96 research outputs found

    Agent Based Modeling for Low-cost Counter UAS Protocol in Prisons

    Get PDF
    Technological advances have led to the prevalence of small unmanned aerial systems (sUAS) which has proven to be a security concern for fixed facilities to include prisons, airports, and forward operating bases. This study explores if agent-based simulation modeling can serve as a useful tool for developing counter unmanned aerial system (C-UAS) parameters for a fixed facility. The relationship between threat speed and a hypothetical C-UAS is explored in an AnyLogic model designed to represent a prison and general sUAS smuggling threats that prisons have experienced in recent years. The data suggests there is a critical threat sUAS speed in which C-UAS failures occur at a much higher frequency and that the relationship is non-linear

    UAV tracking module proposal based on a regulative comparison between manned and unmanned aviation

    Get PDF
    Purpose: The aim of this study is twofold. First is to compare manned and unmanned aviation regulations in the context of ICAO Annexes to identify potential deficiencies in the international UAV legislations. Second is to propose a UAV monitoring module work flow as a solution to identified deficiencies in the international UAV regulations. Design/methodology: In the present study, firstly the regulations used in manned aviation were summarized in the context of ICAO Annexes. Then along with an overview of the use of UAVs, international UAV regulations have been reviewed with a general perspective. In addition, a comparison was made on whether contents of ICAO Annexes find a place in common international UAV regulations in order to understand areas to be developed in the international UAV regulations, and to better understand the different principles between manned and unmanned air transport. In the last section, we present a UAV tracking module (UAVTram) in line with the above-mentioned comparison between manned and unmanned aviation and the identified deficiencies in the international UAV regulations. Findings: The international UAV regulations should be developed on the basis of airport airspace use, detection, liabilities, sanctions of violations, and updating of regulation. Proposed UAVTram has potential to offer real-time tracking and detection of UAVs as a solution to malicious use of UAVs. Research limitations/implications: Our study is not exempt from limitations. Firstly, we didn’t review all UAV regulations because it needs a considerable amount of efforts to check out all the UAV regulations pertinent to different areas of the world. It is the same case for manned aviation as we used only ICAO Annexes to contextually compare with UAV regulations. Practical implications: From the practical perspective, studies introducing new technologies such as systems that help detection of remote pilots causing trouble and agile defense systems will give valuable insights to remove individual UAV threats. Originality/value: We didn’t find any study aiming to compare manned and unmanned aviation rules in search of finding potential deficiencies in the UAV regulations. Our study adopts such an approach. Moreover, our solution proposal here uses Bluetooth 5.0 technology mounted on stationary transmitters which provides more effective range with higher data transfer. Another advantage is that this work is projected to be supported by Turkish civil aviation authority, DGCA. This may accelerate efforts to make required real-time tests.Peer Reviewe

    Radicalization of Airspace Security: Prospects and Botheration of Drone Defense System Technology

    Get PDF
    The development of a comprehensive and decisive drone defense integrated control system that can provide maximum security is crucial for maintaining territorial integrity and accelerating smart aerial mobility to sustain the emerging drone transportation system (DTS) for priority-based logistics and mobile communication. This study explores recent developments in the design of robust drone defense control systems that can observe and respond not only to drone attacks inside and outside a facility but also to equipment data such as CCTV security control on the ground and security sensors in the facility at a glance. Also, it considered DDS strategies, schema, and innovative security setups in different regions. Finally, open research issues in DDs designs are discussed, and useful recommendations are provided. Effective means for drone source authentication, delivery package verification, operator authorization, and dynamic scenario-specific engagement are solicited for comprehensive DDS design for maximum security Received: 2023-03-07 Revised: 2023-04-2
    • …
    corecore