Documente Academic
Documente Profesional
Documente Cultură
1.OBJECTIVE:
With the proliferation of Unmanned Aerial Vehicles (UAV), a series of safety and
security challenges emerged. The recent commercial availability of a new generation of small
UAV has emphasised the growing threat posed by these machines. Due to which there is an
immediate need of counter UAV technology. Our main focus is to mainly look into the basic
need, methodologies, applications and advantages of detecting an UAV.
2.INTRODUCTION:
The modern world is changing rapidly with the development of new technologies
constantly emerging and revolutionizing approaches to various tasks. Together with
significant benefits, come many ways of using technology for malicious purposes. Unmanned
aerial vehicles (UAVs), also known as drones, are aircrafts that do not carry any crew, but
rather, are operated remotely by human operators, or autonomously via pre-programmed
software or robots. UAVs vary widely in size and capacity, and have become increasingly
prevalent. Their use has increased exponentially over the last decade for a broad range of
applications, including cartography and mapping, inspection of remote power lines and
pipelines, delivery services, telecommunications relay, police surveillance, traffic monitoring,
border patrol and reconnaissance, and emergency and disaster monitoring.
From a military perspective, UAVs, which can be recoverable or expendable, are
generally used to operate in dangerous or hostile territories, without endangering the
operators. It is employed for surveillance and reconnaissance, information collection,
detection of mines, and for combat purposes. UAV hold many attractions for the military.
They are generally smaller, lighter and cheaper as compared to manned aerial vehicles as they
do not need equipment to support a crew. UAVs can also be used for many hours in a stretch,
while switching operators.
The recent commercial availability of a new generation of small UAVs, often
quadcopters or some other form of rotorcraft, has emphasised the growing threat posed by
these machines. These UAVs can be easily purchased over the internet and can carry a
payload of up to a few kilogrammes. They are cheap, easy to fly and small enough to evade
traditional security surveillance. A recreational UAV costing a few hundred dollars can be
turned into an aerial equivalent of an improvised explosive device (IED), or be equipped with
a camera and data downlink to become a spy UAV.
Counter-UAV technology can be facilitated using a wide variety of means, but focuses
on two distinct processes detection and engagement. Detection encompasses technology and
processes necessary to detect, locate, track, and identify an unmanned aircraft. Conversely,
engagement involves technology and actions to prevent, disrupt, disable, override, spoof
[mislead], or otherwise interfere with UAV operations. Engagement may also include active
measures to forcefully capture, inflict damage, or destroy the aerial vehicle. The distinction
between these processes is essential, as there are no legal ramifications for conducting UAV
detection, whereas significant legal hurdles exist to conducting engagement
3.NEED FOR DETECTION:
UAV can be used for the betterment of society or for the killing people and destroying
assents. Both the government and civilians are using drones for commercial purposes, but
this is an era where we cannot say which drone is good and which is rouge so there is an
immediate requirement for the best counter UAV solutions and standards to safeguard civil
aviation against possible UAV and drone attacks. They are silent killers and are hard to detect
and can be used to wage war with plausible deniability. UAV represent one of the biggest
shifts in aerial warfare and was never in doubt. There are organisations where they
weaponised ordinary reconnaissance drones with missiles and used them as killing machines
to hunt down their enemies and exploitation of airspace with weapons which was a privilege
of the state and its militaries so far but which has been compromised now.
In 2013, Germany’s Pirate Party flew a small multirotor drone in close proximity to the
German Chancellor Angela Merkel at an open-air rally, leading many to speculate about the
ease with which a drone could attack an otherwise highly secured area. This incident
highlighted the ease with which drones can disrupt our current way of working. Since then
there have been multiple scenarios where drones have disrupted the security and privacy and
aided in penetration where otherwise difficult. Given below are a few examples:
In August 2018, a failed assassination attempt against Venezuelan President Nicolás
Maduro was mounted with explosive-armed drones in Caracas during a televised
national event. The drones detonated explosives above the audience which led to a
few injuries.
In July 2018, in the UAE, terrorists claimed to have sent an armed drone to attack the
international airport in Abu Dhabi, the capital of the United Arab Emirates. While the
authorities deny the claims, the Caracas incident provides sufficient evidence that this
can be done.
