Abstract
The conflict resolution problem in cooperative unmanned aerial vehicle (UAV) clusters sharing a three-dimensional airspace with increasing air traffic density is very important. This paper innovatively solves this problem by employing the complex network (CN) algorithm. The proposed approach allows a UAV to perform only one maneuver—that of the flight level change. The novel UAV conflict resolution is divided into two steps, corresponding to the key node selection (KS) algorithm based on the node contraction method and the sense selection (SS) algorithm based on an objective function. The efficiency of the cooperative multi-UAV collision avoidance (CA) system improved a lot due to the simple two-step collision avoidance logic. The paper compares the difference between random selection and the use of the node contraction method to select key nodes. Experiments showed that using the node contraction method to select key nodes can make the collision avoidance effect of UAVs better. The CA maneuver was validated with quantitative simulation experiments, demonstrating advantages such as minimal cost when considering the robustness of the global traffic situation, as well as significant real-time and high efficiency. The CN algorithm requires a relatively small computing time that renders the approach highly suitable for solving real-life operational situations.
1. Introduction
Collision is an inherent problem in unmanned aerial vehicle (UAV) systems [,,,,,]. Path planning is important in performing different tasks. Therefore, the demand for the collision avoidance (CA) of UAVs has emerged. With increasing UAV cluster densities, it has become more difficult to perform multi-UAV collaborative tasks, especially if collision avoidance requirement cannot be met. Therefore, the effective planning of flight trajectories and collision avoidance among UAV flight trajectories has become critical in UAV clusters for safe and smooth operation [].
Various conflict detection and resolution (CDR) theories with different techniques have been proposed to solve this problem. In conventional aviation, several widely used CA systems exist. For example, the traffic alert and CA system (TCAS) is recognized worldwide as an airborne collision avoidance system, and it is the last line of the CDR approach. Technological development has enabled the increase in air traffic density to be mitigated [,]. Many studies regarding UAV collision avoidance have been performed in recent years [,,]. CDR and the optimization of different resolutions have been discussed widely by many researchers and practitioners. These methods can be classified into two primary types of algorithms: Geometric and path planning. Geometric algorithms focus on analyzing the relationship between UAVs and intruders within a specific space to implement passive CA operations. Meanwhile, path planning algorithms focus on obtaining a path for an optimal connection between the start and end points with minimal security constraints [,,]. Dimensionality, direction selection, the number of participants, and resolutions are four key elements that should be considered for a UAV’s CDR. A detailed summary of publications regarding the different methods of CA is provided in Table 1.

Table 1.
Summary of publications addressing the CDR problem.
Geometric algorithms exploit state information such as the location, velocity, and the heading of UAVs and intruders to geometrically perform the CA operation. Park, Oh, and Tahk (2008) [] demonstrated a typical example of this approach, in which a single resolution maneuvering logic called ‘vector sharing resolution’ was proposed. This method calculates the subtraction of two UAVs’ movement vectors in a two-dimensional space and adjusts the trajectories of the UAVs based on the shortest distance vector obtained. Another instant of this method can be found in [] by Chakravarthy et al. In contrast, this paper solves the problem of obstacles being irregular objects. A collision cone approach is employed by which the irregularly shaped moving objects can be modelled through general quadric surfaces and dynamic inversion-based avoidance strategies can be derived. The limitations of this type of method is the need for information from the intruder UAV, as well as sensitivity to noise from the input data of the sensors.
Path planning algorithms include sampling-based, artificial heuristic, numerical optimization, and decoupled path planning approaches. Each method exhibits its own strength over others in certain aspects. The philosophy of sampling-based approaches is transforming the path-planning problem to obtain a suitable problem from a limited quantity of candidates that is a continuous state space. Lin and Saripalli (2017) [] presented a method based on the closed-loop rapidly exploring random tree algorithm and three variations of it. Artificial heuristic approaches are highly advantageous during the optimization process, and typical methods include the genetic algorithm [], particle swarm optimization [], and artificial bee colony optimization []. Numerical optimization approaches rely on some geometric trajectory calculations and aim to obtain an optimal path with respect to a specific objective in the solution sense. The relevant methods include mixed integer linear programming [], nonlinear programming [], Dynamic programming [], quadratic programming [], and Pontryagin’s minimum principle []. In decoupled path planning approaches, the basic principle involves obtaining an optimal trajectory under the specific constraints in the first phase; subsequently, the trajectory has to be steered out of the dangerous region. The A*(A-Star) search algorithm was applied to obtain a solution in []. The Coronoid graph can be used to generate an initial path that can be subsequently refined by curve fitting with curvature and other constrains []. The concepts of space–time reachability of aircraft and space–time potential conflict space were proposed in [] to consider the uncertainty of the pilot intent. The conflict resolution problem was modeled as a constraint optimization problem in [,]. Based on the Single European Sky Air Traffic Management Research and Next Generation Air Transportation System initiatives, [] proposed a new separation management service to shift the centralized air traffic control interventions to more efficient decentralized tactical operations based on a surrounding traffic analysis tool.
