Next Article in Journal
UAV-Centric Privacy-Preserving Computation Offloading in Multi-UAV Mobile Edge Computing
Previous Article in Journal
Active Fault-Tolerant Cooperative Control for Multi-QUAVs Using Relative Measurement Information
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

A Survey on UxV Swarms and the Role of Artificial Intelligence as a Technological Enabler

by
Alexandros Dimos
*,
Dimitrios N. Skoutas
*,
Nikolaos Nomikos
and
Charalabos Skianis
Department of Information and Communication Systems Engineering (ICSD), University of Aegean, 83200 Samos, Greece
*
Authors to whom correspondence should be addressed.
Drones 2025, 9(10), 700; https://doi.org/10.3390/drones9100700
Submission received: 4 September 2025 / Revised: 3 October 2025 / Accepted: 9 October 2025 / Published: 12 October 2025
(This article belongs to the Section Artificial Intelligence in Drones (AID))

Abstract

In recent years, there has been an ever increasing interest in UxVs and the technology surrounding them. A more recent area of interest within the UxV ecosystem is the development of UxV swarms. In these systems, multiple UxVs synchronize, continuously exchange information, and operate as a cohesive unit. This evolution requires a higher level of autonomy, enhanced coordination, and more efficient communication channels. In this survey, we present relevant research on swarms of UxVs, always considering artificial intelligence (AI) as the key technological enabler for the swarm operations. We view the swarm from three distinct perspectives; these are intelligence-wise, communication-wise, and security-wise. Our main goal is to explore in which ways and to what extent AI has been integrated in these aspects. We aim to identify which of these aspects are the most researched and which need deeper investigation, the types of AI that are mainly used, and which types of vehicles are preferred. We then discuss the results of our work and present current limitations as well as areas of future research in the realm of UxVs, AI, swarm intelligence, communications, and security.

1. Introduction

The rapid evolution of autonomous systems has fueled growing interest in integrating uncrewed vehicles (UxVs) across defense, civilian protection, research, logistics, agriculture, and environmental monitoring. These platforms span aerial (UAVs), ground (UGVs), and surface/underwater (USVs/UUVs) domains and offer unprecedented mobility and mission autonomy. Recent events in Ukraine have accelerated UAV development for military use [1], underscoring the inevitability of UxV adoption in additional sectors. This momentum is reflected in a large body of literature reviewing state-of-the-art (SotA) advances [2] while also proposing innovative applications, such as blockchain integration in underwater drones [3]. UAVs have great potential due to their broad applications [4,5,6,7,8], while unmanned marine vehicles (UMVs) are comparatively underexplored but show promise for industrial and civil protection scenarios [9,10,11,12]. Research on UGVs emphasizes distinct challenges in areas such as terrain adaptability and energy efficiency [13,14,15], with novel approaches in path planning [16]. Complementary studies explore cross-platform collaboration between UAVs and UGVs [17,18,19], highlighting the benefits of multimodal coordination. Beyond technical development, regulatory and governance issues are also examined [20,21,22]. Furthermore, proposals for open-source drone technologies [23] illustrate ongoing debates about transparency and standardization.
As observed, the scientific community has often treated UxVs as individual assets, focusing primarily on their standalone capabilities and performance, as well as their applications in different domains, e.g., civil, military, commercial, etc. In this review, we move one step further and treat UxVs as parts of a swarm. This swarm comprises identical vehicles, all of which follow the same collaborative logic, communicate with the same protocols, and operate as nodes of a larger network. In addition, we want to explore how AI can enhance the autonomy and operational capabilities of the swarm and its individual units. Several surveys, such as [24,25], have examined AI’s role in enhancing the autonomy of individual UxVs as well as the introduced challenges. Here, we extend this perspective to the swarm level, investigating how AI can enable collaborative behaviors and system-wide resilience. We firmly believe that AI can play a pivotal role in aspects such as adaptive communications, dynamic decision-making, and more robust security and self-adaptable mechanisms. Such advancements could potentially reduce or even eliminate the need for human controller supervision of each drone.

1.1. Our Contribution

Motivated by the observations outlined above, this review paper surveys SotA methodologies for implementing UxV swarms, while simultaneously encouraging further research across multiple facets of the field. Although there exists a wealth of reviews and analyses on UxVs—both as standalone platforms and as components within a swarm—many tend to either concentrate on narrowly defined technologies or provide only a high-level perspective on the evolution of drone and swarm systems.
In this context, the primary contributions of this paper are as follows:
  • Present a thorough overview of the existing literature, i.e., reviews, surveys, etc., in the domain of swarm technologies and identify research gaps.
  • Enhance understanding on how AI can be integrated in different swarm operations, e.g., path planning, formation control, etc.
  • Investigate how AI can improve the swarm’s networking, e.g., adaptive communication protocols, channel selection, etc.
  • Enhance the security posture of the swarm with anomaly detection, self-recovery, and self-adaptability to external and internal factors.
  • Analyze trends in vehicle selection to highlight dominant platforms and neglected domains.
  • Discuss our findings and elaborate on future areas of research.
The novelty of our work lies in its agnostic and holistic approach to swarm intelligence in autonomous systems. Unlike existing reviews, which often focus on specific vehicle types, particular AI algorithms, or narrow application domains, our study deliberately avoids these constraints. We treat the swarm as a conceptual and functional entity. We analyze its behavior, coordination mechanisms, and emergent properties independent of the underlying hardware or software implementation.

1.2. Methodology

In this chapter, we describe the methodology used to collect and select the literature analyzed in this survey. The methodology we followed is compliant with the PRISMA 2020 guidelines. Our goal was to identify peer-reviewed studies on UxV swarms that apply AI methods to swarm intelligence, communication, and security. This ensures that our review is both comprehensive and reproducible. We adopted an iterative, keyword-driven search strategy and queried the following electronic databases between April and June 2025:
  • MDPI;
  • IEEE Xplore Digital Library;
  • SpringerLink;
  • ScienceDirect;
  • Scopus;
  • Google Scholar.
To uncover research spanning all aspects of swarm intelligence, communication, and security, we searched using combinations of relevant keywords, including the following: “UxV swarm”, “UAV swarm”, “UGV swarm”, “UUV swarm”, “USV swarm”, “multi-robot swarm”, “swarm intelligence”, “AI in UxV swarms”, “machine learning in UxV swarms”, “reinforcement learning in UxV swarms”, “federated learning in UxV swarms”, “adaptive swarm communications”, “machine learning-driven swarm communications”, “swarm security”, “AI-driven swarm security”, “machine learning for swarm intrusion detection”.
Our results were filtered to include only peer-reviewed journal and conference papers. Citation trails of key publications were also followed to capture additional influential works that might not have been indexed under the same terms. We included studies that
  • Focused on UxV swarms (UAV, UGV, USV, UUV, or mixed swarms);
  • Applied AI-, ML-, or data-driven methods to swarm intelligence, communication, or security;
  • Were published in English and peer-reviewed (journal or conference).
We excluded
  • Non-peer-reviewed works such as patents, theses, and white papers;
  • Duplicate records across databases.
All records were imported into a reference manager (Zotero), where duplicates were automatically and manually removed by matching DOI, title, and author. The authors did not use any automation tools to filter out possibly irrelevant records. Two authors independently screened titles and abstracts for relevance, resolving disagreements by consensus. The full text of the remaining titles was then retrieved by the authors. Subsequently, full-text screening was conducted to confirm that each included study was relevant to the thematic focus of our review. A summary of the described methodology, along with the counts of all the reports we collected and filtered, adapted from the PRISMA 2020 guidelines, is shown in Figure 1.

2. Previous Review and Survey Works

Previously, a wide range of reviews and surveys have been published investigating SI, swarm communications, and swarm security. Our goal in this chapter is to show whether there is relevant research that focuses on AI as the main technological enabler for the above sectors. The AI umbrella covers a plethora of algorithms, from rule-based ones to the more dynamic ones, e.g., neural networks (NNs) and machine learning (ML). In this review, we will focus on modern algorithms that handle ML, NNs, deep learning (DL), reinforcement learning (RL), deep reinforcement learning (DRL), and even large language models (LLMs). Consequently, we will examine whether the reviewed articles from Table 1 and Table 2 address the following key areas, which are also presented in Figure 2:
  • AI in Swarm Intelligence: Applications of AI to swarm coordination, path planning, resource allocation, target tracking, formation control, and other collective swarm behaviors.
  • AI-Based Adaptive Communications: Use of AI to enable dynamic and adaptive communication systems, including adaptive routing protocols, frequency allocation, channel selection, topology control, and quality-of-service (QoS) optimization.
  • AI-Driven Security Mechanisms: Techniques leveraging AI to enhance the security and resilience of the swarm and individual agents, including anomaly detection, intrusion detection, self-healing, fault tolerance, and automated incident response.
Table 1 and Table 2 provide a high-level analysis of the collected surveys, using three types of annotations to indicate the extent of coverage across the key areas:
  • ✓: Indicates that the survey offers a comprehensive analysis of the subject, supported by examples and in-depth discussion.
  • ✗: Indicates that the survey does not address the subject at all.
  • Partially: Indicates that the survey mentions the subject briefly or superficially, without detailed discussion or illustrative examples.

2.1. AI in Swarm Intelligence

Research into AI-driven swarm intelligence (SI) is diverse, encompassing both rule-based approaches and advanced AI methodologies. We need to clarify here that we adopt the definition of SI from [48], which defines it as a mindset of intelligent groups of simple agents that exchange information with each other or with the environment following basic rules that collectively lead to global system behavior. Sarkar et al. [28] place AI as the central enabler for swarm coordination. They leverage ML, DL, RL, convolutional neural networks (CNNs), and recurrent neural networks (RNNs) for tasks such as trajectory optimization and resource allocation. Their approach aligns closely with our focus on AI as a foundational swarm technology, although they only partially cover security aspects. Alqudsi et al. [34] similarly adopt AI for autonomy, obstacle avoidance, and decision-making, but omit security mechanisms. In a similar manner, the researchers in [44] place AI as the cornerstone of SI, by highlighting the role of ML, DL, and RL and evolutionary algorithms in decision-making, autonomous control, path planning, and environment perception. Following the same trend, Javed et al. similarly adopt AI (RL, NNs, clustering, SVMs) for task coordination, path planning, formation control, autonomous decision-making, and data processing in [45]. The work in [46] stands out by choosing generative artificial intelligence (GAI) as the main technological enabler in tasks like path planning, state estimation, and trajectory modeling. Finally, in [47], Azoulay et al. try to apply ML methods to various swarm control and flocking behaviors and cover subjects such as flock formation and clustering, task allocation, multi-agent coordination, trajectory optimization, and navigation.
Chen, Wu et al. [27] explore SI within flying ad hoc networks (FANETs), applying percolation theory to maintain network topology using only local information. While the work addresses dynamic topology control, it remains primarily rule-based, not employing ML or NNs. Asaamoning et al. [36] apply SI algorithms such as Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), and Raft consensus protocols to path planning and formation control. Although they acknowledge AI-enhanced routing, their approach is algorithmic, not data-driven. Schranz et al. [33] prefer bio-inspired algorithms to AI, focusing on decentralized communication between swarm members. Wu et al. [39] similarly emphasize heuristic methods without delving into AI.
In summary, while AI-based approaches to SI are gaining significant traction, much of the existing research still relies on rule-based or bio-inspired algorithms, indicating that there is still a gap for more data-driven AI methodologies in swarm coordination.

2.2. AI-Based Adaptive Communications

In the context of adaptive communications, Li et al. [32] implement DRL for power control in software-defined UxV networks, aligning well with our focus on AI-based communications. They also use unsupervised learning for drone controller placement but only mention security briefly as a future direction. Michailidis et al. [43] focus on the intersection of UAVs, internet of things (IoT), and mobile edge computing (MEC), emphasizing AI-driven communication optimization. They explore the role of AI—especially federated learning (FL), RL, and DL—in dynamic task offloading, adaptive communication, and secure data management. We also witness a shift toward AI-based approaches in [45], where researchers examine ML-based topology prediction and RL-based adaptive routing protocols. Very interesting research is presented in [46], where issues like data restoration, bit error rate improvements, and spatio-temporal user distribution prediction are addressed by GAI algorithms, e.g., a conditional generative adversarial network (GAN), diffusion models, and transformers.
Chen, Xi et al. [26] provide a comprehensive overview of communication architectures, including UAV-to-UAV and UAV-to-infrastructure networks. They discuss ring, star, and mesh topologies but do not incorporate AI-driven adaptation mechanisms. Similarly, Vedachalam et al. [40] thoroughly explore communication systems (acoustic, optical) but exclude AI-driven optimization, focusing instead on engineering challenges and redundancy. Liu et al. [41] similarly limit their communication analysis to underwater vehicles, excluding AI-driven protocols. Boccadoro et al. [42] provide a technical survey on the internet of drones (IoD), covering inter-agent communication and network configurations comprehensively. While they acknowledge AI as a potential tool for optimization, specific implementations are not addressed.
Overall, the literature indicates that while communication architectures are well explored, the integration of AI-driven adaptive communication techniques remains underdeveloped, highlighting a potential research direction in real-time, AI-based communication strategies.

