Topology Reconstruction Algorithm Design for Multi-Node Failure Scenarios in FANET
Highlights
- A collaborative reconstruction strategy based on geometric overlapping regions and a comprehensive node importance evaluation mechanism is proposed, which guides the cooperative reconstruction strategy to select low-criticality nodes for performing reconstruction tasks.
- An improved Artificial Potential Field (APF) algorithm that incorporates dynamic influence zones and a composite repulsion model to ensure safe and efficient path planning in complex three-dimensional environments is proposed.
- The collaborative reconstruction strategy significantly optimizes resource efficiency and safeguards network backbone integrity, achieving approximately 40% energy savings compared to independent repair methods.
- The improved APF algorithm ensures robust autonomous survivability in critical mission scenarios, achieving over 97% path planning success rates even in dynamic, highdensity obstacle environments with severe network disruptions.
Abstract
1. Introduction
- A deployment position determination strategy based on coverage intersection is designed. It utilizes the overlapping communication coverage among neighbors of the failed node to quickly identify candidate locations for connectivity restoration, thereby avoiding computationally complex global calculations.
- A node importance classification and action node selection mechanism based on multidimensional node attributes is proposed. This mechanism dynamically categorizes nodes into different types based on their topological structure and functional attributes, prioritizing low-importance nodes for network reconstruction tasks to minimize impact on core network functions.
- This paper enhances the traditional artificial potential field (APF) method and proposes an adaptive lightweight path planning approach tailored for different types of obstacles. This method employs the same path strategy for different obstacles to reduce the complexity of algorithm and balance energy optimization with real-time performance requirements.
2. Related Work Review and Analysis
2.1. Review of Related Works
2.2. Gap Analysis and Motivation
3. System Model and Problem Formulation
3.1. System Model
3.2. Problem Analysis
- : Deployment Position DeterminationThe core objective of deployment position determination is to identify the optimal deployment position while ensuring network connectivity. This paper transforms the problem into a convex optimization problem by defining the first region and the second region. The interior point method is employed to solve for the position that minimizes the sum of distances from the action node to all relevant neighboring nodes, thereby ensuring connection reliability while optimizing network communication efficiency.
- : Action Node SelectionAction node selection is an important part in the network reconstruction process. This paper constructs a comprehensive importance evaluation model based on nodes’ topological attributes (degree centrality, betweenness centrality, closeness centrality) and functional attributes (load level, remaining energy ratio), categorizing nodes into four types: A, B, C, and D. For failed nodes of varying importance, differentiated search ranges and retry strategies are employed to ensure the most suitable nodes are selected for reconstruction tasks while minimizing secondary network impacts.
- : Path Planning EnhancementPath planning must ensure that action nodes safely and efficiently reach their deployment positions. The inflexibility of repulsion ranges in traditional APF method is addressed by introducing dynamic repulsion influence zones and a composite repulsion model. The improved APF algorithm enhances safety in high-speed scenarios and reduces the probability of nodes becoming trapped in local minima.
3.3. Algorithm Framework Overview
- Deployment Position Determination (Section 4.1): Based on the intersection of communication coverage from the failed node’s neighbors, the algorithm calculates the geometrically optimal deployment position. This step transforms the connectivity restoration problem into a convex optimization problem, minimizing the mobility cost while ensuring coverage. Consequently, it determines the precise geometric coordinates required for network reconfiguration.
- Multidimensional Importance Assessment and Node Selection (Section 4.2): The system evaluates the comprehensive importance I of candidate neighboring nodes based on topological attributes (e.g., degree, betweenness) and functional attributes (e.g., energy, load), categorizing nodes into four classes: A, B, C, and D. Based on specific failure scenarios (singlenode or multi-node failures), the algorithm follows the principle of protecting core high-value nodes and prioritizing low-importance nodes to select the most suitable action node for repair tasks, thereby determining the optimal agent node for executing the reconfiguration task.