The rapid development of real-time communication technology has made real-time communication between UAVs possible. Therefore, this paper was able to consider using the real-time information of UAV to prevent collision. It is a great idea to use a complex network to analyze the nature of a system. Networks are everywhere, including the internet, electric power grids, supply chains, urban road networks, and the world trade web []. The work already done has mainly been about preventing networks from being destroyed []. The collision avoidance network is exactly the opposite of most networks, and it is necessary to destroy the network as soon as possible. The collision avoidance based on a complex network (CACN) model grounds the generation of optimal direction changes of the objective function, which integrates the number of intruder UAVs of designated direction, the robustness of the network, and the connected components of the network. The CACN strategy can reduce the domino effect to a certain extent thus improve computational consuming time. In particular, the generated points by the CACN model are recorded and can be further analyzed.
The layout of this paper is as follows. Section 2 describes the CA system architecture; Section 3 illustrates the key node selection algorithm and the sense selection algorithm; Section 4 shows the simulation experiments and analyzes the experimental results; finally, conclusions and prospects for future research are summarized in Section 5.
2. The Proposed Collision Avoidance System Architecture
Many algorithms in the collision avoidance system support its operation. The core step of the system is to process the information of each trajectory input, which is the four-dimensional (three-dimensional (3D) position + time) information of each UAV, and an analysis on whether any threat is present in the next time interval. If a threat is detected, the system immediately reacts to calculate a suitable CA strategy. The instructions are subsequently communicated to each UAV to synergistically resolve the current threat.
The distributed dynamic optimization approach (DDOA) is used to generate suitable direction changes for the UAVs such that the problem of CA can be mitigated. The core of this approach consists of two parts: The conflict detection (CD) module is used to forecast the threats, and the conflict resolution (CR) module is applied to resolve the detected conflicts. The complex network (CN) aims to avoid collisions by choosing the suitable UAV and the corresponding UAV with a local optimization scope. The CN algorithm only allows for one UAV to perform conflict resolution at one time, which is the principle of DDOA.
3. Core Algorithm Analysis
This section describes the complex network model for UAV collision avoidance system and the collision avoidance algorithm in detail. The collision avoidance algorithm consists of two parts: The key node selection algorithm and the collision avoidance direction-selection algorithm.
3.1. Representation of Cooperative UAV Flight and Conflict Detection
The background of the problem is that when large scale UAV clusters meet, it is very likely that conflicts will occur. For simplicity, weather perturbations are not discussed when analyzing the trajectories. UAVs share a common airspace in the same or different flight levels, and a UAV cluster can be considered safe only if the separation between each UAV is larger than the given safety distance. A sequence of discrete points is used to model the trajectories of the UAV, and speed information can also be obtained from these discrete tracking points.
Because UAV clusters frequently experience threats, and some threats are regarded as potential threats, it is more efficient to perform one resolution at a time rather than comprehensively considering each threat. By constructing a complex network of UAV groups and analyzing the nature of the network under threat conditions to determine the appropriate CA strategy, the human–machine group can self-organize CA under the condition of performance constraints, thus significantly improving the real-time performance and applicability of CA in UAV clusters.
The key node in the complex network theory exhibits important properties [,,,], and it exhibits the greatest effect on the entire complex network system. The UAV CA algorithm based on the complex network proposed herein considers the safety indicators of the UAV group system at each moment, such that the overall safety of the entire flight process is maximized. The CA system consists of two key algorithms: A key node selection algorithm and a collision direction-selection algorithm. The algorithm expresses the threat between the UAVs using a complex network. The UAV network model is established based on three parameters: Flight speed, flight angle, and security zone. In a real-time communication environment, all UAVs fly toward a given target and must perform CA operations. Each UAV owns a flight trajectory control module, and the CA resolution calculated by the CA system interacts with the surrounding UAVs through real-time data links.
The UAV node is used to indicate that the state of the UAV is monitored by the system in real time. Its attributes are expressed as {UAV, velocity, position, angle, t, state, sense, strength, approaching time, time cost, key-node}. The UAV indicates the UAV number, velocity indicates the UAV speed, position indicates the current position of the UAV, angle indicates UAV flight angle, t indicates the current time of the UAV, state indicates the UAV flight status, ‘sense’ indicates that the UAV collision direction is selected, ‘strength’ indicates the change direction of the UAV, ‘approaching time’ indicates the remaining time of the UAV approaching the nearest point, ‘time cost’ indicates the entire flight time consumption, and ‘key-node’ indicates whether the UAV was selected as a key node.
To detect collisions, UAVs are identified in the Cartesian system. The motion of each UAV is driven by the following:
In the above formula, and are defined as the position vector and speed vector, respectively, of at time . The foot mark i represent i-th UAV. The subscript indicates the horizontal axis system and refers to the height. Let designate the horizontal angle which is the direction of speed in the plane (counter-clockwise along the axis). Let represent the angle of climb, which is the direction of speed in the vertical plane (measured from the plane, with positive being the upwards direction and negative being the downwards direction).
The maximum climb (tilt) angle, which is determined by the performance of the UAV, is defined to limit the maximum angle at which the UAV will rise and fall in the vertical plane when performing a CA mission, thus setting the maximum pitch change angle. The constraint can be expressed as follows:
The collection of points in the next time step is as follows:
Note that and are defined as the current attitude of and the candidate attitude of in the next time step, respectively. The symbols and refer to the absolute velocity of UAVs and time interval of each time step, respectively.
