Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities

被引:58
|
作者
Solodov, Alexander [1 ,2 ]
Williams, Adam [3 ]
Al Hanaei, Sara [1 ]
Goddard, Braden [4 ]
机构
[1] Khalifa Univ, Dept Nucl Engn, Abu Dhabi, U Arab Emirates
[2] Gulf Nucl Energy Infrastruct Inst GNEII, Abu Dhabi, U Arab Emirates
[3] Sandia Natl Labs, POB 5800, Albuquerque, NM 87185 USA
[4] Virginia Commonwealth Univ, Dept Mech & Nucl Engn, Richmond, VA USA
关键词
unmanned aerial vehicles; drones; nuclear security; threat; SECURITY;
D O I
10.1057/s41284-017-0102-5
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Unmanned aerial vehicles (UAV) are among the major growing technologies that have many beneficial applications, yet they can also pose a significant threat. Recently, several incidents occurred with UAVs violating privacy of the public and security of sensitive facilities, including several nuclear power plants in France. The threat of UAVs to the security of nuclear facilities is of great importance and is the focus of this work. This paper presents an overview of UAV technology and classification, as well as its applications and potential threats. We show several examples of recent security incidents involving UAVs in France, USA, and United Arab Emirates. Further, the potential threats to nuclear facilities and measures to prevent them are evaluated. The importance of measures for detection, delay, and response (neutralization) of UAVs at nuclear facilities are discussed. An overview of existing technologies along with their strength and weaknesses are shown. Finally, the results of a gap analysis in existing approaches and technologies is presented in the form of potential technological and procedural areas for research and development. Based on this analysis, directions for future work in the field can be devised and prioritized.
引用
收藏
页码:305 / 324
页数:20
相关论文
共 50 条
  • [1] Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities
    Alexander Solodov
    Adam Williams
    Sara Al Hanaei
    Braden Goddard
    Security Journal, 2018, 31 : 305 - 324
  • [2] A conceptual system architecture for countering the civilian unmanned aerial vehicles threat to nuclear facilities
    Islam, Md Shafiqul
    Ahmed, Md Mobasher
    Islam, Saad
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 23 : 139 - 149
  • [3] Detection of unmanned aerial vehicles (UAV) in urban environments
    Nussler, D.
    Shoykhetbrod, A.
    Guetgemann, S.
    Kueter, A.
    Welp, B.
    Pohl, N.
    Krebs, C.
    EMERGING IMAGING AND SENSING TECHNOLOGIES FOR SECURITY AND DEFENCE III; AND UNMANNED SENSORS, SYSTEMS, AND COUNTERMEASURES, 2018, 10799
  • [4] Cybersecurity in Unmanned Aerial Vehicles: a Review
    Shafik, Wasswa
    Matinkhah, S. Mojtaba
    Shokoor, Fawad
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2023, 16 (01):
  • [5] Radar Antenna Array Designing for Unmanned Aerial Vehicles (UAV)
    Nachev, Ivaylo
    Petkov, Peter Z.
    2020 55TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATION, COMMUNICATION AND ENERGY SYSTEMS AND TECHNOLOGIES (IEEE ICEST 2020), 2020, : 207 - 210
  • [6] UAV-g 2019: Unmanned Aerial Vehicles in Geomatics
    Nex, Francesco
    DRONES, 2019, 3 (03) : 1 - 9
  • [7] Localization of intruder UAV operator using Unmanned Aerial Vehicles
    Magdalenic, Ivan
    Popovic, Elvis
    Tomas, Boris
    Vrcek, Neven
    Posaric, Lovro
    CENTRAL EUROPEAN CONFERENCE ON INFORMATION AND INTELLIGENT SYSTEMS, CECIIS, 2023, : 377 - 381
  • [8] A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles
    Ficco, Massimo
    Granata, Daniele
    Palmieri, Francesco
    Rak, Massimiliano
    INTERNET OF THINGS, 2024, 26
  • [9] Civilian uses of unmanned aerial vehicles and the threat to the right to privacy - An Israeli case study
    Volovelsky, Uri
    COMPUTER LAW & SECURITY REVIEW, 2014, 30 (03) : 306 - 320
  • [10] ARID: Anonymous Remote IDentification of Unmanned Aerial Vehicles
    Tedeschi, Pietro
    Sciancalepore, Savio
    Di Pietro, Roberto
    37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, : 207 - 218