计算机应用专辑

面向重点区域安防的无人机探测与反制技术研究

展开
  • 1. 中国人民解放军海军装备部, 四川 成都 610091;
    2. 中国电子科技集团公司第五十二研究所, 浙江 杭州 311000;
    3. 中国航空工业集团公司成都飞机设计研究所, 四川 成都 610091

收稿日期: 2021-06-01

  网络出版日期: 2022-01-28

Research on UAV Detection and Counter Technologies for Security in Key Areas

Expand
  • 1. The Department of Naval Equipment of the Chinese People's Liberation Army, Chengdu 610091, Sichuan, China;
    2. The 52nd Research Institute of China Electronic Technology Group Co., Ltd., Hangzhou 311000, Zhejiang, China;
    3. Chengdu Aircraft Design and Research Institute, Aviation Industry Corporation of China, Ltd., Chengdu 610091, Sichuan, China

Received date: 2021-06-01

  Online published: 2022-01-28

摘要

分析了无人机的特点、安全隐患以及反无人机的难点;阐述了基于雷达、无线电、光电、声波等传感设备的各种无人机探测技术以及干扰阻断类、直接捕捉类、打击毁伤类、监测控制类等各种无人机反制技术的原理和特征;分析了各类技术在市场上的应用情况,并对它们的适用性和优缺点进行了比较。最后,针对各类重点区域的无人机管控提出了有效的建议。

本文引用格式

蒋冬婷, 范长军, 雍其润, 瞿崇晓, 刘硕, 张永晋 . 面向重点区域安防的无人机探测与反制技术研究[J]. 应用科学学报, 2022 , 40(1) : 167 -178 . DOI: 10.3969/j.issn.0255-8297.2022.01.015

Abstract

This study analyzes the characteristics of unmanned aircraft vehicle (UAV), security risks of UAV and difficulties in counter unmanned aircraft vehicle (C-UAV). UAV detection techniques including radar, radio electro-optical, and acoustic sensors as well as UAV interdiction techniques including RF/GNSS jamming, spoofing, laser, nets and so on have been thoroughly studied in this paper. The market application of these technologies is analyzed, and the advantages and disadvantages of these technologies are compared and analyzed. Finally, some suggestions on UAV defense and control systems in various key areas are provided.

参考文献

[1] Sarah J F. The rise of the drones:framework and governance:why risk it[J]. Journal of Air Law and Commerce, 2017, 82(4):685-715.
[2] Chamola V, Kotesh P, Agarwal A, et al. A comprehensive review of unmanned aerial vehicle attacks and neutralization techniques[J]. Ad Hoc Networks, 2021(111):102324-102345.
[3] Tyurin V, Martyniuk O, Mirnenko V, et al. General approach to counter unmanned aerial vehicles[C]//2019 IEEE 5th International Conference Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD), 2019:75-78.
[4] Shi X, Yang C, Xie W, et al. Anti-drone system with multiple surveillance technologies:architecture, implementation, and challenges[J]. IEEE Communications Magazine, 2018, 56(4):68-74.
[5] Jackman A. Visualizations of the small military drone:normalization through ‘naturalization’[J]. Critical Military Studies, 2021:1-26.
[6] Guvenc I, Koohifar F, Singh S, et al. Detection, tracking, and interdiction for amateur drones[J]. IEEE Communications Magazine, 2018, 56(4):75-81.
[7] Kumar A. Drone proliferation and security threats[J]. Indian Journal of Asian Affairs, 2020, 33(1/2):43-62.
[8] Stoica P, Basak S, Molder C, et al. Review of counter-UAV solutions based on the detection of remote control communication[C]//202013th International Conference on Communications (COMM). IEEE, 2020:233-238.
[9] 罗俊海, 王芝燕. 无人机探测与对抗技术发展及应用综述[J/OL]. 控制与决策(2021-05-06)[2021-05-31]. https://doi.org/10.13195/j.kzyjc.2020.1507. Luo J H, Wang Z Y. A review of development and application of UAV detection and counter technology[J/OL]. Control and Decision (2021-05-06)[2021-05-31]. https://doi.org/10.13195/j.kzyjc.2020.1507. (in Chinese)
[10] Souli N, Makrigiorgis R, Anastasiou A, et al. HorizonBlock:implementation of an autonomous counter-drone system[C]//2020 International Conference on Unmanned Aircraft Systems (ICUAS). IEEE, 2020:398-404.
[11] Müller T. Robust drone detection for day/night counter-UAV with static VIS and SWIR cameras[C]//Proceedings of the Ground/Air Multi-sensor Interoperability, Integration, and Networking for Persistent ISR VIII. International Society for Optics and Photonics, Anaheim, CA, USA, 2017(10190):1019018.
[12] Kim J, Park C, Ahn J, et al. Real-time UAV sound detection and analysis system[C]//2017 IEEE Sensors Applications Symposium (SAS). IEEE, 2017:1-5.
[13] Taha B, Shoufan A. Machine learning-based drone detection and classification:state-of-theart in research[J]. IEEE Access, 2019(7):138669-138682.
[14] Yaacoub J P, Noura H, Salman O, et al. Security analysis of drones systems:attacks, limitations, and recommendations[J]. Internet of Things, 2020(11):100218-100230.
[15] Brito A, Sebastião P, Souto N. Jamming for unauthorized UAV operations-communications link[C]//2019 International Young Engineers Forum (YEF-ECE). IEEE, 2019:94-98.
[16] Straub J. An Interdiction detection and prevention system (IDPS) for anti-autonomy attack repulsion[C]//2019 IEEE Aerospace Conference, 2019:1-8.
[17] Kang H, Joung J, Kim J, et al. Protect your sky:a survey of counter unmanned aerial vehicle systems[J]. IEEE Access, 2020(8):168671-168710.
[18] Pu D. Research on laser damage to typical reconnaissance UAV[C]//The Fifth International Symposium on Laser Interaction with Matter. International Society for Optics and Photonics, 2019(11046):1104634-1104645.
[19] Noh J, Kwon Y, Son Y, et al. Tractor beam:safe-hijacking of consumer drones with adaptive GPS spoofing[J]. ACM Transactions on Privacy and Security (TOPS), 2019, 22(2):1-26.
[20] Park S, Kim Ht, Lee S, et al. Survey on anti-drone systems:components, designs, and challenges[J]. IEEE Access, 2021(9):42635-42659.
文章导航

/