- Path Planning via Improved APF (Section 4.3): After determining the action node and target location, to ensure safe and rapid node arrival, we employ an Improved Artificial Potential Field (APF) method incorporating dynamic influence zones and tangential forces. This generates collision-free flight trajectories, enabling collision-free path generation and navigation control from the current position to the target location.
4. Detailed Design of Algorithm
4.1. Deployment Position Determination
4.1.1. Delineation of UAV Coverage Areas
4.1.2. Calculation of Deployment Position
- Deploying action node to the corresponding to a single failure node to reconstruct only that node;
- Deploying action node to the corresponding to a subset to reconstruct multiple nodes simultaneously.
- Single Node Failure (H = 1): When , the set is simply the neighbor set of the single failed node (), and the feasible region is the first region of that node.
- Multiple Node Failures (H > 1): When , the failed nodes share a common reconstruction region (), the set is the union of neighbors from multiple nodes.
4.2. Action Node Selection
4.2.1. Calculation of Node Importance
- Degree Centrality
- Betweenness Centrality
- Closeness Centrality
- Load Degree
- Residual Energy Ratio
- Comprehensive Importance
4.2.2. Classification of UAVs
- Type A nodes: the most important nodes, accounting for the top of the total number, are considered the most critical core nodes in the network.
- Type B nodes: relatively important, accounting for to of the total number.
- Type C nodes: generally of moderate importance, accounting for to of the total number;
- Type D nodes: least important, accounting for the bottom of the total number.
4.2.3. Selection of Action Node
- Single node failure scenario
- Type A Node Failure: Its action nodes can search for Type B, C, or D nodes among its three-hop neighbors;
- Type B Node Failure: Its action node can search from Type C or D nodes among its two-hop neighbors;
- Type C Node Failure: Its action node can only search from Type D nodes among its two-hop neighbors;
- Type D Node Failure: Does not trigger the active reconstruction mechanism.
- Multiple node failure scenario
- In a scenario of local dual-node failure, if one of the nodes is a Type D node, the failure condition is automatically downgraded to a local single-node failure and handled according to the single-node failure reconstruction strategy;
- In a scenario of local triple-node failure, if one of the nodes is a Type D node, the failure condition is automatically downgraded to a local dual-node failure and processed according to the dual-node failure reconstruction rules;
- Other scenarios follow the same principle.
4.3. Path Planning Enhancement
4.3.1. Traditional APF
- Safety hazards in high-speed scenarios: When encountering rapidly approaching obstacles, the fixed perception threshold lacks flexibility. It fails to provide sufficient maneuvering buffer space commensurate with relative velocity, resulting in inadequate physical response and high collision risk.
- Planning constraints in dense environments: In low-speed, densely obstructed scenarios, an overly conservative exclusion range restricts path planning space, increasing the probability of the algorithm becoming trapped in local optima.
4.3.2. Improved Repulsive Field Model Based on Dynamic Influence Zone
- Relative Kinematics Modeling and Collision Prediction
- Spatio-temporal Coupled Risk Assessment Function
- Time decay factor : controls the rate at which risks dissipate over time. A larger value indicates that the algorithm pays less attention to distant potential collisions, exhibiting stronger “myopic” characteristics and tending to address only imminent threats. Conversely, a smaller value grants the algorithm a longer temporal horizon, enabling it to provide early warnings for future potential conflicts.
- Spatial sensitivity factor : determines the “hardness” or steepness of the gradient of the spatial safety boundary. A larger value narrows the transition zone of the Sigmoid activation function, making the algorithm extremely sensitive to behaviors encroaching on the safe radius . This results in risk assessment exhibiting a step-like, hard-constrained characteristic. Conversely, a smaller value smooths the risk transition, allowing for flexible avoidance within a certain buffer zone.
