Next Article in Journal
Attitude Control of Small Fixed−Wing UAV Based on Sliding Mode and Linear Active Disturbance Rejection Control
Next Article in Special Issue
Formation Cooperative Intelligent Tactical Decision Making Based on Bayesian Network Model
Previous Article in Journal
A Review of Constrained Multi-Objective Evolutionary Algorithm-Based Unmanned Aerial Vehicle Mission Planning: Key Techniques and Challenges
Previous Article in Special Issue
An Integrated Geometric Obstacle Avoidance and Genetic Algorithm TSP Model for UAV Path Planning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cooperative Target Fencing Control for Unmanned Aerial Vehicle Swarm with Collision, Obstacle Avoidance, and Connectivity Maintenance

Naval Aviation University, Yantai 264000, China
*
Authors to whom correspondence should be addressed.
Drones 2024, 8(7), 317; https://doi.org/10.3390/drones8070317
Submission received: 4 June 2024 / Revised: 9 July 2024 / Accepted: 9 July 2024 / Published: 11 July 2024
(This article belongs to the Special Issue UAV Trajectory Generation, Optimization and Cooperative Control)

Abstract

:
This paper investigates the target fencing control problem of fixed-wing Unmanned Aerial Vehicle (UAV) swarms with collision avoidance and connectivity maintenance in obstacle environments. A distributed cooperative fencing scheme for maneuvering targets is proposed without predefined accurate formation. Firstly, considering that not all states of the target can be obtained by UAVs, a differential state observer is developed to estimate the target’s unknown speed and control input. Secondly, by constructing potential functions with fewer parameter adjustments, corresponding negative gradient terms are calculated to guarantee the flight safety and communication connectivity of the swarm. A distributed cooperative controller is designed using the self-organized theory and consensus control. Additionally, the stability of the closed-loop system with the controller is analyzed based on Lyapunov stability theory. Finally, numerical simulations are performed to illustrate the effectiveness of the proposed scheme.

1. Introduction

UAVs have been endowed with stronger autonomous decision-making and response capabilities through artificial intelligence technology. Nevertheless, the intricacy of flight airspace and the constraints of onboard sensors pose challenges for a single UAV in executing complex tasks. The UAV swarm effectively mitigates these limitations by leveraging cooperative capabilities. They are often applied to high-risk and easily exposed tasks such as target tracking [1,2], target fencing [3,4], and area searching [5]. Consequently, they have received widespread attention from scholars [6,7].
Target fencing control aims to design a cooperative controller for a group of UAVs to enclose the target within their flight convex hull [8]. The design of the fencing strategy focuses on four main aspects. The first aspect involves how to obtain the target’s unknown state. In practical tracking or fencing scenarios, the target is typically uncooperative, implying that its speed and control input are not directly accessible. Several studies assume that the target’s states were partially or entirely known by UAVs. In [9], a high-order sliding mode observer was designed to estimate the unmeasurable linear velocity of the target, enabling UAVs to enclose the target in the desired formation. In [10], the target’s state can be obtained by certain UAVs and transmitted to their neighbors through the network for distributed estimation within each formation form. An adaptive extended state observer was constructed in [11] which can simultaneously estimate the leader’s maneuvers and external disturbances.
The second aspect involves designing an appropriate control scheme for fencing. To address the problem of fencing control, various relevant controllers were designed [12,13,14,15]. In [12], a formation controller was designed to ensure that followers gradually converge to the moving convex hull formed by leaders. Based on a disturbance observer, a formation controller was designed in [13] to achieve fencing control for unmanned surface vehicle swarms containing uncertainty and external disturbance. In [14,15], a distributed circular formation controller was introduced to fence the target by guiding agents toward a fixed-distance circle centered on the target. Most existing fencing control studies, including the aforementioned literature, require pre-designing desired orientations or distances centered around the target. However, in practical applications, defining appropriate parameter values becomes challenging due to complex flight environments of UAV swarms. To overcome this, a cooperative controller for fencing the target with a constant speed was presented in [16], eliminating preset formation parameters. Building upon [16], cooperative controllers for fencing targets were further developed for mobile robot systems and UAV swarms in [17,18].
The third aspect involves the security control of the target fencing process. Safety requirements, including collision avoidance and obstacle avoidance, are fundamental for the successful swarm execution of target fencing, as well as prerequisites for other tasks [19]. Therefore, the problem of swarm cooperative control with a security mechanism is studied. Currently, there exist three methods to ensure swarm security control. The first is the widely used artificial potential field (APF) method [20,21,22,23,24]. In [20], a safety overtaking controller for multi-unmanned ground vehicles in dynamic environments was designed based on APF. In [21], an adaptive controller that combines repulsive potential function and sliding manifold was proposed to achieve the fixed-time convergence of agent formation. To address the secure area control in second-order agent systems, an exponential control obstacle function was introduced in [22] to ensure internal collision avoidance and the external obstacle avoidance of agents. In [23,24], collision avoidance in formation and trajectory tracking were solved based on the consensus term and collision avoidance term, respectively. Additionally, distributed model predictive control (DMPC) also serves as an effective method for ensuring swarm security control. In [25], DMPC was introduced to avoid collision in the formation navigation control of unmanned underwater vehicles. In [26], the MPC method was utilized to eliminate collision risks during the formation reconstruction of the robot system. In [27], a combined soft/hard constraint-based MPC scheme was designed to tackle both collision avoidance and obstacle avoidance challenges encountered by UAV swarms. The stability and feasibility of MPC for collision and obstacle avoidance in multi-agent systems were analyzed in [28]. The third approach to achieve security control is the online optimization method. In [29], the collision-free global path of a multi-robot system was calculated based on the motion planning method. Deep reinforcement learning-based methods were proposed in [30,31] to address collision avoidance in uncertain dynamic environments by planning the optimal paths. It should be noted that APF-based methods provide an explicit security controller related to distance, endowing the swarm with real-time collision and obstacle avoidance capabilities [32]. As noted in [20,21,22,23,24], the agent was treated as a particle when designing potential functions. Nevertheless, during the collision avoidance process, the body radius of UAVs cannot be ignored. The DMPC method and online optimization method are capable of overcoming model constraints and addressing control challenges in complex systems. However, they demand substantial computational resources, which may potentially compromise real-time performance, particularly when dealing with large numbers of agents or high-dimensional systems.
The fourth aspect involves effectively maintaining connectivity within the swarm during the target fencing process. Incorporating collision avoidance and obstacle avoidance terms into the cooperative controller may result in a distance between UAVs that exceeds the sensing range of onboard sensors, leading to a loss of connectivity among the swarm. Therefore, it is crucial to investigate the connectivity maintenance of the swarm system. In [33,34], the authors focused on connectivity maintenance and collision avoidance within a fixed communication topology. A decentralized adaptive output feedback formation tracking controller was proposed in [35]. However, due to its communication structure limitations, it only guaranteed connectivity between the leader and follower. In [36], a prescribed performance method was proposed to guarantee agent connectivity but failed to consider security control in obstacle avoidance environments. Despite widespread attention given to multi-agent system connectivity, several limitations as described in [33,34,35,36] remain. Furthermore, fewer research studies consider collision avoidance, obstacle avoidance, and connectivity maintenance simultaneously for swarms in complex flight environments.
Motivated by the aforementioned discussion, this paper investigates the cooperative target fencing control problem of UAV swarms with collision, obstacle avoidance, and connectivity maintenance. A distributed control scheme is proposed based on swarm self-organization theory and consensus control. Specifically, the controller comprises three primary functionalities. The navigation control term drives the swarm toward the target. The repulsive and attractive terms between UAVs are used for collision avoidance and connectivity maintenance, respectively. The obstacle avoidance term ensures the flight safety of the swarm. In comparison with existing research, the main contributions of this paper are as follows.
  • A distributed cooperative fencing control scheme for UAV swarms is proposed, comprising a target state observer and a distributed cooperative fencing controller. Compared with most existing fencing or containment schemes [12,13,14,15], the proposed control strategy directly fences a target instead of forming a formation based on preset orientations or distances and subsequently guiding the swarm around it.
  • Compared to [16,17], which only applies to fencing a target with constant speed, we design a differential state observer to estimate the unknown speed and control input of the target based on measurable position information, thus enabling cooperative fencing of a maneuvering target.
  • Different from [18], which primarily focuses on defining the separation and attraction rules, we further improve the swarm self-organized behaviors during the process of fencing a target. Within a dynamic network topology, collision, obstacle avoidance, and connectivity maintenance control mechanisms are introduced for the swarm based on local interaction information, ensuring effective target fencing in complex environments while meeting security requirements.

