scholarly journals Swarm-based counter UAV defense system

2021 ◽  
Vol 1 (1) ◽  
Author(s):  
Matthias R. Brust ◽  
Grégoire Danoy ◽  
Daniel H. Stolfi ◽  
Pascal Bouvry

AbstractUnmanned Aerial Vehicles (UAVs) have quickly become one of the promising Internet-of-Things (IoT) devices for smart cities. Thanks to their mobility, agility, and onboard sensors’ customizability, UAVs have already demonstrated immense potential for numerous commercial applications. The UAVs expansion will come at the price of a dense, high-speed and dynamic traffic prone to UAVs going rogue or deployed with malicious intent. Counter UAV systems (C-UAS) are thus required to ensure their operations are safe. Existing C-UAS, which for the majority come from the military domain, lack scalability or induce collateral damages. This paper proposes a C-UAS able to intercept and escort intruders. It relies on an autonomous defense UAV swarm, capable of self-organizing their defense formation and to intercept the malicious UAV. This fully localized and GPS-free approach follows a modular design regarding the defense phases and it uses a newly developed balanced clustering to realize the intercept- and capture-formation. The resulting networked defense UAV swarm is resilient to communication losses. Finally, a prototype UAV simulator has been implemented. Through extensive simulations, we demonstrate the feasibility and performance of our approach.

2020 ◽  
Author(s):  
Matthias Brust ◽  
Grégoire Danoy ◽  
Daniel Stolfi ◽  
Pascal Bouvry

Abstract Unmanned Aerial Vehicles (UAVs) have quickly become one of the promising Internet-of-Things (IoT) devices for smart cities thanks to their mobility, agility, and onboard sensors' customizability. UAVs are used in many applications expanding beyond the military to more commercial ones, ranging from monitoring, surveillance, mapping to parcel delivery. As governments plan using UAVs to build fresh economic potential for innovation, urban planners are moving forward to incorporate so-called UAV flight zones and UAV highways in their smart city design. However, the high-speed and dynamic flow of UAVs needs to be monitored to detect and, subsequently, to deal with intruders, rough drones, and UAVs with a malicious intent. Autonomous defense systems consisting of collaboratively working UAVs as a swarm will gain increasing importance, since a manually conducted defense is bound to fail due to the high dynamics involved in UAV maneuvering. This paper proposes a UAV defense system for intercepting and escorting intruders. The proposed UAV defense system consists of a defense UAV swarm, which is capable to self-organize their defense formation in the event of intruder detection, and chase the malicious UAV. Our fully localized approach follows a modular design regarding the defense phases and it uses a newly developed balanced clustering to realize the intercept- and capture-formation. The resulting networked defense UAV swarm is resilient against communication losses. Finally, a prototype UAV simulator has been implemented. Through extensive simulations, we demonstrate the feasibility and performance of our approach.


Energies ◽  
2021 ◽  
Vol 14 (15) ◽  
pp. 4572
Author(s):  
Hossam A. Gabbar

In recent years, there have been tendencies to enable smart cities with interconnected infrastructures and communities. Current engineering design and operation practices are limited to handling individual systems with modeling and simulation, as well as control systems. This paper presents a holistic approach with engineering practice to design and operate interconnected systems as part of smart cities. The approach is based on modeling individual physical systems and associated processes and identifying key performance indicators to evaluate each system and interconnected systems with an understanding of the coupling among systems to increase the overall performance of interconnected systems. The multi-objective optimization technique is proposed to achieve the best performance based on system design, control, and operation parameters. Due to the multidimensional nature of the interconnected systems, a unified interface system with modular design is proposed to achieve the highest overall performance of the interconnected systems with standardized interactions among state variables and performance measures. The proposed approach can allow dynamic updates of the interconnected systems based on model libraries of each system and process. A case study is presented of interconnected energy–water–transportation–waste facilities, whereby modeling is discussed, and performance measures are evaluated for different scenarios using the unified interface design.


2020 ◽  
Vol 65 (3) ◽  
pp. 1-23
Author(s):  
David H. Klyde ◽  
Sean P. Pitoniak ◽  
P. Chase Schulze ◽  
Paul Ruckel ◽  
James Rigsby ◽  
...  

