Next Article in Journal
Explainable Kolmogorov–Arnold Networks for Zero-Shot Human Activity Recognition on TinyML Edge Devices
Previous Article in Journal
Shared Autoencoder-Based Unified Intrusion Detection Across Heterogeneous Datasets for Binary and Multi-Class Classification Using a Hybrid CNN–DNN Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Deceptive Waypoint Sequencing Based UAV–UAV Interception Control Using DBSCAN Learning Strategy

by
Abdulrazaq Nafiu Abubakar
1,
Ali Nasir
1,2,3 and
Abdul-Wahid A. Saif
1,4,*
1
Department of Control and Instrumentation Engineering, King Fahd University of Petroleum and Minerals, Dhahran 31261, Saudi Arabia
2
Interdisciplinary Research Center for Intelligent Manufacturing and Robotics, King Fahd University of Petroleum and Minerals, Dhahran 31261, Saudi Arabia
3
Interdisciplinary Research Center for Aviation and Space Exploration, King Fahd University of Petroleum and Minerals, Dhahran 31261, Saudi Arabia
4
Interdisciplinary Research Center for Smart Mobility and Logistics (IRC-SML), King Fahd University of Petroleum and Minerals, Dhahran 31261, Saudi Arabia
*
Author to whom correspondence should be addressed.
Mach. Learn. Knowl. Extr. 2026, 8(3), 54; https://doi.org/10.3390/make8030054
Submission received: 22 January 2026 / Revised: 18 February 2026 / Accepted: 19 February 2026 / Published: 25 February 2026

Abstract

Modern multi-Unmanned Aerial Vehicle (UAV) attacks pose significant challenges to existing counter-UAV frameworks due to their agility, irregular spatial formations, and increasing reliance on intelligent evasive behaviors. This paper proposes a unified interception architecture that integrates Density-Based Spatial Clustering of Applications with Noise (DBSCAN) for multi-target grouping, a deceptive waypoint sequencing (DWS) mechanism for adversarial evasion, and a robust sliding-mode backstepping controller augmented with extended state observers (ESOs) for precise tracking under disturbances. DBSCAN enables real-time clustering of attacking UAVs without prior knowledge of the number of formations, producing dynamic centroids that serve as tactical interception references. To counter risky attackers capable of predicting defender trajectories, a novel DWS strategy introduces centroid-relative waypoints that preserve mission objectives while reducing trajectory predictability. Lyapunov-based analysis is developed for stability, guaranteeing uniform ultimate boundedness of the tracking errors. The proposed approach achieves successful interception in both scenarios, with an interception time of 7 s and final interception error of 0.023 m in the single-UAV case, and an interception time of 8 s with final interception error of 0.050 m in the multiple-UAV case, whereas the PID baseline fails to achieve interception under the same conditions. Extensive simulations involving single and multi-cluster engagements demonstrate that the proposed strategy achieves fast, accurate, and deception-resilient interception, outperforming the conventional PID approach in the presence of disturbances, nonlinearities, and dynamic swarm configurations. The obtained results show the effectiveness of integrating adaptive clustering, deceptive planning, and robust nonlinear control for modern UAV–UAV defensive operations.

Graphical Abstract

1. Introduction

Unmanned aerial vehicles (UAVs), commonly referred to as drones, have rapidly increased in both civilian and military sectors, enabling new applications while also raising additional security concerns. In 2020, the global drone market was valued at approximately $ 22.5 billion, with projections expected to exceed $ 42.8 billion by 2025 [1]. UAVs are used for infrastructure inspections, logistics (delivery), surveillance, search and rescue, and military reconnaissance and strike operations [2,3,4]. They range from those covered by the hobbyist UAV to those that are for long-range fixed-wing systems. However, this growth also brings threats: small drones can be weaponized, used for smuggling or espionage, or flown into restricted areas [5,6]. The increasing accessibility of commercial off-the-shelf UAV technology means that potential adversaries can deploy swarms of intelligent drones. Several studies show that these UAVs are of low cost and high maneuverability, and are therefore difficult to detect and track [7,8,9,10]. Authors highlight that their small size, agile flight, and ability to fly close to the ground allow UAVs to evade traditional surveillance methods [9,10]. This highlights the urgent need for advanced counter-UAV solutions to ensure public safety and protect assets.
Quadrotors and other micro and mini UAVs deserve special attention. These small multirotor drones, often weighing less than 20 kg, are inexpensive, highly maneuverable, and increasingly common [11]. Improvements in battery and motor technology enable small quadrotors to carry cameras, sensors, or even small payloads over practical distances. They can be operated by amateurs or programmed for autonomous missions [11,12]. The common use of this system among the civilian is because they are simple to use and economical [9]. While these features offer benefits, they also pose security risks. Even a hobbyist drone can be equipped with surveillance cameras or weapons. Cases regarding the UAVs being used for smuggling and spying have recently been published by researchers [13]. In a worst-case scenario, coordinated swarms of small drones could bypass defenses or exploit vulnerabilities. Ref. [10] caution that “significant security threats can emerge from UAVs approaching in swarms”, emphasizing the need for detection systems to be capable of tracking multiple targets at once [14]. Small quadrotors pose unique challenges due to their very low radar and visual signatures, ability to operate at low altitudes among obstacles, and potential for mass deployment by adversaries.
Due to these challenges, effective countermeasures depend on a range of detection and tracking technologies. Common counter-UAV sensor suites consist of radar, electro-optical/infrared (EO/IR) cameras with computer vision, acoustic microphones, and radio frequency (RF) receivers for monitoring known drone frequencies [15,16]. In practice, a network of diverse sensors is utilized: for instance, Ref. [10] discuss systems that combine data from distributed radar, camera, and microphone arrays to ensure comprehensive coverage [15]. Techniques such as multilateration and triangulation can use data from multiple stations to determine a drone’s position. Additionally, machine learning and artificial intelligence have been utilized; for example, neural networks can identify the optical or RF signatures of known drone models. Despite these advancements, significant challenges still persist. Small and fast-maneuvering UAVs are very difficult to detect in a harsh environment [10,17]. Line-of-sight issues can obstruct cameras and radars. Optical methods are affected by shadows, changes in lighting, and clutter from the sky. Additionally, small drones have low thermal and acoustic signatures, making them difficult to detect. Even active radar can be deceived by GPS spoofing, and clever drones may use navigation tricks to counteract jamming. Counter-UAV systems must address low radar cross-sections, limited signal-to-noise ratios, and adversarial countermeasures in complex environments [10,17].
Once a threat is detected, there are several available strategies for neutralization. Mechanical (kinetic) methods physically intercept UAVs, while electronic and cyber methods disrupt their systems [18]. Kinetic capture and interdiction techniques include nets, tethered projectiles, and hard-kill interceptors. For example, net guns or capture drones can ensnare small UAVs and bring them safely to the ground [19]. Net-based systems are particularly effective for small, slow drones that are hard to target with guns or missiles; nets can safely immobilize the drone with minimal collateral damage [20,21]. Alternative non-explosive munitions or frangible projectiles have been proposed. Directed-energy weapons, such as high-power microwave or laser systems, can disable UAV electronics at a distance without physical contact [22,23]. These methods can disable a drone without firing projectiles; however, they require a clear line of sight and considerable power. In contrast, electronic non-physical countermeasures disrupt a drone’s control and navigation signals. Common methods include RF or Global Positioning System (GPS) jamming and spoofing. By broadcasting noise or fake Global Navigation Satellite System (GNSS) signals, defenders can cause a drone to lose communication or deviate from its intended path. Authors in one study note that most counter-UAV systems currently utilize jamming and spoofing techniques [24,25,26]. Each neutralization tactic for drones comes with trade-offs. Kinetic methods may cause collateral damage or violate property laws. Jamming is limited by regulations on signal emissions, while directed energy weapons require specialized equipment. Because of safe and legal intent, non-lethal techniques used to capture nuisance drones are often preferred.
Classical guidance laws provide simple yet effective rules for directing an interceptor toward a moving target. Two well-known examples are pure pursuit (PP) and proportional navigation (PN). In PP guidance, the interceptor continuously points its velocity directly at the target’s current position [27,28]. This yields an intuitive “chase” behavior that is easy to implement, but it often leads to a lagging trajectory where the interceptor falls in behind the target (a tail-chase), especially if the target is fast or maneuvering. Pure pursuit can result in a longer path and potential overshoot of the target’s position [29]. By contrast, PN is a more sophisticated and widely used guidance law originally developed for homing missiles [30]. The core idea of PN is to steer the interceptor such that it maintains a constant bearing (constant line-of-sight angle) to the moving target, which is the condition for collision in a constant-velocity scenario [31].
Most of the research on onboard detection of non-cooperating UAVs focuses on visual methods based on deep learning [32,33,34]. However, detection and precise state estimation of small drones in cluttered environments proves to be a difficult problem, which several works have attempted to address by utilizing depth images instead of (or in addition to) RGB [35,36]. Flying objects are typically spatially distinctive, making them easily detectable in depth images, and the depth information provides a full 3D relative location of the target, which is otherwise problematic with monocular approaches [37].
Controlling defensive UAVs relies on an effective control architecture. Pursuing or intercepting target drones requires strong guidance [37]. Recent studies have emphasized nonlinear robust controllers capable of managing UAV dynamics uncertainties at low speeds and altitudes [38]. Sliding-mode control (SMC) is well-known for its robustness to disturbances and parameter variations, while backstepping control is appreciated for its systematic Lyapunov-based design [39,40]. These techniques have been utilized in quadrotors for tasks such as tracking and following paths [39]. For instance, Zhang et al. designed a disturbance observer-augmented sliding-mode backstepping controller for a quadrotor, demonstrating Lyapunov stability and exhibiting improved tracking compared to adaptive backstepping [14]. These schemes are designed to inherently compensate for errors caused by wind or modeling inaccuracies. Additionally, the two results are combined in sliding-mode backstepping controllers, which integrate the disturbance rejection of SMC with the recursive structure of backstepping. In [13], the authors developed a sliding-mode backstepping law for UAV interception that ensures chattering-free and asymptotically stable tracking of target trajectories. SMC and backstepping techniques are particularly effective for low-speed interception tasks, as they ensure both convergence and robustness, even in the presence of payload variations or wind gusts. These features make them ideal for use in defender UAVs tasked with fast and precise interception of adversaries.
Fully capable models enable rearranging when faced with multiple attacking UAVs to improve task efficiency. When confronted with multiple attackers, defenders must prioritize the threats they face. Unsupervised learning such as clustering offers a method to group attacker UAVs based on their spatial proximity. DBSCAN (Density-Based Spatial Clustering of Applications with Noise) is particularly effective for discovering clusters of arbitrary shapes while automatically categorizing outlier drones as noise [41,42]. DBSCAN does not require a pre-defined number of clusters and can handle irregular cluster shapes, unlike k-means [43,44]. In a nut shell, unsupervised clustering for UAV positioning improves resource allocation and multi-interception.
Defensive planning should also take into account the presence of intelligent adversaries. Modern attacking UAVs do not necessarily follow fixed, naive trajectories; rather, they can utilize onboard decision-making logic or learning algorithms [45,46]. An adversarial UAV can adjust its flight path to evade defenders and detect attempts at jamming [47]. Static intercept paths may not be adequate. One strategy to mitigate this issue is deception; defenders can create false cues or waypoints to mislead attackers. Spoofed navigation beacons or decoy routes can mislead an attacker about the defender’s intent. By adding deceptive waypoints to the defenders trajectory, we interrupt the attacker’s decision-making and mislead it from the actual trajectory. While this concept is not yet common in the UAV literature, similar ideas are present in electronic warfare: jamming and spoofing are established countermeasures [48,49,50]. Recent advancements in ground robotics and computer security have demonstrated that misleading an AI planning process can reduce adversarial effectiveness [51,52]. Incorporating deception into UAV defense can enhance its effectiveness against risky attackers.
Inspired by the discussions above, this research aims to integrate concepts from machine learning, specifically DBSCAN, SMC, backstepping, stability analysis, and waypoint sequencing to develop a UAV–UAV interception control strategy. In this research, the actual interception strategy involves clustering, transforming chaotic multi-agent environments into manageable sub-problems. The approach simplifies assignment by classifying attacking UAVs based on proximity and density, allowing for uncertainty in attacker trajectories. To provide precise and stable interceptions, a sliding-mode backstepping control technique combines the recursive stabilization of backstepping with the robustness of sliding-mode control. The stability of the quadrotor system is rigorously guaranteed by Lyapunov’s direct method, which ensures that the defenders’ centroids will converge to attackers’ notwithstanding dynamic uncertainties. Specifically, our contributions are as follows:
1.
This is the first research to integrate a multi-target grouping scheme based on DBSCAN for coordinating defenses against UAV attackers that are spatially distributed with sliding-mode control and backstepping for an UAV–UAV attacker–defender interception strategy and robust trajectory tracking for interception.
2.
In contrast to the research in [13], in this work a novel deceptive route point strategy is incorporated for defender paths that deceive attacking UAVs. The attackers are non-reactive and do not have access to the defender’s internal reference-switching and waypoint sequencing logic.
3.
A robust sliding-mode backstepping controller with an extended state observer (ESO) is incorporated for defender UAVs to accurately intercept cluster centroids under time-varying disturbances.
4.
This work employs the Lyapunov stability analysis method to guarantee the interception of attackers by UAV defenders and the stability of the system states.
The remainder of the paper is structured as follows. Section 2 provides the problem formulation of the UAV–UAV interception. Section 3 describes the UAV–UAV deceptive waypoint interception design using DBSCAN learning. Section 4 evaluates the approach in simulation. Finally, Section 5 concludes the work.