- Dynamic Reconstruction of the Range of Repulsive Forces
- Composite Repulsive Force Calculation Model
4.3.3. Collaborative Computation and Motion Control for UAVs
4.4. Complexity and Overhead Analysis
4.5. Discussion on Limitations and Applicability
- Constraints of Network Sparsity: The core of deployment location determination relies on the existence of a non-empty intersection region among neighbors of failed nodes. In extremely sparse networks, if node spacing approaches the maximum communication radius R, such an intersection region may not exist. In such cases, the collaborative reconstruction strategy degrades into independent single-node repairs or fails to find feasible solutions. Therefore, this algorithm is not recommended for extremely sparse wide-area surveillance tasks with low node density or lacking redundancy.
- Sensitivity to highly dynamic topologies: Node importance evaluation relies on the accuracy of k-hop local topology information. If network topology or node functional states (e.g., energy levels and queue lengths) changes faster than the information update cycle (e.g., in hypersonic drone swarms or high-latency communication environments), computed importance values may be based on outdated data, leading to suboptimal action node selection. Consequently, this algorithm is best suited for FANETs with moderate maneuvering speeds, rather than hypersonic combat scenarios.
5. Simulation and Analysis
5.1. Validation of Node Criticality Assessment and Classification
5.1.1. Verification of Node Attribute Weight Sensitivity and Analysis
5.1.2. Impact of Different Node Type Deletions Under Fixed Network Scale
5.1.3. Differential Impact of Deleting Different Node Types Across Network Scales
5.2. Evaluation of Network Topology Reconstruction Efficiency
- Independent Reconstruction Strategy: This strategy decouples multi-node failures into multiple independent single-node failures for processing. For X faulty nodes, the algorithm strictly restricts deployment searches to their respective “primary regions (),” ignoring any overlap between regions. Consequently, this strategy adheres to a “one-to-one” repair principle, meaning repairing X faulty nodes necessarily consumes X action nodes.
- Collaborative Reconstruction Strategy: This strategy prioritizes searching the “second region ()” between faulty nodes. When overlapping coverage regions exist, the algorithm computes deployment points within these intersection areas. This leverages the geometric center effect to achieve “many-to-one” or “few-to-many” repairs (i.e., repairing X faults with Y active nodes, where ), maximizing network resource conservation.
5.2.1. Reconstruction Efficiency Analysis in Localized Single Node Failure Scenarios
5.2.2. Reconstruction Efficiency Analysis in Localized Multiple Node Failure Scenarios
5.3. Comprehensive Performance Evaluation of the Improved APF in Complex Environments
5.3.1. Comprehensive Performance Evaluation in Dynamic Environments
5.3.2. Comprehensive Performance Evaluation in Static Conditions
6. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Nomenclature
| N | The total number of nodes in the FANET |
| The network adjacency matrix at time t | |
| The edge set at time t | |
