• Title/Summary/Keyword: Unmanned security

Search Result 174, Processing Time 0.019 seconds

A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks (군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.897-908
    • /
    • 2018
  • In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.

Recent R&D Trends of Mobile FSO Technologies (모바일 자유공간 광전송(FSO) 기술 동향)

  • Yeo, C.I.;Heo, Y.S.;Ryu, J.H.;Lee, M.S.;Kang, H.S.;Park, S.W.;Kim, K.E.;Kim, S.C.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.6
    • /
    • pp.118-128
    • /
    • 2018
  • With the massive increase in bandwidth for wireless communications, free space optical (FSO) communication has attracted significant interest owing to its outstanding strengths over conventional radio frequency wireless communication such as a wide bandwidth, unlicensed spectrum, low power consumption, small size, electromagnetic interference immunity, long-range propagation, and improved security. In recent years, FSO technology has been studied intensively for use in terrestrial and underwater autonomous and unmanned mobile systems, a rapidly growing application area, including robots, drones, unmanned aerial vehicles, autonomous vehicles, unmanned trains, and unmanned submarines. In this report, we review the recent trends and key technologies for the mobile FSO system, and introduce our drone-based mobile FSO system, which is currently under development.

Adaptation of the parameters of the physical layer of data transmission in self-organizing networks based on unmanned aerial vehicles

  • Surzhik, Dmitry I.;Kuzichkin, Oleg R.;Vasilyev, Gleb S.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.23-28
    • /
    • 2021
  • The article discusses the features of adaptation of the parameters of the physical layer of data transmission in self-organizing networks based on unmanned aerial vehicles operating in the conditions of "smart cities". The concept of cities of this type is defined, the historical path of formation, the current state and prospects for further development in the aspect of transition to "smart cities" of the third generation are shown. Cities of this type are aimed at providing more comfortable and safe living conditions for citizens and autonomous automated work of all components of the urban economy. The perspective of the development of urban mobile automated technical means of infocommunications is shown, one of the leading directions of which is the creation and active use of wireless self-organizing networks based on unmanned aerial vehicles. The advantages of using small-sized unmanned aerial vehicles for organizing networks of this type are considered, as well as the range of tasks to be solved in the conditions of modern "smart cities". It is shown that for the transition to self-organizing networks in the conditions of "smart cities" of the third generation, it is necessary to ensure the adaptation of various levels of OSI network models to dynamically changing operating conditions, which is especially important for the physical layer. To maintain an acceptable level of the value of the bit error probability when transmitting command and telemetry data, it is proposed to adaptively change the coding rate depending on the signal-to-noise ratio at the receiver input (or on the number of channel decoder errors), and when transmitting payload data, it is also proposed to adaptively change the coding rate together with the choice of modulation methods that differ in energy and spectral efficiency. As options for the practical implementation of these solutions, it is proposed to use an approach based on the principles of neuro-fuzzy control, for which examples of determining the boundaries of theoretically achievable efficiency are given.

A Study on the Effective Military Use of Drones (드론의 효과적인 군사분야 활용에 관한 연구)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.61-70
    • /
    • 2020
  • The unmanned aerial vehicle that emerged with the 4th Industrial Revolution attracts attention not only from Korea but also from around the world, and its utilization and market size are gradually expanding. For the first time, it was used for military purposes, but it is currently used for transportation, investigation, surveillance, and agriculture. China, along with the US and Europe, is emerging as a leader in the commercial unmanned aerial vehicle market, and Korea, which has the world's seventh-largest technology in related fields, is striving to promote various technology development policies and system improvement related to unmanned aerial vehicles. Military drones will revolutionize the means of war by using a means of war called an unmanned system based on theories such as network-oriented warfare and effect-oriented warfare. Mobile equipment, including drones, is greatly affected by environmental factors such as terrain and weather, as well as technological developments and interests in the field. Now, drones are being used actively in many fields, and especially in the military field, the use of advanced drones is expected to create a new defense environment and provide a new paradigm for war.

Development of Control Method for Improving Energy Efficiency of Unmanned Underwater Gliders (무인 수중글라이더의 에너지 효율 개선을 위한 제어방법 개발)

  • La, Seung-kyu;Ko, Sung-hyup;Ji, Dae-hyeong;Chon, Seung-jae;Jeong, Seong-hoon;Choi, Hyeung-sik;Kim, Joon-young
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.2
    • /
    • pp.105-112
    • /
    • 2022
  • In this paper, unmanned underwater glider was designed for high-depth operation and adopted a bladder-type buoyancy controller for improving battery efficiency, and the motion controller controls the pitch angle by moving the internal mass battery. To improve the energy efficiency of the unmanned underwater glider, a layered PID controller that performs control by section was designed. Simulation program including 6-DOF motion equations and hydrodynamics coefficients of an unmanned underwater glider is constructed using Matlab/Simulink program. Control methods such as PID controller, sliding mode controller and layered PID controller were applied to the simulator to compare the dynamics performance and energy efficiency. As a result, the layered PID controller showed improved control performance compared to other controllers and improved energy efficiency of approximately 7.2% compared to PID controller.