2. Problem Formulation

In Figure 1, the notations A i and D j refer to the attacking UAV i and the defending UAV j, respectively. Consider a swarm of M attackers A i R n with positions P A i = [ x A i , y A i , z A i ] and velocities V A i = [ v A , x i , v A , y i , v A , z i ] , alongside N defending UAVs D j R n described by positions P D j = [ x D j , y D j , z D j ] and velocities V D j = [ v D , x j , v D , y j , v D , z j ] . These states define the framework for UAV-to-UAV interception. The attacking swarm is clustered into N groups using the DBSCAN algorithm, after which each defender is tasked with intercepting the centroid of its allocated cluster. This technique reduces the complexity of interception and improves the efficiency of intercepting numerous attackers. To enhance robustness against risky attackers capable of anticipating defender motion, a conditional risk-activation strategy is introduced: when such behavior is detected, the defender switches from direct centroid pursuit to a waypoint sequencing strategy. The switching condition is defined by a binary risk flag
r j ( t ) = 1 , if attackers predict the path of defender D j , 0 , otherwise ,
so that r j ( t ) = 0 corresponds to direct centroid pursuit and r j ( t ) = 1 activates deceptive waypoint sequencing. In the latter case, each defender D j generates a finite waypoint sequence W j = { w j , 1 , w j , 2 , , w j , K } , w j , k R 3 , such that the final waypoint satisfies w j , K = c a ( j ) ( t term ) , where c a ( j ) is the centroid of the assigned attacker cluster. The risk flag r j ( t ) is implemented as a predefined piecewise-constant signal in the simulation studies in order to isolate and evaluate the effect of switching between direct centroid pursuit and the DWS waypoint-sequenced reference. Specifically, r j ( t ) is set to
r j ( t ) = 0 , t [ 0 , t 1 ) [ t 2 , t 3 ) , 1 , t [ t 1 , t 2 ) [ t 3 , t 4 ) ,
where { t k } are prescribed switching instants. These intermediate waypoints ensure that the trajectory remains deceptive and less predictable, while guaranteeing that the ultimate mission objective arrival at the cluster centroid is achieved.
The defending UAVs are assigned to engage the centroids of the attacker clusters, which act as tactical reference points representing the geometric center of each concentrated attacker group. Once a defender arrives in the vicinity of its designated centroid, it initiates a neutralization procedure either through physical means or through non-kinetic actions such as electronic interference, kinetic measures, or net-based capture, targeting the nearby attackers within its operational interception radius. In this work, the centroid is not considered the terminal trajectory, but as a reference point that positions defenders advantageously for intercepting the attacker UAVs. This shifts the strategy from a mere rendezvous task to an active interception process, where reaching the centroid effectively triggers engagement at the swarm level.
Assumption 1: The positions and velocities of the attacking UAVs are assumed to be available through the radar sensing system at any given time.
Assumption 2: The defending quadrotors are considered to have the same dynamics, mass, drag characteristics, and inertia, and are modeled as rigid bodies with symmetric structures.
Assumption 3: The defenders operate independently, such that their trajectory and control inputs are not influenced by the states or actions of the other defenders.

3. UAV–UAV Deceptive Waypoint Interception Design Using DBSCAN Learning

3.1. Clustering Overview

Clustering is an essential, unsupervised learning approach used to group data points based on similarity or spatial closeness without the need for predefined labels [53]. In swarms, clustering is important for reducing the computational complexity and improving multiagent interception techniques by representing swarm UAVs through their centroids [54]. There are several clustering techniques, each providing different functional strength.
Uncertain, data-based techniques like Gaussian Mixture Models (GMMs) allow for flexible partition that can represent similar group structures; however, they need extra effort and rely on assumptions about the underlying data distribution and the number of clusters [55]. Clustering methods like k-means are simple and computationally efficient but require the number of clusters to be specified in advance and assume spherical cluster geometry, making them less suitable for dynamically evolving swarm patterns [56].
In contrast, density-based approaches, particularly the Density-Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm, are highly effective for identifying clusters of irregular shapes and handling noise in dynamic environments [41]. DBSCAN automatically determines the number of clusters by identifying dense regions within the data and isolating sparse or anomalous points as noise. This property makes DBSCAN particularly advantageous in swarm interception scenarios, where the number and spatial configuration of attacking UAVs can change unpredictably over time.
By relying on two essential factors, namely the neighborhood radius ε and the minimum number of surrounding points (MinPts), DBSCAN adaptively groups UAVs that are spatially close or moving cohesively, without requiring predefined cluster counts. This adaptability allows defensive systems to detect compact UAV formations, isolate outliers, and reassign interception resources dynamically. Given that the attacking UAVs in our system may demonstrate non-uniform movements behaviors and irregular location distributions, DBSCAN provides a robust and adaptable solution for real-time clustering, making it extremely appropriate for rapid interception tasks.

3.2. DBSCAN Clustering

DBSCAN is an unsupervised clustering algorithm that groups data points based on their spatial density rather than a predefined number of clusters. Unlike k-means, DBSCAN does not require the number of clusters N to be specified in advance and can effectively identify clusters of arbitrary shape, as well as isolate outliers [57]. This property makes DBSCAN suitable for dynamic multi-UAV environments where the number and formation of attacking quadrotors change over time.
In this work, DBSCAN is utilized to group attacking UAVs based on their spatial proximity and motion behavior. The clustering is performed using the instantaneous positions and velocities of the attackers, allowing defenders to identify dense formations of UAVs and detect outliers that may represent individual or evasive threats. The obtained clusters allow the system to assign appropriate defenders, predict attacker trajectory, and change the formation accordingly in real time. For simplicity and comprehensive understanding of UAV–UAV interception, we again consider the case when M > N .
The clusters are defined as
C a ( j ) = { A i E A i is density-connected to any A j C a ( j ) } , a = 1 , 2 , , N
where
  • E = { A 1 , A 2 , , A M } represents the set of all attacking UAVs;
  • C a ( j ) denotes the cluster a (i.e., a group of attackers identified as a dense region);
  • Clustering is performed based on the attackers’ positions P A i and velocities V A i .
In DBSCAN, two parameters govern the clustering behavior:
  • ε : the neighborhood radius defining spatial proximity;
  • MinPts: the minimal quantity of adjacent points necessary to define a dense area.
For every attacker A i , its ε -neighborhood can be identified as
N ε ( A i ) = { A j E   P A j P A i   ε } .
The point A i is categorized as:
  • A core point if | N ε ( A i ) |   MinPts ;
  • A border point if it lies within N ε of a core point but has fewer than MinPts neighbors;
  • A noise point if it is neither a core nor a border point.
Each cluster C a ( j ) thus consists of a maximal set of density-connected points. To represent each cluster, we define a density-based centroid c a ( j ) as the mean position of all core points within the cluster:
c a ( j ) = 1 | Q a | i Q a P A i , Q a = { A i C a ( j ) A i is a core point } .
This centroid serves as the representative position of cluster C a ( j ) , allowing defenders to coordinate interception based on the most stable (densest) regions of attacker formations.
Unlike k-means, DBSCAN does not minimize a global variance function but rather satisfies the density-connectivity condition. Formally, two attackers A i and A j belong to the same cluster if there exists a sequence of core points ( A i = p 1 , p 2 , , p k = A j ) such that
p t + 1 N ε ( p t ) , t = 1 , 2 , , k 1 .
This ensures that attackers within each cluster are connected through dense neighborhoods, capturing natural formations without enforcing artificial cluster boundaries. Consequently, DBSCAN dynamically partitions the M attackers into N clusters (and possible noise points) suitable for cluster-to-defender assignments. DBSCAN uses two parameters: the neighborhood radius ε and the minimum number of neighbors M i n P t s required to declare a core point. In the UAV interception setting, ε should be chosen to reflect the maximum separation at which attackers are considered part of the same locally dense formation, while remaining larger than sensing/measurement uncertainty and smaller than the typical separation between distinct formations. If ε is too small, a coherent formation can fragment into multiple clusters and more points can be labeled as noise; if ε is too large, nearby formations can be merged into a single cluster. The parameter M i n P t s controls the required local density: larger values make clustering more conservative, whereas smaller values make cluster formation easier but may admit spurious clusters.
The analysis for the feasibility of the DBSCAN is done as follows.