When the first pair of UAVs involved in the conflict is detected, each UAV maintains its speed before the first pair of UAVs reaches the danger point to simplify the conflict situation. To determine if a threat of conflict exists, the scope and vertical criteria must be met. This time interval is defined as the time closest to the point of approach (CPA) on the horizontal plane:
The formula defines as the time to CPA in the case of a horizontal plane between and at time . The subscript h indicates the horizontal plane, while i and j indicate the serial numbers of the UAVs. The equation is defined on the condition that the denominator is not equal to zero. The following equation is defined as the time CPA in the case of a vertical plane:
A traffic alert (TA) event will be triggered if the following conditions are satisfied:
and are the range and altitude limit values for safe aviation, respectively, in case of the appearance of slow-closure-rate encounters which make the time threshold values not feasible. and are the horizontal and vertical distances between and at CPA, respectively. We used the time when the first pair of triggers a TA alert. From that moment, we built a network where each UAV is represented as a node. If a pair of nodes collides, the node will establish a connection. At that moment, all nodes in the system will verify if they are approaching; if they are approaching each other, the two nodes are connected:
In the case of a pair of UAVs, CA is based on the following principles. As shown in Figure 1, cruises from the right side to the left side, whereas and cruise from the left side to the right side. At this time, is selected as the key node. According to the scene at this time, the direction of the CA direction and the target point at the time of the predicted CPA choosing an upward climb or a downward climb may be selected. Furthermore, and the must maintain the minimum safety altitude-limitation. The specific key node selection methods and direction selection strategies are discussed later.

Figure 1.
Traffic alert and CA (collision avoidance) system (TCAS) coordination for multi-unmanned aerial vehicles (UAVs).
3.2. Key Node Selection
The first problem to solve in an encounter is choosing a key UAV to amend its trajectory to avoid collision. The method proposed herein decides the priority of the UAVs via the analysis of the network formed in the collision space. The most threatened one is chosen as the key node. Obviously, the UAV with the higher priority performs collision avoidance operations first.
To clarify, it is necessary to define the collision space. When the system detects a pair of UAVs exhibiting a collision risk, the system obtains all the possible UAV numbers to be hit in the future through global data analysis, and then it obtains the status of the corresponding UAV. The airspace formed by these UAVs is called the collision space. Among them, a connection exists between UAVs that are at the risk of collision, and a network is formed for analysis. An adjacency matrix is applied to record the status between the UAVs. The node represents the UAV, and the edge represents the relationship between the UAVs. A set is defined to contain the nodes that satisfy the condition. As shown in Figure 2, the nodes represent the corresponding UAVs.

Figure 2.
Conceptual graph for key node selection.
After the network is completed, a network description is established to describe the internal characteristics of the multi-UAV system. The nodes in the network exhibit different properties, because the position and velocity are different and the degree of threat is different. Thus, the key node can be chosen according to its properties.
First, the easiest method to measure the degree of threat of the UAVs is by examining the situation of the connected edges in the network; this is called the key node selecting method based on degree. To render the network closer to the real scene, it is insufficient to only use the number of edges. The degree approach requires more detailed information, and the edge is a good choice. The edges should contain extra properties to monitor the true relationship of the UAVs. The relationship includes the distance and relative speed between UAVs. The closer a pair of UAVs is to each other, the more dangerous they are. Therefore, the weight of each side depends on the relative distance and relative speed between the UAVs, which is defined as the edge weight between the UAVs:
where is the relative speed of the vector direction, and represent the distance between the UAVs. This implies that the faster the two UAVs approach each other, the greater is the weight of the edge between the two UAVs. The degree of importance of each node can be based on the weight of all edges. The summed value represents the degree of importance of the node.
There are many other methods to rank the importance of nodes [,]. Another improved method based on node contraction [] proposed herein aims to excavate the deeper threat of the UAV networks. There are three reasons for using the node contraction method in selecting the key node: First, the principle of key node selection is to fully exploit the importance of the node, for which the network cohesion is a good measure. The choice of key nodes is not only related to the current degree, it is also to the location of the node. If the node is in the fortress position, shrinking the node will result in a much smaller average path length of the network, resulting in greater network cohesion. This method to obtain key nodes is consistent with the key node selection requirements of the UAV group in performing CA operations, i.e., to determine the current and potential threats of the drone to perform CA. Second, the node contraction method has a shorter calculation time than the node deletion method and the median method, and it does not exponentially increase when the number of nodes is small. Finally, the original method of selecting the key nodes has its limitations, and the changes in the structure of the cluster cannot be detected well. Therefore, this method is not considered for some structurally important points.
Notation
Sets:
- sets of node representing UAV flying in the air sector under control.
- , sets of edge implying pairs of UAV that are potentially in conflict.
- , sets of relative velocity between UAVs.
- , graph representing the complex network of the UAV group.
Matrix:
- the threat matrix implying the degree of threat between pairs of UAVs.
