• Title/Summary/Keyword: 드론 식별

Search Result 51, Processing Time 0.028 seconds

An Evaluation of Inference Acceleration for Drone-based Real-time Object Detection (드론 기반 실시간 객체 식별을 위한 추론 가속화 평가)

  • Kwon, Seung-Sang;Moon, Yong-Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.408-410
    • /
    • 2022
  • 최근 데이터 획득 위치에 가장 근접하고, 저 수준의 계산력을 제공하는 엣지 기기를 중심으로 직접 딥러닝 추론을 수행하고자 하는 요구가 증가하고 있다. 본 논문에서는 드론에서 촬영한 교통 영상 데이터를 기반으로, 다수의 차량 종류 및 보행자를 식별하는 모델을 Jetson Nano 에 탑재하여 기본 성능을 측정한다. 더불어, 자원제약형 기기 환경에서 TensorRT 와 Deepstream 을 활용하여 객체 식별 모델의 연산 경량화 및 추론 가속화 성능을 극대화하기 위한 구현 및 실험을 수행하여 Anchor-based 및 Anchor-free 객체 식별 모델의 정확도와 실시간 대응력을 평가하고 논의한다.

Drone detection system using YOLO (YOLO를 이용한 드론탐지 시스템)

  • Shin, JunPyo;Kim, YuMin;Choi, KyuMin;Sung, SeungMin;Lee, ByungKwon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.01a
    • /
    • pp.233-236
    • /
    • 2021
  • 본 논문에서는 국내 드론 사용량이 증가하고 있으나 드론을 제재하기 위한 수단과 AI를 활용한 드론 콘텐츠가 부족하다. 상기 문제점을 해결하기 위해 Darknet 과 YOLO_mark를 사용하여 디바이스를 학습시켜 손쉽게 드론 인식 및 구별을 할 수 있게 구현하였다. 이를 통해 기존 드론 제재 수단의 한계를 극복하고 손쉽게 이용할 수 있다. 나아가 본 논문을 이용하여 군◦경에서 드론 식별 등으로 활용할 수 있다.

  • PDF

Development Directions for Enhanced Protection of National Mjor Facilities Countering Drone Threats (국가중요시설 방호력 강화를 위한 대드론체계 발전 방향)

  • Sang-Keun Cho;Ki-Won Kim;In-keun Son;Kang-Il Seo;Min-seop Jung;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.257-262
    • /
    • 2023
  • Recently there are increasing number of claims that it is necessary to build a countermeasure in case of aggressive threats by small drones. During Russia-Ukraine war ignited by Russian invasion on February 2022, attacking drones have been being used widely to damage other country's national major facilities. On December 2022, 5 drones sent by North Korea made a flight around Seoul, South Korea about 7 hours, but it was not successful to search and track them. Furthermore, none of these were destroyed and shot down. Counter-drone system is essential system to search and identify unintended small drones and disable them. This paper is for proposing required functions for building a counter-drone system for national major facilities. We conducted focus group interviews with relevant government officials and analyzed their suggestions on how to augment protection capabilities to defend against small drone attacks.

A Survey on Hardware Characteristic-based Drone Identification and Authentication Technology (하드웨어적 고유 특성 기반 드론 식별 및 인증 기술 연구 동향 분석)

  • Sungbin Park;Hoon Ji;Yeonjoon Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.1181-1184
    • /
    • 2023
  • 최근 드론은 군사 작전, 물류 운송, 인명 구조 등 다양한 분야에서 활용되고 있으며 관련 산업의 규모는 증가하는 추세이다. 이에 따라, GPS 스푸핑, 조종사 비익명화 등의 드론을 향한 공격 기법들 또한 발달하고 있다. 이런 공격들은 드론에 대한 인증을 도입함으로써 대비할 수 있는 공격들이다. 이에, 학계에서는 강건한 인증을 위해 드론 하드웨어의 고유 특성을 활용할 수 있는 RF 신호, 소리 신호, 드론 내부 센서 신호 등에 기반한 인증 기술들이 연구되어온 바 있다. 본 논문에서는 지금까지의 드론 인증 기술 연구 동향을 분석하고, 이를 기반으로 향후 연구 방향을 제시한다.

Efficient Drone Detection method using a Radio-Frequency (RF를 이용한 효과적인 드론 탐지 기법)

  • Choi, Hong-Rak;Jeong, Won-Ho;Kim, Kyung-Seok
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.26-33
    • /
    • 2017
  • A drone performs a mission through remote control or automatic control, which uses wireless communications technology. Recently the increasing use of drones, the drone signal RF detection is necessary. In this paper, we propose an efficient dron RF detection method through simulations considering Wi-Fi, Bluetooth and dedicated protocol dron communication method in ISM(Industry Science Medical) band.. After configuring an environment where a common terminal and a drone signal are mixed, a general terminal and a drone signal are distinguished from each other by using a RF characteristic according to a dron movement. The proposed drone RF detection method is the WRMD(Windowed RSSI Moving Detection) operation and the Doppler frequency identification method. The simulation environments consist to mixed for two signals and four signals. We analysis the performance to proposed drone RF detection technique thorough detection rate.

