. Research review of UAV swarm mission planning method. Syst. Eng. Electron. 2021, 43, 99–111. (In Chinese) [Google Scholar]
  30. Wu, Q.B.; Zhou, S.L.; Liu, W.; Yin, G.Y. Multi-unmanned aerial vehicles cooperative search based on central-distributed model predictive control. Control. Theory Appl. 2015, 32, 1414–1421. (In Chinese) [Google Scholar]
  31. Tian, L.; Wang, M.Y.; Zhao, Q.L.; Wang, X.D.; Song, X.; Ren, Z. Distributed time-varying group formation tracking for cluster systems under switching topologies. Scientia Sinica Inf. 2020, 50, 408–423. (In Chinese) [Google Scholar]
  32. Dong, X.W.; Li, Q.D.; Zhao, Q.L.; Ren, Z. Time-varying group formation analysis and design for second-order multi-agent systems with directed topologies. Neurocomputing 2016, 205, 367–374. [Google Scholar] [CrossRef] [Green Version]
  33. Su, F. Research on Distributed Online Cooperative Mission Planning for Multiple Unmanned Combat Aerial Vehicles in Dynamic Environment. Ph.D. Thesis, National University of Defense Technology, Changsha, China, 2013. (In Chinese). [Google Scholar]
  34. Ma, D.L.; Chen, Y. Assessments of air-to-surface operational effectiveness for aircraft during combat sortie. J. Beijing Univ. Aeronaut. Astronaut. 2000, 26, 1413–1417. (In Chinese) [Google Scholar]
  35. Wang, Y.X.; Zhang, T.; Cai, Z.H.; Zhao, J.; Wu, K. Multi-UAV coordination control by chaotic grey wolf optimization based distributed MPC with event-triggered strategy. Chin. J. Aeronaut. 2020, 33, 2877–2897. [Google Scholar] [CrossRef]
  36. Zhu, Y.; Zhang, T.; Song, J.Y. Study on the Local Minima Problem of Path Planning Using Potential Field Method in Unknown Environments. Acta Autom. Sin. 2010, 36, 1122–1130. [Google Scholar] [CrossRef]
  37. Fan, S.P.; Qi, Q.; Lu, K.F.; Wu, G.; Li, L. Autonomous Collision Avoidance Technique of Cruise Missiles Based on Modified Artificial Potential Method. Trans. Beijing Inst. Technol. 2018, 38, 828–834. [Google Scholar]
  38. Ge, S.S.; Cui, Y.J. New potential functions for mobile robot path planning. IEEE Trans. Robot. Autom. 2000, 16, 615–620. [Google Scholar] [CrossRef] [Green Version]
Figure 1. The hierarchical communication topology of UAV swarms with a distributed group.
Figure 1. The hierarchical communication topology of UAV swarms with a distributed group.
Applsci 12 02865 g001
Figure 2. (a) The detection area of reconnaissance payload; (b) the available area of attack payload.
Figure 2. (a) The detection area of reconnaissance payload; (b) the available area of attack payload.
Applsci 12 02865 g002
Figure 3. The process of task assignments based on extended CNP.
Figure 3. The process of task assignments based on extended CNP.
Applsci 12 02865 g003
Figure 4. The determination mechanism on cooperators.
Figure 4. The determination mechanism on cooperators.
Applsci 12 02865 g004
Figure 5. The process of task assignment based on extended CNP.
Figure 5. The process of task assignment based on extended CNP.
Applsci 12 02865 g005
Figure 6. The coupling of the UAV mission assignment and path planning.
Figure 6. The coupling of the UAV mission assignment and path planning.
Applsci 12 02865 g006
Figure 7. The procedure for cooperative dynamic task assignment.
Figure 7. The procedure for cooperative dynamic task assignment.
Applsci 12 02865 g007
Figure 8. The communication topology G0 of the UAV swarm.
Figure 8. The communication topology G0 of the UAV swarm.
Applsci 12 02865 g008
Figure 9. The feasible area of payload: (a) the available detection area; (b) the available attack zone.