Updates to the military rotorcraft handling qualities specification are currently being considered that address the high-speed flight regime envisioned for the Future Vertical Lift platform of the U. S. Army. A team that features industry and academia has developed and evaluated a set of mission task elements (MTEs) that are defined to address vertical takeoff and landing (VTOL) high-speed handling qualities. Following the mission-oriented approach upon which ADS-33E-PRF is based, the MTEs were designed to meet different levels of precision and aggressiveness. Tracking MTEs based on a sum-of-sines (SOS) command signal were defined for precision, aggressive, and precision, nonaggressive applications. The command signals were derived from fixed-wing analogs that have long been used to evaluate aircraft handling qualities. While the precision, aggressive SOS tracking tasks, the primary subject of this paper, are surrogates for air-to-air tracking and nap-of-the-earth tracking, the known forcing function allows for complete open- and closed-loop pilot—vehicle system identification. The MTE objectives, descriptions, and performance criteria were assessed and refined via several checkout piloted simulation sessions. Formal evaluations were then conducted by Army test pilots at four simulator facilities, each featuring a unique high-speed platform including a generic winged-compound helicopter, two tiltrotor configurations, and a compound helicopter with coaxial rotors. To aid in the MTE evaluation process, baseline VTOL configurations were varied to achieve different handling qualities levels. Quantitative measures based on task performance and qualitative measures based on pilot ratings, comments, and debrief questionnaires were used to assess MTE effectiveness. The piloted simulation results demonstrated that the SOS tracking MTEs provided an effective means to discern precision, aggressive handling qualities in high-speed flight.


1970 ◽  
Vol 7 (01) ◽  
pp. 55-68
Author(s):  
Eugene R. Miller

A number of commercial applications have been proposed for rigid sidewall surface effect craft. The transport of crews to offshore operations is an application which is well-suited to the immediate use of moderately sized craft of this type. Because the crews are paid while they are in transit, high speeds are required to minimize the total transportation costs. The characteristics and performance of rigid sidewall surface effect craft suitable for crew transport operations are developed. The major design parameters studied include pay-load, total power, and machinery type. Performance estimates are made for operations in both calm water and waves. An economic model is developed to simulate crewboat operations. Cost estimates are based on current technology and price levels. The total unit transportation cost is used as the economic criterion in the determination of the relative merit of various craft. For the purpose of comparison the characteristics and costs of planing hull crewboats for the same mission are developed. It is concluded that rigid sidewall surface effect craft have the potential of being economically superior to planing boats for crew transport operations.


Cryptography ◽  
2019 ◽  
Vol 3 (3) ◽  
pp. 20 ◽  
Author(s):  
Venkatraman ◽  
Overmars

The potential benefits of the Internet of Things (IoT) are hampered by malicious interventions of attackers when the fundamental security requirements such as authentication and authorization are not sufficiently met and existing measures are unable to protect the IoT environment from data breaches. With the spectrum of IoT application domains increasing to include mobile health, smart homes and smart cities in everyday life, the consequences of an attack in the IoT network connecting billions of devices will become critical. Due to the challenges in applying existing cryptographic standards to resource constrained IoT devices, new security solutions being proposed come with a tradeoff between security and performance. While much research has focused on developing lightweight cryptographic solutions that predominantly adopt RSA (Rivest–Shamir–Adleman) authentication methods, there is a need to identify the limitations in the usage of such measures. This research paper discusses the importance of a better understanding of RSA-based lightweight cryptography and the associated vulnerabilities of the cryptographic keys that are generated using semi-primes. In this paper, we employ mathematical operations on the sum of four squares to obtain one of the prime factors of a semi-prime that could lead to the attack of the RSA keys. We consider the even sum of squares and show how a modified binary greatest common divisor (GCD) can be used to quickly recover one of the factors of a semi-prime. The method presented in this paper only uses binary arithmetic shifts that are more suitable for the resource-constrained IoT landscape. This is a further improvement on previous work based on Euler’s method which is demonstrated using an illustration that allows for the faster testing of multiple sums of squares solutions more quickly.


Author(s):  
Hooshang Heshmat ◽  
James F. Walton ◽  
Andrew Hunsberger

In the paper the authors will present the design and preliminary test results for a high specific power (i.e., kW/kg) fully integrated and completely oil-free gas turbine driven electric generating system that operates with commercially available heavy fuel. The oil-free, high-speed micro-turboalternator system achieves high specific power through operating speeds to 180,000 rpm and the use of compliant foil bearings, high performance compressor and turbine and a permanent magnet alternator. The high operating temperatures and speeds require that oil-free compliant foil bearings be used and that the alternator section be isolated from the turbine engine portion of the system. The selected modular design approach, including compressor and turbine aerodynamic design, system thermal management issues and the corresponding impact on rotor bearing system dynamics, will all be presented. The paper concludes with a presentation of preliminary testing results showing stable full speed operation and peak power generated. Data obtained compares well with design predictions both from a rotordynamic and with regard to the cycle efficiency and performance. Conclusions regarding the ability to scale the technology to even smaller systems will also be presented.