Real-time Anomaly Detection System Using HITL Simulation-Based UAV Packet Data (HITL 시뮬레이션 기반 무인비행체 패킷 데이터를 활용한 실시간 이상 탐지 시스템)

  • Daekyeong Park;Byeongjin Kim
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.103-113
    • /
    • 2023
  • In recent years, Unmanned Aerial Vehicles (UAV) have been widely used in various industries. However, as the depend ence on UAV increases rapidly, concerns about the security and safety of UAV are growing. Currently, various vulnerabili ties such as stealing the control right of the UAV or the right to communicate with the UAV in the web application are being disclosed. However, there is a lack of research related to the security of UAV. Therefore, in this paper, a study was conducted to determine whether the packet data was normal or abnormal by collecting packet data of an unmanned aerial vehicle in a HITL(Hardware In The Loop) simulation environment similar to the real environment. In addition, this paper proposes a method for reducing computational cost in the modeling process and increasing the ease of data interpretation, a machine learning-based anomaly detection model that detects abnormal data by learning only normal data, and optimized hyperparameter values.

Manned-Unmanned Teaming Air-to-Air Combat Tactic Development Using Longshot Unmanned Aerial Vehicle (롱샷 무인기를 활용한 유무인 협업 공대공 전술 개발)

  • Yoo, Seunghoon;Park, Myunghwan;Hwang, Seongin;Seol, Hyeonju
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.3
    • /
    • pp.64-72
    • /
    • 2021
  • Manned-unmanned teaming can be a very promising air-to-air combat tactic since it can maximize the advantage of combining human insight with the robustness of the machine. The rapid advances in artificial intelligence and autonomous control technology will speed up the development of manned-unmanned teaming air-to-air combat system. In this paper, we introduce a manned-unmanned teaming air-to-air combat tactic which is composed of a manned aircraft and an UAV. In this tactic, a manned aircraft equipped with radar is functioning both as a sensor to detect the hostile aircraft and as a controller to direct the UAV to engage the hostile aircraft. The UAV equipped with missiles is functioning as an actor to engage the hostile aircraft. We also developed a combat scenario of executing this tactic where the manned-unmanned teaming is engaging a hostile aircraft. The hostile aircraft is equipped with both missiles and radar. To demonstrate the efficiency of the tactic, we run the simulation of the scenario of the tactic. Using the simulation, we found the optimal formation and maneuver for the manned-unmanned teaming where the manned-unmanned teaming can survive while the hostile aircraft is shot-downed. The result of this study can provide an insight to how manned aircraft can collaborate with UAV to carry out air-to-air combat missions.

Privacy Protection from Unmanned Aerial Vehicle (무인항공기 사생활 보호 방안)

  • Lee, Bosung;Lee, Joongyeup;Park, Yujin;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.1057-1071
    • /
    • 2016
  • Privacy-right infringement using unmanned aerial vehicle (UAV) usually occurs due to the unregistered small UAV with the image data processing equipment. In this paper we propose that privacy protection acts, Personal Information Protection Act, Information and Communications Network Act, are complemented to consider the mobility of image data processing equipment installed on UAV. Furthermore, we suggest the regulations for classification of small UAVs causing the biggest concern of privacy-right infringement are included in aviation legislations. In addition, technological countermeasures such as recognition of UAV photographing and masking of identifying information photographed by UAV are proposed.

Sequence Based Anomaly Detection System for Unmanned Aerial Vehicle (시퀀스 유사도 기반 무인 비행체 이상 탐지 시스템)

  • Seo, Kang Uk;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.39-48
    • /
    • 2022
  • In this paper, we propose an anomaly detection system (ADS) to detect anomalies of the in-vehicle network for unmanned aerial vehicle (UAV). The proposed ADS detects the anomalies by measuring the similarity of status messages sequences periodically sent by the UAV to the ground control system. We defined three types of malicious message injection attacks that can be performed on the in-vehicle network of UAV and simulated those attack techniques in the Pixhawk4 quadcopter. The proposed ADS can detect abnormal sequences with accuracy of higher than 96%.

A study on the physical security market economy revitalization plan (물리보안 시장경제 활성화 방안에 관한 연구)

  • Min Su Kim
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.115-120
    • /
    • 2023
  • In the domestic physical security (mechanical security) market, there is an increasing variation in the expansion of security areas due to the infrastructure of large enterprises and small and medium-sized enterprises. In other words, problems related to on-site dispatch between companies are constantly being raised due to the limitation of physical security service s to the scope of dispatch according to the dispatch time. Therefore, in this study, based on the results of the criteria for the scope of dispatch as a criterion for dispatch time through simulations related to on-site dispatch, we propose a plan to activate the physical security (mechanical security) market in the future.