2.3. AI-Driven Security Mechanisms

Sarkar et al. [28] touch on security through AI-enabled anomaly detection, focusing mainly on identifying malicious nodes or patterns of erratic behavior that could disrupt UAV networks. While their approach demonstrates AI’s potential for anomaly detection, its scope is limited to specific attack scenarios without proposing comprehensive frameworks. Zaitseva et al. [35] adopt a structural reliability perspective, assessing vulnerabilities in communication links as potential points of failure in the swarm. Although AI is not directly implemented, their work underscores opportunities for AI-driven fault tolerance mechanisms. Asaamoning et al. [36] identify security as a challenging area in networked control systems, suggesting AI-enhanced routing as a potential future direction, but not integrating it in practice. Boccadoro et al. [42] address cryptographic challenges and UAV-specific threats, proposing AI as a tool for intrusion detection, although the concept remains largely theoretical. Chung et al. [37] emphasize control-theoretic approaches to security, focusing on fault detection through optimized path planning. AI applications are not discussed, but their framework offers potential integration points for anomaly detection systems.
The most complete piece of work we have witnessed so far covering the intersection between security and AI is [43]. Michailidis et al. stand out for their in-depth treatment of AI-driven security in UAVs and IoT environments. They explore the use of FL, RL, and DL for intrusion detection, adaptive communication optimization, and blockchain-based authentication. Javed et al. consider blockchain as a possible security framework in [45], but they also elaborate on ML for detecting intrusion and spoofing attempts as well as GPS manipulation. Moving one step further, Liu et al. [46] introduce LLMs and transformers in intrusion detection methods. They even examine the use of GANs for trajectory obfuscation and image privacy preservation.
Still, while we observe a trend toward the adoption of AI as a security enabler, practical implementations of AI-driven security mechanisms in swarm systems remain scarce, suggesting a significant research gap in developing real-time, AI-based anomaly detection and mitigation frameworks.

2.4. Comparative Analysis

In terms of our analysis of the literature, we believe that our work stands out from existing surveys, although some studies adopt a similar approach and methodology. The closest are [45,46], yet there are important differences. Specifically, ref. [46] focuses primarily on GAI and its future potential in swarms, while presenting only limited practical applications. Ref. [45], on the other hand, is the most similar to our work but restricts its scope to UAVs, excluding other vehicle types. This is also evident in [39]. Such approaches narrow the scope of research by focusing on one type of vehicle and its intricacies. Furthermore, we believe that the majority of the literature lacks a holistic approach and focuses on a specific aspect of swarm systems without integrating others. For example, in [28], researchers address SI and communication, but are not concerned about how these functionalities remain secure. Other works present the swarm only as a means of improving other systems, such as in [43], where it is used to improve IoT networks. Our work, on the contrary, provides a comprehensive perspective that brings together different vehicle classes while examining how AI can enhance swarm-level autonomy, communication, coordination, and security in an integrated manner.

3. AI in Swarm Intelligence

In this section, we will investigate how AI can contribute to and enhance SI and swarm operations in general. Our focus is to identify the swarm operations that are most distinct from swarm logic and to describe how researchers address them, primarily using AI and ML techniques. Based on pieces of work such as [49,50], we have identified the following core operations, which we also present in Figure 3:
  • Path Planning and Navigation: These involve how both individual UxVs and the whole swarm plan their routes within the operating environment.
  • Obstacle and Collision Avoidance: This concerns how UxVs and the swarm avoid environmental obstacles and internal collisions.
  • Formation Control: This describes how UxVs form and maintain formations, as well as how they adapt these formations dynamically.
  • Target Search: This includes detecting targets, pursuing them efficiently, and ultimately reaching them.
  • Mission Planning: This addresses how the swarm can operate more effectively given specific goals and environmental conditions.
  • Task Optimization: This focuses on how the swarm efficiently performs assigned tasks and allocates them to individual UxVs.
  • Resource Optimization: This primarily relates to energy efficiency and how the swarm can complete tasks without depleting its resources.
Since our survey examines AI as a technological enabler, we also need to examine the algorithms and methodologies covered by each paper. For this reason and since many papers covered multiple swarm operations, we have chosen to classify them based on which technology they relied on the most. This is why we have chosen to split this chapter into three sub-chapters:
  • Approaches Relying on Reinforcement Learning: This chapter mostly includes academic papers which rely on RL and algorithms from the RL family to perform the swarm operations.
  • Supervised, Federated, and Probabilistic Models: In this section, we deal with pieces of work which rely on supervised NNs, FL, or probabilistic approaches.
  • Hybrid, Bio-Inspired, and Other Methods: Finally, this category includes research that relies on bio-inspired algorithms, e.g., ACO, PPO, etc., and approaches that do not belong in any of the previous categories.

3.1. Approaches Relying on Reinforcement Learning

In Table 3, we have gathered the relevant literature and marked which swarm operations are included in each piece of the literature. These works in the literature are highly reliant on RL and DRL. For UAV swarms, Xiao et al. [51] introduce a curriculum-based multistage RL framework and perform visual target search using RGB input, while Perrusquia et al. rely on observational trajectory data in [52] and introduce a multi-agent inverse RL framework to determine the mission rewards and network topology of the swarms. Both approaches achieve decentralized coordination since agents rely on raw sensor input. For hybrid UAV–UGV scenarios, researchers in [53] address formation control, mission planning, and navigation of hybrid drone swarms by training a UAV to shepherd UGVs using a deep hierarchical RL approach. The shepherding task is decomposed into two subtasks, collect and drive, and two double deep Q-networks (DQNs) are trained for each task. Zhang et al. also tackle mission planning, task optimization, and path planning for heterogeneous UGV-UAV coalitions in [54] by introducing augmented DRL, a hybrid framework that integrates generative adversarial imitation learning with proximal policy optimization (PPO) to learn complementary cooperative strategies.
Other studies emphasize robustness under uncertainty. In [55], Venturini et al. develop a double deep Q learning (DDQL)-based distributed RL framework for UAV swarms to perform efficient target search under partial observability and possible communication loss. Qamar et al. extend DRL with island policy-based optimization in [56]. This technique splits the UAV swarm into sub-swarms, which perform tasks such as formation control, navigation, dynamic obstacle avoidance, and multi-target tracking in 3D environments. Staying on the USV use case, Gan et al. [57] propose a cooperative target-chasing and encirclement framework for multiple USVs. With DRL at its basis, USV agents are able to execute encirclement maneuvers and avoid collisions. In [58], Cao and Fang deal with path planning and collision avoidance for multiple UGVs in static environments by proposing the Optimized-Weighted-Speedy Q-learning algorithm, a method that integrates a distributed anti-collision cooperation mechanism that enables agents to simultaneously compute collision-free paths. Finally, the researchers in [59] tackle issues like target search, formation control, and mission planning by proposing a dynamic switching-enabled multi-agent RL (MARL) framework, which enables autonomous UUV swarms to track multiple targets cooperatively while adapting to sonar noise and ocean currents.
Although these works collectively demonstrate the adaptability of RL to various swarm tasks, we should mention possible limitations. First, we need to address the fact that most RL frameworks rely on simulation environments for training, raising concerns about transferability to real-world deployments where sensing is noisy and dynamics are uncertain. Furthermore, we should also raise the question of how an RL framework adapts when swarm size increases, which could introduce unexpected behaviors. Efforts such as distributed or hierarchical RL, e.g., refs. [53,55], partially address this by decomposing tasks or distributing policies, but these solutions introduce added complexity in synchronization and convergence.

3.2. Supervised, Federated, and Probabilistic Models

Apart from RL and already established bio-inspired methods, other types of ML models and hybrid approaches, combining AI and probabilistic techniques, have been proposed. In Table 4, we have gathered the relevant literature with the corresponding swarm operations. In [60], Yuwen et al. tackle formation control, mission planning, and task optimization in USV swarm confrontations by proposing a distributed Nash equilibrium seeking algorithm within a coalition game framework for uncertain Euler–Lagrange systems with local and coupling constraints. The researchers in [61] also use probabilistic models and present a model-driven cooperative path planning strategy for dynamic target search in multi-UUV formations, where spiral path parameterization, hierarchical formation control, and Kriging-assisted discrete global optimization are used to maximize the target detection success rate under dynamic and uncertain conditions. Paczyk et al. [62] present a neural control system for autonomous UUV swarms using RNNs, a type of NN not so famous in this field of research, for formation control and an autoencoder-based filter for sonar noise in obstacle avoidance.
Raj et al. [63] introduce a feed-forward NN-based mechanism for UAV trajectory prediction and collision avoidance, incorporating various activation functions, including a novel AdaptoSwelliGauss function. Cabuk et al. [64] focus on energy optimization within UAV swarms, training four predictive energy models on real-world flight data and deriving a cost function to evaluate swarm-wide energy consumption for operations such as connectivity restoration, enabling energy-aware reconfiguration. Kusyk et al. [65] propose a decentralized AI-based flight control system where individual UAVs compute their next positions using a genetic algorithm and communicate only with nearby neighbors, enhancing swarm efficiency and scalability without centralized control. Zeng et al. [66] present a federated learning framework in which each UAV trains a local model and sends it to a leading UAV for aggregation into a global model, which is then redistributed to the swarm. Finally, Trihinas et al. [67] introduce a framework for repeatable testing of ML-driven UAV applications, supporting mission workflow prototyping, energy profiling, and performance monitoring of both tasks and vehicles.
These supervised, federated, and probabilistic approaches highlight important trade-offs compared to RL. Probabilistic methods such as those in [61] offer interpretability and robustness under uncertainty, but their reliance on handcrafted models and assumptions about dynamics may limit generalization to heterogeneous swarms or unstructured environments. Supervised learning approaches, e.g., refs. [63,64], benefit from efficiency and use of real-world data, yet they often require labeled datasets and may lack adaptability to unforeseen scenarios. Federated learning frameworks address scalability by distributing training across agents, but they introduce challenges such as model heterogeneity, synchronization, and communication costs.

3.3. Hybrid, Bio-Inspired, and Other Methods

SI algorithms and bio-inspired optimization techniques, like ACO, PSO, and Artificial Bee Colony (ABC), offer fertile ground for enhancement through ML or other techniques, making them more dynamic and adaptable to stochastic environments. Table 5 includes the pieces of work that rely on such methods to execute the swarm operations. For example, in [68], Saeed et al. analyze how swarm intelligence algorithms, i.e., ACO, PSO, and ABC, can be enhanced for UAV path planning in 2D and 3D environments. They integrate obstacle distance into ACO’s pheromone update rules, which significantly optimizes trajectory planning and obstacle avoidance. Gal goes one step further in a use case with USV swarms in [69], by proposing a multi-target tracking approach based on adaptive PSO with K-Nearest Neighbors (KNN), enhanced with a pursuit–evasion model. Similarly, in [70], the researchers perform target search for UAV swarms, using AI-driven strategies, such as Lawn Mower, Hill Climbing, and A-star with Bayesian updating. Zeng and Nait-Abdesselam propose an RL-enhanced Boid model for UAV swarms in [71]. This approach enables the swarm agents to learn flocking behavior through multi-agent Q-learning, offering robust decentralized control for swarm navigation and cohesion, surpassing rule-based approaches. In [72] the researchers again introduce an AI ground station called the Hive, which largely decentralizes the swarm and enables autonomous reconnaissance missions. Distributed PSO alongside vision-based navigation is used to enhance formation control, task execution, and long-term mission planning.
Zhu et al. focus on optimizing tasks and resources in [73]. They develop a mathematical model for multi-USV maritime patrol task assignment under endurance and time constraints. By integrating A* path planning and energy-aware scheduling, the system ensures efficient patrol task coverage with minimized deviation from task time windows and optimized energy resupply. Liu et al. [74] propose a hierarchical mission planning system for multi-UGV swarms that integrates task decomposition, assignment, sequencing, and path planning using a hybrid clustering method and a multilayer planner. Key techniques include A-star, ACO, and a novel multi-operator continuous ACO. In [75], Hussein et al. investigate ML-based shepherding algorithms to control swarms of UxVs in complex environments. They rely on human demonstrations to train ML controllers and explore how different levels of autonomy during data collection impact swarm control performance. Finally, in [76], Saffre et al. propose a bio-inspired, decentralized framework for UAV swarms performing long-term surveillance missions. The system relies on a shared digital twin that models environmental signals to guide individual drone path planning and task allocation.
SI and bio-inspired approaches remain attractive for swarm coordination due to their simplicity, scalability, and ability to exploit emergent behaviors. When combined with ML, they can adapt to dynamic conditions and outperform purely rule-based methods, as in [71]. However, their reliance on heuristics or handcrafted mechanisms often limits generalization across domains. For example, adaptations such as modified pheromone rules or pursuit–evasion models improve task-specific performance but may not scale efficiently to heterogeneous swarms or large agent populations. Similarly, optimization-driven frameworks, e.g., refs. [73,74], provide strong guarantees on task allocation and resource use but may incur computational complexity that hinders real-time deployment.