Figure 9. The feasible area of payload: (a) the available detection area; (b) the available attack zone.
Applsci 12 02865 g009
Figure 10. The initial setting of the situation between both sides.
Figure 10. The initial setting of the situation between both sides.
Applsci 12 02865 g010
Figure 11. (a) The execution sequence of the UAV swarm; (b) the diagram of the UAV swarm performing tasks.
Figure 11. (a) The execution sequence of the UAV swarm; (b) the diagram of the UAV swarm performing tasks.
Applsci 12 02865 g011
Figure 12. The initial setting of the situation between both sides. (Considering unknowned targets).
Figure 12. The initial setting of the situation between both sides. (Considering unknowned targets).
Applsci 12 02865 g012
Figure 13. (a) The execution sequence of the UAV swarm; (b) the diagram of the UAV swarm performing tasks. (Considering unknowned targets).
Figure 13. (a) The execution sequence of the UAV swarm; (b) the diagram of the UAV swarm performing tasks. (Considering unknowned targets).
Applsci 12 02865 g013
Figure 14. (a) The execution sequence of the UAV swarm; (b) the diagram of the swarm performing tasks under V5 failure.
Figure 14. (a) The execution sequence of the UAV swarm; (b) the diagram of the swarm performing tasks under V5 failure.
Applsci 12 02865 g014
Figure 15. Assignment time varies with (a) the number of subsets, (b) the number of UAVs of each subset, and (c) the number of targets.
Figure 15. Assignment time varies with (a) the number of subsets, (b) the number of UAVs of each subset, and (c) the number of targets.
Applsci 12 02865 g015
Table 1. The table of capability parameters of UAVs.
Table 1. The table of capability parameters of UAVs.
UAVInitial Position (m)The Maximum Air-Range (m)Fuel Consumption Rate (m1)Velocity
(m/s)
The Maximum Number of TasksMission Capability
ReconnaissanceAttack
V1(2500,20,200)10,0000.011202
V2(0,20,200)10,0000.03802
V3(5000,20,200)10,0000.03802
V4(500,20,200)10,0000.011202
V5(1000,20,200)10,0000.011202
V6(1500,20,200)10,0000.021002
V7(2000,20,200)10,0000.021002
V8(4500,20,200)10,0000.011202
V9(4000,20,200)10,0000.011202
V10(3500,20,200)10,0000.021002
V11(3000,20,200)10,0000.021002
Table 2. The parameter table of UAV reconnaissance payload.
Table 2. The parameter table of UAV reconnaissance payload.
Flight Height
H/m
Operating Distance
Rs,max/m
Azimuth Search Angle
φmax
Pitch Search Angle
ϕmax
Mounting Angle
α/°
200500453030
Table 3. The parameter table of UAV attack load.
Table 3. The parameter table of UAV attack load.
Flight Velocity
V/m
The Minimum Launch Distance
Ra,min/m
The Maximum off-Boresight Angle φa,max/°The Maximum Operating Range of Guidance Equipment dmax/mMaximum Horizontal Detection Angle of Guidance Equipment ± ϕa,maxAiming Time of Guidance Equipmentta/s
100806030±600.2
Table 4. The table of information on known targets.
Table 4. The table of information on known targets.
TargetCoordinate (m)Task TypeTime Window of STime Window of A
Reconnaissance SAttack ALatest (s)Earliest (s)Latest (s)Earliest (s)
T1(538.4, 3516.3, 0)73.793.798.7123.7
T2(1497.9, 3788.2, 0)117.5137.5142.5167.5
T3(2396.8, 4602.3, 0)150.3170.3175.3200.3
T4(4005.0, 4287.9, 0)193.8213.8218.8243.8
T5(3359.0, 4171.4, 0)249.6269.6274.6299.6
T6(1949.3, 3865.2, 0)167.0187.0192.0217.0
Table 5. The task assignment of the UAV swarm.
Table 5. The task assignment of the UAV swarm.
UAVAir-Range Estimation (m)The Number of TasksThe Execution Planning
V100None
V23524.001(T1, A, 98.7, 79.52)
