Control and Monitoring Subsystem of an Unmanned Aerial Vehicle

Authors

DOI:

https://doi.org/10.18372/1990-5548.73.17012

Keywords:

ground control station, data exchange protocol, control system, unmanned aircraft, control line, protection line, user interface

Abstract

The object of the research is the unmanned aerial vehicle monitoring system, the data exchange protocol and the unmanned aerial vehicle control line. A study was conducted, based on the results of which the unmanned aerial vehicle protection protocol and criteria were selected. An algorithm has been developed that ensures the establishment of the fact that the received radio radiation belongs to the class of radio signals of unmanned aerial vehicle remote control systems with pulse-position and pulse-code modulations. The results of practical testing of possible solutions are presented and the results of the functioning of the developed communication components are given. The user interface was developed, and the hybrid data exchange protocol was implemented in software.

Author Biographies

Victor Sineglazov , National Aviation University, Kyiv, Ukraine

Doctor of Engineering Science. Professor. Head of the Department

Aviation Computer-Integrated Complexes Department

Faculty of Air Navigation, Electronics and Telecommunications

Artur Tsoba , National Aviation University, Kyiv, Ukraine

The object of the research is the unmanned aerial vehicle monitoring system, the data exchange protocol and the unmanned aerial vehicle control line. A study was conducted, based on the results of which the unmanned aerial vehicle protection protocol and criteria were selected. An algorithm has been developed that ensures the establishment of the fact that the received radio radiation belongs to the class of radio signals of unmanned aerial vehicle remote control systems with pulse-position and pulse-code modulations. The results of practical testing of possible solutions are presented and the results of the functioning of the developed communication components are given. The user interface was developed, and the hybrid data exchange protocol was implemented in software.

References

K. D. Atherton, The FAA says there will be 7 million drones flying over America by 2020. Popular Sci. 2016.

S. Ueno and T. Higuchi, Numerical Analysis-Theory and Application. InTech., pp. 609 – 626, 2011. ISBN 978-953-307-389-7

A. J. Kerns, D. P. Shepard, J. A. Bhatti, and T. E. Humphreys, "Unmanned aircraft capture and control via GPS spoofing," J. Field Rob, 2014, 31(4):617–636. https://cdn.intechopen.com/pdfs/19457.pdf

D. Kovar, UAVs, Iot, and Cybersecurity. Wednesday, December 7, 2016. 11:00am–11:45am.

R. Mitchell and R. Chen, "Adaptive intrusion detection of malicious unmanned air vehicles using behavior rule specifications," IEEE Trans. Syst. Man Cybernet. 2014; 44(5):593–604 https://doi.org/10.1109/TSMC.2013.2265083

H. Lu, Y. Li, S. Mu, D. Wang, H. Kim, and S. Serikawa, "Motor anomaly detection for unmanned aerial vehicles using reinforcement learning," IEEE Internet Things J. 2017, 5(4): 2315–2322. https://doi.org/10.1109/JIOT.2017.2737479

H. Sedjelmaci, S. M. Senouci, and N. Ansari, "A hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks," IEEE Trans. Syst. Man Cybernet. 2017, 48(9):1594–1606. https://doi.org/10.1109/TSMC.2017.2681698

Downloads

Published

2022-11-24

Issue

Section

AUTOMATION AND COMPUTER-INTEGRATED TECHNOLOGIES