首页> 外文会议>International Conference on Cyber Conflict >UAV exploitation: A new domain for cyber power
【24h】

UAV exploitation: A new domain for cyber power

机译:无人机剥削:网络力量的新域

获取原文

摘要

The risks of military unmanned aerial vehicles (UAVs) being subjected to electronic attack are well recognised, especially following high-profile incidents such as the interception of unencrypted video feeds from UAVs in Iraq and Israel, or the diversion and downing of a UAV in Iran. Protection of military UAV assets rightly focuses on defence against sophisticated cyber penetration or electronic attack, including data link intercepts and navigational spoofing. Offensive activity to counter adversary drone operations presumes a requirement for high-end electronic attack systems. However, combat operations in eastern Ukraine in 2014-16 have introduced an entirely new dimension to UAV and counter-UAV operations. In addition to drones with military-grade standards of electronic defence and encryption, a large number of civilian or amateur UAVs are in operation in the conflict. This presents both opportunities and challenges to future operations combating hybrid threats. Actual operations in eastern Ukraine, in combination with studies of potential criminal or terrorist use of UAV technologies, provide indicators for a range of aspects of UAV use in future conflict. However, apart from the direct link to military usage, UAVs are rapidly approaching ubiquity with a wide range of applications reaching from entertainment purposes to border patrol, surveillance, and research, which imposes an indirect security and safety threat. Issues associated with the unguarded use of drones by the general public range from potentially highly dangerous situations such as failing to avoid controlled airspace, to privacy violations. Specific questions include attribution of UAV activities to the individuals actually directing the drone; technical countermeasures against hacking, interception or electronic attack; and options for controlling and directing adversary UAVs. Lack of attribution and security measures protecting civilian UAVs against electronic attack, hacking or hijacking, with the consequent likelihood of unauthorised use or interception, greatly increases the complication of each of these concerns.
机译:军事无人驾驶飞行器(无人机)受到电子攻击的风险得到充分认识到,特别是在伊拉克和以色列截取的未加密视频饲料等高调的事件之后,或者在伊朗无人民的转移和拖延。保护军事无人机资产正确地关注防御复杂的网络渗透或电子攻击,包括数据链接截取和导航欺骗。反对反对者无人机运营的攻击活动假定高端电子攻击系统的要求。但是,2014 - 16年在东乌克兰的战斗行动已经向无人机和柜台运营引入了一个完全新的维度。除了用军事级标准的电子防御和加密的无人机外,大量的民用或业余无人机在冲突中运作。这给未来的运营带来了对抗混合威胁的机会和挑战。乌克兰东部的实际运营与潜在的刑事或恐怖主义使用无人机技术的研究相结合,为未来冲突中的一系列方面提供了一系列方面的指标。然而,除了直接链接到军事用法,无人机迅速接近浮息性,广泛的应用范围从娱乐目的到达巡逻,监控和研究,这强加了间接安全和安全威胁。与普遍公众在潜在的高度危险情况下,与普遍公众的无人驾驶功能相关的问题,例如未能避免受控空域,以隐私违规。具体问题包括实际指导无人机的个人的UAV活动的归属;防止黑客,拦截或电子攻击的技术对策;控制和指导对手无人机的选择。缺乏归因和安全措施,保护平民免提免受电子攻击,黑客或劫持的影响,随着未经授权的使用或拦截的可能性,大大增加了这些问题的复杂性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号