V300None
V43486.001(T1, S, 73.7, 65.14)
V54230.002(T2, S, 117.5, 62.14)→(T6, S, 167.0, 59.20)
V63756.521(T2, A, 142.5, 74.87)
V73837.181(T6, A, 192.0, 73.23)
V84298.741(T5, S, 249.6, 57.04)
V96475.102(T3, S, 150.3, 51.47)→(T4, S, 193.8, 57.34)
V104477.551(T4, A, 218.8, 60.51)
V115702.982(T3, A, 175.3, 56.75)→(T5, A, 274.6, 66.90)
Table 6. The table of information on unknown targets.
Table 6. The table of information on unknown targets.
TargetCoordinates (m)Task Type
Reconnaissance SAttack A
T7(3467.7, 2897.7, 0)
T8(1307.7, 3057.7, 0)
Table 7. Information of unknown targets and corresponding subtasks.
Table 7. Information of unknown targets and corresponding subtasks.
TargetThe Time It Is
Discovered
DiscovererSubset to Which the Discoverer BelongsTime Window of STime Window of A
Latest (s)Earliest (s)Latest (s)Earliest (s)
T7237.9V8 (S)2271.0291.0291.0316.0
T8109.1V5 (S)1155.8175.8175.8200.8
Table 8. The task assignment of the UAV swarm.
Table 8. The task assignment of the UAV swarm.
UAVAir-range Estimation (m)The Number of TasksThe Execution Planning
V100None
V23524.001(T1, A, 98.7, 79.52)
V33262.791(T7, A, 291.0, 84.77)
V44366.552(T1, S, 73.7, 65.14)→(T8, S, 155.8, 32.90)
V54230.002(T2, S, 117.5, 62.14)→(T6, S, 167.0, 59.20)
V64502.802(T2, A, 142.5, 74.87)→(T8, A, 175.8, 135.13)
V73837.181(T6, A, 192.0, 73.23)
V85747.082(T5, S, 249.6, 57.04)→(T7, S, 271.0, 27.42)
V96475.102(T3, S, 150.3, 51.47)→(T4, S, 193.8, 57.34)
V104477.551(T4, A, 218.8, 60.51)
V115702.982(T3, A, 175.3, 56.75)→(T5, A, 274.6, 66.90)
Table 9. The bidding values of potential bidders for dynamic subtasks.
Table 9. The bidding values of potential bidders for dynamic subtasks.
Bidding Value of SubtaskSubset 1Subset 2
V2V4V3V8
T2 (S)10.7230.88−106.49−48.62
T6 (S)−6.7421.83−2.7752.89
Table 10. Task assignment under the circumstance of UAV breakdown.
Table 10. Task assignment under the circumstance of UAV breakdown.
SubtaskBidding WinnerWinning Bidding ValueStart Time (s)
T2 (S)V4 (Subset 1)30.88117.5 s
T6 (S)V8 (Subset 2)52.89167.0 s
Table 11. The simulation cases to be compared.
Table 11. The simulation cases to be compared.
CaseNumber of SubsetsNumber of UAVs of Each SubsetNumber of TargetsThe Size of the UAV Swarm
(a)5, 10, 15, 20, 25101050, 100, 150, 200, 250
(b)520, 40, 60, 80, 10010100, 200, 300, 400, 500
(c)5105, 10, 15, 20, 2550
Table 12. The real-time performance between the proposed approach and ACO in reference [10].
Table 12. The real-time performance between the proposed approach and ACO in reference [10].
The Size of the UAV SwarmThe Number of TargetsThe Total Solving Time of the CNP-Based
Approach/(Seconds)
The Total Solving Time of ACO (50 Iterations)/(Seconds)
50101.6641.5
100101.7059.8
150101.8574.9
200101.9396.2
250101.98112.5
150152.0388.2
150203.50124.1
150255.30179.0
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Qin, B.; Zhang, D.; Tang, S.; Wang, M. Distributed Grouping Cooperative Dynamic Task Assignment Method of UAV Swarm. Appl. Sci. 2022, 12, 2865. https://doi.org/10.3390/app12062865

AMA Style

Qin B, Zhang D, Tang S, Wang M. Distributed Grouping Cooperative Dynamic Task Assignment Method of UAV Swarm. Applied Sciences. 2022; 12(6):2865. https://doi.org/10.3390/app12062865

Chicago/Turabian Style

Qin, Boyu, Dong Zhang, Shuo Tang, and Mengyang Wang. 2022. "Distributed Grouping Cooperative Dynamic Task Assignment Method of UAV Swarm" Applied Sciences 12, no. 6: 2865. https://doi.org/10.3390/app12062865

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop