Intelligent UAV Identity Authentication and Safety Supervision Based on Behavior Modeling and Prediction

被引:30
作者
Jiang, Changjun [1 ]
Fang, Yu [1 ]
Zhao, Peihai [2 ]
Panneerselvam, John [3 ]
机构
[1] Tongji Univ, Dept Comp Sci & Technol, Shanghai 201804, Peoples R China
[2] Donghua Univ, Sch Comp Sci & Technol, Shanghai 201620, Peoples R China
[3] Univ Derby, Dept Elect Comp & Math, Derby DE22 3AW, England
关键词
Trajectory; Unmanned aerial vehicles; Prediction algorithms; Authentication; Real-time systems; Kalman filters; Mathematical model; Behavior authentication; behavior prediction; big data intelligent; intelligent analysis; unmanned aerial vehicle (UAV);
D O I
10.1109/TII.2020.2966758
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since unmanned aerial vehicles (UAVs) can be controlled remotely in the absence of a unified means of identity authentication, they are quite vulnerable for illegal control by unidentifiable users. Only by tracing the identity of UAV itself, or providing management to pilots, current UAV identity authentication mechanism is far from achieving "single machine for single person." With the development of artificial intelligence, it is possible to achieve automatic UAV identification. Therefore, this article proposes a behavior-based intelligent UAV identification and security supervision. Based on location tracking and flying data acquisition provided by the airborne black box, the UAV's behavioral data are collected on real time. Then, a reliable identification of UAVs is completed through the behavioral modeling, and a warning is issued in the potential illegal cases. It provides the government with intelligent control and disposal decision basis for flying UAVs.
引用
收藏
页码:6652 / 6662
页数:11
相关论文
共 25 条
[1]   Aircraft Trajectory Prediction Made Easy with Predictive Analytics [J].
Ayhan, Samet ;
Samet, Hanan .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :21-30
[2]   A Survey on Trajectory Data Mining: Techniques and Applications [J].
Feng, Zhenni ;
Zhu, Yanmin .
IEEE ACCESS, 2016, 4 :2056-2067
[3]   Learning Time-Series Shapelets [J].
Grabocka, Josif ;
Schilling, Nicolas ;
Wistuba, Martin ;
Schmidt-Thieme, Lars .
PROCEEDINGS OF THE 20TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'14), 2014, :392-401
[4]   A Structured Sparse Subspace Learning Algorithm for Anomaly Detection in UAV Flight Data [J].
He, Yongfu ;
Peng, Yu ;
Wang, Shaojun ;
Liu, Datong ;
Leong, Philip H. W. .
IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2018, 67 (01) :90-100
[5]   Classification of time series by shapelet transformation [J].
Hills, Jon ;
Lines, Jason ;
Baranauskas, Edgaras ;
Mapp, James ;
Bagnall, Anthony .
DATA MINING AND KNOWLEDGE DISCOVERY, 2014, 28 (04) :851-881
[6]   Correlation-Averaging Methods and Kalman Filter Based Parameter Identification for a Rotational Inertial Navigation System [J].
Hu, Peida ;
Chen, Bingxu ;
Zhang, Chenxi ;
Wu, Qiuping .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (03) :1321-1328
[7]  
Jiang C. J., 2001, SCI CHINA SER F, V44, P226
[8]   Credit Card Fraud Detection: A Novel Approach Using Aggregation Strategy and Feedback Mechanism [J].
Jiang, Changjun ;
Song, Jiahui ;
Liu, Guanjun ;
Zheng, Lutao ;
Luan, Wenjing .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (05) :3637-3647
[9]   An Indexing Network: Model and Applications [J].
Jiang, Changjun ;
Sun, Haichun ;
Ding, Zhijun ;
Wang, Pengwei ;
Zhou, MengChu .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2014, 44 (12) :1633-1648
[10]   Dynamic invariance of Petri net [J].
Jiang, CJ .
SCIENCE IN CHINA SERIES E-TECHNOLOGICAL SCIENCES, 1997, 40 (06) :605-611