| The normalized degree centrality of node i at time t | |
| The normalized betweenness centrality of node i at time t | |
| The normalized closeness centrality of node i at time t | |
| The number of services in the MAC queue of node i at time t | |
| The maximum capacity of the MAC queue | |
| The load degree of node i at time t | |
| The residual energy of node i at time t | |
| The initial energy of a node | |
| The residual energy ratio of node i at time t | |
| The comprehensive importance of node i at time t | |
| Weight coefficients for comprehensive importance | |
| Subsets of nodes classified as Type A, B, C, and D, respectively | |
| The selected action node | |
| H | The set of failed nodes, |
| The set of neighboring nodes of node i | |
| The communication coverage area (a sphere) of node | |
| The first region for failed node | |
| The second region for a subset of failed nodes | |
| The union of neighbor sets for all failed nodes in subset S | |
| The set of positions of all nodes in | |
| The position vector of node i | |
| R | The communication radius of a UAV node |
| The optimal deployment position | |
| The attractive scale coefficient in traditional APF | |
| The repulsive scale coefficient in traditional APF | |
| Energy Constraint Factor | |
| The fixed repulsive influence range in traditional APF | |
| The dynamic repulsive influence range | |
| The absolute safety distance | |
| The time decay factor | |
| The spatial sensitivity factor | |
| The positional repulsive coefficient | |
| The velocity repulsive coefficient | |
| The expansion threshold | |
| The contraction threshold | |
| The velocity vector of the UAV | |
| The velocity vector of an obstacle | |
| The total force vector acting on the UAV | |
| The current speed of the UAV | |
| The desired velocity vector of the UAV |
References
- Hewett, R.; Puangpontip, S. On Controlling Drones for Disaster Relief. Procedia Comput. Sci. 2022, 207, 3703–3712. [Google Scholar] [CrossRef]
- Rabta, B.; Wankmüller, C.; Reiner, G. A Drone Fleet Model for Last-Mile Distribution in Disaster Relief Operations. Int. J. Disaster Risk Reduct. 2018, 28, 107–112. [Google Scholar] [CrossRef]
- Tang, Z.; Jiao, Y.; Wang, X.; Pan, X.; Peng, J. Research on Scheduling Return Communication Tasks for UAV Swarms in Disaster Relief Scenarios. Drones 2025, 9, 567. [Google Scholar] [CrossRef]
- Grando, L.; Jaramillo, J.F.G.; Leite, J.R.E.; Ursini, E.L. Systematic Literature Review Methodology for Drone Recharging Processes in Agriculture and Disaster Management. Drones 2025, 9, 40. [Google Scholar] [CrossRef]
- Dukkanci, O.; Koberstein, A.; Kara, B.Y. Drones for Relief Logistics Under Uncertainty After an Earthquake. Eur. J. Oper. Res. 2023, 310, 117–132. [Google Scholar] [CrossRef]
- Almansor, M.J.; Din, N.M.; Baharuddin, M.Z.; Ma, M.; Alsayednoor, H.M.; Al-Shareeda, M.A.; Al-asadi, A.J. Routing Protocols Strategies for Flying Ad-Hoc Network (FANET): Review, Taxonomy, and Open Research Issues. Alex. Eng. J. 2024, 109, 553–577. [Google Scholar] [CrossRef]
- Pasandideh, F.; Costa, J.P.J.D.; Kunst, R.; Hardjawana, W.; de Freitas, E.P. A Systematic Literature Review of Flying Ad Hoc Networks: State-of-the-Art, Challenges, and Perspectives. J. Field Robot. 2023, 40, 955–979. [Google Scholar] [CrossRef]