In March 2017, a woman in Washington spotted a drone outside her window and tried
to shoot it down initially using stones and then using a gun.
In November 2016, a husband used drones mounted with cameras to catch his wife
cheating and then posted evidence of the alleged affair online.
In January 2015, a drone crashed onto the White House lawn after its operator lost
control, prompting concerns that the US President’s residence may be vulnerable.
Also, in 2015, a man protesting Japan’s nuclear policy dropped a drone carrying
radioactive sand from the Fukushima nuclear disaster onto the Prime Minister’s office
premises, though the amount of radiation was minimal.
On September 14 2019, Houthi rebels, fighting a Saudi Arabia-led coalition in Yemen,
used explosive-laden drones in a pre-dawn attack on two Saudi refineries. The
devastation led to the world's largest oil producer cutting oil output by half.
There have been some of instances where drones can be used for penetrating secure
areas and capture data through remote signals which can be received through drones with
camera payloads. Given the above nature of risks, counter-UAV technologies become
important to mitigate, manage and monitor these perils. Considering the drone platform and
the number of different payloads which can be used on the platform, counter-UAV
technologies have seen extensive investment and development. The competition between
hackers who leverage technology to expose different types of risks, with or without malicious
intent, which require preparation. While the above examples are largely global, they are
possible in the Indian context and can be risks which require preparation.
4.ADVANTAGES:
Detection comprises sensor correlation, targeted visual display, and communication
alerts of UAV activity and fusing sensor data with AI (Artificial Intelligence) will conduct further
analysis and confirms the object is a UAV and by use of proprietary machine vision algorithms
to classify objects and confirm targets as threat drones including signal-emitting and non-
signal-emitting.
The key advantages of UAV detection are
Automatic early detection and neutralization.
High-resolution 3D flight plots of UAV in real time.
Permits 24/7 monitoring and recording.
Do not interfere with radio traffic and can prevent many disasters.
Adjustable monitoring and invisible protective shield precise to the meter can be
established with these systems.
We can eradicate the risk of spying, tracking and surveillance (Privacy risk).
Can avoid leveraging UAV to drop harmful or explosive material into sensitive areas.
Reliable protection for individuals, companies and facilities from any unauthorized
intruders and airborne cargo.
5.DETECTION METHODOLOGY:
Early detection and identification are the key to effective neutralization of the UAV
threat. It would provide sufficient time to make a decision on the nature of the threat and
deploy the means necessary to destroy or capture a rogue UAV. The expanding technological
capabilities of UAVs necessitate the use of several types of detection capabilities, including
the reflectance of ultraviolet, visible and infrared photons, radar reflectance, acoustic
emissions, electromagnetic emissions, and induced magnetic fields.
Cons:
Medium probability of detection with higher false alarm rates.
Radar returns from birds are very similar to radar returns from drones, but
sophisticated signal processing can help differentiate these targets.
Line of sight obstacles (hills, buildings, and trees) will degrade detection performance.
360o coverage is obtained by either using multiple radar units or using a rotating
mount for the radar.
ACOUSTIC SENSING
Acoustic sensors operate by identifying the distinct noise made by the motors that
drive the propellers of UAV. These set of sensors detect specific noise signatures created by
UAV motors and propellers. Despite the advantages of being a passive sensor that is relatively
inexpensive, acoustic sensors would make ineffective standalone detection systems. For
example, these sensors have limited range, rely on matching registered acoustic sensors to a
database of known UAV signatures, suffer from high nuisance alarm rates and are not capable
of detecting gliding UAVs as those do not produce any significant noise.
Drone Shield's acoustic sensor was designed to provide high detection rates with low
false alarms. It contains a database of common UAV acoustic signatures so that false alarms
are reduced and in many cases the type of UAV is also included in the alert. This system is
being used by law enforcement officers in the US to enforce no UAV zones. A significant
advantage of acoustic sensing is that is that it has low cost, even when implemented as a
network of sensing devices placed around the protection perimeter. However, it is incapable
of detecting fixed-wing UAVs operating as gliders or rotorcraft UAVs in free fall. Sophisticated
operators could change the sound signature of a UAV by buying different propellers or making
other modifications.