3.4. Conclusion

Concluding our overview of AI in swarm operations, we would like to point out some interesting findings. Based on Table 3, Table 4 and Table 5, it is evident that aerial vehicles are dominant and much more preferable than others. This is expected, if we consider how modular and accessible commercial-off-the-shelf (COTS) equipment for UAVs is. Another explanation could be that UAVs operate in the sky without many obstacles, whereas UGVs or UUVs might encounter many times more obstacles. This significantly reduces the complexity of tasks such as path planning and formation control. In terms of swarm operations encountered in the bibliography, if we look at Figure 4, it has become pretty evident that path planning is the most well researched, with formation control following. We witnessed that formation control and collision avoidance overlapped in many pieces of work, which makes sense since formation control needs to take into account the possibility of collisions inside the swarm. Furthermore, for environmental obstacles, a visual way of identifying objects was preferred. Regarding task optimization, we need to state that while not being the main point many a time, a lot of papers considered and proposed ways to further optimize the core operations, like path planning or obstacle avoidance. Researchers had a similar approach to resource optimization, oftentimes presenting it as something complementary to more significant functionalities, e.g., path planning algorithms that take into account energy consumption.
Regarding the type of AI that was preferred in the sample of the literature, we observe that Table 3, Table 4 and Table 5 are of similar size. This distribution suggests that the swarm operations we identified have been repeatedly studied as technology has advanced, ranging from earlier methods such as ACO and PSO to more recent approaches based on RL, FL, etc. Note that paradigms with RL and FL at the center have been the most prevalent in recent years.

4. AI-Based Adaptive Communications

In the previous chapter, we analyzed how AI can be integrated into swarm operations to make them more efficient and dynamic. In this chapter, we plan to cover the various communication aspects that connect individual UxVs and elevate them to the swarm level, as well as how AI can enhance these aspects. Following the same methodology as in the previous chapter, we will identify which communication aspects each paper addresses and how AI is utilized. In Figure 5 we classify these communication functions in the following sub-categories:
  • Network Architecture and Topologies: These address how nodes (UAVs, relays, base stations) are physically or logically arranged, and how coverage and connectivity are maintained—particularly in dynamic, multi-node environments.
  • Channel and Propagation Modeling: This involves how signals behave during transmission, as well as methods to model, predict, measure, or enhance signal behavior.
  • Signal Quality: This refers to signal processing techniques that improve signal fidelity, energy efficiency, or robustness.
  • Routing and Protocols: These describe how data paths are selected and how nodes communicate using predefined or adaptive rules.
  • Network Management and Optimization: These encompass system-level strategies for dynamically allocating resources, maintaining service quality, and optimizing overall network performance.
We will follow the same logic from Section 3 and again examine the literature we found based on the types of algorithms and methodologies they adopted:
  • Approaches Relying on Reinforcement Learning: This chapter mostly includes academic papers which rely on RL and algorithms from the RL family to perform the swarm operations.
  • Supervised, Federated, and Probabilistic Learning Models: In this section, we deal with pieces of work which rely on supervised NNs, FL, or probabilistic approaches.
  • Hybrid, Bio-Inspired, and Other Methods: Finally, this category includes research that relies on bio-inspired algorithms, e.g., ACO, PPO, etc., and approaches that do not belong in any of the previous categories.

4.1. Approaches Relying on Reinforcement Learning

As in other swarm operations, RL and DRL still remain relevant in enhancing the swarm’s communication posture. This is emphasized in surveys and reviews such as [77,78,79]. We present the relevant literature in Table 6 alongside the communication functions covered in said literature. Kuranthan et al. offer a comprehensive review in [77], elaborating on how ML-driven UAV swarms benefit from supervised, unsupervised, RL, and FL techniques in operations such as channel estimation, scheduling, trajectory planning, and resource management. In [78], Divakar et al. highlight how FL and RL, combined with SI, can optimize resource allocation, trajectory planning, and scalable communication in next-generation aerial networks. Similarly, in [79], Khan et al. advocate for RL, DRL, and FL in operations such as real-time path planning, dynamic routing, signal optimization, and distributed network intelligence. We observe that in [80], Kushik et al. present a DQN-based positioning system for UAV swarms, where UAVs act as relays to bridge broken radio frequency (RF) links. The system adapts to dynamic topology and varying link conditions using parameters such as the signal-to-interference-plus-noise ratio (SINR), packet delivery ratio (PDR), and interference. Likewise, the researchers in [81] propose a DRL-powered integrated communication and control framework for autonomous UAV swarms. The leading UAV uses a deep deterministic policy gradient (DDPG) agent and optimizes control signal generation, subcarrier allocation, and data rate to manage formation while minimizing communication error and collision risks. Wang et al. propose an ML-powered framework for spectrum sharing in UAV swarm communication systems in [82]. They address challenges like jamming resistance, ultra-density, and dynamic topology through MARL, game theory, and task-driven optimization and achieve adaptive and collaborative spectrum usage.
Collectively, these studies underscore the promise of RL and its subdomains in enabling adaptive, resilient communication among swarms. However, significant challenges remain. The most influential factor is the diverse nature of communications, where different types of applications, e.g., video streaming or telemetry data, rely on different frequencies, protocols, and equipment. Video streaming, in particular, demands high bandwidth, stable bitrates, and low latency to ensure continuous quality of service (QoS). Creating a simulation environment that considers so many variables, which constantly change, is computationally demanding and could struggle with the sim-to-real gap, therefore significantly reducing the QoS for certain applications. Furthermore, while the spectrum sharing and relay positioning frameworks, e.g., refs. [80,82], show robustness to jamming and topology changes, such algorithms should be tested by adding or removing swarm agents constantly, making agents lose connection temporarily, or using more powerful jammers if possible.

4.2. Supervised, Federated, and Probabilistic Models

With works such as [77] in mind, we move from RL approaches to more supervised and probabilistic solutions. Table 7 includes the scientific publications we have discovered on this matter accompanied by the communication function each publication covers. In [83], Mao et al. introduce a DL-based transport layer protocol for UAV swarms. Their approach uses network coding and real-time topology-aware control to distinguish between congestion and random loss and also predicts optimal coding rates based on dynamic link conditions. The researchers in [84] propose a decentralized FL framework for UAV swarms using the inexact stochastic parallel random walk alternating direction method of multipliers algorithm, enabling efficient model training under dynamic topologies with low communication overhead. Xu et al. rely again on FL in [85] and present a hierarchical FL-based semantic communication framework for UAV swarms. Each UAV trains its semantic model according to local data; all model parameters are then aggregated to achieve global parameter consensus. Finally, the researchers in [86] introduce a scalable drone swarm routing system that combines multi-beam beamforming with a feed-forward NN to optimize signal fidelity and path planning. By learning the deviation between model-based routing outputs and ground-truth signals, the system passively supports decentralized and real-time routing in dense UAV networks.
Moving to more probabilistic approaches, the researchers in [87] introduce an ML-guided UAV deployment framework for emergency cellular networks. They use k-medoids clustering to optimally place aerial base stations to enhance user signal quality. Their approach improved coverage and SINR resilience even under localization errors, offering a robust solution for rapid network restoration in disaster scenarios. Comparably, Khalil et al. propose an ML-driven UAV swarm communication model for search-and-rescue missions in [88]. They leverage random forest (RF) regression for accurate channel modeling and K-means clustering for adaptive swarm formation in order to ensure intra-swarm link quality prediction and efficient swarm management. Khalil et al. performed similar research in [89]. In their paper, they present an ML framework that predicts and mitigates outage probabilities in 6G UAV swarm relays by combining RF regression for attenuation forecasting, K-means clustering for band selection, and custom metasurface design for signal enhancement. In [90], Lim et al. introduce a Bayesian network classifier and predict the reliability of the communication of UAV swarms by incorporating latency constraints and identifying the likely failure modes.
These supervised, federated, and probabilistic approaches offer complementary advantages compared to RL. Supervised and DL-based frameworks such as those described in [83,86] are efficient at learning from structured data and optimizing specific communication functions, but they require large, labeled datasets and may struggle to generalize under unpredictable conditions. Federated learning, e.g., refs. [84,85], enhances scalability and reduces central bottlenecks, yet it introduces synchronization challenges and communication overhead that may offset its benefits in bandwidth-constrained aerial networks. Probabilistic and statistical models provide interpretability and robustness under uncertainty, making them well suited for emergency or highly dynamic scenarios. However, they often rely on simplifying assumptions and may face computational limits in real-time large-scale deployments.

4.3. Hybrid, Bio-Inspired, and Other Methods

The approaches presented in this section combine biologically inspired coordination and signal-level innovations to address the communication aspects of the swarm. The literature that exploits said approaches is presented in Table 8. In [91], the researchers demonstrate the strong potential of massive multiple-input and multiple-output (MIMO) systems by providing closed-form ergodic rate bounds, incorporating 3D geometry, polarization mismatch, and UAV mobility to optimize antenna array configurations and ensure reliable high-capacity links. Lakas et al. preserve swarm cohesion in [92] by proposing a leader–follower-based multi-cluster swarm control system using a simple 1-hop broadcast protocol for coordination and connectivity maintenance. On the other hand, Sousa et al. rely on multi-hop communication in [93] and present a system for aquatic USV swarms using a passive link quality estimation strategy to optimize data routing. Their system incorporates three acknowledgment-based delay-tolerant network protocols, validated in both real and simulated environments. Similarly and in order to increase network quality, Nomikos et al. propose a buffer-aided opportunistic UAV swarm framework for 6G maritime networks in [94], combining non-orthogonal multiple access (NOMA) and dynamic decoding to boost sum-rate and reduce delay under poor shore-to-sea link conditions.
Ultimately, we will examine a number of hybrid approaches that integrate both ML and bio-inspired algorithms. A good example of such a hybrid approach can be found in [95]. Pham et al. tackle sum-rate maximization for UAV-assisted visible light communication (VLC) with NOMA by combining swarm intelligence (Harris Hawks optimization) and an NN for joint UAV placement and power allocation. In [96], Zhou et al. propose a hybrid edge computing framework for the IoD, combining DL for network load prediction with swarm-based routing for dynamic path adaptation. This integration enables responsive, low-latency communication and efficient resource management in IoD environments. Finally, the researchers in [97] propose a joint SI and DL framework to optimize UAV relay positioning, hybrid beamforming, and power allocation in UAV-assisted mmWave massive MIMO IoT networks. The solution enhances throughput and reduces delay with a low-complexity NN capable of near-optimal performance.
Bio-inspired coordination and signal-level innovations demonstrate strong potential for enhancing swarm communication, particularly in challenging environments such as maritime or ultra-dense UAV networks. Signal-level methods, such as MIMO and NOMA, provide high-capacity, low-latency links but are highly sensitive to mobility, interference, and hardware constraints. Approaches such as leader–follower and multi-hop are lightweight and scalable, yet may struggle with dynamic link quality and unpredictable disruptions. Hybrid frameworks that integrate SI with ML, e.g., refs. [95,96,97], attempt to balance robustness and adaptability, but they introduce additional complexity in terms of computation and synchronization.