- Bakirci, M. A Novel Swarm Unmanned Aerial Vehicle System: Incorporating Autonomous Flight, Real-Time Object Detection, and Coordinated Intelligence for Enhanced Performance. Trait. Signal 2023, 40, 2063–2078. [Google Scholar] [CrossRef]
- Zou, Y.; Xia, H.; Yang, X.; Li, P.; Yi, Y. Dynamics Model of a Multi-Rotor UAV Propeller and Its Fault Detection. Drones 2025, 9, 176. [Google Scholar] [CrossRef]
- Gangopadhyay, S.; Jain, V.K. A Position-Based Modified OLSR Routing Protocol for Flying Ad Hoc Networks. IEEE Trans. Veh. Technol. 2023, 72, 12087–12098. [Google Scholar] [CrossRef]
- Yan, S.; Feng, J.; Pan, F. A Distributed Task Allocation Method for Multi-UAV Systems in Communication-Constrained Environments. Drones 2024, 8, 342. [Google Scholar] [CrossRef]
- Chen, Z.; Cheng, N.; Yin, Z.; He, J.; Lu, N. Service-Oriented Topology Reconfiguration of UAV Networks with Deep Reinforcement Learning. In Proceedings of the 14th International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 1–3 November 2022; pp. 753–758. [Google Scholar]
- Wu, K.; Chin, K.-W.; Soh, S. Multi-UAVs Network Design Algorithms for Computed Rate Maximization. IEEE Trans. Mob. Comput. 2024, 23, 8965–8980. [Google Scholar] [CrossRef]
- Kurenda, M.; Wojtowicz, K.; Sibilski, K.; Djabin, J.; Kochan, J.; Wojciechowski, P.; Marut, A. Real-Time Control of Multiple Multirotor Platforms Interconnected in a Mesh Network. In Proceedings of the 2024 IEEE International Workshop on Technologies for Defense and Security (TechDefense), Naples, Italy, 20–22 May 2024; pp. 307–311. [Google Scholar]
- Sun, J.; Chu, Y.; Shi, C.; Guo, W. An Enhanced Resilience and Throughput BBV-Based Method for UAV Networks. In Proceedings of the 2024 IEEE 24th International Conference on Communication Technology (ICCT), Chengdu, China, 18–21 October 2024; pp. 1197–1202. [Google Scholar]
- Jouhari, M.; Al-Ali, A.K.; Baccour, E.; Mohamed, A.; Erbad, A.; Guizani, M.; Hamdi, M. Distributed CNN Inference on Resource-Constrained UAVs for Surveillance Systems: Design and Optimization. IEEE Internet Things J. 2022, 9, 1227–1242. [Google Scholar] [CrossRef]
- Di Ferdinando, M.; Bianchi, D.; Di Gennaro, S.; Pepe, P. On the Robust Quantized Sampled–Data Leaderless Consensus Tracking of Nonlinear Multi–Agent Systems. In Proceedings of the 60th IEEE Conference on Decision and Control (CDC), Austin, TX, USA, 13–17 December 2021; pp. 3263–3268. [Google Scholar]
- Yu, M.; Niu, Y.; Xueda, L.; Zhang, D.; Peng, Z.; He, M.; Luo, L. Adaptive Dynamic Reconfiguration Mechanism of Unmanned Swarm Topology Based on an Evolutionary Game. J. Syst. Eng. Electron. 2023, 34, 598–614. [Google Scholar] [CrossRef]
- Alam, M.M.; Moh, S. Joint Trajectory Control, Frequency Allocation, and Routing for UAV Swarm Networks: A Multi-Agent Deep Reinforcement Learning Approach. IEEE Trans. Mob. Comput. 2024, 23, 11989–12005. [Google Scholar] [CrossRef]
- Gaydamaka, A.; Samuylov, A.; Moltchanov, D.; Ashraf, M.; Tan, B.; Koucheryavy, Y. Dynamic Topology Organization and Maintenance Algorithms for Autonomous UAV Swarms. IEEE Trans. Mob. Comput. 2024, 23, 4423–4439. [Google Scholar] [CrossRef]
