Science, Technologies, Innovations №3(31) 2024, 107-114 р

http://doi.org/10.35668/2520-6524-2024-3-12

Diviziniuk M. M. — D. Sc. in Physics and Mathematics, Professor, Chief Research Associate, Center for Information-analytical and Technical Support of Nuclear Power Facilities Monitoring of the National Academy of Sciences of Ukraine, 34A, Academician Palladin Ave, Kyiv, Ukraine, 03142; divizinyuk@ukr.net; ORCID: 0000-0002-5657-2302

Farrakhov O. V. — PhD in Engineering, Leading Researcher, Center for Information-analytical and Technical Support of Nuclear Power Facilities Monitoring of the National Academy of Sciences of Ukraine, 34A, Academician Palladin Ave, Kyiv, Ukraine, 03142; farrakhov@ukr.net; ORCID: 0000-0003-4988-126X

Martseva L. A. — D. Sc. in Pedagogy, assistant professor, Zhytomyr Polytechnic State University, 103, Chudnivsyka Str., Zhytomyr, Ukraine, 10005; l.a.martseva@gmail.com; ORCID: 0000-0001-5037-6565

Kotsiubynskyi A. O. — PhD in Physics and Mathematics, Assistant Professor, Ivano-Frankivsk National Technical University of Oil and Gas, 15, Karpatska Str., Ivano-Frankivsk, Ukraine, 76019; Radijrlife@gmail.com; ORCID: 0000-0003-1135-3568

Vlasenko O. V. — Senior Lecturer at the Department of Software Engineering, Zhytomyr Polytechnic State University, 103, Chudnivsyka Str., Zhytomyr, Ukraine, 10005; oleh.vls@gmail.com; ORCID: 0000-0001-6697-2150

ANALYSIS OF SCENARIOS OF THE USE OF UNMANNED AIRCRAFT AGAINST CRITICAL INFRASTRUCTURE OBJECTS

Abstract. The purpose of the work is to analyze the use of unmanned aerial vehicles in ensuring the safety of critical infrastructure facilities. To achieve the goal, the following tasks were solved. First, the problem was considered and the research task was set. It is shown that unmanned aerial vehicles pose a significant danger to critical state infrastructure facilities. At the next stage, typical objects of the state’s critical infrastructure are described and a typical nuclear power plant is taken as an example. It is shown that unmanned aerial vehicles have a wide range of typification both by design features and by classification features. The analysis was carried out and possible ways of using unmanned aerial vehicles against the object of critical infrastructure were presented. It is shown that small and medium-sized unmanned aerial vehicles can be used by criminals as both reconnaissance and local strike means of damaging the infrastructure of a critical infrastructure object. Large unmanned aerial vehicles can be used as unguided means of destruction and as means of supporting the actions of sabotage groups. Recommendations are provided for the protection of critical infrastructure objects from the action of unmanned aerial vehicles of various classifications, namely the use of electronic warfare systems, radar systems, thermal imaging systems, sound detection systems of unmanned aerial vehicles and the use of large-caliber cannon-machine gun stationary and mobile anti-aircraft systems for their neutralization , portable and stationary anti-aircraft missile systems and systems for interception of unmanned aerial vehicles using a directed electromagnetic signal.

Keywords: critical infrastructure facility, unmanned aerial vehicles, national security.

REFERENCES

  1. Pro krytychnu infrastrukturu: Zakon Ukrainy vid 16 lystopada 2021 r. № 1882-IX [About critical infrastructure. Law of Ukraine on November 16, 2021 No. 1882-IX]. Retrieved from: https://zakon.rada.gov.ua/laws/show/en/1882-20?lang=uk#Text [in Ukr.].
  2. Martin, W. (2024). Nuclear power. Encyclopedia Britannica. Retrieved from: https://www.britannica.com/technology/nuclear-power.
  3. Khalife, J., & Kassas, Z. M. (2022). On the achievability of submeter-accurate UAV navigation with cellular signals exploiting loose network synchronization. IEEE Trans. Aerosp. Electron. Syst. 58, 4261–4278. DOI: http://doi.org/10.1109/TAES.2022.3162770.
  4. Liu, W., Zhang, T., Huang, S., & Li, K. (2022). A hybrid optimization framework for UAV reconnaissance mission planning. Comput. Ind. Eng. 173, 108653. DOI: http://dx.doi.org/10.1016/j.cie.2022.108653.
  5. Puente-Castro, A., Rivero, D., & Pazos, A. (2022). Fernandez-Blanco, E. A review of artificial intelligence applied to path planning in UAV swarms. Neural Comput & Applic. 34, 153–170. DOI: http://dx.doi.org/10.1007/s00521-021-06569-4.
  6. Mohsan, S. A. H., Othman, N. Q. H., Li, Y., Alsharif, M. H., & Khan, M. A. (2023). Unmanned aerial vehicles (UAVs): Practical aspects, applications, open challenges, security issues, and future trends. Intell. Serv. Robot. 16, 109–137. DOI: http://dx.doi.org/10.1007/s11370-022-00452-4.
  7. Ganti, S. R., & Kim, Y. (2015). Design of low-cost on-board auto-tracking antenna for small UAS. In Proceedings of the 12th International Conference on Information Technology-New Generations, Las Vegas, NV, USA. P. 273–279.
  8. Countering rogue drones. (2018). FICCI Committee on Drones, EY. 32 p.
  9. de Visser, E., Cohen, M. S., LeGoullon, M., Sert, O., Freedy, A., Freedy, E., Weltman, G., & Parasuraman, R. (2008). A Design Methodology for Controlling, Monitoring and Allocating Unmanned Vehicles. Third International Conference on Human Centered Processes (HCP-2008). P. 1–5.
  10. Kratky, M., & Minarik, V. (2017). The non-destructive methods of fight against UAVs. International Conference on Military Technologies (ICMT). IEEE. P. 690–694.
  11. Kim, B. H., Khan, D., Choi, W., & Kim, M. Y. Real-time counter-UAV system for long distance small drones using double pan-tilt scan laser radar. Preceding SPIE11005, Laser Radar Technology and Applications XXIV, 110050C (2 May 2019). DOI: http://doi.org/10.1117/12.2520110.
  12. Gaspar, J., Ferreira, R., Sebastião, P., & Souto, N. (2018). Capture of UAVs Through GPS Spoofing. 2018 Global Wireless Summit (GWS). IEEE. P. 21–26.
  13. Müller, W., Reinert, F., & Pallmer, D. (2018). Open architecture of a counter UAV System. Preceding SPIE 10651, Open Architecture. Open Business Model Net-Centric Systems and Defense Transformation. 1065106. DOI: http://doi.org/1117/12.2305606.
  14. Hartmann, K., & Giles, K. (2016). UAV exploitation: A new domain for cyber power. 8th International Conference on Cyber Conflict (CyCon). IEEE. P. 205–221.
  15. Michalski, D., & Michalska, A. (2017). Protection against drone activity. Security Forum. 1 (1), 73– Retrieved from: https://wsb.edu.pl/files/pages/634/security_forum_01_2017_8druk.pdf.
  16. US GAO (2023). Report to Congressional Committees. Directed Energy Weapons: DOD should focuse on Transition Planning. Retrieved from: https://www.gao.gov/assets/gao-23-105868.pdf.
  17. Vashisht, P. (2021). Modern Counter Drone Systems – A Technology Review. Retrieved from: https://www.mistralsolutions.com/wp-content/uploads/2021/07/Modern-Counter-Drone-Systems.pdf.