4.4. Conclusions

Our analysis of how AI can enhance the communication aspects of the swarm yielded interesting insights. First and foremost, we need to state that UAVs are the vehicle of choice for most researchers, with only one piece of bibliography focusing on USVs instead. This could again be due to the commercial success of aerial vehicles versus other types and their compatibility with arrays and other systems. Furthermore, most of the existing wireless communications already happen over the air, making UAVs another part of an existing ecosystem. In contrast, testing USVs and UUVs is more challenging due to their operational environment. While UAVs benefit from widespread terrestrial infrastructure—such as arrays and base stations—that support connectivity, similar infrastructure is largely absent on bodies of water like seas and lakes, making it difficult to ensure reliable communication between USVs. Things are even more complicated in the case of UUVs since water acts as the signal carrier, necessitating specialized equipment that is far less accessible than its terrestrial counterparts.
Regarding the communication aspects of the swarm, we have created Figure 6 to demonstrate results from Table 6, Table 7 and Table 8 comprehensively. We do not observe large deviations from bar to bar, showing that all aspects are researched for the most part. We also observe that the most researched topic is Network Management and Optimization, which makes sense if we consider that this category includes all the system-level strategies to dynamically allocate resources, maintain service quality, and optimize performance. Channel and Propagation Modeling, Signal Quality and Enhancement, and Routing and Protocols are the most equally researched; this could be due to the fact that the first two categories are both related to signals and how these are propagated, processed, and enhanced. Finally, we need to state that Network Architecture and Topologies is the least researched; therefore, it would be worth looking at the swarm from a network architecture perspective.

5. AI-Driven Security Mechanisms

The final chapter of our survey revolves around the security posture and resilience of the swarm and how AI can help improve these areas. We follow the same methodology as before and try to identify operations related to security and resilience that have been enhanced by AI in the relevant literature. We have identified the following categories, which are also displayed in Figure 7:
  • Anomaly and Intrusion Detection: Refer to the ability to identify abnormal behavior.
  • Data Integrity and Privacy: These involve techniques to ensure that data are kept, transmitted, and processed in a secure manner.
  • Self Adaptability: This refers to the swarm’s ability to effectively respond to threats, faulty behavior, and generally dynamic internal and external changes.
  • Authentication Rules and Protocols: These include rules and protocols that ensure that individual vehicles of the swarm are always authenticated.
  • Explainability: AI, especially in security, should include methods to log decisions and provide an explanation.
We followed the same methodology as in the previous chapter, but this time, we only managed to create two chapters due to the lack of research:
  • Supervised, Federated, and Probabilistic Learning Models: In this section, we deal with pieces of work which rely more on supervised NNs, FL, or probabilistic approaches.
  • Unsupervised, Hybrid, and Other Approaches: Finally, this category includes the rest of the literature we found on the security aspects of the swarm.

5.1. Supervised, Federated, and Probabilistic Models

Supervised and FL methods form a significant portion of the existing research on UAV swarm security, particularly for tasks such as intrusion and anomaly detection, and swarm coordination. Table 9 displays this research alongside the security mechanisms tackled in each paper. Liu et al. [98] combine a multilayer perceptron with an XGBoost classifier to detect network intrusions within swarm communications. Similarly, da Silva et al. [99] incorporate both supervised and unsupervised techniques into an intrusion detection system, enhanced with FL to enable distributed and privacy-preserving threat detection. FL also plays a key role in the work of Challita et al. [100], where CNNs and RNNs are trained collaboratively across UAVs to support real-time authentication and identify cyber–physical threats in cellular-connected swarms. Along similar lines, Halli Sudhakara et al. [101] develop a federated intrusion detection system targeting GPS spoofing, further incorporating explainability through SHapley Additive exPlanations (SHAP) to make the model’s behavior interpretable.
Another group of works focuses on anomaly detection using labeled data. Chouhan et al. [102] propose an NN-based framework for detecting anomalies, verifying object recognition, and ensuring data integrity. Their system integrates adaptive AI models and surveillance components for swarm defense scenarios. Expanding on this theme, Ahn et al. [103] introduce an anomaly detection method that uses principal component analysis, clustering, and deep NNs to monitor kinematic flight data. This enables continuous tracking of drone behavior without relying on centralized control. An additional contribution comes from Nebe et al. [104], who address abnormal swarm dynamics by employing autoencoders, Gaussian mixture models, and CNNs to identify chaotic motion patterns. Their approach also includes a mechanism for rerouting drones based on trajectory corrections. Explainability within supervised models is also being explored. Gackowska-Katek et al. [105] propose a CatBoost-based model for predicting swarm disorganization resulting from intrusions. They try to relate collision avoidance and formation parameters to entropy, helping operators better interpret swarm instability.
Supervised and FL approaches offer promising tools for strengthening swarm security, particularly in intrusion detection and anomaly recognition. Supervised methods, as in [98,102], benefit from using labeled datasets and established classifiers, but their dependence on labeled data and centralized training often limits adaptability in environments where targeted adversarial actions occur. FL frameworks improve scalability and privacy by distributing learning between agents, yet they may be sensitive if attack patterns change and target different parts of the system. Finally, recent trends toward explainability, for example, refs. [101,105], rely on SHAP values for explainability, and we need to consider their efficiency in swarms employing diverse models to accomplish different tasks.

5.2. Unsupervised, Hybrid, and Other Methods

When labeled data are scarce or system conditions are highly dynamic, researchers turn to unsupervised or hybrid models to support security in UAV swarms. Table 10 displays the academic papers that rely on such methods. In [106], Wedaj Kibret proposes a property-based attestation framework that monitors system behavior to verify device integrity in large-scale swarms. This approach focuses on runtime properties rather than static binaries to detect impersonation and replay attacks. Identity verification and secure coordination are further addressed by Karmakar et al. in [107], who introduce SwarmAuth—a blockchain-based authentication framework combining physically unclonable functions and K-means clustering. This method enables decentralized identity verification and cluster formation management. An interesting take on authentication can be found in [108], where Semenov et al. proposed a Fourier-based steganographic method for embedding UAV identifiers into ADS-B signals, enhancing resilience against spoofing and cyberattacks while preserving full compliance with automatic dependent surveillance–broadcast (ADS-B) standards. From a network architecture perspective, Grueber et al. [109] propose a software-defined networking (SDN) approach to swarm security. They integrate an RF classifier into the SDN controller to detect insider threats and mitigate traffic injection attacks via flow-level monitoring and secure routing protocols. Several studies take a broader or more strategic view. Tayyab et al. [110] examine the limitations of traditional drone security mechanisms, emphasizing risks posed by compromised swarm members. They propose a combination of AI-based security tools and regulatory safeguards to address ethical and legal considerations in swarm deployment. Finally, Phadke and Medrano [111] conduct a structured analysis of resiliency challenges in UAV swarms. They identify vulnerabilities across communication, mobility, task execution, and security layers and advocate for integrated, multi-module solutions that enhance resilience to jamming and intrusion.
These unsupervised and hybrid approaches broaden the security toolbox for UxV swarms by reducing dependence on labeled data and enabling more adaptive, decentralized defenses. Property-based attestation provides lightweight runtime verification, but may struggle with sophisticated adversaries capable of mimicking normal behavior. Blockchain-based frameworks, as in [107], improve decentralization and tamper-resistance, but raise concerns about latency, energy consumption, and scalability in resource-constrained swarms. SDN-based solutions centralize detection and control for better traffic management, but may introduce single points of failure in the system and require robust controller protection.

5.3. Conclusions

Finishing our analysis on the security mechanisms of the swarm and how they could be improved with AI, we gather our results in Figure 8. Here, we observe that anomaly and intrusion detection against attacks is a popular research choice. A representative type of attack that frequently affects UxVs is jamming. Jamming interferes with the communication frequencies of UxVs, rendering them unable to receive commands from their operator and therefore complete their objective. This technique has been used extensively against aerial vehicles in real-world applications; therefore, applying countermeasures against it is a very compelling area of research. For example, in [112], Naous et al. propose the combination of RL and non-terrestrial networks to mitigate any jamming attempts against UAVs, as well as ways to ensure that data integrity and privacy are preserved. Although we see little effort to ensure the explainability of such methods, which is important when AI makes decisions on anomaly classification or acts on its own to adapt to these anomalies and new circumstances, if we look at [101,105], they both rely on SHAP analysis to identify key contributing features. SHAP values can prove helpful in explaining ML decisions, but there is also a certain level of untrustworthiness, as demonstrated in [113], and as ML models become more complex with more diverse inputs, the need for more dynamic and robust methods increases.
Furthermore, as swarms tend to grow in size and complexity, efficient and dynamic authentication schemes will be more needed to ensure that no external vehicles have infiltrated the formation. While ADS-B exists, it is a protocol that lacks encryption and strict authentication, creating the need for supplementary and robust mechanisms such as those proposed in [114]. Finally, since UxVs integrate commercial-off-the-shelf (COTS) software and hardware components, which might not be tested for zero-day exploits or other exploitable behaviors, ways to rapidly and efficiently test them will be vital in the future.

6. Discussion

Our survey on UxV swarms has mapped the literature landscape and highlighted strengths and weaknesses across three dimensions:
  • Type of vehicle;
  • Swarm aspects;
  • Type of AI.
Regarding vehicles, Figure 9 illustrates the distribution of vehicle types in the bibliography of this review. By doing this, we wanted to highlight the general research trend. As we observe, there is a preference for UAVs, while ground and underwater swarms remain underexplored. We see research opportunities in adapting existing AI-based approaches to these environments, as shown in works on surface vessels such as [39,46] and underwater systems [115,116]. Ground swarms are particularly scarce, and their integration with AI remains an open avenue.
Across swarm aspects, our review in Section 3, Section 4 and Section 5 shows that intelligence and operations such as path planning, formation control, and obstacle avoidance are well studied. Less attention is given to task and resource optimization, although these underpin the swarm’s capabilities and behaviors. In communication, the focus on UAVs and reliance on terrestrial networks offer limited room for future research. Works such as [112,117] prompt us to move one step further and integrate aerial vehicles in non-terrestrial networks (NTNs). NTNs could also prove extremely beneficial for swarms of UGVs or water vehicles, which operate in remote locations with limited coverage by terrestrial networks. Furthermore, developing water-based communication for UUVs could open new research directions as described in [118]. Security research is largely based on intrusion detection, with some steps toward self-adaptability. However, proactive measures such as vulnerability assessment, authentication, and explainability become critical as AI/ML integration deepens. These insights are summarized in Figure 10.
In terms of AI, heuristic algorithms such as ACO, PSO, and ABC remain widely used, often in hybrid approaches with modern ML. RL and FL stand out as particularly suitable for swarms due to their agent-based nature. We need to state that applying RL algorithms in the real world is challenging though, as described in [119]. Valuable insight in this regard is also provided by Salvato et al. in [120] and Tobin et al. in [121], where they show that RL policies trained in simulation often fail in the real world due to the "real world gap", i.e, unmodeled dynamics, noise, and limited variability in simulators, and that techniques such as domain randomization are needed to partially mitigate these transfer failures. Looking ahead, generative AI and LLMs represent a promising frontier. Recent studies [122,123,124,125,126,127,128] demonstrate their potential for anomaly detection, incident response, and reasoning tasks. We envision LLMs supporting mission planning, self-adaptability, and resilience against disruptions. We could also consider custom and lightweight LLMs embedded in individual vehicles, complemented by larger models overseeing the swarm.
From our synthesis, several research gaps emerge. These include the following:
  • Expansion beyond UAVs to ground and underwater swarms or combinations of different vehicles in the same swarm.
  • Facing task and resource optimization as standalone swarm functions.
  • Development of communication techniques and coverage expansion to environments with limited coverage by terrestrial means.
  • Adoption of proactive and AI-driven security strategies with a focus on explainability.
  • Integration of LLMs into swarm decision-making.