- the adjacency matrix of graph G.
- matrix that store the relative distance between UAVs.
Variables:
- : The average distance of graph G.
- : Node that is chosen to be removed.
First, the UAV group is modelled, the UAV is replaced by a node, and the threatened UAV pairs are connected. Subsequently, the complex network can be represented by where is an undirected connected graph. We assume n nodes and m edges exist, and we represent n UAVs and m threats among them, respectively.
The threat coefficient shows the degree of threat between and , where represents the projection value of the relative speed between and on its relative position, and represents the relative position between and .
Definition 1.
is defined as follows:
The adjacency matrix of graph G is represented by; it containsnrows andncolumns. The elementis defined as follows:
The network cohesion is defined below. The degree of network cohesion depends on the connectivity of each node in the network, calculated using the arithmetic mean of the shortest distance between all pairs of nodes. The degree of network cohesion is still related to the density of the network; this is because in the UAV network, the more the number of UAVs, the greater is the threat of the entire network and the greater is the network cohesion.
The cohesion of graph G is defined as follows:
The following equation shows the importance of node []:
Because , the following inequality can be achieved.
The algorithm is as follows: []:
Input: ,
Output:
Step 1: Calculate the shortest relation distance matrix for all pairs of UAV nodes;
Step 2: Calculate the initial cohesion of the UAV network;
Step 3: Assess the node importance of all UAV nodes.
Step 4: Calculate the network cohesion after the node shrinks by calculating the shortest distance matrix and the threat matrix between the node pairs after contraction, thereby obtaining .
As shown in the algorithm steps above, the time complexity of the whole algorithm depends on the calculation of the shortest distance matrix between all pairs of nodes after the node shrinks, because the calculation of the threat matrix only requires the deletion of the nodes around the current node . Because the time complexity of the Floyd algorithm is , the complexity of the algorithm will reach , owing to the need to shrink the operation of each node. The algorithm for calculating given below is based on the initial matrix; the calculation can be completed with a small number of operations, and the time complexity of the entire algorithm will reduce to .
The direct distance matrix can be obtained by the adjacency matrix .
At this point, the change law of the shortest distance relative to between any pair of nodes in the UAV network is as follows:
- (1)
- If and :
- ①
- If , it is implied that node is on the shortest path between node and node ; then, ;
- ②
- If , it is implied that node is not on the shortest path between node and node ; then .
- (2)
- If only one node exists between node and node , then ;
- (3)
- If , then .
3.3. Direction of Collision Avoidance
Most of the CA systems use the upward or downward strategy to avoid collision. The sense selection can reduce the domino effect. For instance, two new encounters will occur if the key UAV descends, and three will occur if it climbs. The implementation of airborne CA systems II (ACAS II) [] indicates that it is effective and safe to perform resolution in the vertical direction; therefore, the method of this paper only considered the vertical change in direction. As shown in Figure 3, the key node direction choosing method was as follows.

Figure 3.
Conceptual graph for sense selection.
To generate a suitable direction for CA, we expect the UAV cluster system to minimize the cost and to choose the fastest method to reach the target, and we expect the domino effect to be as small as possible in the CA process. The objective function for direction choosing should include three elements:
(1) The Number of Intruder UAV Designated Directions
(2) Network Robustness
Complex networks rely on their robustness, i.e., the ability of a network to maintain its connectivity when a fraction of its vertices is damaged, for their function and performance []. In the context of this new conflict model, it is important to improve reliability as much as possible. The robustness of the edge connection is defined as follows:
(3) Connected Component of the Network
stand for N nodes in the network at time m, is the number of nodes that are rejected in the network at time m, and represents the number of sub-maps of the network.
In summary, the objective function at time m consists of three elements and is represented as follows:
In this formula, , , and are the corresponding weight coefficients of the three indicators. Different weights satisfy the requirements of different scenarios of CA. For instance, if , it is implied that the connected component is more important than the robustness of the network. It is noteworthy that a normalization process is required in this computation.
Assuming that the direction is amended to avoid the collision in the period and the corresponding position and pitch angle sequences of are, respectively,
the following constraints of the optimization process should be satisfied:
In the formula above, implies that the direction change should be in the range of (A,B). indicates that the pitch angle at time is determined by the global information at time m and the constrains of the CA system. By repeating the optimization procedure, the complete amending trajectory is generated.
The goal of this new model is to decompose the network as quickly as possible. This implies that after the critical node is cleared, the robustness of the connection and the number of connected components should be as low as possible. This implies that the UAVs are leaving each other and the risk of crashes is becoming smaller. Meanwhile, this model also considers the number of intruder UAVs of the corresponding direction, implying that a lesser domino effect will occur because the density of the intruder UAV is small due to the sense selected by the model. In the simulation step, the new model obtains the key nodes and evaluates the robustness of the connections or the number of connected components when different choices are made by the critical nodes. The key nodes will select the course of change and form a new network in the next simulation step. The new model will again select the key node. The model will monitor multiple UAV systems to determine if a TA alert is present; if the model stops searching for critical nodes, multiple UAV systems will be considered safe.
