对手
计算机安全
计算机科学
可扩展性
适应性
鉴定(生物学)
软件
协议(科学)
合法性原则
灵活性(工程)
妥协
操作系统
生物
替代医学
法学
社会学
病理
统计
政治学
医学
植物
社会科学
数学
生态学
作者
Serhii Pohasii,Stanislav Milevskyi,Oleksandr Bilotserkivskyi,Valeria Baranova,Інна Іпполітова,Iryna Pyvavar
标识
DOI:10.1109/khpiweek61412.2023.10312972
摘要
The rapid development in unmanned aerial systems (UAS) has raised concerns about security in both civilian and military domains. Remote identification of UAS, crucial for ensuring legality and ownership verification in real-time, poses challenges. This article explores the improvement of software and hardware complexes to counter the unauthorized use of enemy commercial UAVs on combat territories. Different data transfer protocols used by UAS, such as MAVLink, DJI OcuSync, Lightbridge, Datalink, and LTE/4G/5G, are compared based on their technical characteristics. The article highlights the vulnerabilities in identity forgery that can compromise privacy and operational security, emphasizing the need for robust remote identification systems. It discusses controversies surrounding DJI's DroneID protocol and the utilization of the DJI AeroScope Monitoring System. The limitations and problems associated with existing hardware solutions are addressed, and the benefits of using budget-friendly equipment for combatting dual-purpose commercial UAS are highlighted. The proposed detection system offers cost-effectiveness, scalability, mobility, and adaptability to counter evolving enemy UAS control methods, ensuring improved security on the front lines.
科研通智能强力驱动
Strongly Powered by AbleSci AI