This study analyzes the characteristics of unmanned aircraft vehicle (UAV), security risks of UAV and difficulties in counter unmanned aircraft vehicle (C-UAV). UAV detection techniques including radar, radio electro-optical, and acoustic sensors as well as UAV interdiction techniques including RF/GNSS jamming, spoofing, laser, nets and so on have been thoroughly studied in this paper. The market application of these technologies is analyzed, and the advantages and disadvantages of these technologies are compared and analyzed. Finally, some suggestions on UAV defense and control systems in various key areas are provided.
JIANG Dongting, FAN Changjun, YONG Qirun, QU Chongxiao, LIU Shuo, ZHANG Yongjin
. Research on UAV Detection and Counter Technologies for Security in Key Areas[J]. Journal of Applied Sciences, 2022
, 40(1)
: 167
-178
.
DOI: 10.3969/j.issn.0255-8297.2022.01.015
[1] Sarah J F. The rise of the drones:framework and governance:why risk it[J]. Journal of Air Law and Commerce, 2017, 82(4):685-715.
[2] Chamola V, Kotesh P, Agarwal A, et al. A comprehensive review of unmanned aerial vehicle attacks and neutralization techniques[J]. Ad Hoc Networks, 2021(111):102324-102345.
[3] Tyurin V, Martyniuk O, Mirnenko V, et al. General approach to counter unmanned aerial vehicles[C]//2019 IEEE 5th International Conference Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD), 2019:75-78.
[4] Shi X, Yang C, Xie W, et al. Anti-drone system with multiple surveillance technologies:architecture, implementation, and challenges[J]. IEEE Communications Magazine, 2018, 56(4):68-74.
[5] Jackman A. Visualizations of the small military drone:normalization through ‘naturalization’[J]. Critical Military Studies, 2021:1-26.
[6] Guvenc I, Koohifar F, Singh S, et al. Detection, tracking, and interdiction for amateur drones[J]. IEEE Communications Magazine, 2018, 56(4):75-81.
[7] Kumar A. Drone proliferation and security threats[J]. Indian Journal of Asian Affairs, 2020, 33(1/2):43-62.
[8] Stoica P, Basak S, Molder C, et al. Review of counter-UAV solutions based on the detection of remote control communication[C]//202013th International Conference on Communications (COMM). IEEE, 2020:233-238.
[9] 罗俊海, 王芝燕. 无人机探测与对抗技术发展及应用综述[J/OL]. 控制与决策(2021-05-06)[2021-05-31]. https://doi.org/10.13195/j.kzyjc.2020.1507. Luo J H, Wang Z Y. A review of development and application of UAV detection and counter technology[J/OL]. Control and Decision (2021-05-06)[2021-05-31]. https://doi.org/10.13195/j.kzyjc.2020.1507. (in Chinese)
[10] Souli N, Makrigiorgis R, Anastasiou A, et al. HorizonBlock:implementation of an autonomous counter-drone system[C]//2020 International Conference on Unmanned Aircraft Systems (ICUAS). IEEE, 2020:398-404.
[11] Müller T. Robust drone detection for day/night counter-UAV with static VIS and SWIR cameras[C]//Proceedings of the Ground/Air Multi-sensor Interoperability, Integration, and Networking for Persistent ISR VIII. International Society for Optics and Photonics, Anaheim, CA, USA, 2017(10190):1019018.
[12] Kim J, Park C, Ahn J, et al. Real-time UAV sound detection and analysis system[C]//2017 IEEE Sensors Applications Symposium (SAS). IEEE, 2017:1-5.
[13] Taha B, Shoufan A. Machine learning-based drone detection and classification:state-of-theart in research[J]. IEEE Access, 2019(7):138669-138682.
[14] Yaacoub J P, Noura H, Salman O, et al. Security analysis of drones systems:attacks, limitations, and recommendations[J]. Internet of Things, 2020(11):100218-100230.
[15] Brito A, Sebastião P, Souto N. Jamming for unauthorized UAV operations-communications link[C]//2019 International Young Engineers Forum (YEF-ECE). IEEE, 2019:94-98.
[16] Straub J. An Interdiction detection and prevention system (IDPS) for anti-autonomy attack repulsion[C]//2019 IEEE Aerospace Conference, 2019:1-8.
[17] Kang H, Joung J, Kim J, et al. Protect your sky:a survey of counter unmanned aerial vehicle systems[J]. IEEE Access, 2020(8):168671-168710.
[18] Pu D. Research on laser damage to typical reconnaissance UAV[C]//The Fifth International Symposium on Laser Interaction with Matter. International Society for Optics and Photonics, 2019(11046):1104634-1104645.
[19] Noh J, Kwon Y, Son Y, et al. Tractor beam:safe-hijacking of consumer drones with adaptive GPS spoofing[J]. ACM Transactions on Privacy and Security (TOPS), 2019, 22(2):1-26.
[20] Park S, Kim Ht, Lee S, et al. Survey on anti-drone systems:components, designs, and challenges[J]. IEEE Access, 2021(9):42635-42659.