2. Problem Formulation

2.1. Modeling of UAV Swarm

In this paper, the nonlinear model in [37] that satisfies the relevant assumptions is used to describe the motion of the fixed-wing UAV swarm. The related variables are defined under the inertial frame x E , y E , z E in Figure 1.
Considering a system composed of n UAVs in 3D space, the mathematical model of the i - th UAV is described as follows:
x ˙ i t = V i t cos γ i t cos ψ i t y ˙ i t = V i t cos γ i t sin ψ i t z ˙ i t = V i t sin γ i t V ˙ i t = T i t D i t m i g sin γ i t γ ˙ i t = g V i t n i t cos ϕ i t cos γ i t ψ ˙ i t = L i t sin ϕ i t m i V i t cos γ i t
where i = 1 , 2 , , n is the index of the UAVs, and p i t = x i t , y i t , z i t T , V i t , γ i t , and ψ i t represent the position, speed, flight-path angle, and heading angle of the i -th UAV, respectively. m i , g , L i t , and D i t represent the mass, gravitational acceleration, lift, and drag, respectively. The actual control vector u i c t = T i t , n i t , ϕ i t T represents the thrust, g-load, and banking angle. Moreover, the constraints on the relevant variables are as follows: T min T i t T max , n min n i t n max , ϕ min ϕ i t ϕ max , V min V i t V max , ψ min ψ i t ψ max , and γ min γ i t γ max .
To facilitate the controller design, the component of V i t along the coordinate axis is defined as q i t = x ˙ t , y ˙ t , z ˙ t T , and the virtual control vector along the coordinate axis is defined as u i t = u i x t , u i y t , u i z t T . The relationships between u i t and u i c t are given as follows:
T i t = cos γ i t u x i t cos ψ i t + u y i t sin ψ i t + u z i t + g sin γ i t m i + D i t n i t = u z i t + g cos γ i t sin γ i t u x i t cos ψ i t + u y i t sin ψ i t g cos ϕ i t ϕ i t = tan 1 u y i t cos ψ i t u x i t sin ψ i t u z i t + g cos γ i t u x i t cos ψ i t + u y i t sin ψ i t sin γ i t
The flight-path angle γ i t and the heading angle ψ i t are computed by sin γ i t = z ˙ i t V i t and tan ψ i t = y ˙ i t x ˙ i t .
We denote the flight convex hull formed by the UAV swarm as c o p , that is
c o p = i = 1 n w i p i : w i 0 , i   and   i = 1 n w i = 1
Let
H p = min r c o p p T r
be the distance between the target and c o p and
h p = arg min r c o p p T r
be the point in c o p that has distance from the target, where p T represents the target’s position vector. It is obvious that p T c o p if and only if H p = 0 . The target fencing diagram is shown in Figure 2.

2.2. Dynamic Communication Topology

The interaction between UAVs can be described by graph G = v , ε , A , where v = 1 , 2 , , n is the set of nodes and ε v × v is the set of edges. The weighted adjacency matrix of G is denoted as A = a i j R n × n . If the i -th UAV can obtain the information from the j -th UAV, a i j > 0 ; otherwise, a i j = 0 . We define the Laplacian matrix of G as L = D A , where D = diag d 1 , d 2 , , d n and d i = j = 1 n a i j , i v .
Notice that the position distribution of the swarm is dynamically changing in accordance with the planned trajectory, and the UAV with sensing range is continually moving in 3D space. Therefore, the neighbor set of each UAV is constantly updated, resulting in a dynamic communication topology. We define the time-varying neighbor set of the i -th UAV as follows:
M i t = j 1 , 2 , , n , p i j μ , j i
where p i j = p i p j represents the Euclidean distance between the i -th UAV and the j -th UAV.
Remark 1.
In this paper, we assume that each UAV is equipped with the same onboard sensors and the  j -th UAV can be observed by the  i -th UAV if  p i j μ . Thus, graph  G  is undirected and the Laplacian matrix  L  is semi-positive definite.
In practical applications, the performance of sensors is related to the distance between UAVs. Therefore, combined with the dynamic topology, the communication weight based on relative distance is defined as follows.
a i j p i j = 1 , p i j 0 , τ μ 1 2 1 + cos π p i j μ τ / 1 τ , p i j τ μ , μ 0 , otherwise
where 0 < τ < 1 is the communication decay rate. Figure 3 shows the evolution of the a i j for different τ . It is obvious that a i j smoothly varies from 1 to 0 by designing (7).

2.3. Control Objective

In specific mission scenarios, UAVs are required to cooperatively fence or capture high-value flying targets. To ensure the safety of the swarm, UAVs should possess autonomous collision and obstacle avoidance capabilities. Furthermore, the behaviors associated with collision or obstacle avoidance may lead to significant separation distances, resulting in losing connectivity between UAVs once p i j > μ . Hence, maintaining connectivity within the swarm holds crucial significance. Additionally, given the limitations of onboard sensors, the speed and control input of the target may not always be directly measurable, requiring the estimation of both. In the target fencing mission, our primary concern is the dynamic changes in the position and velocity of the UAV swarm relative to the target in 3D space. Consequently, in formulating the control law, we prioritize the virtual position p i and speed q i of the UAVs as the principal control variables. Combining the above analysis, the control objective can be expressed as follows.
(C1) The target’s speed and control input can be estimated within a fixed time, i.e., lim t T i V ^ T i t = V T t and lim t T i u ^ T i t = u T t , where V T t represents target’s speed vector, and V ^ T i t and u ^ T i t represent the estimation of the target’s speed and control input for the i -th UAV, respectively.
(C2) The target can be fenced by the UAV swarm, and each UAV’s speed converges to the target’s speed eventually, i.e., lim t H p t = 0 and lim t q i t = lim t q j t = V T t .
(C3) Collision avoidance and connectivity maintenance: 2 r i n < p i j t μ , t > 0 , where r i n represents the body radius of the i - th UAV.
(C4) Obstacle avoidance: p i , o k ¯ t = p i t o k ¯ > r i n + r o k ¯ , t > 0 , k ¯ = 1 , 2 , , l , where o k ¯ represents the position vector of the k ¯ - th obstacle, and p i , o k t represents the Euclidean distance between the i - th UAV and the k ¯ - th obstacle.
Remark 2.
(C2) means that there exists a flight trajectory  p t = p t + 1 n p T t h p t , which enables the swarm to constantly fence the target, i.e., H p t = min r c o p p T r = 0  and the trajectory  p t  of the UAVs converges  p t , where   represents the Kronecker product [16].