It is noteworthy that this method is a solution to the deadlock problem. The reasons for solving the deadlock problem are as follows: During the entire simulation period, the threat detection between real-time UAVs is performed and the network is built in real time; the key nodes are selected, and the direction of CA is selected. Therefore, the deadlock problem can be avoided.
The algorithm proposed in this paper has a simple logical structure and strong stability. Decision calculations consume very little time and meet real-time requirements. The algorithm can be applied to engineering practice due to the following reasons. Firstly, the method we proposed is designed from the perspective of scheduling. Our innovation was to abstract the collision avoidance problem of the UAV to the network’s collapse problem, aiming to solve the collision avoidance problem by using network theory. Second, the proposed method allows the UAV to perform only one maneuver—that of the flight level change. This maneuver is used in the traffic collision avoidance system (TCAS), and it is simple but very effective. As such, it can definitely be applied to the UAV collision avoidance system. The algorithm is shown below as Algorithm 1.
Algorithm 1 Novel Model Based on Key Node Research |
Input: Initial position, target position, initial velocity of the UAVs, the number of UAVs N, the simulation step length S Output: Trajectories of all the UAVs R for j = 1:S do for i = 1:N do Calculate whether a TA is issued; while TA is issued do Construct the network of the UAVs involved; Calculate the relative distance and relative velocities of all the involved UAVs; Select the key node; Calculate the weight (relevant to the number of intruders, robustness and connected component); Choose the optimal directions for the key node; Update the current direction of the key node; if no collision then break; else R[i][j] = the coordinate of the step j of UAV i; Calculate the state of all the UAVs involved in the scenario; if all the UAVs have reach the safe area then break; return R; |
4. Simulation and Results
We conducted two different simulation experiments on nine UAV scenarios for two different key node selection methods. The cruise speed set by the UAVs was 10 m/s. The minimum separation distance was set to 35 m. The simulation step size was set to 1 s. The pitch angle ranged from −0.785 to 0.785. It was assumed that each UAV can sense the global information and, as such, simulation calculation time can be ignored. The emulation code was run on a T450 laptop(Lenovo Thinkpad T450 Laptop, Lenovo, Beijing, China) with an Intel i7 processor of 2.6 GHz and 8 GB of RAM.
4.1. A Case Scenario
Figure 4a shows the UAV trajectory under the first key node selecting method, which is barely based on degree. In this scenario, the first time a TA appears is when and collide with each other. After the analysis of the CA system, we discovered that when avoiding the imminent collision, some potential collisions may occur. Therefore, when the TA issues a warning at 18:15:22 for the first time, the system selects as the key node and instructs to descend to avoid a conflict. As the simulation step progresses, and burst into each other’s collision volumes. This time, becomes the key node, and a climb instruction is sent to to avoid collision. The result in Figure 4b demonstrates the conflict resolution maneuver and that the difference in this method arises because the key node in the same scenario is different. When selecting the key node by the node contracting method, the system selects the as the key node and instructs to descend to avoid conflict. These UAVs form a decentralized CA situation. This can be explained by the fact that the robustness of the network in this area has been minimized. The intuitive image is that three UAVs have spread out and no cross routes have appeared, thus avoiding the domino effect.

Figure 4.
Trajectory (a) with key node selecting based on degree and (b) with key node selecting based on the node contraction method.
Table 2 summarizes the trajectory of and (the waypoints are recorded every 4 s for simplicity) in the same scenario under two different key node selecting methods. The UAV starts to change its angle at 18:15:23 and returns to the original trajectory at 18:17:23.

Table 2.
Waypoints of partial trajectory.
From this simulation, the results indicate that the CA system can facilitate the UAV cluster to effectively avoid collision in both scenarios. The figure illustrates the relative distance of each pair of UAVs that are involved in a collision scenario involving nine UAVs and four conflicts among them. It is noteworthy that the distance between and is defined by . Evidently, the separation of each pair of UAV is never intruded upon, according to Figure 5. For instance, in Scenario 1, encounters and , and the distances between them are always larger than the separation distance even at the closest point such that the safety flight is guaranteed, and it is the same in Scenario 2.

Figure 5.
Minimal distance of UAVs for two scenarios.
Because the algorithm implements a single-machine change in direction, when the UAV does not reach the pre-set CA altitude, the relative distance of the UAV will be reduced slightly; however, it will not collide because it is at the predicted moment of collision. The UAV has already flown to a safe altitude; therefore, although a close trend may occur during CA, the UAV can maintain a safe relative distance in the subsequent flight path.
Figure 6 depicts the situation during the final CA of the UAV group. The connection represents the potential threat between the UAVs. The connection method is the same as the logic of building the network. It is related to the relative distance between nodes and the relative speed between the nodes. The network node can identify key nodes and subsequently select the most appropriate CA direction according to the network properties.

Figure 6.
Distribution of UAVs during a threat in two scenarios.
