Modeling and Simulation of Sensor Placement Strategies to Detect Malicious UAS Operations
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F24727679%3A_____%2F20%3AN0000005" target="_blank" >RIV/24727679:_____/20:N0000005 - isvavai.cz</a>
Result on the web
—
DOI - Digital Object Identifier
—
Alternative languages
Result language
angličtina
Original language name
Modeling and Simulation of Sensor Placement Strategies to Detect Malicious UAS Operations
Original language description
In this paper, we introduce a software framework for modeling and simulation of sensor placement strategies to detect malicious unmanned aerial systems operations. Three basic components are modeled – environment, detection sensors, and UAS. The environment is represented in the form of a 3D model defined by a polygonal mesh with material values assigned. Four types of sensors are modeled – camera, acoustic sensor, radar, and remote control radio signal detector. A two-phase iterative algorithm for sensor placement and its evaluation via simulation of UAS operations is introduced. We provide a taxonomy of malicious UAS operations based on data from various databases of incidents and attacks. Using this taxonomy, typical representatives of malicious UAS operations are generated for particular critical infrastructures. Features of the proposed framework were verified in scenarios with three typical representatives of critical infrastructures – airport, prison, and industrial complex. The results of these experiments are discussed, and general recommendations are provided.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
—
OECD FORD branch
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Result continuities
Project
<a href="/en/project/TL01000322" target="_blank" >TL01000322: Evolution of unmanned technologies and their societal perception: analysis of opportunities and minimization of risks</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2020
Confidentiality
C - Předmět řešení projektu podléhá obchodnímu tajemství (§ 504 Občanského zákoníku), ale název projektu, cíle projektu a u ukončeného nebo zastaveného projektu zhodnocení výsledku řešení projektu (údaje P03, P04, P15, P19, P29, PN8) dodané do CEP, jsou upraveny tak, aby byly zveřejnitelné.
Data specific for result type
Article name in the collection
2020 Integrated Communications Navigation and Surveillance Conference (ICNS)
ISBN
978-1-7281-7270-5
ISSN
—
e-ISSN
2155-4951
Number of pages
12
Pages from-to
2G2-1 - 2G2-12
Publisher name
IEEE
Place of publication
—
Event location
Herndon, VA, USA
Event date
Sep 8, 2020
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
—