3. Main Results

3.1. Differential State Observer

In the uncooperative scenarios, the UAVs and the target have a competitive relationship. Therefore, it is unreasonable for the UAVs to obtain V T t and u T t . Assuming that the target’s position can be measured by the UAVs through onboard sensors, we design a fixed-time state observer (8) to estimate V T t and u T t .
z ˙ 1 i t = z 2 i t κ 1 i z 1 i t p T t α 1 i sgn z 1 i t p T t κ ¯ 1 i z 1 i t p T t β 1 i sgn z 1 i t p T t z ˙ 2 i t = z 3 i t κ 2 i z 1 i t p T t α 2 i sgn z 1 i t p T t κ ¯ 2 i z 1 i t p T t β 2 i sgn z 1 i t p T t z ˙ 3 i t = κ 3 i z 1 i t p T t α 3 i sgn z 1 i t p T t κ ¯ 3 i z 1 i t p T t β 3 i sgn z 1 i t p T t
where z k i t , k = 1 , 2 , 3 represents the estimation of p T k 1 t (i.e., p T t , V T t , and u T t ) for the i - th UAV. α k i 0 , 1 satisfies α k i = k α i k 1 and α i belongs to 1 ε 1 , 1 for a sufficiently small ε 1 > 0 . β k i > 1 satisfies β k i = k β i k 1 and β i belongs to 1 , 1 + ε 2 for a sufficiently small ε 2 > 0 . Observer gains κ k i and κ ¯ k i are selected such that the polynomials s 3 + κ 1 i s 2 + κ 2 i s + κ 3 i = 0 and s 3 + κ ¯ 1 i s 2 + κ ¯ 2 i s + κ ¯ 3 i = 0 are Hurwitz.
Theorem 1.
Based on the observer (8),  V T t  and  u T t  can be estimated within a fixed time
T i λ max 2 α i P ˜ i 1 α i λ min Q ˜ i + λ max P ˜ 1 i β i 1 λ min Q ˜ 1 i λ min 1 β i P ˜ 1 i
where  Q ˜ i  and  Q ˜ 1 i  are the symmetric positive definite matrix.  P ˜ i = P ˜ i T > 0  and  P ˜ 1 i = P ˜ 1 i T > 0  satisfy the Lyapunov equation  P ˜ i A ˜ i + A ˜ i T P ˜ i = Q ˜ i  and  P ˜ 1 i A ˜ 1 i + A ˜ 1 i T P ˜ 1 i = Q ˜ 1 i , respectively, where  A ˜ i = κ 1 i 1 0 κ 2 i 0 1 κ 3 i 0 0 and A ˜ 1 i = κ ¯ 1 i 1 0 κ ¯ 2 i 0 1 κ ¯ 3 i 0 0  are Hurwitz.
Proof of Theorem 1.
We denote the observer error as ξ i t = ξ 1 i t = p T t z 1 i t and its derivatives ξ k i t = p T k 1 t z k i t take the form
ξ ˙ 1 i t = ξ 2 i t κ 1 i ξ i t α 1 i sgn ξ i t κ ¯ 1 i ξ i t β 1 i sgn ξ i t ξ ˙ 2 i t = ξ 3 i t κ 2 i ξ i t α 2 i sgn ξ i t κ ¯ 2 i ξ i t β 2 i sgn ξ i t ξ ˙ 3 i t = κ 3 i ξ i t α 3 i sgn ξ i t κ ¯ 3 i ξ i t β 3 i sgn ξ i t
Furthermore, (10) is rewritten as
ξ ˙ 1 i t = ζ ˙ 1 i t + ς ˙ 1 i t                   = ζ 2 i t κ 1 i ξ i t α 1 i sgn ξ i t + ς 2 i t κ ¯ 1 i ξ i t β 1 i sgn ξ i t ξ ˙ 2 i t = ζ ˙ 2 i t + ς ˙ 2 i t                   = ζ 3 i t κ 2 i ξ i t α 2 i sgn ξ i t + ς 3 i t κ ¯ 2 i ξ i t β 2 i sgn ξ i t ξ ˙ 3 i t = ζ ˙ 3 i t + ς ˙ 3 i t                   = κ 3 i ξ i t α 3 i sgn ξ i t κ ¯ 3 i ξ i t β 3 i sgn ξ i t
Since A ˜ and A ˜ 1 are Hurwitz, the systems ζ ˙ i t = A ˜ i ζ i t and ς ˙ i t = A ˜ 1 i ς i t are asymptotically stable.
For the function V o i = ζ i T P ˜ i ζ i + ς i T P ˜ 1 i ς i , its time derivative yields
V ˙ o i = ζ ˙ i T P ˜ i ζ i + ς ˙ i T P ˜ 1 i ς i         = ζ i T P ˜ i A ˜ i + A ˜ i T P ˜ i ζ i + ς i T P ˜ 1 i A ˜ 1 i + A ˜ 1 i T P ˜ 1 i ς i         = ζ i T Q ˜ i ζ i + ς i T Q ˜ 1 i ς i < 0
We define an energy function
V g i = Θ i T P ˜ i Θ i + Λ i T P ˜ 1 i Λ i
where Θ i = ζ i 1 ϑ 1 i , ζ i 1 ϑ 2 i , ζ i 1 ϑ 3 i , Λ i = ς i 1 σ 1 i , ς i 1 σ 2 i , ς i 1 σ 3 i , ϑ k i = k 1 α i k 2 , and σ k i = k 1 β i k 2 .
Based on [38], if α i 1 ε 1 , 1 , β i 1 , 1 + ε 2 , V g i is the Lyapunov function for the error system (11). In view of (12), it implies that V ˙ g i < 0 and
V ˙ g i λ min Q ˜ i λ max P ˜ i ζ ˙ i T P ˜ i ζ i 1 + η 1 λ min Q ˜ 1 i λ max P ˜ 1 i ς ˙ i T P ˜ 1 i ς i 1 + η 2
As noted in [38,39], the observer error converges to 0 within a fixed time, i.e., lim t T i V ^ T i t = V T t and lim t T i u ^ T i t = u T t . The convergence time T i is bounded by (9). Thus, (C1) is proved. □
Remark 3.
In [18], assuming a consistently connected communication topology, a network-based observer was designed to estimate the target’s state. In this paper, we address the challenge of maintaining connectivity within a dynamic topology and propose a differential state observer capable of simultaneously estimating the target’s velocity and control input, laying the foundation for UAV swarms to accurately fence a maneuvering target. Prior to commencing their tasks, the observer algorithm can be pre-integrated into the onboard computer, enabling real-time computation of speed and control input once the target’s position is acquired or detected.

3.2. Cooperative Fencing Controller

In this section, the cooperative target fencing controller designed for UAV swarms consists of three components: a navigation control term u i f t , a collision avoidance and connectivity maintenance term u i c t , and an obstacle avoidance term u i c o t . The schematic diagram of the cooperative target fencing control is illustrated in Figure 4.

3.2.1. Navigation Control Term

Given that the primary objective of the UAV swarm is to fence the target, it is imperative to guide each UAV towards the target using the navigation control term. Moreover, each UAV must maintain a consistent flight speed that aligns with the target’s speed to preserve a stable convex hull and ensure continuous target fencing. To fulfill these requirements, u i f t is designed, as follows:
u i f t = u ^ T i t c 1 p i t p T t c 2 q i t V ^ T t c 3 j M i t a i j t q i t q j t
where the control gains c 1 , c 2 and c 3 are positive constants.
Remark 4.
In (15),  u i f t  introduces a feedback term  c 1 p i t p T t  about the relative distance between the  i - th  UAV and the target, serving solely as an attractive term to drive the UAVs towards the target, rather than directing them to converge to the target’s position. The collision avoidance term in Section 3.2.2 ensures that the relative distance between each UAV is automatically maintained, thus guaranteeing the existence of the convex hull and enabling the swarm to fence the target.