We defined a new amount to measure the effect of UAVs when selecting key nodes using different methods. We defined this amount as the residual threat factor. The meaning of this quantity is the measure of the sum of threats to the UAVs in a certain area centered on the critical node after a conflict avoidance maneuver. That is, it evaluates the safety of the UAV in a certain area centered on the point after performing CA maneuver. Therefore, the threat coefficients of the UAVs in the area are added, and different key node selections are compared. The residual threat coefficient under the algorithm compares the advantages and disadvantages of the key node selection method. The residual threat factor (RTF) can be defined as follows:
To depict the overall threat during the CA procedure, an average residual threat factor was defined as follows:
Table 3 shows that the of the degree method was 0.0126, while the of the node contraction method was 0.0093. This implies that the node contraction method has an average threat level lower than the degree method.

Table 3.
(residual threat factor) of two key node selecting approaches in two scenarios.
4.2. Further Investigation
This section discusses the primary results obtained using the CN algorithm based on two different key node selecting algorithms, as well as those obtained by the randomly chosen key node. It also reports the statistical comparison between those methods.
To validate the performance of the CN, a set of 500 different scenarios were grouped by the UAV number, from 24 to 48 within 100 tests. The extra consuming time is a frequently used performance metric to measure the different performance metrics that are used to measure the different performances of CA system algorithms.
Figure 7 shows the extra consuming time of the CN algorithm compared with the randomly selected ‘sense.’

Figure 7.
Consuming time of the complex network (CN) algorithm and random approach.
The simulation result presented herein clearly demonstrates the good performance of the CN algorithm for solving high-density CA problems, owing to the potential threat being solved preferentially and reducing the domino conflict. This shows that the wasted time increases if the number of UAVs increases, because more encounters will occur if more UAVs are cruising in the same limited airspace. This also shows the extra consuming time increases faster than the UAV density, and the difference between the extra consuming time under the CN algorithm and the extra consuming time under the random algorithm increases as the density of the UAV increases. However, while the key node is chosen randomly, the wasted time is always larger than that of the CN algorithm where the key node is chosen based on the degree or node contraction methods. Under the middle density circumstance (90 UAVs), the key node selection method by degree consumes more time than the key node selecting method by node contraction, because the node contraction method can obtain more potential threat information and can more accurately. choose the most threatened node The opposite applies for the high airspace density (more than 100 UAVs), because the airspace is sufficiently clouded such that the most intuitive method can more efficiently handle this type of situation.
We made a comparison of our proposed CN algorithm with the satisficing game theory-based algorithm (SGTA) [], the reactive inverse proportional navigation(PN) algorithm (RIPNA) [] and the geometric optimization model algorithm (GOM) [], which is capable of dealing with large scale UAV cluster collision avoidance scenarios. This paper compared the computational time of different methods when the scene setting for each method was the same. The results for scenarios consisting of 20 UAVs, 40 UAVs and 60 UAVs are shown in Table 4.

Table 4.
Time consuming comparison of the novel algorithm.
Evidently, the computational efficiency of the CN algorithm is higher than the other three algorithms, and it is worth mentioning that the average consuming time did not exponentially increase. Table 4 shows that this method can solve the collision avoidance problem in the case of high-density traffic airspace within an acceptable range.
5. Conclusions and Future Work
We herein proposed a CA method based on CNs for a group of UAVs in a local airspace. This method used the CN theory to synchronize the trajectory of the UAV in the global scope as quickly as possible to achieve CA. The collision avoidance method consisted of two different algorithms: The key node selection algorithm and the collision direction-selection algorithm. These two sub-algorithms formed a local space range that guaranteed the threat moment when the UAV groups met. The inner safety of the UAV group was the optimal core algorithm of the CA system. The key node selection algorithm constructed the key node selection strategy through the state representation and conflict detection logic of the UAV. The direction selection algorithm selected the threat cancellation scheme based on the minimum robustness principle working with the node selection algorithm. The two algorithms jointly applied a state-of-the-art CN theory to provide a method for resolving threats that occur when a group of unmanned aircrafts meets, by analyzing various states of the UAV group in the local airspace. In this paper, we compared the collision avoidance effects of UAVs under key node selection methods based on random selection and node contraction methods. The experimental results show that the key node selection strategy based on the node contraction method has better collision avoidance effects. The computational efficiency of the CN algorithm is higher than the satisficing game theory-based algorithm (SGTA), reactive inverse PN algorithm (RIPNA) and geometric optimization model algorithm (GOM), and it is worth mentioning that the average consuming time did not exponentially increase.
Future research will focus on the following aspects: (1) Using appropriate heuristic algorithms to improve the efficiency and speed of algorithm implementation; (2) conducting a more comprehensive study of the safety indicators of UAVs and integrating them into the existing ones, thus establishing an anti-collision system to enhance the safety of the system for the UAV group; (3) considering more complicated disturbance situations (such as strong wind) to accommodate more intensive and complex situations; (4) integrating UAVs into general purpose aviation operations in a non-segregated airspace.
Author Contributions
Conceptualization, Y.H. and J.T.; methodology, Y.H.; software, Y.H.; validation, Y.H.; formal analysis, Y.H.; investigation, Y.H.; resources, Y.H., J.T. and S.L.; data curation, Y.H.; writing—original draft preparation, Y.H.; writing—review and editing, Y.H. and J.T.; visualization, Y.H.; supervision, J.T. and S.L.; project administration, J.T. and S.L.; funding acquisition, J.T. and S.L.