Pros:
Day/night operations. 360o coverage can be obtained using multiple microphone
arrays, but this increases the cost.
Detections are possible even in the absence of drone RF communication, such as
waypoint flight mode.
Simultaneous detection of multiple drones.
Small microphone arrays with low power requirements.
Low-Medium system cost.
Cons:
Medium probability of detection with higher false alarm rates.
Shorter detection ranges from 100-400m depending on obstacles in the area. Line of
sight obstacles (hills, buildings, and trees) only slightly degrades detection
performance. Ineffective in urban areas with a lot of ambient noise.
It can be spoofed through playback of an audio recording of a UAV.
Cons:
Line of sight obstacles (hills, buildings, and trees) will degrade detection performance.
If the drone is not communicating, there will be no detection.
RF scanners are limited in their capability to accurately locate a drone in space.
COMBINED SENSORS
Typically, most of the commercially available Counter UAV integrate a variety of
different sensor types to provide a more robust detection capability. For example, a system
might include an acoustic sensor that cues an optical camera when it detects a potential drone
in the vicinity. The use of multiple detection elements may also be intended to increase the
probability of a successful detection, given that no individual detection method is entirely
failproof.
6.APPLICATIONS:
A. AIRPORTS
In many countries the air traffic control reported an increase of drone sightings in the
recent years and in the event of a drone sighting, the entire airport must be closed for hours,
and sometimes even for days. This does not only cost millions, but also leads to chaotic
conditions in passenger processing. If a small UAV got into the engine of an aero plane, it
could stop the engine and several helicopter piolets have reported many close encounters
with UAV and drones.
The UAV detection system helps to locate the perpetrators within the shortest periods
possible and to display the route of all drones including the flight height. Thus, flight
interruptions are reduced to the absolute minimum, and the airport operators saves
enormous costs, and also the flight of aero planes and helicopters cannot be disturbed.
B. CRITICAL INFRASTRUCTURE
Due to the increase in the UAV and drone availability the protection and security for
many structures whether oil or gas refineries, pipelines, chemical plants, substations like
critical infrastructure has been largely unprotected up to now. The total failure of critical
infrastructures can have unavoidable consequences to public safety, natural habitat and
safety of society are at stake here.
The UAV detection can help in providing security for extremely large areas with high
level of accuracy, which can be easily integrated into existing infrastructure and would not
interfere with the regular habitat or the public and with high level of reliability and several
facilities can be monitored from one place which eliminates the necessity of line of sight.
D. MILITARY
Whether in the desert, on the ice, or in the jungle the protection of military properties
is of great importance. When used in the flight against state and military, a single targeted
threat by a drone or UAV can have devasting consequences for national security and safety,
so detection and dissolving of UAV is an important task and should be done with utmost
accurate detection.
The UAV detection technology provides protection against the hostile or unauthorized
UAV which can help in a number of environments which are fully integrated as a system and
can also provide enhancements to the tracking and identification capabilities of any military
system as well as a counter measure option for safety and protection. Detection can also help
military personal of avoiding a UAV carrying explosives and preventing a disaster.
G. PERSONAL SECURITY
Protecting the privacy of one individual is the utmost importance and for a VIP their
protection and privacy are extremely important because being shielded from the paparazzi is
part of everyday life for people in the public eye and many incidents of drones near VIP
created a viable threat to them and also with availability of cheap UAV which can land and
take off vertically are of serious concern. The detection system can help to precisely identify
a rouge drone’s vulnerabilities and then deploy counter measures.
I. BORDER PROTECTION
UAVs and Drones at national borders at extreme altitudes are no longer a rare feature.
Due to the long range and flight heights, drones are being used increasingly for border
espionage or for smuggling over borders. Most drones today have first person view (FPV)
along with HD resolution capabilities. This helps drone operators to remotely observe and
track movements of objects of interest. The case of drone sightings has been recorded
recently near the Punjab border (Tarn Taran district) capable of carrying a 4kg payload by
Pakistan based Khalistan zindabad force to infiltrate weapons from across the international
border. Unmanned aerial vehicles currently pose a disproportionate threat to ground forces
due to the inability of most sensors to detect them. UAVs, as small, low-velocity aircraft,
present weak signatures to RF, EO, and IR systems. By early detection and establishing
counter attack systems we can easily eradicate these infiltrations in to our own airspace and
also can reduce the human effect at Border.