3.2.2. Collision Avoidance and Connectivity Maintenance Term

To facilitate real-time collision avoidance, we propose a modified potential field method that incorporates the physical radius of each UAV into the design of the potential function, in contrast to previous studies [21,22,23,24,25], where the agent was treated as a particle.
Assume that the collision avoidance radius of each UAV is D s . To ensure collision avoidance and connectivity maintenance among UAVs, each UAV should be encompassed by both attractive and repulsive potential fields. As described in Figure 5a, when the relative distance p i j t = r i n + D s between UAVs, they are positioned at a safe distance and the repulsive force remains F r i j = 0 . In Figure 5b, as they continue to approach, that is, p i j t < r i n + D s , the i - th UAV triggers the repulsive potential field of the j - th UAV, resulting in the repulsion between them. In Figure 5c, p i j t = 2 r i n represents the minimum safe distance between them and the corresponding repulsive force F r i j = .
Moreover, due to the movement of the i - th UAV and the repulsive force, it is possible for the j - th UAV to be positioned outside of the sensing range, that is, p i j t > μ , resulting in a loss of connectivity between them. To address this problem, we construct an attractive potential field and constrain their relative distance within μ .
In summary, the i - th UAV and the j - th UAV exhibit repulsive behavior when p i j t 2 r i n , r i n + D s , while exhibiting attractive behavior when p i j t r i n + D s , μ . Based on the above analysis, the potential function including collision avoidance and connectivity maintenance is defined as follows:
Ψ c p i j t = r i n + D s p i j t φ c p i j t d p i j t
φ c p i j t = e p i j t r i n + D s p i j t μ p i j t 2 r i n 2 1 , p i j t 2 r i n , μ 0 , p i j t μ ,
Remark 5.
Given that collision avoidance and connectivity maintenance rely on the constraint of relative distance between UAVs, we draw inspiration from [40] to design a potential field function for achieving these two functionalities. Although target fencing control with a collision avoidance strategy has been investigated in [16,17,18], these studies generally assume that the topology between UAVs is consistently connected with time-invariant communication weights. However, in practical scenarios, it is difficult to meet these idealized conditions.
Considering the neighbor set M i t and the time-variant communication weights, the potential-based control term is formulated as
u i c t = j M i t a i j t k c p i Ψ c p i j t
where k c > 0 is the control gain and p i Ψ c p i j t represents the gradient of Ψ c p i j t along p i t .

3.2.3. Obstacle Avoidance Term

Assumption 1.
The flight trajectory of the target is ideal under  u T t , that is, no problems of obstacle avoidance arise with the target.
The obstacle avoidance potential field is defined similarly to Section 3.2.2, with the exception that the attractive term is omitted. Consider that an obstacle is surrounded by a sphere with a radius of r o k ¯ , and set the safe obstacle avoidance distance as χ r i n + r o k ¯ , where χ 1 represents the obstacle avoidance margin parameter. When the UAV detects the obstacle within its sensing range μ , it actively maneuvers away from the obstacle under the repulsive force F c i , o k ¯ .
To further illustrate the obstacle avoidance process of the swarm, a schematic diagram of the obstacle avoidance potential field is shown in Figure 6. It is noteworthy that this paper distinguishes itself from others solely focused on obstacle avoidance by also considering collision avoidance and connectivity maintenance among UAVs within the context of obstacle avoidance.
The obstacle avoidance potential function Ψ c o p i , o k ¯ t can be designed as follows:
Ψ c o p i , o k ¯ t = μ p i , o k ¯ t φ c o p i , o k ¯ t d p i , o k ¯ t
φ c o p i , o k ¯ t = e p i , o k ¯ t μ p i , o k ¯ t χ r i n + r o k ¯ 1 , p i , o k ¯ t χ r i n + r o k ¯ , μ 0 , p i , o k ¯ t μ ,
Then, the control term u i c o t is
u i c o t = ϖ i k ¯ = 1 l k o k ¯ p i , o k ¯ Ψ c o p i , o k ¯ t
where k o k ¯ > 0 is the control gain, ϖ i > 0 is designed later, and p i , o k ¯ Ψ c o p i , o k ¯ t represents the gradient of Ψ c o p i , o k ¯ t along p i , o k ¯ t .
Remark 6.
In (19), UAVs have the capability to obtain obstacle positions, with obstacle detection being performed through airborne sensing equipment. For instance, the UAV utilizes visual and laser sensors to perceive the flight environment and measure the relative distance to obstacles, thereby calculating control commands required to avoid obstacles.
Combined with the above analysis, we have developed a cooperative fencing controller (22) for UAV swarms:
u i t = u i f t + u i c t + u i c o t         = u ^ T i t c 1 p i t p T t c 2 q i t V ^ T i t c 3 j M i t a i j t q i t q j t         j M i t a i j t k c p i Ψ c p i j t ϖ i k ¯ = 1 l k o k ¯ p i , o k ¯ Ψ c o p i , o k ¯ t
Remark 7.
This paper adopts the method of the segmented design of potential fields to address collision, obstacle avoidance, and connectivity maintenance problems simultaneously. Compared to the traditional APF methods, the potential functions in this paper exhibit smooth variability, which avoids the saltation phenomenon of the controller. When obstacle avoidance and connectivity maintenance are not considered, the controller (19) can also be effectively applied to solve the target fencing control problem in [18].

