Abstract
Due to the constant development and maturity of unmanned aerial vehicles (UAVs), the application of UAVs expands to more and more fields. In the meantime, the corresponding security risks, especially the potential security risks related to lower airspace, are brought by UAV. Therefore, the detecting, tracking, disturbing and capturing of amateur UAV (A-UAV) in specific airspace with strict security requirements (e.g., no-fly zone) are of urgent practical significance. In this paper, a monitoring of UAV (M-UAV) is proposed for that purpose. Moreover, the relevant design issues of A-UAV monitoring are discussed, the potential solutions are given, and finally, the feasible communication architectures adopted in cooperative work of multiple monitoring UAVs (MM-UAVs) for Anti-Abuse of Amateur UAV (AAAU) in no-fly zone are summarized. This paper has a significant reference value for design and realization of A-UAV monitoring systems.
Similar content being viewed by others
References
Kaleem Z, Chang K (2016) Public safety priority-based user association for load balancing and interference reduction in ps-lte systems. IEEE Access 4:9775–9785
Du M, Wang K, Liu X, Guo S, Zhang Y (2017) A differential privacy-based query model for sustainable fog data centers. IEEE Trans Sustainable Comput PP(99):1–1
Hou X, Li Y, Chen M, Wu D, Jin D, Chen. S (2016) Vehicular fog computing: A viewpoint of vehicles as the infrastructures. IEEE Trans Veh Technol 65(6):3860–3873
Du M, Wang K, Liu X, Guo S, Zhang Y (2017) A differential privacy-based query model for sustainable fog data centers. IEEE Trans Sustainable Comput PP(99):1–1
Kihara K, Lu H, Yang S, Serikawa S (2017) Development of the system detecting for motor abnormalities of drone using temperature sensor. In: International conference on industrial application engineering, pp 284–288
Lu H, Li Y, Mu S, Wang D, Kim H, Serikawa S (2017) Motor anomaly detection for unmanned aerial vehicles using reinforcement learning. IEEE Internet Things J PP(99):1–1
Tadoh R, Lu H, Yang S, Serikawa S (2017) Development of the drone with the function of flight and vehicle to save power consumption. In: International conference on industrial application engineering, pp 289–292
Chen M, Yang LT, Kwon T, Zhou L, Jo M (2011) Itinerary planning for energy-efficient agent communications in wireless sensor networks. IEEE Trans Veh Technol 60(7):3290–3299
Xu F, Tu Z, Li Y, Zhang P, Fu X, Jin D (2017) Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data. In: International conference on World Wide Web, pp 1241–1250
Khan A, Rinner B, Cavallaro A (2015) Multiscale observation of multiple moving targets using micro aerial vehicles. In: 2015 IEEE/RSJ international conference on intelligent robots and systems (IROS), pp 4642–4649
Zhang Y, Chen M, Guizani N, Wu D, Leung VCM (2017) Sovcan: Safety-oriented vehicular controller area network. IEEE Commun Mag 55(8):94–99
Chen M, Hao Y, Hwang K, Wang L, Wang L (2017) Disease prediction by machine learning over big data from healthcare communities. IEEE Access 5:8869–8879
Chen M, Zhou P, Fortino G (2017) Emotion communication system. IEEE Access 5:326–337
Papatheodorou S, Tzes A, Stergiopoulos Y (2016) Collaborative visual area coverage. arXiv:1612.02067
Hönig W, Ayanian N (2016) Dynamic multi-target coverage with robotic cameras. In: 2016 IEEE/RSJ international conference on intelligent robots and systems (IROS), pp 1871–1878
Xu F, Li Y, Wang H, Zhang P, Jin D (2017) Understanding mobile traffic patterns of large scale cellular towers in urban environment. IEEE/ACM Trans Netw 25(2):1147–1161
Kang J, Yu R, Huang X, Jonsson M, Bogucka H, Gjessing S, Zhang Y (2016) Location privacy attacks and defenses in cloud-enabled internet of vehicles. IEEE Wirel Commun 23(5):52–59
Exo360 drone. https://www.indiegogo.com/projects/exo360-drone-aerial-360-video-made-simple-camera-vr
Yu R, Kang J, Huang X, Xie S, Zhang Y, Gjessing S (2016) Mixgroup: Accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks. IEEE Trans Dependable Secure Comput 13(1):93–105
Saleem Y, Rehmani MH, Zeadally S (2015) Integration of cognitive radio technology with unmanned aerial vehicles: issues, opportunities, and future research challenges. J Netw Comput Appl 50:15–31
Chen M, Ma Y, Li Y, Wu D, Zhang Y, Youn CH (2017) Wearable 2.0: Enabling Human-cloud integration in next generation healthcare systems. IEEE Commun Mag 55(1):54–61
Zeng Y, Zhang R, Lim TJ (2016) Wireless communications with unmanned aerial vehicles: opportunities and challenges. IEEE Commun Mag 54(5):36–42
Aerospace forecasts 2016-2036. https://www.faa.gov
Sahingoz OK (2014) Networking models in flying ad-hoc networks (fanets): Concepts and challenges. J Intell Robot Syst 74(1-2):513
Li Y, Zheng F, Chen M, Jin D (2015) A unified control and optimization framework for dynamical service chaining in software-defined nfv system. IEEE Wirel Commun 22(6):15–23
Li Y, Chen M (2015) Software-defined network function virtualization: a survey. IEEE Access 3:2542–2553
Chen M, Qian Y, Mao S, Tang W, Yang X (2016) Software-defined mobile networks security. Mobile Netw Appl 21(5):729–743
Chen M, Yang J, Hao Y, Mao S, Hwang K (2017) A 5g cognitive system for healthcare. Big Data Cognit Comput 1(1):1–15
Acknowledgment
The authors would like to extend their sincere appreciation to the Deanship of Scientific Research at King Saud University, Riyadh, Saudi Arabia for funding this research group No. (RG-1437-042).
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Hossain, M.S., Yang, J., Lu, J. et al. MT-AAAU: Design of Monitoring and Tracking for Anti-Abuse of Amateur UAV. Mobile Netw Appl 23, 328–335 (2018). https://doi.org/10.1007/s11036-017-0936-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-017-0936-4