Author Contributions

Investigation and research, A.D. and D.N.S.; Writing—original draft, A.D.; Review and editing, D.N.S., A.D., N.N., and C.S.; Supervision, D.N.S., N.N., and C.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ACOAnt Colony Optimization
ADS-BAutomatic Dependent Surveillance–Broadcast
AIArtificial Intelligence
CNNsConvolutional Neural Networks
COTSCommercial-Off-The-Shelf
DDPGDeep Deterministic Policy Gradient
DDQLDouble Deep Q-Learning
DLDeep Learning
DOAJDirectory of Open Access Journals
DQNDeep Q-Networks
DRLDeep Reinforcement Learning
FANETsFlying Ad Hoc Networks
FLFederated Learning
GAIGenerative Artificial Intelligence
GANGenerative Adversarial Network
IoDInternet of Drones
IoTInternet of Things
KNNK-Nearest Neighbors
LLMsLarge Language Models
MARLMulti-Agent RL
MDPIMultidisciplinary Digital Publishing Institute
MLMachine Learning
MIMOMultiple-Input and Multiple-Output
NNsNeural Networks
NOMANon-Orthogonal Multiple Access
NTNNon-Terrestrial Network
PDRPacket Delivery Ratio
PPOProximal Policy Optimization
PRISMAPreferred Reporting Items for Systematic Reviews and Meta-Analyses
PSOParticle Swarm Optimization
QoSQuality of Service
RLReinforcement Learning
RNNsRecurrent Neural Networks
SDNSoftware-Defined Networking
SHAPSHapley Additive exPlanations
SISwarm Intelligence
SINRSignal-to-Interference-Plus-Noise Ratio
SotAState of the Art
UAVsUncrewed Aerial Vehicles
UGVsUncrewed Ground Vehicles
USVsUncrewed Surface Vehicles
UUVsUncrewed Underwater Vehicles
UxVUncrewed Vehicle
VLCVisible Light Communication