3.3. Stability Analysis

Assumption 2.
The initial state of the  i - th  UAV is chosen to satisfy  p i 0 o k ¯ > χ r i n + r o k ¯ ,  p i 0 p j 0 μ , and  p i 0 p j 0 > 2 r i n .
Theorem 2.
Supposing that Assumptions 1–2 hold and the control parameters satisfy the aforementioned requirements, the fixed-wing UAV swarm is capable of effectively fencing a maneuvering target under the control law (22). Moreover, the control law facilitates collision, obstacle avoidance, and connectivity maintenance throughout the target fencing process.
Proof of Theorem 2.
According to Theorem 1, the target’s speed and control input can be observed by UAVs within a fixed time, i.e., lim t T i V ^ T i t = V T t and lim t T i u ^ T i t = u T t . Thus, the controller (22) can be transformed into
u i t = u T t c 1 p i t p T t c 2 q i t V T t                   c 3 j M i t a i j t q i t q j t                   j M i t a i j t k c p i Ψ c p i j t ϖ i k ¯ = 1 l k o k ¯ p i , o k ¯ Ψ c o p i , o k ¯ t
The control objectives (C2)–(C4) will be proved in four steps. The first part is to prove the system stability without obstacles.
Step 1: Proof of target fencing stability
For convenience, we denote p ˜ i t = p i t p T t as the position error between the i - th UAV and the target, p ¯ t = 1 n i = 1 n p ˜ i t as the average position error, q ˜ i t = q i t V T t as the speed error between the i - th UAV and the target, and q ¯ t = 1 n i = 1 n q ˜ i t as the average speed error.
The time derivative of p ¯ t yields
p ¯ ˙ t = 1 n i = 1 n p ˜ ˙ i t = 1 n i = 1 n q ˜ i t
Then, differentiating p ¯ ˙ t ,
p ¯ ¨ t = 1 n i = 1 n q ˙ i t V ˙ T t             = 1 n i = 1 n c 1 p ˜ i t c 2 q ˜ i t c 3 j M i t a i j t q i t q j t             j M i t a i j t k c p i Ψ c p i j t
Based on the definition of a dynamic network in Section 2.2, which states that the communication between UAVs is undirected, it is implied that p i j = p j i and q i j = q j i . We have i = 1 n j M i t a i j t q i t q j t = 0 and i = 1 N j M i t a i j t k c p i Ψ c p i j t = 0 .
Thus, (25) can be transformed into the following system
p ¯ ¨ t + c 1 p ¯ ˙ t + c 2 p ¯ t = 0
Due to c 1 > 0 , c 2 > 0 , it is obvious that (26) is stable. p ¯ t , p ¯ ˙ t and p ¯ ¨ t exponentially converge to zero as t . It implies that p ¯ t c o p and lim t H p = 0 , i.e., the target is fenced by the swarm.
Step 2: Proof of convergence for UAVs’ speed
We denote the following Lyapunov function candidate as
V s t = 1 2 i = 1 n q ˜ i T t q ˜ i t + c 1 p ˜ i T t p ˜ i t
The time derivative of (27) is
V ˙ s t = i = 1 n q ˜ i T t c 1 p ˜ i t c 2 q ˜ i t c 3 j M i t a i j t q ˜ i t q ˜ j t + c 1 p ˜ i T t q ˜ i t   = i = 1 n c 2 q ˜ i T t q ˜ i t c 3 q ˜ i T t j M i t a i j t q ˜ i t q ˜ j t   = c 2 q ˜ T t I n I 3 q ˜ t c 3 q ˜ T t L I 3 q ˜ t   = q ˜ T t c 3 L + c 2 I n I 3 q ˜ t
where q ˜ t = q ˜ 1 t , q ˜ 2 t , , q ˜ n t T . Since the Laplacian matrix L is positive semi-definite, I n is positive definite, and c 2 > 0 , c 3 > 0 , it follows that matrix c 3 L + c 2 I n is positive definite. Hence, V ˙ s t 0 indicates V s t V s t 0 = c , t t 0 . Combined with Theorem 1 in [40], it can be shown that Ω = p ˜ t , q ˜ t : V s t c is an invariant set and all solutions starting from Ω for Equation (29) will converge to the largest invariant set Ω ¯ = p ˜ t , q ˜ t : V s t = 0 .
V ˙ s t = q ˜ T t c 3 L + c 2 I n I 3 q ˜ t = 0
Therefore, q ˜ t = 0 , i.e., q 1 t = q 2 t = = q n t = V T t , which means that the speeds of each UAV can consistently converge to the target’s speed. With this, the control objective (C2) is proved.
Step 3: Proof of collision avoidance and connectivity maintenance
To prove (C3), the Lyapunov function V c X t is constructed as follows
V c X t = 1 2 i = 1 n j M i t a i j t k c Ψ c p i j t   + c 1 2 i = 1 n p i t p T t 2 + 1 2 i = 1 n q i t V T t 2
where vectors X t = p T t , q T t , p T T t , V T T t T , p t = p 1 t , p 2 t , , p n t T , and q t = q 1 t , q 2 t , , q n t T .
Taking the derivatives of V c X t gives
d V c X t d t = i = 1 n V c X t p i T t p ˙ i t + i = 1 n V c X t q i T t q ˙ i t + i = 1 n V c X t p T T t p ˙ T t + i = 1 n V c X t V T T t V ˙ T t   = i = 1 n u i c t T + c 1 p i t p T t T q i t   + i = 1 n c 1 p i t p T t T V T t + i = 1 n q i t V T t T u i t   + i = 1 n q i t V T t T u T t
Substituting (23) into (31), we have
d V c X t d t = i = 1 n u i c t T q i t + c 1 p i t p T t T q i t V T t   + q i t V T t T u i t u T t   = c 2 i = 1 n q i t V T t 2 i = 1 n u i c t V T T t   c 3 i = 1 n q i t V T t T j M i t a i j t q i t q j t   = c 2 i = 1 n q i t V T t 2 c 3 q ˜ T t L I 3 q ˜ t 0
In view of (30) and (32), it is derived that
a i j t k c Ψ c p i j t V c X t = V c X 0 + 0 t d V c X t d t d t V c X 0 <
If p i j t = 2 r i n , then Ψ c 2 r i n = 2 r i n r i n + D s φ c p i j t d p i j t = , which contradicts Equation (33). Hence, p i j t > 2 r i n , i j , that is, collision avoidance can be achieved between UAVs.
Note that, according to the potential field function defined in (16), if p i j t 2 r i n , r i n + D s , UAVs are affected by repulsive force, leading to an increase in the inter-UAV distance. As the distance extends to p i j t r i n + D s , μ , UAVs are impacted by the attractive force, leading to a decrease in the inter-UAV distance. By appropriately designing the potential field gain k c , the connectivity within the swarm is maintained. The control objective (C3) is proved.
Step 4: Proof of obstacle avoidance
We choose a Lyapunov function candidate V i , o k ¯ t as
V i , o k ¯ t = 1 2 p i , o k ¯ T t p i . o k ¯ t + 1 2 q i T t q i t
Differentiating V i , o k ¯ t with respect to time, we have
V ˙ i , o k ¯ t = p i , o k ¯ T t q i t + q i T t u T t c 1 p i t p T t c 2 q i t V T t   c 3 j M i t a i j t q i t q j t j M i t a i j t k c p i Ψ c p i j t   ϖ i k ¯ = 1 l k o k ¯ p i , o k ¯ Ψ c o p i , o k ¯ t
Given that the dwell time of the i - th UAV in Ω o = p i p i , o k ¯ μ is finite, the terms in (35) are bounded except ϖ i q i T t k ¯ = 1 l k o k ¯ p i , o k ¯ Ψ c o p i , o k ¯ t . From the definition of the obstacle avoidance potential field function, if p i , o k ¯ t r i n + r o k ¯ , then p i , o k ¯ Ψ c o p i , o k ¯ t . As the i - th UAV approaches the obstacle, we can derive the following inequality.
ϖ i q i T t k ¯ = 1 l k o k ¯ p i , o k ¯ Ψ c o p i , o k ¯ t > 1 2 ϖ i p i , o k ¯ T t p i . o k ¯ t + 1 2 ϖ i q i T t q i t p i , o k T t q i t q i T t u T t c 1 p i t p T t c 2 q i t V T t c 3 j M i t a i j t q i t q j t j M i t a i j t k c p i Ψ c p i j t
Substituting (23) into (31), we have V ˙ i , o k ¯ t > ϖ i V i , o k ¯ t . And the following inequality
p i , o k ¯ t 2 > 2 e ϖ i t t 0 V i , o k ¯ 0 q i t 2
holds, where q i t 2 is bounded in Ω o . Hence, we design the parameter ϖ i appropriately such that p i , o k ¯ t 2 > 2 e ϖ i t t 0 V i , o k ¯ 0 q i t 2 > r i n + r o k ¯ 2 . As a consequence, no collision occurs between UAVs and obstacles throughout the target fencing process.
It is worth noting that through Steps 1–3, we have demonstrated the stability of the system outside of Ω o . Therefore, we do not need to prove the stability of the system during the obstacle avoidance process, and it is only necessary to illustrate that under the action of the obstacle avoidance potential function, each UAV can avoid collision with obstacles. The control objective (C4) is proved.
In summary, the target fencing with collision, obstacle avoidance, and connectivity maintenance is achieved. The proof of Theorem 2 is completed. □

4. Numerical Simulation

In this section, we conduct two simulations to verify the effectiveness of the cooperative target fencing control strategy by the MATLAB R2020a platform. In the first scenario, the cooperative fencing of a target moving with a constant speed in a UAV swarm in an obstacle-free flight environment is validated. In the second scenario, it verifies that the same UAV swarm can fence a maneuvering target cooperatively in the presence of obstacles.
The parameters of the UAV model are selected from [37]. L i t and D i t are calculated by (38).
L i t = m i g n i t D i t = 1 2 ρ V i 2 t S w C D 0 + 2 k d k n 2 n i 2 t m i 2 ρ S w V i t
where ρ = 1.225 kg / m 3 , S w = 1.37 m 2 , and C D 0 = 0.02 represent the atmospheric density, the wing area, and the zero-lift drag coefficient, respectively. The rest of the parameters in the model are the include coefficient k d = 0.1 , the load-factor effectiveness k n = 1 , and the weight of the UAV m i = 20 kg . The constraints on the actual control variables are 10 N T i 125 N , 1.5 n i 2.0 , and 80 ° ϕ i 80 ° . Moreover, the body radius of each UAV is set to r i n = 10 m and sensing range is μ = 100 m .