Funding
This research received no external funding.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Olfati-Saber, R. Flocking for multi-agent dynamic systems: Algorithms and theory. IEEE Trans. Autom. Control 2006, 51, 401–420. [Google Scholar] [CrossRef]
- Rezaee, H.; Abdollahi, F. Mobile robots cooperative control and obstacle avoidance using potential field. In Proceedings of the 2011 IEEE/ASME International, Budapest, Hungary, 3–7 July 2011; pp. 2159–6247. [Google Scholar]
- Rezaee, H.; Abdollahi, F. A decentralized cooperative control scheme with obstacle avoidance for a team of mobile robots. IEEE Trans. Ind. Electron. 2013, 61, 347–354. [Google Scholar] [CrossRef]
- Nguyen, T.; La, H.M.; Le, T.D.; Jafari, M. Formation control and obstacle avoidance of multiple rectangular agents with limited communication ranges. IEEE Trans. Control Netw. Syst. 2016, 4, 680–691. [Google Scholar] [CrossRef]
- Duguleana, M.; Mogan, G. Neural networks based reinforcement learning for mobile robots obstacle avoidance. Expert Syst. Appl. 2016, 62, 104–115. [Google Scholar] [CrossRef]
- Pallottino, L.; Feron, E.M.; Bicchi, A. Conflict resolution problems for air traffic management systems solved with mixed integer programming. IEEE Trans. Intell. Transp. 2002, 3, 3–11. [Google Scholar] [CrossRef]
- Richards, A.; How, J.P. Aircraft Trajectory Planning with Collision Avoidance Using Mixed Integer Linear Programming. In Proceedings of the American Control Conference, Anchorage, AK, USA, 8–10 May 2002; pp. 1936–1941. [Google Scholar]
- Shorrock, S.T.; Kirwan, B. Development and application of a human error identification tool for air traffic control. Appl. Ergon. 2002, 33, 319–336. [Google Scholar] [CrossRef]
- Galster, S.M.; Duley, J.A.; Masalonis, A.J. Air traffic controller performance and workload under mature free flight: Conflict detection and resolution of aircraft self-separation. Int. J. Aviat. Psychol. 2001, 11, 71–93. [Google Scholar] [CrossRef]
- Yu, X.; Zhang, Z. Sense and avoid technologies with applications to unmanned aircraft systems: Review and prospects. Prog. Aerosp. Sci. 2015, 74, 152–166. [Google Scholar] [CrossRef]
- Tang, J. Review: Analysis and Improvement of Traffic Alert and Collision Avoidance System. IEEE Access 2017, 99, 1. [Google Scholar] [CrossRef]
- LaValle, S.M. Planning Algorithms; Cambridge University Press: Cambridge, UK, 2006. [Google Scholar]
- Ha, L.N.N.T.; Bui, D.H.P.; Hong, S.K. Nonlinear Control for Autonomous Trajectory Tracking while Considering Collision Avoidance of UAVs Based on Geometric Relations. Energies 2019, 12, 1551. [Google Scholar] [CrossRef]
- Liu, Z.; Zhang, Y.; Yuan, C.; Ciarletta, L.; Theilliol, D. Collision Avoidance and Path Following Control of Unmanned Aerial Vehicle in Hazardous Environment. J. Intell. Robot. Syst. 2018, 95, 193–210. [Google Scholar] [CrossRef]
- Sharma, V.; Jayakody, D.; Kumar, R.; Li, J. Secure and Efficient Context-Aware Localization of Drones in Urban Scenarios. IEEE Commun. Mag. 2018, 56, 120–128. [Google Scholar] [CrossRef]
- Park, J.W.; Oh, H.D.; Tahk, M.J. UAV collision avoidance based on geometric approach. In Proceedings of the SICE Annual Conference, Tokyo, Japan, 20–22 August 2008; pp. 2122–2126. [Google Scholar]
- Chakravarthy, A.; Ghose, D. Generalization of the collision cone approach for motion safety in 3-D environments. Auton. Robot. 2012, 32, 243–266. [Google Scholar] [CrossRef]
- Lin, Y.; Saripalli, S. Sampling-Based Path Planning for UAV Collision Avoidance. IEEE Trans. Intell. Transp. 2017, 99, 1–14. [Google Scholar] [CrossRef]
- Pehlivanoglu, Y.V. A new vibrational generic algorithm enhanced with a Voronoi diagram for path planning of autonomous UAV. Aerosp. Sci. Technol. 2012, 16, 47–55. [Google Scholar] [CrossRef]
- Karimi, J.; Pourtakdoust, S.H. Optimal maneuver-based motion planning over terrain and threats using a dynamic hybrid PSO algorithm. Aerosp. Sci. Technol. 2013, 26, 60–71. [Google Scholar] [CrossRef]
- Xu, C.; Duan, H.B.; Liu, F. Chaotic artifical bee colony approach to uninhabited combat air vehicle (UCAV) path planning. Aerosp. Sci. Technol. 2010, 18, 535–541. [Google Scholar] [CrossRef]