References

  1. Zaytsev, V. Unmanned Aerial Vehicles in Ukraine: Modernity, Challenges, and Development Prospects. In Intelligent Transport Systems: Ecology, Safety, Quality, Comfort; Slavinska, O., Danchuk, V., Kunytska, O., Hulchak, O., Eds.; Lecture Notes in Networks and Systems; Springer Nature Switzerland: Cham, Switzerland, 2025; Volume 1335, pp. 296–307. [Google Scholar] [CrossRef]
  2. Alzahrani, B.; Oubbati, O.S.; Barnawi, A.; Atiquzzaman, M.; Alghazzawi, D. UAV assistance paradigm: State-of-the-art in applications and challenges. J. Netw. Comput. Appl. 2020, 166, 102706. [Google Scholar] [CrossRef]
  3. Kumar, A.; Ahuja, N.J.; Thapliyal, M.; Dutt, S.; Kumar, T.; De Jesus Pacheco, D.A.; Konstantinou, C.; Raymond Choo, K.K. Blockchain for unmanned underwater drones: Research issues, challenges, trends and future directions. J. Netw. Comput. Appl. 2023, 215, 103649. [Google Scholar] [CrossRef]
  4. Chaurasia, R.; Mohindru, V. Unmanned Aerial Vehicle (UAV): A Comprehensive Survey. In Unmanned Aerial Vehicles for Internet of Things (IoT), 1st ed.; Mohindru, V., Singh, Y., Bhatt, R., Gupta, A.K., Eds.; Wiley: Hoboken, NJ, USA, 2021; pp. 1–27. [Google Scholar] [CrossRef]
  5. Tsouros, D.C.; Bibi, S.; Sarigiannidis, P.G. A Review on UAV-Based Applications for Precision Agriculture. Information 2019, 10, 349. [Google Scholar] [CrossRef]
  6. Mohsan, S.A.H.; Khan, M.A.; Noor, F.; Ullah, I.; Alsharif, M.H. Towards the Unmanned Aerial Vehicles (UAVs): A Comprehensive Review. Drones 2022, 6, 147. [Google Scholar] [CrossRef]
  7. Munasinghe, I.; Perera, A.; Deo, R.C. A Comprehensive Review of UAV-UGV Collaboration: Advancements and Challenges. J. Sens. Actuator Netw. 2024, 13, 81. [Google Scholar] [CrossRef]
  8. Mueller, M.; Smith, N.; Ghanem, B. A Benchmark and Simulator for UAV Tracking. In Computer Vision–ECCV 2016, Amsterdam, The Netherlands, 11–14 October 2016; Leibe, B., Matas, J., Sebe, N., Welling, M., Eds.; Springer International Publishing: Cham, Switzerland, 2016; Volume 9905, pp. 445–461. [Google Scholar] [CrossRef]
  9. Tijjani, A.S.; Chemori, A.; Creuze, V. A survey on tracking control of unmanned underwater vehicles: Experiments-based approach. Annu. Rev. Control 2022, 54, 125–147. [Google Scholar] [CrossRef]
  10. Wibisono, A.; Piran, M.J.; Song, H.K.; Lee, B.M. A Survey on Unmanned Underwater Vehicles: Challenges, Enabling Technologies, and Future Research Directions. Sensors 2023, 23, 7321. [Google Scholar] [CrossRef]
  11. Li, J.; Zhang, G.; Jiang, C.; Zhang, W. A survey of maritime unmanned search system: Theory, applications and future directions. Ocean Eng. 2023, 285, 115359. [Google Scholar] [CrossRef]
  12. Bae, I.; Hong, J. Survey on the Developments of Unmanned Marine Vehicles: Intelligence and Cooperation. Sensors 2023, 23, 4643. [Google Scholar] [CrossRef]
  13. Farella, A.; Paciolla, F.; Quartarella, T.; Pascuzzi, S. Agricultural Unmanned Ground Vehicle (UGV): A Brief Overview. In Farm Machinery and Processes Management in Sustainable Agriculture; Lorencowicz, E., Huyghebaert, B., Uziak, J., Eds.; Springer Nature Switzerland: Cham, Switzerland, 2024; Volume 609, pp. 137–146. [Google Scholar] [CrossRef]
  14. Ni, J.; Hu, J.; Xiang, C. A review for design and dynamics control of unmanned ground vehicle. Proc. Inst. Mech. Eng. Part D J. Automob. Eng. 2021, 235, 1084–1100. [Google Scholar] [CrossRef]
  15. Ersü, C.; Petlenkov, E.; Janson, K. A Systematic Review of Cutting-Edge Radar Technologies: Applications for Unmanned Ground Vehicles (UGVs). Sensors 2024, 24, 7807. [Google Scholar] [CrossRef] [PubMed]
  16. Baras, N.; Dasygenis, M. UGV Coverage Path Planning: An Energy-Efficient Approach through Turn Reduction. Electronics 2023, 12, 2959. [Google Scholar] [CrossRef]
  17. Miki, T.; Khrapchenkov, P.; Hori, K. UAV/UGV Autonomous Cooperation: UAV assists UGV to climb a cliff by attaching a tether. In Proceedings of the 2019 International Conference on Robotics and Automation (ICRA), Montreal, QC, Canada, 20–24 May 2019; pp. 8041–8047. [Google Scholar] [CrossRef]
  18. Gabrlik, P.; Lazna, T.; Jilek, T.; Sladek, P.; Zalud, L. An automated heterogeneous robotic system for radiation surveys: Design and field testing. J. Field Robot. 2021, 38, 657–683. [Google Scholar] [CrossRef]
  19. Asadi, K.; Kalkunte Suresh, A.; Ender, A.; Gotad, S.; Maniyar, S.; Anand, S.; Noghabaei, M.; Han, K.; Lobaton, E.; Wu, T. An integrated UGV-UAV system for construction site data collection. Autom. Constr. 2020, 112, 103068. [Google Scholar] [CrossRef]
  20. Stöcker, C.; Bennett, R.; Nex, F.; Gerke, M.; Zevenbergen, J. Review of the Current State of UAV Regulations. Remote Sens. 2017, 9, 459. [Google Scholar] [CrossRef]
  21. Henderson, I.L. Aviation safety regulations for unmanned aircraft operations: Perspectives from users. Transp. Policy 2022, 125, 192–206. [Google Scholar] [CrossRef]
  22. Zwickle, A.; Farber, H.B.; Hamm, J.A. Comparing public concern and support for drone regulation to the current legal framework. Behav. Sci. Law 2019, 37, 109–124. [Google Scholar] [CrossRef] [PubMed]
  23. Glossner, J.; Murphy, S.; Iancu, D. An Overview of the Drone Open-Source Ecosystem. arXiv 2021. [Google Scholar] [CrossRef]
  24. Sai, S.; Garg, A.; Jhawar, K.; Chamola, V.; Sikdar, B. A Comprehensive Survey on Artificial Intelligence for Unmanned Aerial Vehicles. IEEE Open J. Veh. Technol. 2023, 4, 713–738. [Google Scholar] [CrossRef]
  25. Arafat, M.Y.; Alam, M.M.; Moh, S. Vision-Based Navigation Techniques for Unmanned Aerial Vehicles: Review and Challenges. Drones 2023, 7, 89. [Google Scholar] [CrossRef]
  26. Chen, X.; Tang, J.; Lao, S. Review of Unmanned Aerial Vehicle Swarm Communication Architectures and Routing Protocols. Appl. Sci. 2020, 10, 3661. [Google Scholar] [CrossRef]
  27. Chen, W.; Liu, J.; Guo, H.; Kato, N. Toward Robust and Intelligent Drone Swarm: Challenges and Future Directions. IEEE Netw. 2020, 34, 278–283. [Google Scholar] [CrossRef]
  28. Sarkar, N.I.; Gul, S. Artificial Intelligence-Based Autonomous UAV Networks: A Survey. Drones 2023, 7, 322. [Google Scholar] [CrossRef]
  29. Puente-Castro, A.; Rivero, D.; Pazos, A.; Fernandez-Blanco, E. A review of artificial intelligence applied to path planning in UAV swarms. Neural Comput. Appl. 2022, 34, 153–170. [Google Scholar] [CrossRef]
  30. Abdelkader, M.; Güler, S.; Jaleel, H.; Shamma, J.S. Aerial Swarms: Recent Applications and Challenges. Curr. Robot. Rep. 2021, 2, 309–320. [Google Scholar] [CrossRef]
  31. Tahir, A.; Böling, J.; Haghbayan, M.H.; Toivonen, H.T.; Plosila, J. Swarms of Unmanned Aerial Vehicles—A Survey. J. Ind. Inf. Integr. 2019, 16, 100106. [Google Scholar] [CrossRef]
  32. Li, Z.; Min, G.; Ren, P.; Luo, C.; Zhao, L.; Luo, C. Ubiquitous and Robust UxV Networks: Overviews, Solutions, Challenges, and Opportunities. IEEE Netw. 2024, 38, 26–34. [Google Scholar] [CrossRef]
  33. Schranz, M.; Umlauft, M.; Sende, M.; Elmenreich, W. Swarm Robotic Behaviors and Current Applications. Front. Robot. AI 2020, 7, 36. [Google Scholar] [CrossRef] [PubMed]
  34. Alqudsi, Y.; Makaraci, M. UAV swarms: Research, challenges, and future directions. J. Eng. Appl. Sci. 2025, 72, 12. [Google Scholar] [CrossRef]
  35. Zaitseva, E.; Levashenko, V.; Mukhamediev, R.; Brinzei, N.; Kovalenko, A.; Symagulov, A. Review of Reliability Assessment Methods of Drone Swarm (Fleet) and a New Importance Evaluation Based Method of Drone Swarm Structure Analysis. Mathematics 2023, 11, 2551. [Google Scholar] [CrossRef]
  36. Asaamoning, G.; Mendes, P.; Rosário, D.; Cerqueira, E. Drone Swarms as Networked Control Systems by Integration of Networking and Computing. Sensors 2021, 21, 2642. [Google Scholar] [CrossRef] [PubMed]
  37. Chung, S.J.; Paranjape, A.A.; Dames, P.; Shen, S.; Kumar, V. A Survey on Aerial Swarm Robotics. IEEE Trans. Robot. 2018, 34, 837–855. [Google Scholar] [CrossRef]
  38. Connor, J.; Champion, B.; Joordens, M.A. Current Algorithms, Communication Methods and Designs for Underwater Swarm Robotics: A Review. IEEE Sens. J. 2021, 21, 153–169. [Google Scholar] [CrossRef]
  39. Wu, G.; Xu, T.; Sun, Y.; Zhang, J. Review of multiple unmanned surface vessels collaborative search and hunting based on swarm intelligence. Int. J. Adv. Robot. Syst. 2022, 19, 17298806221091885. [Google Scholar] [CrossRef]
  40. Vedachalam, N.; Ramesh, R.; Jyothi, V.B.N.; Doss Prakash, V.; Ramadass, G.A. Autonomous underwater vehicles–challenging developments and technological maturity towards strategic swarm robotics systems. Mar. Georesources Geotechnol. 2019, 37, 525–538. [Google Scholar] [CrossRef]
  41. Liu, G.; Chen, L.; Liu, K.; Luo, Y. A swarm of unmanned vehicles in the shallow ocean: A survey. Neurocomputing 2023, 531, 74–86. [Google Scholar] [CrossRef]
  42. Boccadoro, P.; Striccoli, D.; Grieco, L.A. An extensive survey on the Internet of Drones. Ad Hoc Netw. 2021, 122, 102600. [Google Scholar] [CrossRef]
  43. Michailidis, E.T.; Maliatsos, K.; Skoutas, D.N.; Vouyioukas, D.; Skianis, C. Secure UAV-Aided Mobile Edge Computing for IoT: A Review. IEEE Access 2022, 10, 86353–86383. [Google Scholar] [CrossRef]
  44. Zhou, Y.; Rao, B.; Wang, W. UAV Swarm Intelligence: Recent Advances and Future Trends. IEEE Access 2020, 8, 183856–183878. [Google Scholar] [CrossRef]
  45. Javed, S.; Hassan, A.; Ahmad, R.; Ahmed, W.; Ahmed, R.; Saadat, A.; Guizani, M. State-of-the-Art and Future Research Challenges in UAV Swarms. IEEE Internet Things J. 2024, 11, 19023–19045. [Google Scholar] [CrossRef]
  46. Liu, G.; Van Huynh, N.; Du, H.; Hoang, D.T.; Niyato, D.; Zhu, K.; Kang, J.; Xiong, Z.; Jamalipour, A.; Kim, D.I. Generative AI for Unmanned Vehicle Swarms: Challenges, Applications and Opportunities. arXiv 2024. [Google Scholar] [CrossRef]
  47. Azoulay, R.; Haddad, Y.; Reches, S. Machine Learning Methods for UAV Flocks Management—A Survey. IEEE Access 2021, 9, 139146–139175. [Google Scholar] [CrossRef]
  48. Pandey, D.; Kushwaha, V. An exploratory study of congestion control techniques in Wireless Sensor Networks. Comput. Commun. 2020, 157, 257–283. [Google Scholar] [CrossRef]
  49. Ding, Y.; Yang, Z.; Pham, Q.V.; Hu, Y.; Zhang, Z.; Shikh-Bahaei, M. Distributed Machine Learning for UAV Swarms: Computing, Sensing, and Semantics. IEEE Internet Things J. 2024, 11, 7447–7473. [Google Scholar] [CrossRef]
  50. Cai, W.; Liu, Z.; Zhang, M.; Wang, C. Cooperative Artificial Intelligence for underwater robotic swarm. Robot. Auton. Syst. 2023, 164, 104410. [Google Scholar] [CrossRef]
  51. Xiao, J.; Pisutsin, P.; Feroskhan, M. Collaborative Target Search With a Visual Drone Swarm: An Adaptive Curriculum Embedded Multistage Reinforcement Learning Approach. IEEE Trans. Neural Netw. Learn. Syst. 2025, 36, 313–327. [Google Scholar] [CrossRef] [PubMed]
  52. Perrusquía, A.; Guo, W. Uncovering Reward Goals in Distributed Drone Swarms Using Physics-Informed Multiagent Inverse Reinforcement Learning. IEEE Trans. Cybern. 2025, 55, 14–23. [Google Scholar] [CrossRef]
  53. Nguyen, H.T.; Nguyen, T.D.; Garratt, M.; Kasmarik, K.; Anavatti, S.; Barlow, M.; Abbass, H.A. A Deep Hierarchical Reinforcement Learner for Aerial Shepherding of Ground Swarms. In Neural Information Processing; Gedeon, T., Wong, K.W., Lee, M., Eds.; Springer International Publishing: Cham, Switzerland, 2019; Volume 11953, pp. 658–669. [Google Scholar] [CrossRef]
  54. Zhang, J.; Yu, Z.; Mao, S.; Periaswamy, S.C.G.; Patton, J.; Xia, X. IADRL: Imitation Augmented Deep Reinforcement Learning Enabled UGV-UAV Coalition for Tasking in Complex Environments. IEEE Access 2020, 8, 102335–102347. [Google Scholar] [CrossRef]
  55. Venturini, F.; Mason, F.; Pase, F.; Chiariotti, F.; Testolin, A.; Zanella, A.; Zorzi, M. Distributed Reinforcement Learning for Flexible and Efficient UAV Swarm Control. IEEE Trans. Cogn. Commun. Netw. 2021, 7, 955–969. [Google Scholar] [CrossRef]
  56. Qamar, S.; Khan, S.H.; Arshad, M.A.; Qamar, M.; Gwak, J.; Khan, A. Autonomous Drone Swarm Navigation and Multitarget Tracking With Island Policy-Based Optimization Framework. IEEE Access 2022, 10, 91073–91091. [Google Scholar] [CrossRef]
  57. Gan, W.; Qu, X.; Song, D.; Yao, P. Multi-USV Cooperative Chasing Strategy Based on Obstacles Assistance and Deep Reinforcement Learning. IEEE Trans. Autom. Sci. Eng. 2024, 21, 5895–5910. [Google Scholar] [CrossRef]
  58. Cao, Y.; Fang, X. Optimized-Weighted-Speedy Q-Learning Algorithm for Multi-UGV in Static Environment Path Planning under Anti-Collision Cooperation Mechanism. Mathematics 2023, 11, 2476. [Google Scholar] [CrossRef]
  59. Wang, S.; Lin, C.; Han, G.; Zhu, S.; Li, Z.; Wang, Z.; Ma, Y. Multi-AUV Cooperative Underwater Multi-Target Tracking Based on Dynamic-Switching-Enabled Multi-Agent Reinforcement Learning. IEEE Trans. Mob. Comput. 2025, 24, 4296–4311. [Google Scholar] [CrossRef]
  60. Yuwen, C.; Wen, G.; Zhou, J.; Luan, M.; Huang, T. Distributed Nash Equilibrium Seeking in Coalition Games for Uncertain Euler-Lagrange Systems With Application to USV Swarm Confrontation. arXiv 2025. [Google Scholar] [CrossRef]