2020 ◽  
Vol 26 (2) ◽  
pp. 342-345
Author(s):  
Benoni Sfârlog ◽  
Ștefania Bumbuc ◽  
Constantin Grigoraș

AbstractIn recent decades, a new paradigm marks the conceptual transformation through which competencies take the place of objectives in education, in general and in training and professional development, in particular. It becomes necessary and useful to analyze the necessity, possibility and opportunity of focusing the instruction on competences. Thus they acquire, in an integrative way, the triple state of a referential system for quality and performance in the military actions, of the objective of the instructive-formative process, and of the result of learning.


2021 ◽  
Vol 10 (1) ◽  
pp. 13
Author(s):  
Claudia Campolo ◽  
Giacomo Genovese ◽  
Antonio Iera ◽  
Antonella Molinaro

Several Internet of Things (IoT) applications are booming which rely on advanced artificial intelligence (AI) and, in particular, machine learning (ML) algorithms to assist the users and make decisions on their behalf in a large variety of contexts, such as smart homes, smart cities, smart factories. Although the traditional approach is to deploy such compute-intensive algorithms into the centralized cloud, the recent proliferation of low-cost, AI-powered microcontrollers and consumer devices paves the way for having the intelligence pervasively spread along the cloud-to-things continuum. The take off of such a promising vision may be hurdled by the resource constraints of IoT devices and by the heterogeneity of (mostly proprietary) AI-embedded software and hardware platforms. In this paper, we propose a solution for the AI distributed deployment at the deep edge, which lays its foundation in the IoT virtualization concept. We design a virtualization layer hosted at the network edge that is in charge of the semantic description of AI-embedded IoT devices, and, hence, it can expose as well as augment their cognitive capabilities in order to feed intelligent IoT applications. The proposal has been mainly devised with the twofold aim of (i) relieving the pressure on constrained devices that are solicited by multiple parties interested in accessing their generated data and inference, and (ii) and targeting interoperability among AI-powered platforms. A Proof-of-Concept (PoC) is provided to showcase the viability and advantages of the proposed solution.


Sensors ◽  
2021 ◽  
Vol 21 (14) ◽  
pp. 4705
Author(s):  
Julian Lich ◽  
Tino Wollmann ◽  
Angelos Filippatos ◽  
Maik Gude ◽  
Juergen Czarske ◽  
...  

Due to their lightweight properties, fiber-reinforced composites are well suited for large and fast rotating structures, such as fan blades in turbomachines. To investigate rotor safety and performance, in situ measurements of the structural dynamic behaviour must be performed during rotating conditions. An approach to measuring spatially resolved vibration responses of a rotating structure with a non-contact, non-rotating sensor is investigated here. The resulting spectra can be assigned to specific locations on the structure and have similar properties to the spectra measured with co-rotating sensors, such as strain gauges. The sampling frequency is increased by performing consecutive measurements with a constant excitation function and varying time delays. The method allows for a paradigm shift to unambiguous identification of natural frequencies and mode shapes with arbitrary rotor shapes and excitation functions without the need for co-rotating sensors. Deflection measurements on a glass fiber-reinforced polymer disk were performed with a diffraction grating-based sensor system at 40 measurement points with an uncertainty below 15 μrad and a commercial triangulation sensor at 200 measurement points at surface speeds up to 300 m/s. A rotation-induced increase of two natural frequencies was measured, and their mode shapes were derived at the corresponding rotational speeds. A strain gauge was used for validation.


Author(s):  
Ou Ruan ◽  
Lixiao Zhang ◽  
Yuanyuan Zhang

AbstractLocation-based services are becoming more and more popular in mobile online social networks (mOSNs) for smart cities, but users’ privacy also has aroused widespread concern, such as locations, friend sets and other private information. At present, many protocols have been proposed, but these protocols are inefficient and ignore some security risks. In the paper, we present a new location-sharing protocol, which solves two issues by using symmetric/asymmetric encryption properly. We adopt the following methods to reduce the communication and computation costs: only setting up one location server; connecting social network server and location server directly instead of through cellular towers; avoiding broadcast encryption. We introduce dummy identities to protect users’ identity privacy, and prevent location server from inferring users’ activity tracks by updating dummy identities in time. The details of security and performance analysis with related protocols show that our protocol enjoys two advantages: (1) it’s more efficient than related protocols, which greatly reduces the computation and communication costs; (2) it satisfies all security goals; however, most previous protocols only meet some security goals.


Sign in / Sign up

Export Citation Format

Share Document