4.1. Scenario 1: Fencing a Target with a Constant Speed without Obstacles

Consider fencing the target with four UAVs. The initial speed of the UAV is randomly chosen from 60 , 75 m / s . The controller parameters are selected as follows: c 1 = 0.7 , c 2 = 2.5 , and c 3 = 1 . The communication decay rate is set as τ = 0.5 . The parameters of the potential field are k c = 0.001 , ϖ i = 1.5 , and χ = 2 .
The simulation results of scenario 1 are shown in Figure 7, Figure 8, Figure 9, Figure 10, Figure 11, Figure 12, Figure 13, Figure 14 and Figure 15. Among them, Figure 7 and Figure 8 plot the target fencing trajectories and the final state of the UAV swarm under the controller (22), where the hexagram and triangle represent the target and the UAVs, respectively.
As depicted in Figure 9, the fencing error converges to 0, which means that the UAV swarm can fence the target, indicating that the effectiveness of the cooperative fencing strategy based on the flight convex hull is demonstrated.
Figure 10 illustrates the relative distance between UAVs, and it is obvious that p i j 2 r i n , μ is consistently upheld during the fencing process, that is, UAVs can avoid collision and maintain the connectivity under the potential function (16).
Figure 11 and Figure 12 show the relative distance p ˜ i and flight speed, and each UAV maintains a fixed distance from the target while moving at a consistent speed. Combined with Figure 10, it can be seen that the UAV swarm is capable of achieving a stable flight convex hull configuration and fence the target, which further explains Remark 4 in Section 3.2.1.
Figure 13 and Figure 14 show the calculated heading angle and flight-path angle. Figure 15 plots the time evolution of actual control variables T i , n i , and ϕ i under the imposed constraints.

4.2. Scenario 2: Fencing a Maneuvering Target with Obstacle Avoidance

This section mainly demonstrates the effectiveness of the control law for fencing a maneuvering target considering obstacle avoidance. The target’s control input is set as u t t = 0.2 sin 0.05 π t , 0.2 cos 0.05 π t , 0.01 sin 0.2 π t T , which is unknown to the UAVs. The controller parameters are c 1 = 0.7 , c 2 = 0.5 , and c 3 = 1 . Other parameters are the same as those in Section 4.1.
The simulation results of scenario 2 are shown in Figure 16, Figure 17, Figure 18, Figure 19, Figure 20, Figure 21, Figure 22, Figure 23, Figure 24 and Figure 25. Among them, Figure 16, Figure 17 and Figure 18 demonstrate that a maneuvering target remains to be fenced by the UAV swarm within an obstacle environment. Despite that the cooperative fencing error temporarily increases during obstacle avoidance, it can still rapidly converge to 0.
Figure 19 shows a partial schematic of the obstacle avoidance process, and it is obvious that p i o k ¯ > χ r i n + r o k ¯ is consistently upheld during the fencing process, that is, the UAV can avoid obstacles under the potential field (19).
Figure 20 shows the time evolution of the relative distance between UAVs under two cases: with or without the attractive potential field. As depicted in Figure 20a, p i j is consistently maintained within the range of 2 r i n , μ , indicating that UAVs can avoid collision and maintain connectivity during the obstacle avoidance process. In Figure 20b, UAVs are propelled away from obstacles by the repulsive force of obstacle avoidance, but due to the absence of inter-UAV attraction, the maximum relative distance exceeds μ . This indicates a disruption in network connectivity, leading to the impairment of the communication link.
Figure 21 depicts the relative distance p ˜ i . It is shown that there are significant fluctuations in the evolution curve of p ˜ i during the obstacle avoidance process, but it still consistently converges to a constant value, which means that UAVs can form a stable convex to fence the target.
Figure 22, Figure 23, Figure 24 and Figure 25 show the time evolution of actual states V i , ψ i , and γ i and actual control variables T i , n i , and ϕ i .

5. Conclusions

In this paper, a distributed cooperative target fencing strategy for UAV swarms with collision, obstacle avoidance, and connectivity maintenance is proposed. A differential state observer is constituted to simultaneously estimate the unknown speed and control input of the target. Collision, obstacle avoidance, and connectivity maintenance potential functions are constructed to guarantee flight safety. Based on the differential state observer and the gradient control terms, a controller without a predefined formation is designed to actualize the cooperative target fencing by combining swarm self-organized theory and consensus theory. Simulation results demonstrate the effectiveness of the proposed controller in fencing a target within an obstacle-laden environment. Future research aims to extend this study to address safety control challenges under interference and node failure conditions and to explore distributed control in a large-scale UAV swarm.

Author Contributions

Conceptualization, H.Y. and X.Y.; methodology, H.Y.; software, Y.Z. and H.Y.; validation, H.Y., Y.Z. and Z.J.; writing—original draft preparation, H.Y. and X.Y.; writing—review and editing, Y.Z. and Z.J.; visualization, H.Y.; supervision, X.Y. and Y.Z. All authors have read and agreed to the published version of the manuscript.

Funding

Our work in this paper was supported by the Natural Science Foundation of Shandong Province (ZR2020MF090).

Data Availability Statement

The data used in the experiments are available in the paper.

Conflicts of Interest

We have no conflicts of interest with any individual or organization regarding this paper.