3.2.1. Computational Complexity Analysis of DBSCAN Clustering

The complexity of DBSCAN clustering in this work depends primarily on the total number of attacking UAVs M, the spatial dimensionality d = ( x , y , z ) , and the neighborhood query mechanism determined by the radius ε and minimum point threshold M i n P t s . Unlike k-means, DBSCAN does not rely on iterative centroid updates; instead, its performance is dominated by the process of neighborhood searches required to identify dense regions [58].
For each UAV position, DBSCAN performs the following key operations:
  • Neighborhood query: For every point, the algorithm retrieves all neighboring points within distance ε . The computational cost of this step depends on the data structure used:
    -
    Using a naive linear search: O ( M 2 ) ;
    -
    Using an optimized spatial index (e.g., k-d tree or ball tree): O ( M log M ) .
  • Cluster expansion: Once a core point is identified ( | N ε |   MinPts ), DBSCAN recursively expands its cluster by visiting all density-reachable points. This operation, in the worst-case scenario, requires visiting all M points once, resulting in O ( M ) complexity.
Thus, the overall computational complexity of DBSCAN is expressed as
O ( M log M ) or O ( M 2 ) .
For three-dimensional UAV swarm data ( d = 3 ), the spatial indexing structure efficiently supports ε -neighborhood queries in O ( log   M ) time on average, resulting in near-linear scalability even for moderately large formations.
In standard UAV defense situations ( M 100 ), the DBSCAN method attains clustering speeds of significantly less than ten milliseconds on an Intel i7 CPU with 16 GB of RAM, clearly confirmed by our simulations. This verifies that DBSCAN clustering is highly computational and appropriate for real-time use in unpredictable UAV interception scenarios.
Compared with k-means, DBSCAN eliminates the dependence on iteration count i and predefined cluster count N, while providing adaptive clustering performance and automatic noise handling. This is a significant advantage for online multi-UAV defense systems operating under uncertain swarm configurations.

3.2.2. Scalability Analysis of DBSCAN

The computational cost of DBSCAN primarily comes from neighborhood searches within the radius ε for each attacker point. A naive all-pairs implementation has worst-case complexity O ( M 2 ) , whereas practical implementations using spatial indexing typically scale closer to O ( M log M ) for 3D data. Consistent with this, our measured clustering time is <10 ms for M = 100 attackers. The clustering step remains within real-time limits at the tested update rate for the considered swarm sizes; large-scale swarms can be further supported by lowering the clustering update frequency and/or using incremental neighbor caching, which does not affect the controller update rate.

3.2.3. Sensitivity Analysis

To manage computational load during dynamic interception, clustering is performed at fixed intervals or whenever the spatial distribution of attackers exceeds a predefined deviation threshold. Since DBSCAN operates solely on attacker position data, the clustering step remains lightweight and scalable, even for large swarms. In MATLAB simulations (version 2023a) on a standard machine (Intel i7, 16 GB RAM), clustering between 50 and 100 attackers typically requires under 10 ms. The control loop runs at its own update rate, while cluster reassignment is triggered only when centroid movement surpasses a designated spatial limit, thereby avoiding unnecessary task reallocation. This approach preserves the real-time capability of the interception framework while keeping both communication overhead and computational effort low.

3.3. Deceptive Waypoint Sequencing (DWS) for UAV–UAV Interception

Deceptive Waypoint Sequencing (DWS) is introduced as a novel, mission-preserving maneuver-planning paradigm for defenders in centroid-based UAV interception. In scenarios where M attacking UAVs (with M > N ) are clustered into N groups and defenders are assigned to intercept cluster centroids, straightforward pursuit of centroids can become predictable and thus exploitable by intelligent attackers that attempt to infer or anticipate defender motion. DWS combats this vulnerability by replacing a single direct centroid reference with a short, structured sequence of intermediate waypoints that are generated relative to the cluster centroid. The sequence deliberately introduces controlled, bounded deviations from the straight-line pursuit so as to increase the defender’s trajectory unpredictability, while preserving the primary mission requirement: arrival at the cluster centroid. DWS therefore augments centroid interception with a lightweight deception layer that is only activated when attacker predictability is detected to be high.
Within the centroid-based architecture, each defender D j is nominally tasked to reach the centroid c a ( j ) ( t ) of its assigned attacker cluster C a ( j ) . DWS modifies the centroid trajectory used by a defender: instead of commanding the defender directly to the centroid, DWS replaces the centroid trajectory by a finite sequence of centroid-relative waypoints W j that terminates at the centroid. Because DWS is defined relative to a moving centroid, it preserves scalability (cluster abstraction remains intact), simplifies waypoint parameterization, and ensures mission correctness (final waypoint equals the centroid).
Let c ( t ) R 3 denote the current position of the centroid assigned to defender D j at planning time t. DWS produces a finite ordered waypoint sequence
W j = { w j , 1 , w j , 2 , , w j , K } , w j , k R 3
where each waypoint is parametrically defined relative to c ( t ) by three scalar parameters ( r i , η i , ζ i ) :
x d W ( t ) = w j , i = c ( t ) + r i cos η i sin η i ζ i , i = 1 , , K .
Here, r i 0 is the radial offset from the centroid in the horizontal plane, η i ( π , π ] is the planar bearing around the centroid, and  ζ i is the normalized vertical parameter. The final waypoint satisfies the mission constraint
w j , K = c ( t term ) ,
which ensures that despite deceptive intermediate motion, the defender ultimately reaches the centroid.

3.3.1. Feasibility, Safety, and Smoothness Constraints

To keep DWS practical and compatible with the defender vehicle, the parameters ( r i , η i , ζ i ) and derived waypoints { w j , i } must satisfy:
  • Radial and vertical bounds:
    0 r i r max , | ζ i | ζ max .
  • Inter-waypoint displacement and curvature: for i = 1 , , K 1 ,
    w i + 1 w i d max , wrap | η i + 1 η i | Δ θ max .
  • Safety:
    w j , i F , i ,
    where F is the free-space set (no-fly zones excluded).
  • Timing and derivative bounds: Given waypoint times 0 = τ 1 < τ 2 < < τ K , the smoothed reference x d ( τ ) must satisfy
    x d ( τ i ) = w i , x ˙ d ( τ )   v max , x ¨ d ( τ )   a max .

3.3.2. Risk Activation and Switching

DWS is activated only when attackers demonstrate sufficient ability to predict attacker motion. A binary risk flag r ( t ) { 0 , 1 } is used:
r ( t ) = 0 , direct centroid pursuit , 1 , DWS mode ( deceptive sequencing ) .
When r ( t ) = 0 , the defender tracks c ( t ) directly. When r ( t ) = 1 , the defender executes a DWS sequence W that terminates at c ( t term ) .
Remark 1. 
The signal r j ( t ) { 0 , 1 } switches the reference used by the defender between direct centroid pursuit and the DWS waypoint-sequenced reference. In this paper, r j ( t ) is selected as a predefined piecewise-constant signal in the simulation studies (with switching at prescribed time instants), and no autonomous supervisory logic is assumed that could induce arbitrarily fast switching. Since switching introduces no state reset and only modifies the bounded reference signal, and since the same stabilizing backstepping–sliding-mode structure is used in both modes, the closed-loop trajectories remain bounded in the considered cases.

3.3.3. Assigning UAV Defenders to Clusters of UAV Attackers Based on DWS

Each defender D j is mapped to a specific attacker cluster C a ( j ) . Under this assignment, the defender is guided toward the centroid c a ( j ) of its corresponding cluster, as defined in (2). Consequently, the interception behavior of the defender is oriented toward
P D j c a ( j ) , a = 1 , 2 , , N .
Therefore, to get an optimal attacker–defender assignment, we need to minimize the equation below:
arg min π j = 1 N P D j c a ( j )
where π denotes the permutation function responsible for mapping defenders to their respective clusters.
This formulation guarantees that each defender is paired with the nearest cluster, thereby reducing the total travel distance between defenders and the corresponding centroids. As a result, the interception task can be accomplished in the shortest possible time. The flowchart in Figure 2 provides an overall summary of the DWS interception framework.
As illustrated in Figure 3, the base-station radar records the positions P A i and velocities V A i of all attacking UAVs at every time instant t. The DBSCAN algorithm is then applied to the acquired position data to generate clusters, with the corresponding centroids updated continuously as the attackers change location. This update process is performed by re-clustering the most recent measurements and recalculating the centroids c a ( j ) as defined in Equation (3). The resulting centroid positions trace trajectories P c a ( j ) , capturing the time-varying behavior of the attacker groups. In parallel, the base station continuously performs a risk assessment that monitors whether attackers display predictive or intelligent pursuit behaviors. If no elevated risk is detected, defenders pursue their assigned centroid trajectories directly. When the risk monitor indicates that defenders’ motions are predictable to the attackers, the base station activates the DWS strategy: rather than commanding the defender to track c a ( j ) directly, the base station generates a finite sequence of centroid-relative waypoints. Executing W j yields a deceptive, centroid-relative reference that reduces predictability to attackers while preserving the mission objective of intercepting the dynamically updated cluster centroid.