  61. Qin, D.; Dong, H.; Sun, S.; Wen, Z.; Li, J.; Li, T. Model-Driven Cooperative Path Planning for Dynamic Target Searching of Unmanned Unterwater Vehicle Formation. J. Mar. Sci. Eng. 2024, 12, 2094. [Google Scholar] [CrossRef]
  62. Praczyk, T. Neural control system for a swarm of autonomous underwater vehicles. Knowl.-Based Syst. 2023, 276, 110783. [Google Scholar] [CrossRef]
  63. Raj, A.; Ahuja, K.; Busnel, Y. AI Algorithm for Predicting and Optimizing Trajectory of UAV Swarm. arXiv 2024. [Google Scholar] [CrossRef]
  64. Cabuk, U.C.; Tosun, M.; Dagdeviren, O.; Ozturk, Y. Modeling Energy Consumption of Small Drones for Swarm Missions. IEEE Trans. Intell. Transp. Syst. 2024, 25, 10176–10189. [Google Scholar] [CrossRef]
  65. Kusyk, J.; Uyar, M.U.; Ma, K.; Wu, J.J.; Ruan, W.; Guha, D.K.; Bertoli, G.; Boksiner, J. AI Based Flight Control for Autonomous UAV Swarms. In Proceedings of the 2018 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 12–14 December 2018; pp. 1155–1160. [Google Scholar] [CrossRef]
  66. Zeng, T.; Semiari, O.; Mozaffari, M.; Chen, M.; Saad, W.; Bennis, M. Federated Learning in the Sky: Joint Power Allocation and Scheduling with UAV Swarms. In Proceedings of the ICC 2020-2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
  67. Trihinas, D.; Agathocleous, M.; Avogian, K.; Katakis, I. FlockAI: A Testing Suite for ML-Driven Drone Applications. Future Internet 2021, 13, 317. [Google Scholar] [CrossRef]
  68. Saeed, R.A.; Omri, M.; Abdel-Khalek, S.; Ali, E.S.; Alotaibi, M.F. Optimal path planning for drones based on swarm intelligence algorithm. Neural Comput. Appl. 2022, 34, 10133–10155. [Google Scholar] [CrossRef]
  69. Gal, O. Adaptive USVs Swarm Optimization for Target Tracking in Dynamic Environments. arXiv 2024. [Google Scholar] [CrossRef]
  70. Sundelius, N.; Funk, P.; Sohlberg, R. Simulation Environment Evaluating AI Algorithms for Search Missions Using Drone Swarms. In International Congress and Workshop on Industrial AI and eMaintenance 2023; Kumar, U., Karim, R., Galar, D., Kour, R., Eds.; Springer Nature Switzerland: Cham, Switzerland, 2024; pp. 191–204. [Google Scholar] [CrossRef]
  71. Zeng, Q.; Nait-Abdesselam, F. Multi-Agent Reinforcement Learning-Based Extended Boid Modeling for Drone Swarms. In Proceedings of the ICC 2024-IEEE International Conference on Communications, Denver, CO, USA, 9–13 June 2024; pp. 1551–1556. [Google Scholar] [CrossRef]
  72. Awasthi, S.; Balusamy, B.; Porkodi, V. Artificial Intelligence Supervised Swarm UAVs for Reconnaissance. In Data Science and Analytics; Batra, U., Roy, N.R., Panda, B., Eds.; Springer Singapore: Singapore, 2020; Volume 1229, pp. 375–388. [Google Scholar] [CrossRef]
  73. Zhu, T.; Xiao, Y.; Zhang, H. Maritime patrol tasks assignment optimization of multiple USVs under endurance constraint. Ocean Eng. 2023, 285, 115445. [Google Scholar] [CrossRef]
  74. Liu, J.; Anavatti, S.; Garratt, M.; Abbass, H.A. A hierarchical mission planning system for multi-uncrewed ground vehicles using fast cost evaluation and ant colony optimisation. Inf. Sci. 2024, 679, 121029. [Google Scholar] [CrossRef]
  75. Hussein, A.; Nguyen, H.; Abbass, H.A. Machine teaching in Swarm Metaverse under different levels of autonomy. Philos. Trans. R. Soc. A Math. Phys. Eng. Sci. 2025, 383, 20240149. [Google Scholar] [CrossRef]
  76. Saffre, F.; Hildmann, H.; Karvonen, H.; Lind, T. Self-Swarming for Multi-Robot Systems Deployed for Situational Awareness. In New Developments and Environmental Applications of Drones; Lipping, T., Linna, P., Narra, N., Eds.; Springer International Publishing: Cham, Switzerland, 2022; pp. 51–72. [Google Scholar] [CrossRef]
  77. Kurunathan, H.; Huang, H.; Li, K.; Ni, W.; Hossain, E. Machine Learning-Aided Operations and Communications of Unmanned Aerial Vehicles: A Contemporary Survey. IEEE Commun. Surv. Tutor. 2024, 26, 496–533. [Google Scholar] [CrossRef]
  78. Divakar, D.; Kanmani; Supriya, A.V. Drone Swarm Coordination Using Machine Learning in IoT Networks. In Machine Learning for Drone-Enabled IoT Networks; Hassan, J., Khalifa, S., Misra, P., Eds.; Springer Nature Switzerland: Cham, Switzerland, 2025; pp. 39–64. [Google Scholar] [CrossRef]
  79. Khan, M.A.; Kumar, N.; Mohsan, S.A.H.; Khan, W.U.; Nasralla, M.M.; Alsharif, M.H.; Żywiołek, J.; Ullah, I. Swarm of UAVs for Network Management in 6G: A Technical Review. IEEE Trans. Netw. Serv. Manag. 2023, 20, 741–761. [Google Scholar] [CrossRef]
  80. Koushik, A.; Hu, F.; Kumar, S. Deep Q-Learning-Based Node Positioning for Throughput-Optimal Communications in Dynamic UAV Swarm Network. IEEE Trans. Cogn. Commun. Netw. 2019, 5, 554–566. [Google Scholar] [CrossRef]
  81. Wei, J.; Zhao, Y.; Yang, K. Integrated Communication and Control for Intelligent Formation Management of UAV Swarms: A Deep Reinforcement Learning Approach. IEEE Wirel. Commun. Lett. 2025, 14, 1351–1355. [Google Scholar] [CrossRef]
  82. Wang, X.; Xu, Y.; Chen, C.; Yang, X.; Chen, J.; Ruan, L.; Xu, Y.; Chen, R. Machine Learning Empowered Spectrum Sharing in Intelligent Unmanned Swarm Communication Systems: Challenges, Requirements and Solutions. IEEE Access 2020, 8, 89839–89849. [Google Scholar] [CrossRef]
  83. Mao, Q.; Zhang, L.; Hu, F.; Bentley, E.S.; Kumar, S. Deep Learning (DL)-based adaptive transport layer control in UAV Swarm Networks. Comput. Netw. 2021, 201, 108511. [Google Scholar] [CrossRef]
  84. Xiao, Y.; Ye, Y.; Huang, S.; Hao, L.; Ma, Z.; Xiao, M.; Mumtaz, S.; Dobre, O.A. Fully Decentralized Federated Learning-Based On-Board Mission for UAV Swarm System. IEEE Commun. Lett. 2021, 25, 3296–3300. [Google Scholar] [CrossRef]
  85. Xu, J.; Yao, H.; Zhang, R.; Mai, T.; Huang, S.; Guo, S. Federated Learning Powered Semantic Communication for UAV Swarm Cooperation. IEEE Wirel. Commun. 2024, 31, 140–146. [Google Scholar] [CrossRef]
  86. Myers, R.J.; Perera, S.M.; McLewee, G.; Huang, D.; Song, H. Multi-Beam Beamforming-Based ML Algorithm to Optimize the Routing of Drone Swarms. Drones 2024, 8, 57. [Google Scholar] [CrossRef]
  87. Tsipi, L.; Tatsis, V.I.; Skoutas, D.N.; Vouyioukas, D.; Skianis, C. A Machine Learning UAV Deployment Approach for Emergency Cellular Networks. In Proceedings of the ICC 2023-IEEE International Conference on Communications, Rome, Italy, 28 May–1 June 2023; pp. 5683–5688. [Google Scholar] [CrossRef]
  88. Khalil, H.; Rahman, S.U.; Ullah, I.; Khan, I.; Alghadhban, A.J.; Al-Adhaileh, M.H.; Ali, G.; ElAffendi, M. A UAV-Swarm-Communication Model Using a Machine-Learning Approach for Search-and-Rescue Applications. Drones 2022, 6, 372. [Google Scholar] [CrossRef]
  89. Khalil, H.; Ali, G.; Ur Rahman, S.; Asim, M.; El Affendi, M. Outage Prediction and Improvement in 6G for UAV Swarm Relays Using Machine Learning. Prog. Electromagn. Res. B 2024, 107, 33–45. [Google Scholar] [CrossRef]
  90. Lim, R.Y.H.; Lim, J.M.Y.; Lan, B.L.; Ho, P.W.C.; Ho, N.S.; Ooi, T.W.M. UAV Swarm Communication Reliability Prediction using Machine Learning. In Proceedings of the 2023 IEEE 8th International Conference on Recent Advances and Innovations in Engineering (ICRAIE), Kuala Lumpur, Malaysia, 2–3 December 2023; pp. 1–6. [Google Scholar] [CrossRef]
  91. Chandhar, P.; Danev, D.; Larsson, E.G. Massive MIMO for Communications With Drone Swarms. IEEE Trans. Wirel. Commun. 2018, 17, 1604–1629. [Google Scholar] [CrossRef]
  92. Lakas, A.; Belkacem, A.N.; Al Hassani, S. An Adaptive Multi-clustered Scheme for Autonomous UAV Swarms. In Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 1567–1572. [Google Scholar] [CrossRef]
  93. Sousa, D.; Luís, M.; Sargento, S.; Pereira, A. An Aquatic Mobile Sensing USV Swarm with a Link Quality-Based Delay Tolerant Network. Sensors 2018, 18, 3440. [Google Scholar] [CrossRef]
  94. Nomikos, N.; Giannopoulos, A.; Kalafatelis, A.; Özduran, V.; Trakadas, P.; Karagiannidis, G.K. Improving Connectivity in 6G Maritime Communication Networks With UAV Swarms. IEEE Access 2024, 12, 18739–18751. [Google Scholar] [CrossRef]
  95. Pham, Q.V.; Huynh-The, T.; Alazab, M.; Zhao, J.; Hwang, W.J. Sum-Rate Maximization for UAV-Assisted Visible Light Communications Using NOMA: Swarm Intelligence Meets Machine Learning. IEEE Internet Things J. 2020, 7, 10375–10387. [Google Scholar] [CrossRef]
  96. Zhou, F.; Lagkas, T.; Aadil, F. Optimizing Edge Computing for Internet of Drones: A Hybrid Approach Using Deep Learning and Swarm-Based Routing. Macaw Int. J. Adv. Res. Comput. Sci. Eng. 2025, 10, 64–73. [Google Scholar] [CrossRef]
  97. Mahmood, M.; Ghadaksaz, M.; Koc, A.; Le-Ngoc, T. Deep Learning Meets Swarm Intelligence for UAV-Assisted IoT Coverage in Massive MIMO. IEEE Internet Things J. 2024, 11, 7679–7696. [Google Scholar] [CrossRef]
  98. Liu, Z.; Ghulam, M.u.d.; Zheng, J.; Wang, S.; Muhammad, A. A novel deep learning based security assessment framework for enhanced security in swarm network environment. Int. J. Crit. Infrastruct. Prot. 2022, 38, 100540. [Google Scholar] [CrossRef]
  99. Da Silva, L.M.; Ferrão, I.G.; Dezan, C.; Espes, D.; Branco, K.R.L.J.C. Anomaly-Based Intrusion Detection System for In-Flight and Network Security in UAV Swarm. In Proceedings of the 2023 International Conference on Unmanned Aircraft Systems (ICUAS), Warsaw, Poland, 6–9 June 2023; pp. 812–819. [Google Scholar] [CrossRef]
  100. Challita, U.; Ferdowsi, A.; Chen, M.; Saad, W. Machine Learning for Wireless Connectivity and Security of Cellular-Connected UAVs. IEEE Wirel. Commun. 2019, 26, 28–35. [Google Scholar] [CrossRef]
  101. Halli Sudhakara, S.; Haghnegahdar, L. Security Enhancement in AAV Swarms: A Case Study Using Federated Learning and SHAP Analysis. IEEE Open J. Intell. Transp. Syst. 2025, 6, 335–345. [Google Scholar] [CrossRef]
  102. Chouhan, N.; Jakka, G.; Navale, G.S.; Verma, G.; Patil, P.S.; Dhotay, M.A. A Novel Machine Learning Unmanned Swarm Intelligence Based Data Security in Defence System. In Proceedings of the 2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI), Chennai, India, 25–26 May 2023; pp. 1–8. [Google Scholar] [CrossRef]
  103. Ahn, H.; Choi, H.L.; Kang, M.; Moon, S. Learning-Based Anomaly Detection and Monitoring for Swarm Drone Flights. Appl. Sci. 2019, 9, 5477. [Google Scholar] [CrossRef]
  104. Nebe, E.; Sanni, M.L.; Adetona, R.A.; Akinyemi, B.O.; Bello, S.A.; Aderounmu, G.A. Chaos Detection and Mitigation in Swarm of Drones Using Machine Learning Techniques and Chaotic Attractors. Int. J. Adv. Comput. Sci. Appl. 2022, 13, 449–460. [Google Scholar] [CrossRef]
  105. Gackowska-Kątek, M.; Cofta, P. Explainable machine learning model of disorganisation in swarms of drones. Sci. Rep. 2024, 14, 22519. [Google Scholar] [CrossRef]
  106. Wedaj Kibret, S. Property-based attestation in device swarms: A machine learning approach. In Machine Learning for Cyber Security; Malik, P., Nautiyal, L., Ram, M., Eds.; De Gruyter: Berlin, Germany, 2022; pp. 71–90. [Google Scholar] [CrossRef]
  107. Karmakar, R.; Kaddoum, G.; Akhrif, O. A Blockchain-Based Distributed and Intelligent Clustering-Enabled Authentication Protocol for UAV Swarms. IEEE Trans. Mob. Comput. 2024, 23, 6178–6195. [Google Scholar] [CrossRef]
  108. Semenov, S.; Krupska-Klimczak, M.; Mazurek, P.; Zhang, M.; Chernikh, O. Improving Unmanned Aerial Vehicle Security as a Factor in Sustainable Development of Smart City Infrastructure: Automatic Dependent Surveillance–Broadcast (ADS-B) Data Protection. Sustainability 2025, 17, 1553. [Google Scholar] [CrossRef]
  109. Guerber, C.; Royer, M.; Larrieu, N. Machine Learning and Software Defined Network to secure communications in a swarm of drones. J. Inf. Secur. Appl. 2021, 61, 102940. [Google Scholar] [CrossRef]
  110. Tayyab, M.; Mumtaz, M.; Muzammal, S.M.; Jhanjhi, N.Z.; tuz Zahra, F. Swarm Security: Tackling Threats in the Age of Drone Swarms. In Advances in Information Security, Privacy, and Ethics; Shah, I.A., Jhanjhi, N.Z., Eds.; IGI Global: Hershey, PA, USA, 2024; pp. 324–342. [Google Scholar] [CrossRef]
  111. Phadke, A.; Medrano, F.A. Towards Resilient UAV Swarms—A Breakdown of Resiliency Requirements in UAV Swarms. Drones 2022, 6, 340. [Google Scholar] [CrossRef]
  112. Naous, T.; Itani, M.; Awad, M.; Sharafeddine, S. Reinforcement Learning in the Sky: A Survey on Enabling Intelligence in NTN-Based Communications. IEEE Access 2023, 11, 19941–19968. [Google Scholar] [CrossRef]
  113. Huang, X.; Marques-Silva, J. On the failings of Shapley values for explainability. Int. J. Approx. Reason. 2024, 171, 109112. [Google Scholar] [CrossRef]
  114. Khan, H.A.; Khan, H.; Ghafoor, S.; Khan, M.A. A Survey on Security of Automatic Dependent Surveillance -Broadcast (ADS-B) Protocol: Challenges, Potential Solutions and Future Directions. IEEE Commun. Surv. Tutor. 2024; early access. [Google Scholar] [CrossRef]
