• Title/Summary/Keyword: 정찰드론

Search Result 49, Processing Time 0.03 seconds

Hijacking Attack using Wireless Network Security Vulnerability in Drone and Its Countermeasure (드론의 무선 네트워크 보안 취약점을 이용한 탈취 및 대응)

  • Son, Juhwan;Sim, Jaebum;Lee, Jae-Gu;Cheong, Il-Ahn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.327-330
    • /
    • 2017
  • In recent years, Drone(lightweight unmanned aerial vehicle) is used for broadcast shooting, disaster scene, leisure, observation and military purposes. However, as the use of drones increases the threat of hacking is also rising. Especially when a flying drone is seized, a dangerous situation can occur which is abused regardless of the driver's intention. Already in Iran and China, there is a case of hacking and stealing the drones of other countries under reconnaissance. In this paper, we analyze the security vulnerabilities of Wi-Fi and Bluetooth communication in wireless network which are used in drones for stealing the commercial drones. The results provide a countermeasure to safeguard the drones against attempts by the unauthorized attacker to take out the drones.

  • PDF

A Study on Realtime Drone Object Detection Using On-board Deep Learning (온-보드에서의 딥러닝을 활용한 드론의 실시간 객체 인식 연구)

  • Lee, Jang-Woo;Kim, Joo-Young;Kim, Jae-Kyung;Kwon, Cheol-Hee
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.10
    • /
    • pp.883-892
    • /
    • 2021
  • This paper provides a process for developing deep learning-based aerial object detection models that can run in realtime on onboard. To improve object detection performance, we pre-process and augment the training data in the training stage. In addition, we perform transfer learning and apply a weighted cross-entropy method to reduce the variations of detection performance for each class. To improve the inference speed, we have generated inference acceleration engines with quantization. Then, we analyze the real-time performance and detection performance on custom aerial image dataset to verify generalization.

Interoperability Design and Verification of Small Drone System Applying STANAG 4586 (STANAG 4586을 적용한 소형드론시스템의 상호운용성 설계 및 검증)

  • Jonghun, Lee;Taesan, Park;Kilyoung, Seong;Gyeongrae, Nam;Jungho, Moon
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.6
    • /
    • pp.74-80
    • /
    • 2022
  • The utilisation of small drones is becoming increasingly widespread particularly in the military sector. In this study, STANAG 4586, a standard interface for military unmanned aerial vehicles, was applied to a multicopter-type small drone to examine the suitability of the military system. To accomplish this, a small multi-copter vehicle was designed and manufactured, integrating a flight control computer, ground control system, and data link. Furthermore, flight control and ground control equipment software were developed by applying the STANAG 4586 interface, followed by HILS and flight tests.

A study on security threats to drones using open source and military drone attack scenarios using telemetry hijacking (오픈소스 활용 드론에 대한 보안 위협과 Telemetry Hijacking을 이용한 군용 드론 공격 시나리오 연구)

  • Lee, Woojin;Seo, Kyungdeok;Chae, Byeongmin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.103-112
    • /
    • 2020
  • Recently, the interest in hobby/leisure drones is increasing in the private sector, and the military also uses drones in various countries such as North Korea, the United States, and Iran for military purposes such as reconnaissance and destruction. A variety of drone related research is underway, such as establishing and operating drone units within the Korean military. Inparticular, recently, as the size of drone flight control source code increases and the number of functions increases, drone developers are getting accustomed to using open sources and using them without checking for separate security vulnerabilities. However, since these open sources are actually accessible to attackers, they are inevitably exposed to various vulnerabilities. In this paper, we propose an attack scenario for military drones using open sources in connection with these vulnerabilities using Telemetry Hijacking techniques.

Development of Autonomous Behavior Software based on BDI Architecture for UAV Autonomous Mission (무인기 자율임무를 위한 BDI 아키텍처 기반 자율행동 소프트웨어 개발)

  • Yang, Seung-Gu;Uhm, Taewon;Kim, Gyeong-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.312-318
    • /
    • 2022
  • Currently, the Republic of Korea is facing the problem of a decrease in military service resources due to the demographic cliff, and is pursuing military restructuring and changes in the military force structure in order to respond to this. In this situation, the Army is pushing forward the deployment of a drone-bot combat system that will lead the future battlefield. The battlefield of the future will be changed into an integrated battlefield concept that combines command and control, surveillance and reconnaissance, and precision strike. According to these changes, unmanned combat system, including dronebots, will be widely applied to combat situations that are high risk and difficult for humans to perform in actual combat. In this paper, as one of the countermeasures to these changes, autonomous behavior software with a BDI architecture-based decision-making system was developed. The autonomous behavior software applied a framework structure to improve applicability to multiple models. Its function was verified in a PC-based environment by assuming that the target UAV is a battalion-level surveillance and reconnaissance UAV.

Performance Comparison among MANET Routing Protocols of Drone Patrol Network for Traffic Violation Enforcement on a Highway (고속도로 상의 교통위반 단속을 위한 드론 패트롤 네트워크의 MANET 라우팅 프로토콜 성능비교)

  • Jo, Jun-Mo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.1
    • /
    • pp.107-112
    • /
    • 2018
  • Recently, there are many real life applications that uses drones. There are various applications such as the aerial shot with the drones for the broadcasting service or drone racing competition and so on. Specifically, they patrol for the traffic enforcement on a highway. The police department use the 'Spot Mobility' method which float the drones for 30 minute period. However, this method is inefficient for the wide area with small numbers of enforcement. Therefore, a wireless network system consists of drones to patrol on the highway systematically is required. In this paper, the most efficient routing protocol will be selected for the MANET drone network by applying various routing protocols. To accomplish this, the drone patrol network system with routing protocols are designed and simulated in OPNET simulator.