3.4. Defender UAV Model for DWS UAV Interception

In this work, the attacker UAVs are represented as time-varying sensor position points P A i . In contrast, the defender UAVs are modeled using a full nonlinear dynamic system to enable accurate maneuvering and effective interception. The quadrotor defender dynamics are governed by nonlinear differential equations that represent both its translational and rotational motion. Control is applied to regulate the defender’s x , y , z coordinates so that it can track the evolving centroid of the attacker groups. The formulation and detailed modeling of quadrotor dynamics are well-established in the literature. Accordingly, the defending UAV’s six-degree-of-freedom state-space equations are given as in refs. [59,60].
Based on assumption 2, the dynamics of the defending UAVs are identical, and are given in Equation (10).
For j = 1 , 2 N
x ˙ 1 = x 2 x ˙ 2 = a 1 x 4 x 6 + a 2 x 2 2 + a 3 Ω ¯ x 4 + b 1 U j , 2 + d j , 2 x ˙ 3 = x 4 x ˙ 4 = a 4 x 2 x 6 + a 5 x 4 2 + a 6 Ω ¯ x 2 + b 2 U j , 3 + d j , 4 x ˙ 5 = x 6 x ˙ 6 = a 7 x 2 x 4 + a 8 x 6 2 + b 3 U j , 4 + d j , 6 x ˙ 7 = x 8 x ˙ 8 = a 9 x 8 + U j , x U j , 1 m + d j , 8 x ˙ 9 = x 10 x ˙ 10 = a 10 x 10 + U j , y U j , 1 m x ˙ 11 = x 12 x ˙ 12 = a 11 x 12 + C x 1 C x 3 m U j , 1 g
Assumption 4: The states of the defending UAVs in Equation (10) are all measurable.
where the state vector of the system is given as
X = [ ϕ D j , ϕ ˙ D j , θ D j , θ ˙ D j , ψ D j , ψ ˙ D j , x D j , x ˙ D j , y D j , y ˙ D j , z D j , z ˙ D j ] T = [ x 1 , x 2 , x 3 , x 4 , x 5 , x 6 , x 7 , x 8 , x 9 , x 10 , x 11 , x 12 ] T
U j , 1 , U j , 2 , U j , 3 , and  U j , 4 are the control inputs of the system, determined by the angular velocities of the four rotors. The angular state variables Φ , θ , ψ are the roll, pitch and yaw respectively. d 2 , d 4 , d 6 and d 8 are the additive disturbances to the state of the quadrotor.
The dynamics in Equation (10) can be interpreted as two coupled subsystems:
  • Rotational subsystem ( x 1 x 6 ) : the states ( x 1 , x 3 , x 5 ) correspond to the attitude angles ( ϕ , θ , ψ ) and ( x 2 , x 4 , x 6 ) correspond to the corresponding angular rates ( ϕ ˙ , θ ˙ , ψ ˙ ) . The expressions for x ˙ 2 , x ˙ 4 , and  x ˙ 6 include the gyroscopic/cross-inertia coupling terms parameterized by a 1 a 8 and are driven by the torque inputs U j , 2 , U j , 3 , and  U j , 4 .
  • Translational subsystem ( x 7 x 12 ) : the states ( x 7 , x 9 , x 11 ) correspond to inertial positions ( x , y , z ) and ( x 8 , x 10 , x 12 ) correspond to the associated linear velocities ( x ˙ , y ˙ , z ˙ ) . The expressions for x ˙ 8 , x ˙ 10 , and  x ˙ 12 include drag terms parameterized by a 9 a 11 and are driven by the total thrust U j , 1 projected via the direction-cosine terms U j , x and U j , y .
  • The coefficients a i and b i (as defined in Equation (10) and the inertia-related expressions in Equation (11)) therefore map explicitly to the appropriate rotational/translational states.
    a 1 = I y I z I x , a 2 = K f a x I x , a 3 = J r I x , a 4 = I z I x I y , a 5 = K f a y I y , a 6 = J r I y , a 7 = I x I y I z , a 8 = K f a z I z , a 9 = K f t x m , a 10 = K f t y m , a 11 = K f t z m , b 1 = d I x , b 2 = d I y , b 3 = 1 I z ,
    U j , x = C x 1 S x 3 C x 5 + S x 1 S x 5 , U j , y = C x 1 S x 3 S x 5 S x 1 C x 5 ,
m is the total mass of the structure and J R 3 × 3 is a symmetric positive definite constant inertia matrix of the quadrotor given by
J = I x 0 0 0 I y 0 0 0 I z
Ω is the angular velocity of the airframe:
Ω = 1 0 sin θ 0 cos ϕ cos θ sin ϕ 0 sin ϕ cos ϕ cos θ ϕ ˙ θ ˙ ψ ˙
where K f t x , K f t y and K f t z are the translation drag coefficients. K f a x , K f a y and K f a z are the friction aerodynamic coefficients. d is the distance between the rotors. The rotor is a unit comprising a D.C-motor actuating a propeller via a reducer. The D.C-motor is governed by the following dynamic equations:
V = r i + L d i d t + k e ω k m i = J r d ω d t + C s + k r ω 2
The motor parameters are defined as follows: V denotes the input voltage applied to the motor; k e and k m are the electrical and mechanical torque constants, respectively; k r represents the constant torque load; r is the internal resistance of the motor; and J r is the rotor’s moment of inertia.
Based on these definitions, the rotor dynamics are modeled as
ω ˙ i = b V i γ 0 γ 1 ω i γ 2 ω i 2
i [ 1 , 4 ]
With
γ 0 = C s J r , γ 1 = k e k m r J r , γ 2 = k r J r and b = k m r J r
Therefore,
Ω ¯ = ω 1 ω 2 + ω 3 ω 4