A Study on the Threat of North Korean Small Drones (북한 소형 드론 위협 사례에 대한 연구)

  • Kwang-Jae Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.397-403
    • /
    • 2024
  • North Korea's rapidly advancing drone development and operational capabilities have become a significant threat to South Korea's security. The drone incursions by North Korea in 2014, 2017, and 2022 demonstrate the technological advancement and provocative potential of North Korean drones. This study aims to closely analyze the military threats posed by North Korean drones and seek effective countermeasures. The research examines the development level of North Korean drone technology, its military applications, the characteristics and patterns of recent drone incursions, the adequacy and limitations of South Korea's current response systems, and future countermeasures. For this purpose, domestic and international research literature and media reports were reviewed, and specific North Korean drone incursion cases were analyzed. The results indicate that North Korea's small drones possess technological features such as small size, low altitude, low-speed flight, long-duration flight, and reconnaissance equipment. These drones pose threats that can be utilized for reconnaissance, surveillance, surprise attacks, and terrorism. Additionally, South Korea's current response systems reveal limitations such as inadequate detection and identification capabilities, low interception success rates, lack of an integrated response system, and insufficient specialized personnel and equipment. Therefore, this study suggests various technical, policy, and international cooperative countermeasures, including the development of drone detection and identification technologies, the utilization of diverse drone neutralization technologies, the establishment of legal and institutional foundations, the construction of a cooperative framework among relevant agencies, and the strengthening of international cooperation. The study particularly emphasizes the importance of raising awareness of the North Korean drone threat across South Korean society and unifying national efforts to respond to these threats.

A Study on the Response Plan through the Analysis of North Korea's Drones Terrorism at Critical National Facilities (국가중요시설에 대한 북한의 드론테러 위협 분석을 통한 대응방안 연구)

  • Ha, Choong soo
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2023.11a
    • /
    • pp.319-320
    • /
    • 2023
  • 본 논문은 이러한 국가중요시설에서의 드론테러 위협과 대응실태를 분석하여 문제점을 도출함으로써 안티드론시스템을 실효적으로 활용하기 위한 법·제도적 발전방안을 제시하는 데에 연구의 목적으로 두었다. 연구방법은 질적연구방법으로서 기존 선행연구논문, 정책자료 등에서 다루지 못한 다양한 문제점들을 전문가 심층면담을 통해 분석하였다. 심층면담을 위한 연구참여자는 국내 안티드론 및 테러분야 전문가 16명을 선정하여 반구조화 인터뷰 12개 문항을 토대로 진행하였다. 연구결과 현재 우리나라 국가중요시설 드론테러에 대해 효과적으로 대응하기 위해서 선행되어야 할 4 가지 문제점에 대한 개선사항이 식별되었다.

  • PDF

MTD (Moving Target Detection) with Preposition Hash Table for Security of Drone Network (드론 네트워크 보안을 위한 해시표 대체 방식의 능동 방어 기법)

  • Leem, Sungmin;Lee, Minwoo;Lim, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.477-485
    • /
    • 2019
  • As the drones industry evolved, the security of the drone network has been important. In this paper, MTD (Moving Target Detection) technique is applied to the drone network for improving security. The existing MTD scheme has a risk that the hash value is exposed during the wireless communication process, and it is restricted to apply the one-to-many network. Therefore, we proposed PHT (Preposition Hash Table) scheme to prevent exposure of hash values during wireless communication. By reducing the risk of cryptographic key exposure, the use time of the cryptographic key can be extended and the security of the drone network will be improved. In addition, the cryptographic key exchange is not performed during flight, it is advantageous to apply PHT for a swarm drone network. Through simulation, we confirmed that the proposed scheme can contribute to the security of the drone network.

Analysis of Regulation and Standardization Trends for Drone Remote ID (드론 원격 식별 규정 및 표준화 동향 분석)

  • Kim, H.W.;Kang, K.S.;Kim, D.H.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.6
    • /
    • pp.46-54
    • /
    • 2021
  • Drone remote identification (ID) capability is essential to ensure public safety, help law enforcement, and secure the safety and efficiency of the national airspace. Remote ID technology can be used to differentiate compliant drones from illegal drones that pose a potential security risk by providing airspace awareness to the civil aviation agency and law enforcement entities. In addition, the increased safety and efficiency obtained by mandating remote ID will make it possible to operate drones over populated areas and beyond visual lines of sight. In addition, remote ID will allow drones to be safely integrated into unmanned traffic management systems and the national airspace. Remote ID devices can be categorized by type, i.e., broadcast remote ID or network remote ID. The broadcast remote ID, which has high technical maturity and will be applied in the near future, is primarily considered to ensure the security of drones. The network remote ID, which is being developed and tested and will be applied in the distant future, can be used additionally to ensure the safety and the efficiency of the national airspace. In this paper, we analyze the trends on regulation and standardization activities for drone remote ID primarily in the United State and Europe.

Implications on US DoD Counter-Small Aircraft Systems Strategy (미 국방부 소형드론 대응전략과 시사점)

  • Kang-Il Seo;Sang-Keun Cho;Ki-Won Kim;In-keun Son;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.239-243
    • /
    • 2023
  • Due to recent small unmanned aircraft threats by North Korea and unsuccessful reponses, severe concerns about future national security have been being increasingly surged. Especially it is notable and unaccpetable to see that North Korea's small drones flying over capical areas over 7 hours were not efficiently detected and identified even though South Korea already recognized the threats since early 2010s. Meanwhile a US military troop operating THAAD system on Seung-Joo, South Korea successfully shot down unidentified small drone on Jan 2023. The threats caused by small unmanned aircraft is worrisome not only to South Korea, but also to international nations. This paper surveyed US DoD Strategy for countering small aircraft systems and suggest how to improve our current anti-dron systems so that small unmanned aircraft threats will be dynamically diminished or neutralized as fast as we can.