A Study on the Generation and Transmission of Drone Jamming Signals Based on the MAVLink Protocol (MAVLink 프로토콜 기반 드론 교란 신호 생성 및 송출에 관한 연구)

  • Woojin Lee;Changhan Lim;Jaeyeon Lee
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.75-84
    • /
    • 2023
  • Recently, as the use of drones for military purposes is increasing, such as the Russia-Ukraine War, North Korea's reconnaissance against South Korea, and Army Tiger 4.0's dronebot system, anti-drone technology is developing a lot in each country. However, traditional anti-drone technologies in the form of using conventional weapons or electronic warfare weapons have the disadvantage of being expensive, so anti-drone technologies that can be performed at low cost are currently being newly researched. Therfore, in response to these anti-drone technologies, many efforts are being made to increase the survivability of our allies. In line with this trend, this study assumes a virtual anti-drone system applied with cyber domain and electronic warfare domain technologies that can be performed at low cost, rather than a technique using expensive conventional weapons or electronic warfare weapons among various anti-drone technologies. In response to this, we would like to present a plan to increase the survivability of friendly drones.

Study on Applicability of Unmanned Aerial Vehicle for Water Disaster Management (수재해 관리를 위한 무인항공기 적용성 검토)

  • Lee, Hyun Seok;Jung, Kwan Sue;Yu, Wan SiK;Kim, Young Kyu
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.249-249
    • /
    • 2016
  • 무인항공기(UAV)는 군사적 목적으로 개발되었지만, 최근 다양한 분야에서 활용되고 있다. 수자원 관리를 위해서도 시대적 흐름에 따라 드론과 관련된 많은 연구가 진행되고 있다. 이수임 등(2015)은 UAV영상을 활용한 수변구조물의 DSM 생성 및 정확도 연구를 통해 지상 LIDAR와 같은 수준의 DSM 및 더욱 정확한 GCP 취득의 필요성을 제시했다. 이용창(2015)은 회전익 UAS 영상기반 고밀도 측점자료의 위치 정확도를 평가하였다. 이인수 등(2013)은 초경량 고정익무인항공기 사진측량기법의 정사영상 정확도 평가를 수행하였다. 또한 김민규 등(2010)은 풍수해 모니터링을 위한 UAV 적용성 분석을 실시하였고, 김홍래 등(2014)은 UAV를 활용한 감시정보정찰 임무분석 및 설계도구 개발을 위한 연구를 수행하였다. 상기와 같이 수자원 분야 활용을 위한 많은 연구가 보고 되고 있으나, 아직까지 드론 활용의 대부분은 항공영상 취득 및 분석기술 개발에 집중되어 있다. 본 연구에서는 무인항공기를 수재해 감시 및 관리 기술에 적용하기 위해 수행되었다. 수재해 감시 및 관리를 위한 방법으로 NIR(Near Infrared) 센서를 부착한 '재해관리용 드론'을 개발하고 현장실험을 수행하였다. 실험결과 NIR센서를 탑재한 드론은 수재해 관리에 매우 유용하게 활용될 수 있을 것으로 판단되었다.

  • PDF

A Study on the Characteristics and Military Applications of Different Types of Unmanned Aerial Vehicles for Military Use (군사용 무인항공기의 유형별 특징과 군사적 활용 방안 연구)

  • Young-Kil Kim;Kyoung-Haing Lee;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.425-430
    • /
    • 2024
  • This paper analyzes the characteristics of various types of unmanned aerial vehicles (drones) for military use and how each type can be utilized in military operations. The scope of the study focuses on the structural features, advantages and disadvantages, and military application cases of fixed-wing, rotary-wing, hybrid, and swarm drones. It also discusses the development direction of drone technology, changes in military strategy, opportunities, and challenges. The results show that each type of drone plays a crucial role in various military operations such as reconnaissance, surveillance, strike, logistics, search, and rescue. With advancements in artificial intelligence, autonomous flight, and swarm technologies, the range of drone applications is expected to expand further. However, ensuring the safety and ethics of drone operations and establishing international norms have emerged as major challenges.

Performance Comparison of CNN-Based Image Classification Models for Drone Identification System (드론 식별 시스템을 위한 합성곱 신경망 기반 이미지 분류 모델 성능 비교)

  • YeongWan Kim;DaeKyun Cho;GunWoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.639-644
    • /
    • 2024
  • Recent developments in the use of drones on battlefields, extending beyond reconnaissance to firepower support, have greatly increased the importance of technologies for early automatic drone identification. In this study, to identify an effective image classification model that can distinguish drones from other aerial targets of similar size and appearance, such as birds and balloons, we utilized a dataset of 3,600 images collected from the internet. We adopted a transfer learning approach that combines the feature extraction capabilities of three pre-trained convolutional neural network models (VGG16, ResNet50, InceptionV3) with an additional classifier. Specifically, we conducted a comparative analysis of the performance of these three pre-trained models to determine the most effective one. The results showed that the InceptionV3 model achieved the highest accuracy at 99.66%. This research represents a new endeavor in utilizing existing convolutional neural network models and transfer learning for drone identification, which is expected to make a significant contribution to the advancement of drone identification technologies.