3.5. Control

This section introduces the proposed methodology for designing the DWS interception control strategy. As outlined in Algorithm 1, the control goal is to intercept the trajectories of attacking UAVs while misleading intelligent adversaries. This is accomplished by generating deceptive waypoints along the paths of the defending UAVs, which are activated when a high threat level is detected, i.e., when the base station identifies the attacking UAVs as intelligent. The overall interception framework is illustrated in the block diagram shown in Figure 4.
Algorithm 1: DWS Interception Algorithm using DBSCAN
Make 08 00054 i001
To formalize the objective, let the positions of the attacking UAVs correspond to the measured and clustered trajectories, denoted by x m , d = P c a ( j ) , where the desired defender positions P c a ( j ) form a 12-dimensional state vector representing the position and orientation of the attacking UAVs. A backstepping-based sliding-mode control law is employed to carry out the interception, ensuring system stability, robustness, and accurate tracking of the desired dynamics while handling all system nonlinearities. Furthermore, an Extended State Observer (ESO) is utilized to estimate additive disturbances affecting the states of the defending quadrotor UAVs.
Let P c a ( j ) ( t ) denote the nominal centroid reference. The active desired trajectory provided to the controller is
x m , d ( t ) = 1 r j ( t ) P c a ( j ) ( t ) + r j ( t ) x d W ( t ) .
Accordingly, the desired signals ( x m , d , x ˙ m , d , x ¨ m , d ) are from x m , d and its time derivatives. Thus, when r j ( t ) = 0 the controller tracks the centroid trajectory; when r j ( t ) = 1 it tracks the DWS trajectory that ends at the centroid. x d W ( t ) is the trajectory of the waypoint defined in (6).
Assumption 5: All waypoints w j , i lie in the free space and respect separation/no-fly constraints (safety).
Theorem 1. 
The stability of the closed-loop system described in (10) can be guaranteed by appropriately selecting the parameters of the proposed controllers given in (24), (27), (30), (33), (36), and (38), along with the ESOs in (25), (28), (31), and (34).
Proof. 
A backstepping control approach is applied recursively to construct the control laws, which reduces the computational effort involved in handling tracking errors and Lyapunov function evaluations. The procedure is applied for j = 1 , 2 , , N , where N represents the total number of defending UAVs:
z m = x m , d x m , m = 1 , 3 , , 11
z m = x m x ˙ ( m 1 ) , d α m 1 e m 1 , m = 2 , 4 , , 12
where x m denotes the actual position of the defending UAVs, x m , d specifies the desired position, and  z m represents the tracking error between them.
α m > 0 , m = 1 , 2 , , 12 .
V m = 1 2 z m 2 , m = 1 , 3 , , 11
V m = V m 1 + 1 2 z m 2 , m = 2 , 4 , , 12
The coefficient α m is a positive design gain chosen to stabilize the virtual control error using Lyapunov-based backstepping. The value influences the convergence rate of the tracking error z m and must meet α m > 0 . V m is the candidate for the Lyapunov function chosen. □
Chattering Suppression: To suppress high-frequency chattering caused by the discontinuous sign function, we define a continuous saturation function:
sat f ( S ) = 1 , S > f , S f , | S | f , 1 , S < f , f { 1 , 3 , 5 , 7 , 9 , 11 } .
where f > 0 defines the boundary layer thickness.
  • Step m = 2 (surface S 1 )
The choice of sliding surfaces depends on the derived tracking errors in (16). If the sliding surface is chosen to be
S 1 = z 2 = x 2 x ˙ 1 , d α 1 z 1
From Equation (18), the Lyapunov function is chosen to be
V 2 = 1 2 z 1 2 + 1 2 z 2 2
Combining (17), (19) and (20), the derivative of the Lyapunov is
V ˙ 2 = z 1 z ˙ 1 + S 1 S ˙ 1 , V ˙ 2 = z 1 z ˙ 1 + S 1 ( a 1 x 4 x 6 + a 2 x 2 2 + a 3 x 4 Ω ¯ + b 1 U j , 2 + d j , 2 x ¨ 1 , d α 1 x ˙ 1 , d x 2 ) .
The assumed law for the surface is the derivative of (19) and therefore satisfies S 1 S ˙ 1 < 0
S ˙ 1 = q 1 sat 1 ( S 1 ) k 1 S 1 = x ˙ 2 x ¨ 1 , d α 1 z ˙ 1 = a 1 x 4 x 6 + a 2 x 2 2 + a 3 Ω ¯ x 4 + b 1 U j , 2 + d j , 2 x ¨ 1 , d α 1 x ˙ 1 , d x 2
Using the backstepping approach, the control input U j , 2 is extracted as
U j , 2 = 1 b 1 ( q 1 sat 1 ( S 1 ) k 1 S 1 a 1 x 4 x 6 a 2 x 2 2 a 3 Ω ¯ x 4 d j , 2 ^ + x ¨ 1 , d + α 1 x ˙ 1 , d x 2 )
Using the first order ESO, the disturbance d 2 can be estimated as
ξ ˙ 2 = h 2 ξ 2 h 2 2 x 2 h 2 a 1 x 4 x 6 + a 2 x 2 2 + a 3 Ω ¯ x 4 + b 1 U j , 2 , h 2 > 0 , d ^ j , 2 = ξ 2 + h 2 x 2 .
By substituting the control input U j , 2 from (23) into (21), we obtain
V ˙ 2 = z 1 z ˙ 1 k 1 S 1 2 S 1 ( d ^ j , 2 d j , 2 ) q 1 S 1 sat 1 ( S 1 ) 0
Given that k 1 > 0 and q 1 > 0 , V ˙ 2 is negative semi-definite. This ensures that the tracking errors z 1 and z 2 remain bounded and that the sliding surface S 1 converges to zero. Consequently, the control law defined in (24) guarantees the Lyapunov stability of this subsystem.
The remaining steps in the control design can be obtained recursively based on the tracking errors in (17a) and (17b), the Lyapunov candidates (18a) and (18b), the saturation law (19), the surface (20), the derivations (23)–(25), and the ESO (25); we repeat the same design for the even indices m { 4 , 6 , 8 , 10 , 12 } . For each case, define S m 1 = z m = x m x ˙ ( m 1 ) , d α m 1 z m 1 (as in (17b)) and use sat f ( · ) with the corresponding odd index f { 3 , 5 , 7 , 9 , 11 } .
Lemma 1. 
Consider the first-order ESO in Equation (25) used to estimate the additive disturbance d j , i ( t ) in the channel x ˙ i , where i { 2 , 4 , 6 , 8 } . Define the estimation error as d ˜ j , i ( t ) = d j , i ( t ) d ^ j , i ( t ) , where d ^ j , i ( t ) = ξ i ( t ) + h i x i ( t ) and h i > 0 (Equation (25)). Assume that d j , i ( t ) is differentiable and satisfies | d ˙ j , i ( t ) | δ ¯ i for all t 0 . Then, the estimation error satisfies
d ˜ ˙ j , i ( t ) = h i d ˜ j , i ( t ) + d ˙ j , i ( t ) , i { 2 , 4 , 6 , 8 } ,
and is exponentially ultimately bounded as
| d ˜ j , i ( t ) | e h i t | d ˜ j , i ( 0 ) | + δ ¯ i h i 1 e h i t , i { 2 , 4 , 6 , 8 } .
In particular, if  d j , i ( t ) is constant (i.e., d ˙ j , i ( t ) = 0 ), then d ˜ j , i ( t ) converges exponentially to zero.
Proof. 
For each i { 2 , 4 , 6 , 8 } , the plant channel is x ˙ i = f i + g i U j , i + d j , i , and the ESO structure in Equation (25) gives d ^ j , i = ξ i + h i x i with ξ ˙ i = h i ( ξ i + h i x i ) h i f i h i g i U j , i . Thus, d ^ ˙ j , i = ξ ˙ i + h i x ˙ i = h i ( ξ i + h i x i ) h i f i h i g i U j , i + h i ( f i + g i U j , i + d j , i ) = h i d ^ j , i + h i d j , i . Therefore, d ˜ ˙ j , i = d ˙ j , i d ^ ˙ j , i = d ˙ j , i ( h i d ^ j , i + h i d j , i ) = h i ( d j , i d ^ j , i ) + d ˙ j , i = h i d ˜ j , i + d ˙ j , i , which proves Equation (27). Solving the linear system yields | d ˜ j , i ( t ) | e h i t | d ˜ j , i ( 0 ) | + 0 t e h i ( t τ ) | d ˙ j , i ( τ ) | d τ e h i t | d ˜ j , i ( 0 ) | + δ ¯ i h i ( 1 e h i t ) , which proves Equation (28). □
  • Step m = 4 (surface S 3 )
S 3 = z 4 = x 4 x ˙ 3 , d α 3 z 3 .
U j , 3 = 1 b 2 ( q 3 sat 3 ( S 3 ) k 3 S 3 ( a 4 x 2 x 6 + a 5 x 4 2 + a 6 Ω ¯ x 2 ) d j , 4 ^ + x ¨ 3 , d + α 3 x ˙ 3 , d x 4 )
ξ ˙ 4 = h 4 ξ 4 h 4 2 x 4 h 4 a 4 x 2 x 6 + a 5 x 4 2 + a 6 Ω ¯ x 2 + b 2 U j , 3 , h 4 > 0 , d ^ j , 4 = ξ 4 + h 4 x 4 .
V ˙ 4 = z 3 z ˙ 3 k 3 S 3 2 S 3 ( d j , 4 ^ d j , 4 ) q 3 S 3 sat 3 ( S 3 ) 0 .
  • Step m = 6 (surface S 5 )
S 5 = z 6 = x 6 x ˙ 5 , d α 5 z 5 .
U j , 4 = 1 b 3 ( q 5 sat 5 ( S 5 ) k 5 S 5 ( a 7 x 2 x 4 + a 8 x 6 2 ) d j , 6 ^ + x ¨ 5 , d + α 5 x ˙ 5 , d x 6 )
ξ ˙ 6 = h 6 ξ 6 h 6 2 x 6 h 6 a 7 x 2 x 4 + a 8 x 6 2 + b 3 U j , 4 , h 6 > 0 , d ^ j , 6 = ξ 6 + h 6 x 6 .
V ˙ 6 = z 5 z ˙ 5 k 5 S 5 2 S 5 ( d j , 6 ^ d j , 6 ) q 5 S 5 sat 5 ( S 5 ) 0 .
  • Step m = 8 (surface S 7 )
S 7 = z 8 = x 8 x ˙ 7 , d α 7 z 7 .
U j , x = m U j , 1 ( q 7 sat 7 ( S 7 ) k 7 S 7 a 9 x 8 d j , 8 ^ + x ¨ 7 , d + α 7 x ˙ 7 , d x 8 )
ξ ˙ 8 = h 8 ξ 8 h 8 2 x 8 h 8 a 9 x 8 + U j , x U j , 1 m , h 8 > 0 , d ^ j , 8 = ξ 8 + h 8 x 8 .
V ˙ 8 = z 7 z ˙ 7 k 7 S 7 2 S 7 ( d j , 8 ^ d j , 8 ) q 7 S 7 sat 7 ( S 7 ) 0 .
  • Step m = 10 (surface S 9 )
S 9 = z 10 = x 10 x ˙ 9 , d α 9 z 9 .
U j , y = m U j , 1 ( q 9 sat 9 ( S 9 ) k 9 S 9 a 10 x 10 + x ¨ 9 , d + α 9 x ˙ 9 , d x 10 )
V ˙ 10 = z 9 z ˙ 9 k 9 S 9 2 q 9 S 9 sat 9 ( S 9 ) 0 .
  • Step m = 12 (surface S 11 )
S 11 = z 12 = x 12 x ˙ 11 , d α 11 z 11 .
U j , 1 = m C x 1 C x 3 ( q 11 sat 11 ( S 11 ) k 11 S 11 a 11 x 12 + g + x ¨ 11 , d + α 11 x ˙ 11 , d x 12 )
V ˙ 12 = z 11 z ˙ 11 k 11 S 11 2 q 11 S 11 sat 11 ( S 11 ) 0 .
Hence, for  i { 3 , 5 , 7 , 9 , 11 } , with  S i , z i , k i > 0 , and  q i > 0 , it follows that V ˙ i for i { 4 , 6 , 8 , 10 , 12 } is negative semi-definite. This ensures that the tracking errors z i remain bounded and that the sliding surfaces S i converge to zero. As a result, the selected control inputs guarantee the Lyapunov stability of the entire system.
Remark 2. 
Under the gain conditions of Theorem 1 and assumptions (5) and (6), the Lyapunov inequalities (26), (31), (34), (37), (39), (41) hold on each mode ( r j = 0 or r j = 1 ), guaranteeing bounded tracking errors and convergence of each sliding surface to zero on any interval of constant mode. With continuity at switching, standard multiple-Lyapunov functions imply uniform ultimate boundedness of the switched closed loop. If the mode remains fixed over a nonzero interval (e.g., during an engagement), asymptotic convergence follows, as in the baseline.
Remark 3. 
We assume U j , 1 > 0 in flight so that ( 35 ) ( 38 ) are well-defined.

