THEORETICAL ANALYSIS OF THE LEVEL OF COMMUNICATION SECURITY OF UAVS OPERATING AS PART OF A GROUP PERFORMING A COMBAT MISSION
DOI:
https://doi.org/10.26906/SUNZ.2023.2.031Keywords:
unmanned aerial vehicle, group of unmanned aerial vehicles, artificial intelligence, information security, data transmissionAbstract
The research relevance lies in the issue of information impact on the AI of the drone and its vulnerability in order to perform sabotage actions by the enemy in local military conflicts. The article provides a theoretical analysis of the security of the information transmitted to a group of drones in order to establish the susceptibility of drones to false data and further organizational actions that can prevent the sabotage actions committed by the enemy and his allies, as well as analyzes situations when an aircraft is misinformed, which in turn entails the failure of the task by the entire group of drones. The subject and the purpose of the research is to establish the existence of the fact of misinformation by the enemy of the UAV, controlled remotely and performing a combat mission as part of a group without the direct participation of the operator. In the process of modeling the situation, theoretical analyzes of the behavior of the UAV were carried out, since the artificial intelligence in one aircraft is only able to influence its behavior and is not able, under false information impact, to establish the fact of false interference by the enemy in another drone in-group in the course of combat operations and warn other elements of the system in its group. Research methods are theoretical analyses of the communicative interaction of a swarm of drones based on the study of the research of algorithms of operator control. Obtained results and conclusion: encrypted false information transmitted with the aim of disorienting the UAV cannot be detected in advance by the classical approach to preventing cyber-attacks. In this regard, the problem of information security of drone AI remains relevant and requires further comprehensive theoretical and practical research with the involvement of IT specialists, linguists, engineers, and military experts.Downloads
References
Kirichenko V.V. Information security of communication channels with UAV electronics and control systems. 2015. H.3. P.23-27. Doi: 10.18372, 1990, 5548.45.9892.
Hooper M, Tian Y, Zhou R, et al. Securing commercial WiFi-UAVs from common secure attacks Proc. IEEE International Communications Conference. 2016. P.1213-1218, id: 10. 1109 MILCOM. 2 Kirichenko V.V. Information security of communication channels with UAV electronics and control systems. 2015. H.3. P.23-27. doi: 10.18372, 1990, 5548.45.9892.
Bayramov, A.A., Hashimov, E.G. Application SMART for small Unmanned Aircraft System of Systems. Chapter // Handbook of Research on Artificial Intelligence Applications in the Aviation and Aerospace Industries. IGI Global, PA, USA, 2019. Eds. T. Shmelova, Y.Sikirda, A.Sterenharz, 390 p. Chapter 8. Application SMART for Small Unmanned Aircraft System of Systems. pp.193-213.
Rivera E., Baikov R., Gu G. Analysis of randomness and cybersecurity. Texas, United States, 2014.
Chung T. H., Jones K. D., M. A. Day, M. M. Day, M. M. Day 50 in 2015: Swarm vs. Team UAV Live-Fly Contest at the postgraduate school on the Volga. AUWSI, 2013, p. 1792-1811.
Hashimov, E.G., Khudeynatov E.K. Evaluation of the effectiveness of the application of UAV systems in modern wars // - Baku: Military knowledge, - 2022. No. 1 (January-March), - p. 11-17.Javaid A.Y. Cyber security analytics and testing of an attack on an unauthorized aerial machine. PhD dissertation. University of Togliatti, 2015.016. 7895496.
Zikratov I.A., Zikratova T.V., Lebedev I.S., Gurtov A.V. Model of trust and reputation for objects of multi-agent robotic systems with decentralized control. Scientific and Technical Journal of Information Technology, Mechanics and Optics, 2014, no. 3.pp. 30-38.
Yakimenko O. A., Chung T. H. Using autonomous capabilities for systems with CORRUSER. Prospectus of the 28th Meeting of the International Union of Aeronautical Physics, ICAS 2012, 2012, p. 47–49.
Vatkin L., Li Kirichenko V.V.Information security of communication channels with UAV electronics and control systems. 2015. H.3. P.23-27. doi: 10.18372, 1990, 5548.45.9892.
Yang J. H., Kapolka M., Chung T. H. Autonomy in combat with the MUT command during a joint assault. Scientific and technical technologies and applications for robots, 2012, p. 561-5569. doi: 10" 1007 978-3642-3737-4-9 54".
Sidorov V., N. V. K., Lam K. I., Salle M. F. B. M. Cyberthreat analysis of UAV transport management for the city airport of the International Conference on Air Transportation. 2017.