7.FURTHER DEVELOPMENTS:
Detection can help us in finding or identifying an illegal or rouge UAV and Emerging
Technology offers an array of ways to counter a UAV which is also a essential part to provide
complete security and protection but they are in developing stage and some of the methods
are already in use by military, police and some industrial and government organizations
around the world. Some of them are
INTERDICTION
Physical interdiction of UAV by specialised ammunition, High energy laser beams can
burn them down, Some counter-UAs set ups fire nets at the UAV to tangle up their propellers
and bring them down but they can be self-defeating since a falling UAV is a dangerous
projectile and can damage the battery and make the UAV to explode.
Using Jammers to disrupt the frequency link between the drone and its operator by
generating large volumes of radio frequency (RF) output. Once the RF link is severed, a UAV
will either descend to ground or initiate a return to home manoeuvre. Satellite hamming
disrupts the UAV satellite link used for navigation but it does not work in the case of
autonomous drones with pre fed coordinates or terrain contour mapping data.
Detecting and Hacking into the drones communications system can help to neutralise
it and disrupting the UAV various flight sensors, motion sensors, gyroscopes, obstacle
avoidance sensors and flight control functions so that it receives an error signal forcing it to
either crash or activate an internal safety manoeuvre to land safely or by spoofing a GPS signal
to force the UAV to change its pre-programmed mission plan but it also can trigger a serious
threat of activating the explosives it might be carrying.
RF JAMMERS
An RF Jammer is a static, mobile, or handheld device which transmits a large amount
of RF energy towards the drone, masking the controller signal. This results in one of four
scenarios, depending on the drone
1. Drone makes a controlled landing in its current position.
2. Drone returns to user-set home location (which could be set to a target position
instead of home).
3. Drone falls uncontrolled to the ground.
4. Drone flies off in a random uncontrolled direction.
GPS SPOOFERS
This device sends a new signal to the drone, replacing the communication with GPS
satellites it uses for navigation. In this way, the drone is spoofed into thinking it’s somewhere
else. By dynamically altering the GPS coordinates in real-time, the UAV’s position can be
controlled by the spoofer. Once control is gained the drone can be directed to a safe zone.
NET GUNS
Firing a net at a drone, or otherwise bringing a net into contact with a drone stops the
drone by prohibiting the rotor blades. Physically captures drone – good for forensics and
prosecution, ground-launched net cannons are semi-automatic with high accuracy, drone
deployed nets have long range, low risk of collateral damage.
8. CHALLENGES:
As much as these technologies are successfully tested in controlled environments,
their success and applicability in real world scenarios is yet to be completely established. Anti-
UAV technologies are still very nascent and companies are trying to build the best systems
involving multiple technologies to deal with all possible contingencies. However, their
effectiveness is yet to be established and some of the challenges are
ECONOMIC FEASIBILITY
Given the cost of commercially available drones today, there is a need to research
economically feasible options for countering rogue drones. A US military ally used a missile
costing millions of dollars to bring down a US$200 commercial drone. This highlights the
needs of this industry of bringing and adopting cost effective ways to tackle rogue drones.
LEGAL CHALLENGES
In most countries jamming radio signals often requires permission and a host of
approvals and licenses before such equipment can be deployed. For example, in the UK, one
needs to have authority under the Wireless Telegraphy Act to start broadcasting any kind of
signal even one intended to bring down a fleet of unauthorized drones.
10.REFERENCES:
1. Gettinger, D., and Holland M. A., 2015. Drone Sightings and Close Encounters: An
Analysis, Center for the Study of the Drone at Bard College, New York.
2. Countering Rogue Drones, a report released by FICCI and Ernst & Young.
3. SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution
Mechanisms, and Scientific Gaps by Ben Nassi, Asaf Shabtai, Ryusuke Masuoka, Yuval
Elovici: https://arxiv.org/abs/1903.05155.
4. Drone Detection System: https://drone-detection-system.com/.