References

  1. Liu, Z.; Xiang, L.S.; Zhu, Z.M. Cooperative Standoff Target Tracking using Multiple Fixed-Wing UAVs with Input Constraints in Unknown Wind. Drones 2023, 7, 593. [Google Scholar] [CrossRef]
  2. Ma, B.D.; Liu, Z.B.; Zhao, W.; Yuan, J.B.; Long, H.; Wang, X.; Yuan, Z.R. Target Tracking Control of UAV Through Deep Reinforcement Learning. IEEE Trans. Intell. Transp. Syst. 2023, 24, 5983–6000. [Google Scholar] [CrossRef]
  3. Zhang, D.F.; Duan, H.B.; Zeng, Z.G. Leader–Follower Interactive Potential for Target Enclosing of Perception-Limited UAV Groups. IEEE. Syst. J. 2022, 16, 856–867. [Google Scholar] [CrossRef]
  4. Zhang, F.; Shao, X.L.; Xia, Y.; Zhang, W.D. Elliptical encirclement control capable of reinforcing performances for UAVs around a dynamic target. Def. Technol. 2024, 32, 104–119. [Google Scholar] [CrossRef]
  5. Hou, Y.K.; Zhao, J.; Zhang, R.Q.; Cheng, X.; Yang, L.Q. UAV Swarm Cooperative Target Search: A Multi-Agent Reinforcement Learning Approach. IEEE Trans. Intell. Veh. 2024, 9, 568–578. [Google Scholar] [CrossRef]
  6. Fu, X.W.; Pan, J.; Wang, H.X.; Gao, X.G. A formation maintenance and reconstruction method of UAV swarm based on distributed control. Aerosp. Sci. Technol. 2020, 104, 105981. [Google Scholar] [CrossRef]
  7. Xu, C.T.; Zhang, K.; Jiang, Y.S.; Niu, S.T.; Yang, T.; Song, H.B. Communication Aware UAV Swarm Surveillance Based on Hierarchical Architecture. Drones 2021, 5, 33. [Google Scholar] [CrossRef]
  8. Hu, B.B.; Zhang, H.T.; Shi, Y. Cooperative label-free moving target fencing for second-order multi-agent systems with rigid formation. Automatica 2023, 148, 110788. [Google Scholar] [CrossRef]
  9. Lin, J.; Wang, Y.N.; Miao, Z.Q.; Fan, S.W.; Wang, H.S. Robust Observer-Based Visual Servo Control for Quadrotors Tracking Unknown Moving Targets. IEEE/ASME Trans. Mech. 2023, 28, 1268–1279. [Google Scholar] [CrossRef]
  10. Zhang, Y.; Wen, Y.Y.; Li, F.F.; Chen, Y.Y. Distributed Observer-Based Formation Tracking Control of Multi-Agent Systems with Multiple Targets of Unknown Periodic Inputs. Unmanned Syst. 2019, 7, 15–23. [Google Scholar] [CrossRef]
  11. An, B.H.; Wang, B.; Fan, H.J.; Liu, L.; Hu, H.; Wang, Y.J. Fully distributed prescribed performance formation control for UAVs with unknown maneuver of leader. Aerosp. Sci. Technol. 2022, 130, 107886. [Google Scholar] [CrossRef]
  12. Chen, L.M.; Li, C.J.; Guo, Y.N.; Ma, G.F.; Li, Y.N.; Xiao, B. Formation–containment control of multi-agent systems with communication delays. ISA Trans. 2022, 128, 32–43. [Google Scholar] [CrossRef]
  13. Wang, Y.H.; Liu, C. Distributed finite-time adaptive fault-tolerant formation–containment control for USVs with dynamic event-triggered mechanism. Ocean. Eng. 2023, 280, 114524. [Google Scholar] [CrossRef]
  14. Ju, S.; Wang, J.; Dou, L.Y. Enclosing Control for Multiagent Systems with a Moving Target of Unknown Bounded Velocity. IEEE Trans. Cybern. 2022, 52, 11561–11570. [Google Scholar] [CrossRef]
  15. Zhang, J.T.; Shao, X.L.; Zhang, W.D. Cooperative Enclosing Control with Modified Guaranteed Performance and Aperiodic Communication for Unmanned Vehicles: A Path-Following Solution. IEEE Trans. Ind. Electron. 2024, 71, 943–953. [Google Scholar] [CrossRef]
  16. Chen, Z.Y. A cooperative target-fencing protocol of multiple vehicles. Automatica 2019, 107, 591–594. [Google Scholar] [CrossRef]
  17. Kou, L.W.; Xiang, J. Target fencing control of multiple mobile robots using output feedback linearization. Acta Autom. Sin. 2020, 48, 1–7. [Google Scholar]
  18. Wen, L.D.; Zhen, Z.Y.; Wan, T.C.; Hu, Z.; Yan, C. Distributed cooperative fencing scheme for UAV swarm based on self-organized behaviors. Aerosp. Sci. Technol. 2023, 138, 108327. [Google Scholar] [CrossRef]
  19. Yu, J.L.; Dong, X.W.; Li, Q.D.; Ren, Z. Practical time-varying output formation tracking for high-order multi-agent systems with collision avoidance, obstacle dodging and connectivity maintenance. J. Frankl. Inst. 2019, 256, 5898–5926. [Google Scholar] [CrossRef]
  20. Xie, S.T.; Hu, J.Y.; Bhowmick, P.; Ding, Z.T.; Arvin, F. Distributed Motion Planning for Safe Autonomous Vehicle Overtaking via Artificial Potential Field. IEEE Trans. Intell. Transp. Syst. 2022, 23, 21531–21547. [Google Scholar] [CrossRef]
  21. Li, Q.; Wei, J.Y.; Gou, Q.X.; Niu, Z.Q. Distributed adaptive fixed-time formation control for second-order multi-agent systems with collision avoidance. Inform. Sci. 2021, 564, 27–44. [Google Scholar] [CrossRef]
  22. Rai, A.; Mou, S.S. Safe Region Multi-Agent Formation Control with Velocity Tracking. Syst. Control Lett. 2024, 186, 105776. [Google Scholar] [CrossRef]
  23. Mondal, A.; Behera, L.; Sahoo, S.R.; Shukla, A. A novel multi-agent formation control law with collision avoidance. IEEE/CAA J. Autom. Sin. 2017, 4, 558–568. [Google Scholar] [CrossRef]
  24. Mondal, A.; Bhowmick, C.; Behera, L.; Jamshidi, M. Trajectory tracking by multiple agents in formation with collision avoidance and connectivity assurance. IEEE Syst. J. 2017, 12, 2449–2460. [Google Scholar] [CrossRef]
  25. Wen, G.H.; Lam, J.; Fu, J.J.; Wang, S. Distributed MPC-Based Robust Collision Avoidance Formation Navigation of Constrained Multiple USVs. IEEE Trans. Intell. Veh. 2024, 9, 1804–1816. [Google Scholar] [CrossRef]
  26. Park, S.; Lee, S.-M. Formation Reconfiguration Control with Collision Avoidance of Nonholonomic Mobile Robots. IEEE Rob. Autom. Lett. 2023, 8, 7905–7912. [Google Scholar] [CrossRef]
  27. Vargas, S.M.; Becerra, H.; Hayet, J.B. MPC-based distributed formation control of multiple quadcopters with obstacle avoidance and connectivity maintenance. Control Eng. Pract. 2022, 121, 105054. [Google Scholar] [CrossRef]
  28. Dai, L.; Cao, Q.; Xia, Y.Q.; Gao, Y.L. Distributed MPC for formation of multi-agent systems with collision avoidance and obstacle avoidance. J. Frankl. Inst. 2017, 354, 2068–2085. [Google Scholar] [CrossRef]
  29. Xidias, E.K.; Azariadis, P.N. Computing collision-free motions for a team of robots using formation and non-holonomic constraints. Robot. Auton. Syst. 2016, 82, 15–23. [Google Scholar] [CrossRef]
  30. Sui, Z.Z.; Pu, Z.Q.; Yi, J.Q.; Wu, S.G. Formation Control with Collision Avoidance Through Deep Reinforcement Learning Using Model-Guided Demonstration. IEEE Trans. Neural Netw. Learn. Syst. 2021, 32, 2358–2372. [Google Scholar] [CrossRef] [PubMed]
  31. Pan, C.; Peng, Z.H.; Liu, L.; Wang, D. Data-driven distributed formation control of under-actuated unmanned surface vehicles with collision avoidance via model-based deep reinforcement learning. Ocean. Eng. 2023, 267, 113166. [Google Scholar] [CrossRef]
  32. Yang, S.; Bai, W.W.; Li, T.S.; Shi, Q.; Yang, Y.; Wu, Y.; Philip Chen, C.L. Neural-network-based formation control with collision, obstacle avoidance and connectivity maintenance for a class of second-order nonlinear multi-agent systems. Neurocomputing 2021, 439, 243–255. [Google Scholar] [CrossRef]
