Unauthorized Drone Detection: Experiments and Prototypes

Muhammad Asif Khan*, Hamid Menouar*, Osama Muhammad Khalid*, Adnan Abu-Dayya*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Citations (Scopus)

Abstract

The increase in the number of unmanned aerial vehicles a.k.a. drones pose several threats to public privacy, critical infrastructure and cyber security. Hence, detecting unauthorized drones is a significant problem which received attention in the last few years. In this paper, we present our experimental work on three drone detection methods (i.e., acoustic detection, radio frequency (RF) detection, and visual detection) to evaluate their efficacy in both indoor and outdoor environments. Owing to the limitations of these schemes, we present a novel encryption-based drone detection scheme that uses a two-stage verification of the drone's received signal strength indicator (RSSI) and the encryption key generated from the drone's position coordinates to reliably detect an unauthorized drone in the presence of authorized drones.

Original languageEnglish
Title of host publication2022 IEEE International Conference on Industrial Technology, ICIT 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728119489
DOIs
Publication statusPublished - 25 Aug 2022
Externally publishedYes
Event2022 IEEE International Conference on Industrial Technology, ICIT 2022 - Shanghai, China
Duration: 22 Aug 202225 Aug 2022

Publication series

NameProceedings of the IEEE International Conference on Industrial Technology
Volume2022-August

Conference

Conference2022 IEEE International Conference on Industrial Technology, ICIT 2022
Country/TerritoryChina
CityShanghai
Period22/08/2225/08/22

Keywords

  • Acoustic
  • drone detection
  • radar
  • radio frequency
  • visual

Fingerprint

Dive into the research topics of 'Unauthorized Drone Detection: Experiments and Prototypes'. Together they form a unique fingerprint.

Cite this