- Campbell, S.E.; Bragg, M.B.; Neogi, N.A. Fuel-optimal trajectory generation for persistent contrail mitigation. AIAA J. Guid. Control Dyn. 2013, 36, 1741–1750. [Google Scholar] [CrossRef]
- Tisdale, J.; Kim, Z.; Hedrick, J.K. Autonomous UAV path planning and estimation. IEEE Robot. Autom. Mag. 2009, 16, 35–42. [Google Scholar] [CrossRef]
- Jorris, T.R.; Cobb, R.G. Multiple method 2-D trajectory optimization satisfying waypoints and no-fly zone constraints. AIAA J. Guid. Control Dyn. 2008, 31, 543–553. [Google Scholar] [CrossRef]
- Grancharova, A.; Grotli, E.I.; Ho, D.T. UAVs trajectory planning by distributed MPC under radio communication path loss constraints. J. Intell. Robot. Syst. 2014, 79, 115–134. [Google Scholar] [CrossRef]
- Sridhar, B.; Ng, H.K.; Chen, N.Y. Aircraft trajectory optimization and contrails avoidance in the presence of winds. AIAA J. Guid. Control Dyn. 2011, 34, 1577–1583. [Google Scholar] [CrossRef]
- Kim, Y.; Gu, D.W.; Postlethwaite, I. Real-time path planning with limited in formation for autonomous unmanned air vehicles. Automatica 2008, 44, 696–712. [Google Scholar] [CrossRef]
- Dai, R.; Cocharan, J. Path planning and state estimation for unmanned aerial vehicles in hostile environment. AIAA J. Guid. Control Dyn. 2010, 33, 595–601. [Google Scholar] [CrossRef]
- Hao, S.; Cheng, S.; Zhang, Y. A multi-aircraft conflict detection and resolution method for 4-dimensional trajectory-based operation. Chin. J. Aeronaut. 2018, 31, 1579–1593. [Google Scholar] [CrossRef]
- Yang, J.; Yin, D.; Shen, L.; Cheng, Q.; Xie, X. Cooperative Deconflicting Heading Maneuvers Applied to Unmanned Aerial Vehicles in Non-Segregated Airspace. J. Intell. Robot. Syst. 2018, 92, 187–201. [Google Scholar] [CrossRef]
- Yang, J.; Yin, D.; Niu, Y.; Shen, L. Distributed Cooperative Onboard Planning for the Conflict Resolution of Unmanned Aerial Vehicles. J. Guid. Control Dyn. 2019, 42, 272–283. [Google Scholar] [CrossRef]
- Radanovic, M.; Eroles, M.A.; Koca, T.; Gonzalez, J.J. Surrounding traffic complexity analysis for efficient and stable conflict resolution. Transp. Res. Part C Emerg. Technol. 2018, 95, 105–124. [Google Scholar] [CrossRef]
- Wu, J.; Tan, S.Y.; Liu, Z. Enhancing structural robustness of scale-free networks by information disturbance. Sci. Rep. 2017, 7, 7559. [Google Scholar] [CrossRef]
- Lu, L.; Chen, D.; Ren, X.L. Vital nodes identification in complex networks. Phys. Rep. 2016, 650, 1–63. [Google Scholar] [CrossRef]
- Morone, F.; Makse, H.A. Influence maximization in complex networks through optimal percolation. Nature 2015, 524, 65–68. [Google Scholar] [CrossRef]
- Ding, J.; Wen, C.; Li, G. Key node selection in minimum-cost control of complex networks. Phys. A Stat. Mech. Appl. 2017, 486, 251–261. [Google Scholar] [CrossRef]
- Tan, Y.J.; Wu, J. Network structure entropy and its application in unscaled networks. Syst. Eng. Theory Pract. 2004, 24, 1–3. [Google Scholar]
- Tang, Y.J.; Wu, J.; Deng, H.Z. Node contraction method for node importance evaluation in complex networks. Syst. Eng. Theory Pract. 2006, 26, 79–83. [Google Scholar]
- Brooker, P. Airborne collision avoidance systems and air traffic management safety. J. Navig. 2005, 58, 1–16. [Google Scholar] [CrossRef]
- Wu, J.; Deng, H.Z.; Tan, Y.J. Spectral Measure of Robustness for Internet Topology. In Proceedings of the IEEE International Conference on Computer Science, Chengdu, China, 9–11 July 2010; pp. 50–54. [Google Scholar]
- Archibald, J.K.; Hill, J.C.; Jepsen, N.A. A Satisficing Approach to Aircraft Conflict Resolution. IEEE Trans. Syst. Man Cybern. Part C 2008, 38, 510–521. [Google Scholar] [CrossRef]
- George, J.; Ghose, D. A reactive inverse PN algorithm for collision avoidance among multiple unmanned aerial vehicles. In Proceedings of the Conference on American Control Conference, St. Louis, MO, USA, 10–12 June 2009; pp. 3890–3895. [Google Scholar]
- Tang, J.; Fan, L.J.; Lao, S.Y. Collision Avoidance for Multi-UAV Based on Geometric Optimization Model in 3D Airspace. Arab. J. Sci. Eng. 2014, 39, 8409–8416. [Google Scholar] [CrossRef]
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).