  33. Peng, Z.H.; Wang, D.; Li, T.S.; Han, M. Output-Feedback Cooperative Formation Maneuvering of Autonomous Surface Vehicles with Connectivity Preservation and Collision Avoidance. IEEE Trans. Cybern. 2019, 50, 2527–2535. [Google Scholar] [CrossRef] [PubMed]
  34. Cong, Y.Z.; Du, H.B.; Jin, Q.C.; Zhu, W.W.; Lin, X.Z. Formation control for multiquadrotor aircraft: Connectivity preserving and collision avoidance. Int. J. Robust Nonlinear Control 2020, 30, 2352–2366. [Google Scholar] [CrossRef]
  35. Dong, C.; Ye, Q.Z.; Dai, S.L. Neural-network-based adaptive output-feedback formation tracking control of USVs under collision avoidance and connectivity maintenance constraints. Neurocomputing 2020, 401, 101–112. [Google Scholar] [CrossRef]
  36. Wang, J.; Wong, W.-C.; Luo, X.Y.; Li, X.L.; Guan, X.P. Connectivity-maintained and specified-time vehicle platoon control systems with disturbance observer. Int. J. Robust Nonlinear Control 2021, 31, 7844–7861. [Google Scholar] [CrossRef]
  37. Wang, J.N.; Xin, M. Integrated Optimal Formation Control of Multiple Unmanned Aerial Vehicles. IEEE Trans. Control Syst. Technol. 2013, 21, 1731–1744. [Google Scholar] [CrossRef]
  38. Basin, M.; Yu, P.; Shtessel, Y. Finite- and fixed-time differentiators utilising HOSM techniques. IET Control Theory Appl. 2017, 11, 1144–1152. [Google Scholar] [CrossRef]
  39. Zuo, Z.Y.; Song, J.W.; Tian, B.L.; Basin, M. Robust Fixed-Time Stabilization Control of Generic Linear Systems with Mismatched Disturbances. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 759–768. [Google Scholar] [CrossRef]
  40. Qiao, Y.T.; Huang, X.X.; Yang, B.; Geng, F.L.; Wang, B.H.; Hao, M.R.; Li, S. Formation Tracking Control for Multi-Agent Systems with Collision Avoidance and Connectivity Maintenance. Drones 2022, 6, 419. [Google Scholar] [CrossRef]
Figure 1. Fixed-wing UAV model.
Figure 1. Fixed-wing UAV model.
Drones 08 00317 g001
Figure 2. Diagram of target fencing.
Figure 2. Diagram of target fencing.
Drones 08 00317 g002
Figure 3. Communication weights under different decay rates.
Figure 3. Communication weights under different decay rates.
Drones 08 00317 g003
Figure 4. Schematic diagram of the UAV swarm cooperative target fencing control.
Figure 4. Schematic diagram of the UAV swarm cooperative target fencing control.
Drones 08 00317 g004
Figure 5. Schematic diagram of collision avoidance and connectivity maintenance potential field. (a) p i j t = r i n + D s ; (b) p i j t < r i n + D s ; (c) p i j t = 2 r i n .
Figure 5. Schematic diagram of collision avoidance and connectivity maintenance potential field. (a) p i j t = r i n + D s ; (b) p i j t < r i n + D s ; (c) p i j t = 2 r i n .
Drones 08 00317 g005
Figure 6. Schematic diagram of obstacle avoidance process.
Figure 6. Schematic diagram of obstacle avoidance process.
Drones 08 00317 g006
Figure 7. Trajectories of UAV swarm during target fencing control (without obstacles).
Figure 7. Trajectories of UAV swarm during target fencing control (without obstacles).
Drones 08 00317 g007
Figure 8. Final fencing state (without obstacles).
Figure 8. Final fencing state (without obstacles).
Drones 08 00317 g008
Figure 9. Cooperative fencing error (without obstacles).
Figure 9. Cooperative fencing error (without obstacles).
Drones 08 00317 g009
Figure 10. Relative distance between UAVs without obstacles.
Figure 10. Relative distance between UAVs without obstacles.
Drones 08 00317 g010
Figure 11. Relative distance between UAVs and the target (without obstacles).
Figure 11. Relative distance between UAVs and the target (without obstacles).
Drones 08 00317 g011
Figure 12. Flight speed (without obstacles).
Figure 12. Flight speed (without obstacles).
Drones 08 00317 g012
Figure 13. Heading angle (without obstacles).
Figure 13. Heading angle (without obstacles).
Drones 08 00317 g013
Figure 14. Flight-path angle (without obstacles).
Figure 14. Flight-path angle (without obstacles).
Drones 08 00317 g014
Figure 15. Actual control variables (without obstacles).
Figure 15. Actual control variables (without obstacles).
Drones 08 00317 g015
Figure 16. Trajectories of the UAV swarm during target fencing control (with obstacles).
Figure 16. Trajectories of the UAV swarm during target fencing control (with obstacles).
Drones 08 00317 g016
Figure 17. Final fencing state (with obstacles).
Figure 17. Final fencing state (with obstacles).
Drones 08 00317 g017
Figure 18. Cooperative fencing error (with obstacles).
Figure 18. Cooperative fencing error (with obstacles).
Drones 08 00317 g018
Figure 19. Schematic diagram of obstacle avoidance. (a) Area 1; (b) area 2.
Figure 19. Schematic diagram of obstacle avoidance. (a) Area 1; (b) area 2.
Drones 08 00317 g019aDrones 08 00317 g019b
Figure 20. Relative distance between UAVs (with obstacles) (a) with connectivity maintenance; (b) without connectivity maintenance.
Figure 20. Relative distance between UAVs (with obstacles) (a) with connectivity maintenance; (b) without connectivity maintenance.
Drones 08 00317 g020
Figure 21. Relative distance between UAVs and the target (with obstacles).
Figure 21. Relative distance between UAVs and the target (with obstacles).
Drones 08 00317 g021
Figure 22. Flight speed (with obstacles).
Figure 22. Flight speed (with obstacles).
Drones 08 00317 g022
Figure 23. Heading angle (with obstacles).
Figure 23. Heading angle (with obstacles).
Drones 08 00317 g023
Figure 24. Flight-path angle (with obstacles).
Figure 24. Flight-path angle (with obstacles).
Drones 08 00317 g024
Figure 25. Actual control variables (with obstacles).
Figure 25. Actual control variables (with obstacles).
Drones 08 00317 g025
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yu, H.; Yang, X.; Zhang, Y.; Jiang, Z. Cooperative Target Fencing Control for Unmanned Aerial Vehicle Swarm with Collision, Obstacle Avoidance, and Connectivity Maintenance. Drones 2024, 8, 317. https://doi.org/10.3390/drones8070317

AMA Style

Yu H, Yang X, Zhang Y, Jiang Z. Cooperative Target Fencing Control for Unmanned Aerial Vehicle Swarm with Collision, Obstacle Avoidance, and Connectivity Maintenance. Drones. 2024; 8(7):317. https://doi.org/10.3390/drones8070317

Chicago/Turabian Style

Yu, Hao, Xiuxia Yang, Yi Zhang, and Zijie Jiang. 2024. "Cooperative Target Fencing Control for Unmanned Aerial Vehicle Swarm with Collision, Obstacle Avoidance, and Connectivity Maintenance" Drones 8, no. 7: 317. https://doi.org/10.3390/drones8070317

APA Style

Yu, H., Yang, X., Zhang, Y., & Jiang, Z. (2024). Cooperative Target Fencing Control for Unmanned Aerial Vehicle Swarm with Collision, Obstacle Avoidance, and Connectivity Maintenance. Drones, 8(7), 317. https://doi.org/10.3390/drones8070317

Article Metrics

Back to TopTop