- Hong, L.; Guo, H.; Liu, J.; Zhang, Y. Toward Swarm Coordination: Topology-Aware Inter-UAV Routing Optimization. IEEE Trans. Veh. Technol. 2020, 69, 10177–10187. [Google Scholar] [CrossRef]
- Matracia, M.; Kishk, M.A.; Alouini, M.-S. On the Topological Aspects of UAV-Assisted Post-Disaster Wireless Communication Networks. IEEE Commun. Mag. 2021, 59, 59–64. [Google Scholar] [CrossRef]
- Liu, Y.; Xie, J.; Xing, C.; Xie, S. Topology Construction and Topology Adjustment in Flying Ad Hoc Networks for Relay Transmission. Comput. Netw. 2023, 228, 109753. [Google Scholar] [CrossRef]
- Alam, M.M.; Arafat, M.Y.; Moh, S.; Shen, J. Topology Control Algorithms in Multi-Unmanned Aerial Vehicle Networks: An Extensive Survey. J. Netw. Comput. Appl. 2022, 207, 103495. [Google Scholar] [CrossRef]
- Gou, H.; He, Z.; Wu, X.; Zhang, G.; Du, P.; Zhai, D. A Distributed and Robust Topology Control Scheme for Drone Swarm Networks. IEEE Trans. Consum. Electron. 2025, 71, 3156–3168. [Google Scholar] [CrossRef]
- He, M.; Wang, P.; Chen, H.; Sun, B.; Wang, H. Optimization of Flying Ad Hoc Network Topology and Collaborative Path Planning for Multiple UAVs. arXiv 2025, arXiv:2506.17945. [Google Scholar] [CrossRef]
- Feng, J.; Pan, Z.; Deng, H.; Xia, Y. A Level-Based Distributed Recursive Self-Healing Algorithm of Unmanned Aerial Vehicle Swarm. IEEE Trans. Aerosp. Electron. Syst. 2025, 61, 14303–14313. [Google Scholar] [CrossRef]
- Abbasi, A.A.; Younis, M.; Akkaya, K. Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks. IEEE Trans. Parallel Distrib. Syst. 2009, 20, 1366–1379. [Google Scholar] [CrossRef]
- Cao, Z.; Nie, G.; Tian, H. A Double Reference Nodes Based Resilience Topology Management for Energy-Efficient FANET. In Proceedings of the 2025 IEEE 101st Vehicular Technology Conference (VTC2025-Spring), Oslo, Norway, 17–20 June 2025; pp. 1–6. [Google Scholar]
- Akram, V.K.; Ugurlu, O. Detecting the Most Vital Articulation Points in Wireless Multi-Hop Networks. IEEE/ACM Trans. Netw. 2023, 31, 2389–2402. [Google Scholar] [CrossRef]
- Younis, M.; Lee, S.; Gupta, S.; Fisher, K. A Localized Self-Healing Algorithm for Networks of Moveable Sensor Nodes. In Proceedings of the IEEE GLOBECOM 2008—2008 IEEE Global Telecommunications Conference, New Orleans, LA, USA, 30 November–4 December 2008; pp. 1–5. [Google Scholar]
- Cao, Y.-Y.; Liu, R.-R.; Jia, C.-X.; Wang, B.-H. Percolation in Multilayer Complex Networks with Connectivity and Interdependency Topological Structures. Commun. Nonlinear Sci. Numer. Simul. 2021, 92, 105492. [Google Scholar] [CrossRef]
- Souto, A.; Alfaia, R.; Cardoso, E.; Araújo, J.; Francês, C. UAV Path Planning Optimization Strategy: Considerations of Urban Morphology, Microclimate, and Energy Efficiency Using Q-Learning Algorithm. Drones 2023, 7, 123. [Google Scholar] [CrossRef]
- Wu, W.; Jin, Z. Virtual Force Vector Control Method of Intelligent Vehicle Path Planning. In Proceedings of the 2022 6th CAA International Conference on Vehicular Control and Intelligence (CVCI), Nanjing, China, 28–30 October 2022; pp. 1–6. [Google Scholar]
- Alam, M.M.; Moh, S. Joint Topology Control and Routing in a UAV Swarm for Crowd Surveillance. J. Netw. Comput. Appl. 2022, 204, 103427. [Google Scholar] [CrossRef]
