首页> 外文会议>International Conference on Cyber Conflict >UAV exploitation: A new domain for cyber power
【24h】

UAV exploitation: A new domain for cyber power

机译:无人机开发:网络力量的新领域

获取原文

摘要

The risks of military unmanned aerial vehicles (UAVs) being subjected to electronic attack are well recognised, especially following high-profile incidents such as the interception of unencrypted video feeds from UAVs in Iraq and Israel, or the diversion and downing of a UAV in Iran. Protection of military UAV assets rightly focuses on defence against sophisticated cyber penetration or electronic attack, including data link intercepts and navigational spoofing. Offensive activity to counter adversary drone operations presumes a requirement for high-end electronic attack systems. However, combat operations in eastern Ukraine in 2014-16 have introduced an entirely new dimension to UAV and counter-UAV operations. In addition to drones with military-grade standards of electronic defence and encryption, a large number of civilian or amateur UAVs are in operation in the conflict. This presents both opportunities and challenges to future operations combating hybrid threats. Actual operations in eastern Ukraine, in combination with studies of potential criminal or terrorist use of UAV technologies, provide indicators for a range of aspects of UAV use in future conflict. However, apart from the direct link to military usage, UAVs are rapidly approaching ubiquity with a wide range of applications reaching from entertainment purposes to border patrol, surveillance, and research, which imposes an indirect security and safety threat. Issues associated with the unguarded use of drones by the general public range from potentially highly dangerous situations such as failing to avoid controlled airspace, to privacy violations. Specific questions include attribution of UAV activities to the individuals actually directing the drone; technical countermeasures against hacking, interception or electronic attack; and options for controlling and directing adversary UAVs. Lack of attribution and security measures protecting civilian UAVs against electronic attack, hacking or hijacking, with the consequent likelihood of unauthorised use or interception, greatly increases the complication of each of these concerns.
机译:人们已经充分认识到军用无人机受到电子攻击的风险,特别是在诸如拦截伊拉克和以色列的无人机未加密的视频源,或伊朗的无人机被转移和击落等引人注目的事件之后。军事无人机资产的保护正确地侧重于防御复杂的网络渗透或电子攻击,包括数据链路拦截和导航欺骗。对抗敌方无人机作战的进攻性活动假定需要高端电子攻击系统。但是,2014-16年度乌克兰东部的作战行动为无人机和反无人机行动引入了全新的面貌。除了具有军用级电子防御和加密标准的无人机外,大量民用或业余UAV还在作战中。这为对抗混合威胁的未来行动带来了机遇和挑战。乌克兰东部的实际行动,结合对无人机技术的潜在犯罪或恐怖使用的研究,为未来冲突中无人机使用的各个方面提供了指标。然而,除了直接与军事用途联系之外,无人机正在迅速普及,其广泛应用范围从娱乐目的到边境巡逻,监视和研究,这构成了间接的安全和安全威胁。公众不加保护地使用无人机所涉及的问题,范围很广,从潜在的高度危险的情况(如无法避开受控空域)到侵犯隐私。具体问题包括将无人机活动归因于实际指导无人机的人员;防止黑客入侵,拦截或电子攻击的技术对策;以及用于控制和指挥敌对无人机的选项。缺乏归因和安全措施来保护民用无人机免受电子攻击,黑客攻击或劫持,从而可能导致未经授权的使用或拦截,这极大地增加了这些问题的复杂性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号