scholarly journals Defending Airports from UAS: A Survey on Cyber-Attacks and Counter-Drone Sensing Technologies

Sensors ◽  
2020 ◽  
Vol 20 (12) ◽  
pp. 3537 ◽  
Author(s):  
Georgia Lykou ◽  
Dimitrios Moustakas ◽  
Dimitris Gritzalis

As the fastest growing segment of aviation, unmanned aerial systems (UAS) continue to increase in number, technical complexity and capabilities. Numerous civilian and commercial uses are drastically transforming civil protection, asset delivery, commercial and entertaining activities. However, UAS pose significant challenges in terms of safety, security and privacy within society. An increasing phenomenon, nowadays, is drone-related incidents near airport facilities, which are expected to proliferate in frequency, complexity and severity, as drones become larger and more powerful. Critical infrastructures need to be protected from such aerial attacks, through effective counteracting technologies, risk management and resilience plans. In this paper, we present a survey of drone incidents near airports and a literature review of sensor technologies, able to prevent, detect, identify and mitigate rogue drones. We exhibit the benefits and limitations of available counter-drone technologies (C-UAS); however, defending airports against misused drone activity is a hard problem. Therefore, we analyze three realistic attack scenarios from malicious drones and propose an effective C-UAS protection plan for each case. We discuss applicability limitations of C-UAS in the aviation context and propose a resilience action plan for airport stakeholders for defending against airborne threats from misused drones.

Smart Cities ◽  
2021 ◽  
Vol 4 (3) ◽  
pp. 1146-1157
Author(s):  
Fountas Panagiotis ◽  
Kouskouras Taxiarxchis ◽  
Kranas Georgios ◽  
Leandros Maglaras ◽  
Mohamed Amine Ferrag

Over the years, the digitization of all aspects of life in modern societies is considered an acquired advantage. However, like the terrestrial world, the digital world is not perfect and many dangers and threats are present. In the present work, we conduct a systematic review on the methods of network detection and cyber attacks that can take place in a critical infrastructure. As is shown, the implementation of a system that learns from the system behavior (machine learning), on multiple levels and spots any diversity, is one of the most effective solutions.


2014 ◽  
Vol 11 (8) ◽  
pp. 525-539 ◽  
Author(s):  
Cheolhyeon Kwon ◽  
Weiyi Liu ◽  
Inseok Hwang

2019 ◽  
Vol 3 ◽  
pp. 1255
Author(s):  
Ahmad Salahuddin Mohd Harithuddin ◽  
Mohd Fazri Sedan ◽  
Syaril Azrad Md Ali ◽  
Shattri Mansor ◽  
Hamid Reza Jifroudi ◽  
...  

Unmanned aerial systems (UAS) has many advantages in the fields of SURVAILLANCE and disaster management compared to space-borne observation, manned missions and in situ methods. The reasons include cost effectiveness, operational safety, and mission efficiency. This has in turn underlined the importance of UAS technology and highlighted a growing need in a more robust and efficient unmanned aerial vehicles to serve specific needs in SURVAILLANCE and disaster management. This paper first gives an overview on the framework for SURVAILLANCE particularly in applications of border control and disaster management and lists several phases of SURVAILLANCE and service descriptions. Based on this overview and SURVAILLANCE phases descriptions, we show the areas and services in which UAS can have significant advantage over traditional methods.


Shore & Beach ◽  
2019 ◽  
pp. 44-49 ◽  
Author(s):  
Elizabeth Sciaudone ◽  
Liliana Velasquez-Montoya

Less than two weeks after Hurricane Florence made landfall in North Carolina (NC), a team of researchers from NC State University traveled to Dare County to investigate the storm’s effects on beaches and dunes. Using available post-storm imagery and prior knowledge of vulnerabilities in the system, the team identified several locations to visit in the towns of Kitty Hawk, Nags Head, Rodanthe, Buxton, and Hatteras, as well as a number of locations within the Pea Island National Wildlife Refuge (Figure 1). Data collected included topographic profiles, still imagery and video from unmanned aerial systems, sediment samples, and geo-located photography. This Coastal Observations piece presents some of the data and photos collected; the full report is available online (Sciaudone et al. 2019), and data collected will be made available to interested researchers upon request.


Author(s):  
V. Yeliseyev ◽  
O. Bondarenko ◽  
O. Kovaliov

The scientific article explores the issues of managing the risks of emergencies in order to improve the readiness and efficiency of the functioning of a single state civil protection system.When calculating the risks, the basic quantitative criteria take into account the probability of emergencies and the magnitude of the damage from these situations.The article presents a method for calculating the joint probability of the action of several emergency factors, taking into account the effect of accumulation of damage.


Sign in / Sign up

Export Citation Format

Share Document