4. Simulation Results

Simulations were performed to evaluate the performance and accuracy of the proposed interception control strategy implemented on a quadrotor UAV. The controller gains were set as k 1 = k 2 = k 3 = k 4 = k 5 = k 6 = 1 , q 1 = q 2 = q 3 = q 4 = q 5 = q 6 = 1 , and  h 2 = h 4 = h 6 = h 8 = 10 . These gains were chosen empirically to obtain stable closed-loop behavior and smooth control signals, and they were kept fixed across all simulation cases to ensure a consistent comparison. The parameters of the defending quadrotor UAVs employed in this study are summarized in Table 1 [9]. The DWS values w j , i are determined by selecting appropriate parameters r i , η i , and  ζ i . The centroid-relative waypoint parameters were selected empirically (trial-and-error) within conservative bounds consistent with the defender UAVs nominal maneuverability and safety margins, ensuring smooth tracking without excessive control effort, while remaining sufficiently nontrivial to realize the intended deception effect. To illustrate the effectiveness of the proposed interception framework, simulations were carried out for both single and multiple UAV-to-UAV interception scenarios.
The simulation focuses on intercepting the centroids of attacker clusters rather than pursuing individual UAVs. It is assumed (Assumption 1) that the initial positions of the attackers are obtained via sensing. DBSCAN clustering is applied to compute the cluster centroids based on spatial proximity. Each of the trajectories of the centroid are then regarded as the reference position for the defending UAVs.
To evaluate the robustness and effectiveness of the proposed sliding-mode backstepping interception strategy, a baseline comparison is conducted against a conventional Proportional–Integral–Derivative (PID) controller. The PID control input along each axis is formulated as
u PID ( t ) = K p e ( t ) + K i 0 t e ( τ ) d τ + K d d e ( t ) d t
In this setup, e ( t ) denotes the tracking error between the actual position of the defending UAV and the assigned centroid trajectory. The PID gains K p , K i , and  K d were tuned empirically for each axis to achieve accurate and stable tracking under ideal operating conditions.
To assess robustness under practical uncertainties, bounded additive disturbances were introduced into the defender UAV dynamics. In particular, disturbances denoted by d 2 , d 4 , d 6 , d 8 were incorporated into Equation (10), which describe x ˙ 2 , x ˙ 4 , x ˙ 6 , x ˙ 8 . These disturbances simulate unmodeled system dynamics, as well as environmental factors such as wind gusts and sensor measurement noise. The disturbances are defined as d 1 , 2 = 4 sin ( 0.5 t ) , d 1 , 4 = sin ( 2 t ) , d 1 , 6 = 7 sin ( 5 t ) and d 1 , 8 = sin ( 3 t ) . for j = 2 d 2 , 2 = 4 sin ( 0.5 t ) , d 2 , 4 = sin ( 2 t ) , d 2 , 6 = 7 sin ( 5 t ) and d 2 , 8 = sin ( 3 t ) .
In this work, the attacker is modeled as non-reactive and does not have access to the defender’s internal reference-switching and waypoint sequencing logic. Therefore, the purpose of the simulations is to validate the feasibility and robustness of the proposed interception framework when DWS generates the reference trajectory, rather than to model a full adversarial decision-making process. Evaluating DWS against specific intelligent attacker predictors (e.g., learning-based anticipation or game-theoretic avoidance) is an important direction for future work.
Case 1: 
This scenario involves a single defending quadrotor UAV and 10 attacking UAVs i.e.,  N = 1 and M = 10 . Here, N = 1 , as there is only one cluster output by DBSCAN. Unlike partition-based methods such as k-means, the DBSCAN algorithm does not require a predefined number of clusters. Instead, it autonomously identifies the most suitable cluster structure based on the spatial distribution and density of quadrotor UAVs. This capability makes DBSCAN highly effective for detecting clusters of arbitrary shapes and distinguishing noise or outlier UAVs in dynamic environments. Clustering is conducted to determine the centroid of the 10 quadrotors. In Case 1, which involves one defender and one centroid, the trajectory is described by x = s i n ( t ) , y = c o s ( t ) , and  z = t . The DWS is introduced at ( T / 3 )  s and ( 2 T / 3 )  s, which is done by varying the risk r j ( t ) in Equation (16), and the waypoints introduced are w 1 , 1 , and w 1 , 2 , where the last waypoint w 1 , k , is the actual centroid equation. In this case, the waypoints parameters are r 1 , 1 = 2 , η 1 , 1 = 20 , r 1 , 2 = 2 , η 1 , 2 = 20 , ζ 1 , 1 = 10 and ζ 1 , 2 = 10 . At each time step, the positions of the UAVs and their corresponding centroids are recorded, as shown in Figure 5. The motion of the attacking UAVs produces dynamically updated centroids c a , forming trajectories P c a ( j ) . Figure 6 depicts the interception of the attacking UAV by the defending UAV using the DWS at 3 s and 6 s, with the final interception occurring at 10 s, as determined by the ode45 solver in the MATLAB simulation. In contrast, Figure 7 indicates that the PID-based approach fails in achieving interception. Figure 8 shows the interception tracking error for the proposed approach, which converges to nearly zero in under 4 s. The control input evolution for this interception is illustrated in Figure 9. The control signals remain smooth and free from chattering, ensuring that the defending quadrotor effectively tracks and intercepts the attacking UAV without overshoot during the transient phase. Additionally, Figure 10 presents the disturbances and their corresponding estimates obtained via the Extended State Observer (ESO). As shown, the estimation error converges to zero quickly. This shows that the proposed control technique is robust despite disturbances in the dynamics of the defending UAVs. To ensure robustness, Figure 6 and Figure 7 demonstrate that the PID controller fails to accurately intercept the attacker centroid when disturbances are present. This leads to substantial interception errors and can ultimately cause mission failure. In comparison, the proposed interception strategy demonstrates reliable performance, successfully accomplishing the interception while showing strong robustness against external disturbances and modeling uncertainties.
Case 2: 
In this case, we use two defending quadrotor UAVs and 20 attacking UAVs, i.e., N = 2 and M = 20 . Here, N = 2 as there are only two clusters output by DBSCAN. Clustering is conducted to determine the centroids of the 20 quadrotors. In this case, each centroid takes a different, pre-defined 3D path. It is thought that the attackers follow the motion of their cluster centroid. To keep things simple and to highlight control performance, only the centroid trajectories are presented in the trajectory plots. The DWS is introduced at ( T / 3 ) s and ( 2 T / 3 ) s, which is done by varying r j ( t ) in Equation (16) for j { 1 , 2 } , and the waypoints introduced for each defender are w j , 1 , and w j , 2 , , where the last waypoint w 1 , k , is the actual centroid equation. In this case, the waypoints parameters are r 1 , 1 = 2 , r 1 , 2 = 2 , η 1 , 1 = 20 , η 1 , 2 = 20 , r 2 , 1 = 2 , r 2 , 2 = 2 , η 2 , 1 = 20 , η 2 , 2 = 20 , ζ 1 , 1 = 10 , ζ 1 , 2 = 10 , ζ 2 , 1 = 10 and ζ 2 , 2 = 10 . At each time instant, the positions of the UAVs and their corresponding centroids are recorded, as shown in Figure 11. The motion of the attacking UAVs generates dynamically updated centroids c a , forming the trajectories P c a ( j ) . Figure 12 illustrates the interception of the attacking UAVs by two defending UAVs for j { 1 , 2 } using the proposed strategy in the presence of disturbances, with successful interception achieved in under 8 s for both centroids. For comparison, Figure 13 shows the results using PID control, where interception fails due to the lack of a mechanism to compensate for DWS and external disturbances. Figure 14 presents the interception tracking error for the proposed strategy, which converges to nearly zero in less than 4 s. Figure 15 depicts the disturbances and their estimates obtained via the ESO, showing that the estimation error quickly approaches zero. The disturbance estimation plots show that d ^ j , i ( t ) closely follows d j , i ( t ) , with a short transient and small steady-state mismatch, indicating accurate online reconstruction of the lumped uncertainties. Consequently, the ESO-based compensation effectively attenuates disturbance effects in the tracking channels and contributes to the small interception errors. These results demonstrate that the proposed control approach is robust against disturbances affecting the defending UAVs. The control efforts are smooth and free from chattering, ensuring that the defending quadrotor effectively intercepts the attacking UAVs, as in Case 1. Overall, the control strategy successfully guides the defending quadrotors to track and intercept the attacking UAVs without overshoot during the transient response. Table 2 below compare the proposed interception control strategy against the PID controller.

5. Conclusions

This paper introduced a comprehensive UAV–UAV interception framework that jointly exploits density-based clustering, deceptive maneuver generation, and robust nonlinear control to address the complexities of modern multi-UAV threats. The DBSCAN clustering module enables real-time grouping of irregular attacker formations while eliminating the need for fixed cluster assumptions, thereby improving scalability in dynamic and uncertain environments. In order to counter intelligent attackers that can predict the defenders’ trajectory, the proposed DWS algorithm generates an unpredictable defender trajectory which significantly improves the robustness in interception. Coupled with a sliding-mode backstepping controller supported by extended state observers, the overall architecture guarantees reliable convergence to attacker centroids under disturbances and modeling uncertainties, as verified through Lyapunov stability analysis.
Simulation studies across single-cluster and multi-cluster scenarios confirm that the proposed approach consistently achieves faster convergence, lower tracking errors, and superior disturbance rejection compared to baseline PID strategies. The result of this mechanism highlight the significance of integrating learning-based position detection with deception planning and robust control for future counter-UAV systems. We will conduct hardware-in-the-loop validation using an autopilot-in-the-loop setup (e.g., Pixhawk running PX4/ArduPilot) connected to a real-time simulator (e.g., Gazebo/JSBSim) via MAVLink/ROS to assess performance under sensing noise, actuator limits, and communication delays. We will also investigate extending the framework to underwater vehicles by adopting a 6-DoF hydrodynamic model with added-mass and nonlinear damping and adapting sensing/communication to acoustic positioning/links, while preserving DBSCAN clustering, DWS reference generation, and ESO-based robust tracking. Moreover, in a subsequent work, we will address extending the comparison set and incorporating additional real-world effects (varying disturbances, formation changes, and network-induced delays).

Author Contributions

A.N.A. wrote the initial draft. A.N. and A.-W.A.S. reviewed and revised the draft. A.N.A. conducted the literature review. A.N. and A.-W.A.S. provided guidance in formulating the proposed scheme. A.N.A. worked out the details of the proposed scheme. A.N. and A.-W.A.S. validated the results. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the King Fahd University of Petroleum and Minerals (KFUPM) and the Interdisciplinary Research Center for Smart Mobility and Logistics (IRC-SML), through the project number INML2523.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Acknowledgments

