Skip to main content
Log in

MT-AAAU: Design of Monitoring and Tracking for Anti-Abuse of Amateur UAV

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Due to the constant development and maturity of unmanned aerial vehicles (UAVs), the application of UAVs expands to more and more fields. In the meantime, the corresponding security risks, especially the potential security risks related to lower airspace, are brought by UAV. Therefore, the detecting, tracking, disturbing and capturing of amateur UAV (A-UAV) in specific airspace with strict security requirements (e.g., no-fly zone) are of urgent practical significance. In this paper, a monitoring of UAV (M-UAV) is proposed for that purpose. Moreover, the relevant design issues of A-UAV monitoring are discussed, the potential solutions are given, and finally, the feasible communication architectures adopted in cooperative work of multiple monitoring UAVs (MM-UAVs) for Anti-Abuse of Amateur UAV (AAAU) in no-fly zone are summarized. This paper has a significant reference value for design and realization of A-UAV monitoring systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Kaleem Z, Chang K (2016) Public safety priority-based user association for load balancing and interference reduction in ps-lte systems. IEEE Access 4:9775–9785

    Article  Google Scholar 

  2. Du M, Wang K, Liu X, Guo S, Zhang Y (2017) A differential privacy-based query model for sustainable fog data centers. IEEE Trans Sustainable Comput PP(99):1–1

    Google Scholar 

  3. Hou X, Li Y, Chen M, Wu D, Jin D, Chen. S (2016) Vehicular fog computing: A viewpoint of vehicles as the infrastructures. IEEE Trans Veh Technol 65(6):3860–3873

    Article  Google Scholar 

  4. Du M, Wang K, Liu X, Guo S, Zhang Y (2017) A differential privacy-based query model for sustainable fog data centers. IEEE Trans Sustainable Comput PP(99):1–1

    Google Scholar 

  5. Kihara K, Lu H, Yang S, Serikawa S (2017) Development of the system detecting for motor abnormalities of drone using temperature sensor. In: International conference on industrial application engineering, pp 284–288

  6. Lu H, Li Y, Mu S, Wang D, Kim H, Serikawa S (2017) Motor anomaly detection for unmanned aerial vehicles using reinforcement learning. IEEE Internet Things J PP(99):1–1

    Article  Google Scholar 

  7. Tadoh R, Lu H, Yang S, Serikawa S (2017) Development of the drone with the function of flight and vehicle to save power consumption. In: International conference on industrial application engineering, pp 289–292

  8. Chen M, Yang LT, Kwon T, Zhou L, Jo M (2011) Itinerary planning for energy-efficient agent communications in wireless sensor networks. IEEE Trans Veh Technol 60(7):3290–3299

    Article  Google Scholar 

  9. Xu F, Tu Z, Li Y, Zhang P, Fu X, Jin D (2017) Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data. In: International conference on World Wide Web, pp 1241–1250

  10. Khan A, Rinner B, Cavallaro A (2015) Multiscale observation of multiple moving targets using micro aerial vehicles. In: 2015 IEEE/RSJ international conference on intelligent robots and systems (IROS), pp 4642–4649

  11. Zhang Y, Chen M, Guizani N, Wu D, Leung VCM (2017) Sovcan: Safety-oriented vehicular controller area network. IEEE Commun Mag 55(8):94–99

    Article  Google Scholar 

  12. Chen M, Hao Y, Hwang K, Wang L, Wang L (2017) Disease prediction by machine learning over big data from healthcare communities. IEEE Access 5:8869–8879

    Article  Google Scholar 

  13. Chen M, Zhou P, Fortino G (2017) Emotion communication system. IEEE Access 5:326–337

    Article  Google Scholar 

  14. Papatheodorou S, Tzes A, Stergiopoulos Y (2016) Collaborative visual area coverage. arXiv:1612.02067

  15. Hönig W, Ayanian N (2016) Dynamic multi-target coverage with robotic cameras. In: 2016 IEEE/RSJ international conference on intelligent robots and systems (IROS), pp 1871–1878

  16. Xu F, Li Y, Wang H, Zhang P, Jin D (2017) Understanding mobile traffic patterns of large scale cellular towers in urban environment. IEEE/ACM Trans Netw 25(2):1147–1161

    Article  Google Scholar 

  17. Kang J, Yu R, Huang X, Jonsson M, Bogucka H, Gjessing S, Zhang Y (2016) Location privacy attacks and defenses in cloud-enabled internet of vehicles. IEEE Wirel Commun 23(5):52–59

    Article  Google Scholar 

  18. Exo360 drone. https://www.indiegogo.com/projects/exo360-drone-aerial-360-video-made-simple-camera-vr

  19. Yu R, Kang J, Huang X, Xie S, Zhang Y, Gjessing S (2016) Mixgroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks. IEEE Trans Dependable Secure Comput 13(1):93–105

    Article  Google Scholar 

  20. Saleem Y, Rehmani MH, Zeadally S (2015) Integration of cognitive radio technology with unmanned aerial vehicles: issues, opportunities, and future research challenges. J Netw Comput Appl 50:15–31

    Article  Google Scholar 

  21. Chen M, Ma Y, Li Y, Wu D, Zhang Y, Youn CH (2017) Wearable 2.0: Enabling Human-cloud integration in next generation healthcare systems. IEEE Commun Mag 55(1):54–61

    Article  Google Scholar 

  22. Zeng Y, Zhang R, Lim TJ (2016) Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun Mag 54(5):36–42

    Article  Google Scholar 

  23. Aerospace forecasts 2016-2036. https://www.faa.gov

  24. Sahingoz OK (2014) Networking models in flying ad-hoc networks (fanets): Concepts and challenges. J Intell Robot Syst 74(1-2):513

    Article  Google Scholar 

  25. Li Y, Zheng F, Chen M, Jin D (2015) A unified control and optimization framework for dynamical service chaining in software-defined nfv system. IEEE Wirel Commun 22(6):15–23

    Article  Google Scholar 

  26. Li Y, Chen M (2015) Software-defined network function virtualization: a survey. IEEE Access 3:2542–2553

    Article  Google Scholar 

  27. Chen M, Qian Y, Mao S, Tang W, Yang X (2016) Software-defined mobile networks security. Mobile Netw Appl 21(5):729–743

    Article  Google Scholar 

  28. Chen M, Yang J, Hao Y, Mao S, Hwang K (2017) A 5g cognitive system for healthcare. Big Data Cognit Comput 1(1):1–15

    Article  Google Scholar 

Download references

Acknowledgment

The authors would like to extend their sincere appreciation to the Deanship of Scientific Research at King Saud University, Riyadh, Saudi Arabia for funding this research group No. (RG-1437-042).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to M. Shamim Hossain or Jun Yang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hossain, M.S., Yang, J., Lu, J. et al. MT-AAAU: Design of Monitoring and Tracking for Anti-Abuse of Amateur UAV. Mobile Netw Appl 23, 328–335 (2018). https://doi.org/10.1007/s11036-017-0936-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-017-0936-4

Keywords

Navigation