Control and Monitoring Subsystem of an Unmanned Aerial Vehicle
DOI:
https://doi.org/10.18372/1990-5548.73.17012Keywords:
ground control station, data exchange protocol, control system, unmanned aircraft, control line, protection line, user interfaceAbstract
The object of the research is the unmanned aerial vehicle monitoring system, the data exchange protocol and the unmanned aerial vehicle control line. A study was conducted, based on the results of which the unmanned aerial vehicle protection protocol and criteria were selected. An algorithm has been developed that ensures the establishment of the fact that the received radio radiation belongs to the class of radio signals of unmanned aerial vehicle remote control systems with pulse-position and pulse-code modulations. The results of practical testing of possible solutions are presented and the results of the functioning of the developed communication components are given. The user interface was developed, and the hybrid data exchange protocol was implemented in software.
References
K. D. Atherton, The FAA says there will be 7 million drones flying over America by 2020. Popular Sci. 2016.
S. Ueno and T. Higuchi, Numerical Analysis-Theory and Application. InTech., pp. 609 – 626, 2011. ISBN 978-953-307-389-7
A. J. Kerns, D. P. Shepard, J. A. Bhatti, and T. E. Humphreys, "Unmanned aircraft capture and control via GPS spoofing," J. Field Rob, 2014, 31(4):617–636. https://cdn.intechopen.com/pdfs/19457.pdf
D. Kovar, UAVs, Iot, and Cybersecurity. Wednesday, December 7, 2016. 11:00am–11:45am.
R. Mitchell and R. Chen, "Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications," IEEE Trans. Syst. Man Cybernet. 2014; 44(5):593–604 https://doi.org/10.1109/TSMC.2013.2265083
H. Lu, Y. Li, S. Mu, D. Wang, H. Kim, and S. Serikawa, "Motor anomaly detection for unmanned aerial vehicles using reinforcement learning," IEEE Internet Things J. 2017, 5(4): 2315–2322. https://doi.org/10.1109/JIOT.2017.2737479
H. Sedjelmaci, S. M. Senouci, and N. Ansari, "A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks," IEEE Trans. Syst. Man Cybernet. 2017, 48(9):1594–1606. https://doi.org/10.1109/TSMC.2017.2681698
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).