  115. Manzanilla, A.; Reyes, S.; Garcia, M.; Mercado, D.; Lozano, R. Autonomous Navigation for Unmanned Underwater Vehicles: Real-Time Experiments Using Computer Vision. IEEE Robot. Autom. Lett. 2019, 4, 1351–1356. [Google Scholar] [CrossRef]
  116. Wu, X.; Chen, H.; Chen, C.; Zhong, M.; Xie, S.; Guo, Y.; Fujita, H. The autonomous navigation and obstacle avoidance for USVs with ANOA deep reinforcement learning method. Knowl.-Based Syst. 2020, 196, 105201. [Google Scholar] [CrossRef]
  117. Iqbal, A.; Tham, M.L.; Wong, Y.J.; Al-Habashna, A.; Wainer, G.; Zhu, Y.X.; Dagiuklas, T. Empowering Non-Terrestrial Networks With Artificial Intelligence: A Survey. IEEE Access 2023, 11, 100986–101006. [Google Scholar] [CrossRef]
  118. Ali, M.F.; Jayakody, D.N.K.; Chursin, Y.A.; Affes, S.; Dmitry, S. Recent Advances and Future Directions on Underwater Wireless Communications. Arch. Comput. Methods Eng. 2020, 27, 1379–1412. [Google Scholar] [CrossRef]
  119. Dulac-Arnold, G.; Mankowitz, D.; Hester, T. Challenges of Real-World Reinforcement Learning. arXiv 2019. [Google Scholar] [CrossRef]
  120. Salvato, E.; Fenu, G.; Medvet, E.; Pellegrino, F.A. Crossing the Reality Gap: A Survey on Sim-to-Real Transferability of Robot Controllers in Reinforcement Learning. IEEE Access 2021, 9, 153171–153187. [Google Scholar] [CrossRef]
  121. Tobin, J.; Fong, R.; Ray, A.; Schneider, J.; Zaremba, W.; Abbeel, P. Domain Randomization for Transferring Deep Neural Networks from Simulation to the Real World. arXiv 2017. [Google Scholar] [CrossRef]
  122. Alrefaei, F. Machine Learning for Intrusion Detection into Unmanned Aerial System 6G Networks. Ph.D. Thesis, Embry-Riddle Aeronautical University, Daytona Beach, FL, USA, 2024. [Google Scholar]
  123. Kheddar, H. Transformers and Large Language Models for Efficient Intrusion Detection Systems: A Comprehensive Survey. arXiv 2025. [Google Scholar] [CrossRef]
  124. Ali, T. Next-Generation Intrusion Detection Systems with LLMs: Real-Time Anomaly Detection, Explainable AI, and Adaptive Data Generation. Master’s Thesis, University of Oulu, Oulu, Finland, 2024. [Google Scholar]
  125. Hassanin, M.; Moustafa, N. A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions. arXiv 2024. [Google Scholar] [CrossRef]
  126. Otal, H.T.; Canbaz, M.A. LLM-Assisted Crisis Management: Building Advanced LLM Platforms for Effective Emergency Response and Public Collaboration. arXiv 2024. [Google Scholar] [CrossRef]
  127. Xia, Y.; Zhang, J.; Jazdi, N.; Weyrich, M. Incorporating Large Language Models into Production Systems for Enhanced Task Automation and Flexibility. arXiv 2024. [Google Scholar] [CrossRef]
  128. Hays, S.; White, J. Employing LLMs for Incident Response Planning and Review. arXiv 2024. [Google Scholar] [CrossRef]
Figure 1. PRISMA 2020 flow diagram illustrating the literature identification, screening, eligibility, and inclusion process.
Figure 1. PRISMA 2020 flow diagram illustrating the literature identification, screening, eligibility, and inclusion process.
Drones 09 00700 g001
Figure 2. Key areas of interest in UxV swarms.
Figure 2. Key areas of interest in UxV swarms.
Drones 09 00700 g002
Figure 3. AI in swarm intelligence.
Figure 3. AI in swarm intelligence.
Drones 09 00700 g003
Figure 4. Appearances of each swarm operation in the surveyed literature.
Figure 4. Appearances of each swarm operation in the surveyed literature.
Drones 09 00700 g004
Figure 5. AI-based adaptive communications.
Figure 5. AI-based adaptive communications.
Drones 09 00700 g005
Figure 6. Appearances of each communication function in the surveyed literature.
Figure 6. Appearances of each communication function in the surveyed literature.
Drones 09 00700 g006
Figure 7. AI-driven security mechanisms.
Figure 7. AI-driven security mechanisms.
Drones 09 00700 g007
Figure 8. Appearances of each security mechanism in the surveyed literature.
Figure 8. Appearances of each security mechanism in the surveyed literature.
Drones 09 00700 g008
Figure 9. Appearances of different types of vehicles in the surveyed literature.
Figure 9. Appearances of different types of vehicles in the surveyed literature.
Drones 09 00700 g009
Figure 10. Research directions on swarm technologies.
Figure 10. Research directions on swarm technologies.
Drones 09 00700 g010
Table 1. Relevant review and survey papers.
Table 1. Relevant review and survey papers.
ReferenceYearShort DescriptionAI in Swarm IntelligenceAI-Based Adaptive CommunicationsAI-Driven Security Mechanisms
Chen, Xi et al. [26]2020Centered on communication architectures and routing protocols, with only indirect references to optimization.
Chen, Wu et al. [27]2020Proposes robustness techniques for drone swarms using rule-based models with limited AI coverage.Partially
Sarkar et al. [28]2023Examines AI methods for network control and UAV coordination, with swarming treated as one of several enabling technologies.Partially
Puente-Castro et al. [29]2022Focused survey on AI-driven path planning for UAV swarms using RL, SI, and GNN, without discussing swarm security aspects.
Abdelkader et al. [30]2021Discusses UAV swarms through the lens of localization and planning, minimizing AI and communication complexity.PartiallyPartially
Tahir et al. [31]2019Engineering-oriented survey of UAV swarms focusing on control systems, decentralized coordination, and layered communications.
Li et al. [32]2024Integrates AI for adaptive control in heterogeneous UxV networks, centered around SDN architecture rather than swarm systems.Partially
Schranz et al. [33]2020Provides a taxonomy of swarm behaviors with examples, avoiding technical AI or communication system analysis.Partially
Alqudsi et al. [34]2025Holistic review integrating AI, ML, communication networks, and ethics in design of scalable, intelligent UAV swarms.Partially
Zaitseva et al. [35]2023Examines reliability modeling and structural analysis of drone swarms, treating swarms as topological systems, not AI-driven.
Asaamoning et al. [36]2021Reviews drone swarms as distributed control systems, highlighting self-organizing algorithms, system security, and resource management.Partially
Chung et al. [37]2018Comprehensive review of UAV swarms, covering flight dynamics, control algorithms, and 3D autonomy.Partially
Connor et al. [38]2021Reviews underwater swarm platforms, sensor types, and role-based designs with minimal focus on AI or SI.Partially
Table 2. Relevant review and survey papers.
Table 2. Relevant review and survey papers.
ReferenceYearShort DescriptionAI in Swarm IntelligenceAI-Based Adaptive CommunicationsAI-Driven Security Mechanisms
Wu et al. [39]2022Research on collaborative search and hunting using multiple USVs. AI central in functions such as path planning, task allocation, and collaborative search.
Vedachalam et al. [40]2019Discusses AUV design and reliability for strategic use, emphasizing battery modeling and navigation accuracy.Partially
Liu et al. [41]2023Focuses on coordination challenges of underwater swarms, highlighting environmental constraints and communication limitations.Partially
Boccardo et al. [42]2021Summarizes real-world use cases and scenarios and cites works that implemented/tested UAV systems in practice.PartiallyPartiallyPartially
Michailidis et al. [43]2022Examines the possibility of a UAV-aided IoT network. Focuses on networking and secure communications.Partially
Zhou et al. [44]2020Examines SI by focusing on decision-making, path planning, control, communication, and applications.Partially
Javed et al. [45]2024Covers aspects of UAV swarms such as formation control, path planning, autonomy, coordination, security, and communications.
Liu et al. [46]2024Aims to provide a comprehensive survey on applications, challenges, and opportunities of GAI in unmanned vehicle swarms.
Azoulay et al. [47]2021Offers a rich and methodical review of ML techniques for UAV flock formation, task allocation, and coordinationPartially
Table 3. Studies with approaches relying on reinforcement learning.
Table 3. Studies with approaches relying on reinforcement learning.
ReferenceVehiclePath Planning and NavigationObstacle and Collision AvoidanceFormation ControlTarget SearchMission PlanningTask OptimizationResource Optimization
Xiao et al. [51]UAV
Perrusquia et al. [52]UAV
Nguyen et al. [53]UAV, UGV
Zhang et al. [54]UAV, UGV
Venturini et al. [55]UAV
Qamar et al. [56]UAV
Gan et al. [57]USV
Cao et al. [58]UGV
Wang et al. [59]UUV
Table 4. Studies with approaches relying on supervised, federated, and probabilistic Models.
Table 4. Studies with approaches relying on supervised, federated, and probabilistic Models.
ReferenceVehiclePath Planning and NavigationObstacle and Collision AvoidanceFormation ControlTarget SearchMission PlanningTask OptimizationResource Optimization
Yuwen et al. [60]USV
Qin et al. [61]UUV
Praczyk et al. [62]UUV
Raj et al. [63]UAV
Cabuk et al. [64]UAV
Kusyk et al. [65]UAV
Zeng et al. [66]UAV
Trihinas et al. [67]UAV
Table 5. Studies with approaches relying on hybrid, bio-inspired, and other approaches.
Table 5. Studies with approaches relying on hybrid, bio-inspired, and other approaches.
ReferenceVehiclePath Planning and NavigationObstacle and Collision AvoidanceFormation ControlTarget SearchMission PlanningTask OptimizationResource Optimization
Saeed et al. [68]UAV
Gal [69]USV
Sundelius et al. [70]UAV
Zeng and Nait-Abdesselam [71]UAV
Awasthi et al. [72]UAV
Zhu et al. [73]USV
Liu, Jing et al. [74]UGV
Hussein et al. [75]Generic
Saffre et al. [76]UAV
Table 6. Studies with approaches relying on reinforcement learning.
Table 6. Studies with approaches relying on reinforcement learning.
ReferenceVehicleNetwork Architecture and TopologiesChannel and Propagation ModelingSignal Quality and EnhancementRouting and ProtocolsNetwork Management and Optimization
Kurunathan et al. [77]UAV
Divakar et al. [78]UAV
Khan et al. [79]UAV
Koushik et al. [80]UAV
Wei et al. [81]UAV
Wang et al. [82]UAV
Table 7. Studies with approaches relying on supervised, federated, and probabilistic Models.
Table 7. Studies with approaches relying on supervised, federated, and probabilistic Models.
ReferenceVehicleNetwork Architecture and TopologiesChannel and Propagation ModelingSignal Quality and EnhancementRouting and ProtocolsNetwork Management and Optimization
Kurunathan et al. [77]UAV
Mao et al. [83]UAV
Xiao et al. [84]UAV
Xu et al. [85]UAV
Myers et al. [86]UAV
Tsipi et al. [87]UAV
Khalil et al. [88]UAV
Khalil et al. [89]UAV
Lim et al. [90]UAV
Table 8. Studies with approaches relying on hybrid, bio-inspired, and other Methods.
Table 8. Studies with approaches relying on hybrid, bio-inspired, and other Methods.
ReferenceVehicleNetwork Architecture and TopologiesChannel and Propagation ModelingSignal Quality and EnhancementRouting and ProtocolsNetwork Management and Optimization
Chandhar et al. [91]UAV
Lakas et al. [92]UAV
Sousa et al. [93]USV
Nomikos et al. [94]UAV
Pham et al. [95]UAV
Zhou et al. [96]UAV
Mahmood et al. [97]UAV
Table 9. Studies with approaches relying on supervised, federated, and probabilistic models.
Table 9. Studies with approaches relying on supervised, federated, and probabilistic models.
ReferenceVehicleAnomaly and Intrusion DetectionSelf AdaptabilityData Integrity and PrivacyAuthenti-cation Rules and ProtocolsExplainabilityVulnerability Assessment
Liu et al. [98]Generic
Da Silva et al. [99]UAV
Challita et al. [100]UAV
Halli Sudhakara and Haghnegahdar [101]UAV
Chouhan et al. [102]UAV
Ahn et al. [103]UAV
Nebe et al. [104]UAV
Gackowska-Katek and Cofta [105]UAV
Table 10. Studies with approaches relying on unsupervised, hybrid, and other methods.
Table 10. Studies with approaches relying on unsupervised, hybrid, and other methods.
ReferenceVehicleAnomaly and Intrusion DetectionSelf AdaptabilityData Integrity and PrivacyAuthenti-cation Rules and ProtocolsExplainabilityVulnerability Assessment
Wedaj Kibret [106]Generic
Karmakar et al. [107]UAV
Semenov et al. [108]UAV
Guerber et al. [109]UAV
Tayyab et al. [110]UAV
Phadke & Medrano [111]UAV
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Dimos, A.; Skoutas, D.N.; Nomikos, N.; Skianis, C. A Survey on UxV Swarms and the Role of Artificial Intelligence as a Technological Enabler. Drones 2025, 9, 700. https://doi.org/10.3390/drones9100700

AMA Style

Dimos A, Skoutas DN, Nomikos N, Skianis C. A Survey on UxV Swarms and the Role of Artificial Intelligence as a Technological Enabler. Drones. 2025; 9(10):700. https://doi.org/10.3390/drones9100700

Chicago/Turabian Style

Dimos, Alexandros, Dimitrios N. Skoutas, Nikolaos Nomikos, and Charalabos Skianis. 2025. "A Survey on UxV Swarms and the Role of Artificial Intelligence as a Technological Enabler" Drones 9, no. 10: 700. https://doi.org/10.3390/drones9100700

APA Style

Dimos, A., Skoutas, D. N., Nomikos, N., & Skianis, C. (2025). A Survey on UxV Swarms and the Role of Artificial Intelligence as a Technological Enabler. Drones, 9(10), 700. https://doi.org/10.3390/drones9100700

Article Metrics

Back to TopTop