- Du, Y.; Zhang, X.; Nie, Z. A Real-Time Collision Avoidance Strategy in Dynamic Airspace Based on Dynamic Artificial Potential Field Algorithm. IEEE Access 2019, 7, 169469–169479. [Google Scholar] [CrossRef]
- Liu, H.; Chu, X.; Leung, Y.-W.; Du, R. Simple Movement Control Algorithm for Bi-Connectivity in Robotic Sensor Networks. IEEE J. Sel. Areas Commun. 2010, 28, 994–1005. [Google Scholar] [CrossRef]
- Hao, G.; Lv, Q.; Huang, Z.; Zhao, H.; Chen, W. UAV Path Planning Based on Improved Artificial Potential Field Method. Aerospace 2023, 10, 562. [Google Scholar] [CrossRef]
- Jayaweera, H.M.; Hanoun, S. A Dynamic Artificial Potential Field (D-APF) UAV Path Planning Technique for Following Ground Moving Targets. IEEE Access 2020, 8, 192760–192776. [Google Scholar] [CrossRef]
- Pan, Z.; Zhang, C.; Xia, Y.; Xiong, H.; Shao, X. An Improved Artificial Potential Field Method for Path Planning and Formation Control of the Multi-UAV Systems. IEEE Trans. Circuits Syst. II Express Briefs 2022, 69, 1129–1133. [Google Scholar] [CrossRef]
- Wu, E.; Sun, Y.; Huang, J.; Zhang, C.; Li, Z. Multi UAV Cluster Control Method Based on Virtual Core in Improved Artificial Potential Field. IEEE Access 2020, 8, 131647–131661. [Google Scholar] [CrossRef]
- Luo, X.; Xie, J.; Xiong, L.; Liu, Y.; He, Y. Distributed Topology Control of Multiple ISAC-UAVs for Mobile Search Teams in Unknown 3-D Terrains. Ad Hoc Netw. 2025, 169, 103753. [Google Scholar] [CrossRef]
- Zhang, X.; Shi, C.; Wu, Z.; Wen, W.; Zhou, J. Stealthy Path Planning Algorithm for UAV Swarm Based on Improved APF-RRT* Under Dynamic Threat. J. Electron. Inf. Technol. 2025, 47, 5178–5191. [Google Scholar]



















| Scheme | Fault Scenario | Node Selection Metric | Information Dependency | Energy Aware | Computational Overhead |
|---|---|---|---|---|---|
| DARA [28] | Single Node | Degree Centrality | Local | No | High |
| RIM [31] | Single Node | Physical Distance | Local | No | Low |
| Yu et al. [18] | Multi-Node | Strategy Payoff | Local | Yes | Medium |
| JTFR [19,35] | Multi-Node | Link Utility and Energy | Local | Yes | High |
| Liu et al. [23] | Multi-Node | Global Greedy Search | Global | No | High |
| Gou et al. [25] | Single Node | Local Topology | Local | No | Medium |
| He et al. [26] | Multi-Node | Global Fitness Function | Global | Yes | High |
| Feng et al. [27] | Multi-Node | Hierarchical Relation | Local | No | High |
| Cao et al. [29] | Single Node | Path Analysis | Local | Yes | Low |
| Luo et al. [42] | Multi-Node | Virtual Force Sum | Local | No | Medium |
| Zhang et al. [43] | Multi-Node | Radar Probability | Hybrid | No | High |
| Proposed | Multi-Node | Multidimensional Importance | Local | Yes | Low |
| Node Type | Search Range | Retry Policy upon Failure | Action Node Type |
|---|---|---|---|
| Type A | Up to 3 hops | Continues every cycle | B, C, D |
| Type B | Up to 2 hops | Up to 3 cycles | C, D |
| Type C | Up to 2 hops | Up to 2 cycles | D |
| Type D | - | - | - |
| Parameter | Symbol | Value |
|---|---|---|
| Simulation Time | − | 100 s |
| Simulation Area | − | m3 |
| UAV Mass | m | 2.0 kg |
| Number of Nodes | M | 50 (Baseline) |
| Maximum Velocity | 30.0 m/s | |
| Maximum Acceleration | 30.0 m/s2 | |
| Normalized Initial Node Energy | 1 | |
| Communication Range | R | 150 m |
| Energy Constraint Factor | 0.2 | |