The authors gratefully acknowledge the support of King Fahd University of Petroleum and Minerals (KFUPM) and the Interdisciplinary Research Center for Smart Mobility and Logistics (IRC-SML), through the project number INML2523.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Fu, C.H.; Tsao, M.W.; Chi, L.P.; Zhuang, Z.Y. On the dominant factors of Civilian-Use drones: A thorough study and analysis of cross-group opinions using a triple helix model (THM) with the Analytic Hierarchy Process (AHP). Drones 2021, 5, 46. [Google Scholar] [CrossRef]
  2. Hoseini, S.A.; Hassan, J.; Bokani, A.; Kanhere, S.S. Trajectory optimization of flying energy sources using q-learning to recharge hotspot uavs. In Proceedings of the IEEE INFOCOm 2020—IEEE Conference on Computer Communications Workshops (INFOCOm WKSHPS), Virtual, 6–9 July 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 683–688. [Google Scholar]
  3. Restas, A. Drone applications for supporting disaster management. World J. Eng. Technol. 2015, 3, 316–321. [Google Scholar] [CrossRef]
  4. Garg, P.; Chakravarthy, A.S.; Mandal, M.; Narang, P.; Chamola, V.; Guizani, M. Isdnet: Ai-enabled instance segmentation of aerial scenes for smart cities. ACM Trans. Internet Technol. 2021, 21, 1–18. [Google Scholar] [CrossRef]
  5. Ana-Raluca, S.T.A.N. Drones—A Threat to Security? In Proceedings Strategies XXI-International Scientific Conference the Complex and Dynamic Nature of the Security Environment, 21st ed.; Carol I National Defence University Publishing House: Bucharest, Romania, 2025; pp. 202–213. [Google Scholar]
  6. Kreps, S.E.; Rogers, J.P. Drones: What Everyone Needs to Know®; Oxford University Press: Oxford, UK, 2025. [Google Scholar]
  7. da Cruz, J.D.A. Criminal Drone Evolution: Cartel Weaponization of Aerial IEDs ed. by Robert J. Bunker & John P. Sullivan. J. Glob. South Stud. 2022, 39, 436–440. [Google Scholar] [CrossRef]
  8. Ivascu, L.N.; Jahankhani, H. An Investigation into Counter Drones Digital Forensics Aided by Remote Identification. In Space Governance: Challenges, Threats and Countermeasures; Springer Nature: Cham, Switzerland, 2024; pp. 195–227. [Google Scholar]
  9. Khawaja, W.; Semkin, V.; Ratyal, N.I.; Yaqoob, Q.; Gul, J.; Guvenc, I. Threats from and Countermeasures for UAVs and UUVs. Sensors 2022, 22, 3896. [Google Scholar] [CrossRef]
  10. Coluccia, A.; Parisi, G.; Fascista, A. Detection and Classification of Multirotor Drones in Radar Sensor Networks: A Review. Sensors 2020, 20, 4172. [Google Scholar] [CrossRef]
  11. Aouladhadj, D.; Kpre, E.; Deniau, V.; Kharchouf, A.; Gransart, C.; Gaquière, C. Drone Detection and Tracking Using RF Identification Signals. Sensors 2023, 23, 7650. [Google Scholar] [CrossRef]
  12. Castrillo, V.U.; Manco, A.; Pascarella, D.; Gigante, G. A Review of Counter-UAS Technologies for Cooperative Defensive Teams of Drones. Drones 2022, 6, 65. [Google Scholar] [CrossRef]
  13. Abubakar, A.N.; Nasir, A.; Saif, A.W.A. Sliding Mode Based Backstepping Control for UAV-UAV Interception Strategy with K-Mean Clustering. Int. J. Intell. Robot. Appl. 2025. [Google Scholar] [CrossRef]
  14. Zhang, Z.; Wang, F.; Guo, Y.; Hua, C. Multivariable Sliding Mode Backstepping Controller for Quadrotor UAV Based on Disturbance Observer. Sci. China Inf. Sci. 2018, 61, 112207. [Google Scholar] [CrossRef]
  15. Ram, A.; Jalal, S.; Jalal, A.S.; Kumar, M. A density based algorithm for discovering density varied clusters in large spatial databases. Int. J. Comput. Appl. 2010, 3, 1–4. [Google Scholar] [CrossRef]
  16. Chen, Y.; Wang, Y. Group Target Tracking for Highly Maneuverable UAV Swarms: A Perspective. Sensors 2023, 23, 4465. [Google Scholar] [CrossRef]
  17. Abir, T.A.; Le, V.; Kuantama, E.; Gupta, P.S.; Copley, A.; Dawes, J.; Islam, M.; Han, R.; Nguyen, P. Detection and Tracking of Drone Swarms using LiDAR. In Proceedings of the 23rd Annual International Conference on Mobile Systems, Applications and Services, Anaheim, CA, USA, 23–27 June 2025; pp. 500–514. [Google Scholar]
  18. Rahman, M.H.; Sejan, M.A.S.; Aziz, M.A.; Tabassum, R.; Baik, J.I.; Song, H.K. A comprehensive survey of unmanned aerial vehicles detection and classification using machine learning approach: Challenges, solutions, and future directions. Remote Sens. 2024, 16, 879. [Google Scholar] [CrossRef]
  19. Chi, Y.; Dong, Y.; Zhang, L.; Qiu, Z.; Zheng, X.; Li, Z. Collaborative Control of UAV Swarms for Target Capture Based on Intelligent Control Theory. Mathematics 2025, 13, 413. [Google Scholar] [CrossRef]
  20. Wang, J.; Zhao, L.; Xia, K.; Wang, C. Discrete-Time Net Capture Against an Intruder Using Multiple UAVs. IEEE Trans. Aerosp. Electron. Syst. 2024, 61, 2094–2105. [Google Scholar] [CrossRef]
  21. Xu, R.; Peng, Q.; Wu, H. Optimization Design of Flexible Net Capture System for Low, Slow, and Small Unmanned Aerial Vehicles Based on Improved Multi-Objective Wolf Pack Algorithm. Drones 2025, 9, 190. [Google Scholar] [CrossRef]
  22. Pradhan, A. Increasing the Range & Effectiveness of Air-to-Air Missiles using Directed Energy Weapons (Lasers) Integrated with Missiles. In Proceedings of the Regional Student Conferences, Multiple Locations, 1 January 2025; p. 98250. [Google Scholar]
  23. Gupta, T. The Role of High Energy Laser as a U.S. Army Counter-Small Unmanned Aircraft System (UAS) Weapon; Technical Report; U.S. Army: Washington, DC, USA, 2023. Available online: https://apps.dtic.mil/sti/html/trecms/AD1230685/ (accessed on 17 February 2026).
  24. Zidane, Y.; Silva, J.S.; Tavares, G. Jamming and spoofing techniques for drone neutralization: An experimental study. Drones 2024, 8, 743. [Google Scholar] [CrossRef]
  25. Joeaneke, P.; Obioha, V.O.; Olaniyi, O.O.; Ogungbemi, O.S.; Olisa, A.O.; Akinola, O.I. Protecting Autonomous UAVs from GPS Spoofing and Jamming: A Comparative Analysis of Detection and Mitigation Techniques. J. Eng. Res. Rep. 2024, 26, 71–92. [Google Scholar] [CrossRef]
  26. Meheretu, S.E.; Nigussie, E.; Gebremeskel, G.B.; Hailesilassie, S.Y. A Systematic Literature Review on Spoofing and Jamming Approaches in Unmanned Aerial Vehicles Navigation. J. Aerosp. Technol. Manag. 2025, 17, e3425. [Google Scholar] [CrossRef]
  27. Ratnoo, T. Shima, Line-of-sight interceptor guidance for defending an aircraft. J. Guid. Control Dyn. 2011, 34, 522–532. [Google Scholar] [CrossRef]
  28. Pliska, M.; Vrba, M.; Báča, T.; Saska, M. Towards safe mid-air drone interception: Strategies for tracking & capture. IEEE Robot. Autom. Lett. 2024, 9, 8810–8817. [Google Scholar] [CrossRef]
  29. Lee, H.; Radzicki, V.R.; Rajagopal, A. Near-field homing and guidance planning for autonomous navigation systems. In Proceedings of the International Telemetering Conference (ITC), Las Vegas, NV, USA, 23–26 October 2017; Volume 53, pp. 677–684. [Google Scholar]
  30. Pastrick, H.L.; Seltzer, S.M.; Warren, M.E. Guidance laws for short-range tactical missiles. J. Guid. Control 1981, 4, 98–108. [Google Scholar] [CrossRef]
  31. Pal, A. Impact Angle Constrained Guidance for Nonstationary Maneuvering and Nonmaneuvering Targets. Master’s Thesis, Jadavpur University, Kolkata, India, 2023. Available online: http://20.198.91.3:8080/jspui/handle/123456789/8943 (accessed on 17 February 2026).
  32. Barišić, A.; Petric, F.; Bogdan, S. Brain over brawn: Using a stereo camera to detect, track, and intercept a faster UAV by reconstructing the intruder’s trajectory. Field Robot. 2022, 2, 222–240. [Google Scholar] [CrossRef]
  33. Nguyen, T.; Shivakumar, S.S.; Miller, I.D.; Keller, J.; Lee, E.S.; Zhou, A.; Özaslan, T.; Loianno, G.; Harwood, J.H.; Wozencraft, J.; et al. Mavnet: An effective semantic segmentation micro-network for mav-based tasks. IEEE Robot. Autom. Lett. 2019, 4, 3908–3915. [Google Scholar] [CrossRef]
  34. Vrba, M.; Saska, M. Marker-less micro aerial vehicle detection and localization using convolutional neural networks. IEEE Robot. Autom. Lett. 2020, 5, 2459–2466. [Google Scholar] [CrossRef]
  35. Vrba, M.; Heřt, D.; Saska, M. Onboard marker-less detection and localization of non-cooperating drones for their safe interception by an autonomous aerial system. IEEE Robot. Autom. Lett. 2019, 4, 3402–3409. [Google Scholar] [CrossRef]
  36. Carrio, A.; Vemprala, S.; Ripoll, A.; Saripalli, S.; Campoy, P. Drone detection using depth maps. In 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS); IEEE: Piscataway, NJ, USA, 2018. [Google Scholar] [CrossRef]
  37. Xiao, J.; Feroskhan, M. Learning multipursuit evasion for safe targeted navigation of drones. IEEE Trans. Artif. Intell. 2024, 5, 6210–6224. [Google Scholar] [CrossRef]
  38. Xiong, S.; Liu, H.H.T. Low-altitude fixed-wing robust and optimal control using a barrier penalty function method. J. Guid. Control Dyn. 2023, 46, 2218–2223. [Google Scholar] [CrossRef]
  39. Hou, Y.; Chen, D.; Yang, S. Adaptive robust trajectory tracking controller for a quadrotor UAV with uncertain environment parameters based on backstepping sliding mode method. IEEE Trans. Autom. Sci. Eng. 2023, 22, 4446–4456. [Google Scholar] [CrossRef]