| Topological Attribute Weights | 0.2, 0.2, 0.2 | |
| Functional Attribute Weights | 0.2, 0.2 | |
| Proportions of Type A and D | 15, 15 | |
| Proportions of Type B and C | 35, 35 | |
| Fixed Repulsive range | 30.0 m | |
| Absolute Safety Distance | 10.0 m | |
| Max Dynamic Variation | 20.0 m | |
| Time Decay Factor | 0.2 | |
| Spatial Sensitivity Factor | 1.5 | |
| Dynamic Expansion Threshold | 30.0 m | |
| Dynamic Contraction Threshold | 20.0 m | |
| Attraction Scale Coefficient in Trad-APF | 20.0 | |
| Repulsion Scale Coefficient in Trad-APF | 80.0 | |
| Positional Repulsion Coefficient in Imp-APF | 60.0 | |
| Velocity Repulsion Coefficient in Imp-APF | 50.0 |
| Scenario | Obstacle Count | Obstacle Speed | Environment |
|---|---|---|---|
| S1 (Dynamic Density Stress) | 100–145 | 15 m/s | m3 |
| S2 (Dynamic Velocity Stress ) | 120 | 10–55 m/s | m3 |
| S3 (Static Density Stress ) | 50–150 | Static | m3 |
| Figure Ref. | Metric/Scenario | Quantitative Comparison | Core Conclusion |
|---|---|---|---|
| Figure 4 | Impact of Node Removal (N = 50) | Efficiency Drop: Type C: 6.4% Type A: 34.0% | Type A nodes are critical, their failure causes maximum network damage. |
| Figure 5, Figure 6, Figure 7, Figure 8, Figure 9, Figure 10, Figure 11, Figure 12 and Figure 13 | Scale Robustness (N = 75–150) | Type A Efficiency Drop: N = 75:0.06 N = 150:0.13 | Classification logic remains valid and stable across different network scales. |
| Figure 14 | Single-Node Repair (Sparse Network) | LCC Recovery Rate: Radius 100: 4.3% adius 60: 41.8% | Proposed method yields significantly higher gains in sparse topologies. |
| Figure 15, Figure 16 | Energy Consumption | Independent: 0.471 Collaborative: 0.275 | Energy consumption reduced by 41.7%, demonstrating superior efficiency. |
| LCC Recovery Rate | Independent: 25.73% Collaborative: 29.78% | Structural integrity improved by 4.05%. | |
| Figure 17 | Dynamic Density (S1) | Success Rate: Traditional: 67.7% Improved: 97.2% | Stable under congestion; Safety margin increased by 2.7 m. |
| Figure 18 | High-Speed Threat (S2) | Success Rate at 55 m/s: Traditional: Unstable Improved: 98.5% | Exhibits high robustness to high-speed dynamic threats. |
| Figure 19 | Static Dense Traps (S3) | Success Rate: Traditional: 73.9% Improved: 92.3% | Success rate increased by 18.4%; Path length shortened by 14.5%. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Chen, J.-W.; Chen, H.-M.; Lin, S.; Wang, S.; Li, H. Topology Reconstruction Algorithm Design for Multi-Node Failure Scenarios in FANET. Drones 2026, 10, 159. https://doi.org/10.3390/drones10030159
Chen J-W, Chen H-M, Lin S, Wang S, Li H. Topology Reconstruction Algorithm Design for Multi-Node Failure Scenarios in FANET. Drones. 2026; 10(3):159. https://doi.org/10.3390/drones10030159
Chicago/Turabian StyleChen, Jia-Wang, Hua-Min Chen, Shaofu Lin, Shoufeng Wang, and Hui Li. 2026. "Topology Reconstruction Algorithm Design for Multi-Node Failure Scenarios in FANET" Drones 10, no. 3: 159. https://doi.org/10.3390/drones10030159
APA StyleChen, J.-W., Chen, H.-M., Lin, S., Wang, S., & Li, H. (2026). Topology Reconstruction Algorithm Design for Multi-Node Failure Scenarios in FANET. Drones, 10(3), 159. https://doi.org/10.3390/drones10030159