  40. Abdullah, M.; Zulfiqar, A.; Arman, J.H. An integral backstepping and nonlinear disturbance observer-based sliding mode control for active fault-tolerant quadcopter UAVs with simulation as well as hardware-in-the-loop experiments. Int. J. Dyn. Control 2025, 13, 159. [Google Scholar] [CrossRef]
  41. Kulkarni, O.; Burhanpurwala, A. A survey of advancements in DBSCAN clustering algorithms for big data. In Proceedings of the 2024 3rd International Conference on Power Electronics and IoT Applications in Renewable Energy and Its Control (PARC), Mathura, India, 23–24 February 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 106–111. [Google Scholar]
  42. Raja, M.; Hasan, P.; Mahmudunnobe, M.; Saifuddin, M.; Hasan, S.N. Membership determination in open clusters using the DBSCAN Clustering Algorithm. Astron. Comput. 2024, 47, 100826. [Google Scholar] [CrossRef]
  43. Kremers, B.J.; Citrin, J.; Ho, A.; van de Plassche, K.L. Two-step clustering for data reduction combining DBSCAN and k-means clustering. Contrib. Plasma Phys. 2023, 63, e202200177. [Google Scholar] [CrossRef]
  44. Li, J.; Zheng, A.; Guo, W.; Bandyopadhyay, N.; Zhang, Y.; Wang, Q. Urban flood risk assessment based on DBSCAN and K-means clustering algorithm. Geomat. Nat. Hazards Risk 2023, 14, 2250527. [Google Scholar] [CrossRef]
  45. Ceviz, O.; Sen, S.; Sadioglu, P. A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions. IEEE Commun. Surv. Tutor. 2024, 27, 3227–3265. [Google Scholar] [CrossRef]
  46. Wang, X.; Zhao, Z.; Yi, L.; Ning, Z.; Guo, L.; Yu, F.R.; Guo, S. A survey on security of UAV swarm networks: Attacks and countermeasures. ACM Comput. Surv. 2024, 57, 1–37. [Google Scholar] [CrossRef]
  47. Harshil, J.; Goti, H.; Mahida, N.; Gupta, R.; Tanwar, S.; Bhardwaj, G.; Jhanjhi, N.Z.; Ray, S.K. AI-based Approach for Radio Frequency Jamming Attack Detection in Unmanned Aerial Vehicles. In Proceedings of the 2024 IEEE 29th Asia Pacific Conference on Communications (APCC), Bali, Indonesia, 5–7 November 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 266–271. [Google Scholar]
  48. Xia, B.; Mantegh, I.; Xie, W. Decentralized UAV Swarm Control: A Multi-Layered Architecture for Integrated Flight Mode Management and Dynamic Target Interception. Drones 2024, 8, 350. [Google Scholar] [CrossRef]
  49. Maaruf, M.; Abubakar, A.N.; Gulzar, M.M. Adaptive backstepping and sliding mode control of a quadrotor. J. Braz. Soc. Mech. Sci. Eng. 2024, 46, 630. [Google Scholar] [CrossRef]
  50. Maaruf, M.; Abubakar, A.N.; Gulzar, M.M.; Bali, A. Finite-Time Adaptive Dynamic Surface Control of a Quadrotor with Input Delay. Arab. J. Sci. Eng. 2025, 1–17. [Google Scholar] [CrossRef]
  51. Shayea, G.G.; Zabil, M.H.M.; Habeeb, M.A.; Khaleel, Y.L.; Albahri, A.S. Strategies for protection against adversarial attacks in AI models: An in-depth review. J. Intell. Syst. 2025, 34, 20240277. [Google Scholar] [CrossRef]
  52. Li, X.; Ru, C.; Sun, H. Adversarial generative learning and timed path optimization for real-time visual image prediction to guide robot arm movements. J.-Real-Time Image Process. 2024, 21, 154. [Google Scholar] [CrossRef]
  53. Xu, R.; Wunsch, D. Survey of clustering algorithms. IEEE Trans. Neural Netw. 2005, 16, 645–678. [Google Scholar] [CrossRef]
  54. Alqefari, S.; Menai, M.E.B. Multi-UAV task assignment in dynamic environments: Current trends and future directions. Drones 2025, 9, 75. [Google Scholar] [CrossRef]
  55. Zhang, Y.; Li, M.; Wang, S.; Dai, S.; Luo, L.; Zhu, E.; Xu, H.; Zhu, X.; Yao, C.; Zhou, H. Gaussian mixture model clustering with incomplete data. ACM Trans. Multimed. Comput. Commun. Appl. 2021, 17, 1–14. [Google Scholar] [CrossRef]
  56. Ikotun, A.M.; Ezugwu, A.E.; Abualigah, L.; Abuhaija, B.; Heming, J. K-means clustering algorithms: A comprehensive review, variants analysis, and advances in the era of big data. Inf. Sci. 2023, 622, 178–210. [Google Scholar] [CrossRef]
  57. Fuchs, M.; Höpken, W. Clustering: Hierarchical, k-means, DBSCAN. In Applied Data Science in Tourism: Interdisciplinary Approaches, Methodologies, and Applications; Springer International Publishing: Cham, Switzerland, 2022; pp. 129–149. [Google Scholar]
  58. Fahim, A. An extended DBSCAN clustering algorithm. Int. J. Adv. Comput. Sci. Appl. 2022, 13, 245–258. [Google Scholar] [CrossRef]
  59. Li, S.; Duan, N.; Min, H. Trajectory tracking control for quadrotor unmanned aerial vehicle with input delay and disturbances. Asian J. Control 2024, 26, 150–161. [Google Scholar] [CrossRef]
  60. Bouadi, H.; Bouchoucha, M.; Tadjine, M. Sliding mode control based on backstepping approach for an UAV type-quadrotor. World Acad. Sci. Eng. Technol. 2007, 26, 22–27. [Google Scholar]
Figure 1. DWS attacker–defender formation strategy using DBSCAN.
Figure 1. DWS attacker–defender formation strategy using DBSCAN.
Make 08 00054 g001
Figure 2. UAV-UAV DWS attacker-defender flow chart using DBSCAN clustering.
Figure 2. UAV-UAV DWS attacker-defender flow chart using DBSCAN clustering.
Make 08 00054 g002
Figure 3. UAV–UAV DWS attacker–defender formation using clustering.
Figure 3. UAV–UAV DWS attacker–defender formation using clustering.
Make 08 00054 g003
Figure 4. UAV–UAV DWS attacker–defender control block diagram.
Figure 4. UAV–UAV DWS attacker–defender control block diagram.
Make 08 00054 g004
Figure 5. Clustering of 10 UAV using DBSCAN.
Figure 5. Clustering of 10 UAV using DBSCAN.
Make 08 00054 g005
Figure 6. Single UAV—UAV DWS attacker—defender interception.
Figure 6. Single UAV—UAV DWS attacker—defender interception.
Make 08 00054 g006
Figure 7. UAV—UAV interception using PID.
Figure 7. UAV—UAV interception using PID.
Make 08 00054 g007
Figure 8. Interception error for single UAV—UAV DWS interception.
Figure 8. Interception error for single UAV—UAV DWS interception.
Make 08 00054 g008
Figure 9. Control inputs for UAV—UAV DWS strategy.
Figure 9. Control inputs for UAV—UAV DWS strategy.
Make 08 00054 g009
Figure 10. Disturbances d 2 , d 4 , d 6 , d 8 and their estimates using the proposed strategy.
Figure 10. Disturbances d 2 , d 4 , d 6 , d 8 and their estimates using the proposed strategy.
Make 08 00054 g010
Figure 11. Clustering of 20 UAVs using DBSCAN.
Figure 11. Clustering of 20 UAVs using DBSCAN.
Make 08 00054 g011
Figure 12. Multiple UAV—UAV DWS attacker—defender interception.
Figure 12. Multiple UAV—UAV DWS attacker—defender interception.
Make 08 00054 g012
Figure 13. Multiple UAV—UAV attacker—defender interception using PID.
Figure 13. Multiple UAV—UAV attacker—defender interception using PID.
Make 08 00054 g013
Figure 14. Multiple UAV—UAV DWS attacker—defender interception error.
Figure 14. Multiple UAV—UAV DWS attacker—defender interception error.
Make 08 00054 g014
Figure 15. Disturbances d i , 2 , d i , 4 , d i , 6 , d i , 8 and their estimates for the multiple UAV—UAV interception.
Figure 15. Disturbances d i , 2 , d i , 4 , d i , 6 , d i , 8 and their estimates for the multiple UAV—UAV interception.
Make 08 00054 g015
Table 1. Parameters of the UAVs (defender).
Table 1. Parameters of the UAVs (defender).
ParameterValueParameterValue
γ 0 189.63 γ 1 6.0612
γ 2 0.0122 J diag ( 3.8278 , 3.8288 , 7.6566 ) × 10 3 N · m / ( rad / s 2 )
m 486 g K f a diag ( 5.5670 , 5.5670 , 6.3540 ) × 10 4 N / ( rad / s )
d 25 cm b 280.19
J r 2.8385 × 10 5 N · m / ( rad / s 2 ) K f t diag ( 5.5670 , 5.5670 , 6.3540 ) × 10 4 N / ( m / s )
Table 2. Interception performance comparison between PID baseline and the proposed approach (single- and multiple-UAV scenarios).
Table 2. Interception performance comparison between PID baseline and the proposed approach (single- and multiple-UAV scenarios).
Approach (Scenario)Interception (Yes/No)Interception Time (s)Average Interception Error (m)
PID-based (Single UAV)NoHigh
Proposed approach (Single UAV)Yes7 0.023
PID-based (Multiple UAVs)NoHigh
Proposed approach (Multiple UAVs)Yes8 0.050
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Abubakar, A.N.; Nasir, A.; Saif, A.-W.A. Deceptive Waypoint Sequencing Based UAV–UAV Interception Control Using DBSCAN Learning Strategy. Mach. Learn. Knowl. Extr. 2026, 8, 54. https://doi.org/10.3390/make8030054

AMA Style

Abubakar AN, Nasir A, Saif A-WA. Deceptive Waypoint Sequencing Based UAV–UAV Interception Control Using DBSCAN Learning Strategy. Machine Learning and Knowledge Extraction. 2026; 8(3):54. https://doi.org/10.3390/make8030054

Chicago/Turabian Style

Abubakar, Abdulrazaq Nafiu, Ali Nasir, and Abdul-Wahid A. Saif. 2026. "Deceptive Waypoint Sequencing Based UAV–UAV Interception Control Using DBSCAN Learning Strategy" Machine Learning and Knowledge Extraction 8, no. 3: 54. https://doi.org/10.3390/make8030054

APA Style

Abubakar, A. N., Nasir, A., & Saif, A.-W. A. (2026). Deceptive Waypoint Sequencing Based UAV–UAV Interception Control Using DBSCAN Learning Strategy. Machine Learning and Knowledge Extraction, 8(3), 54. https://doi.org/10.3390/make8030054

Article Metrics

Back to TopTop