A Systems Analysis of Energy Usage and Effectiveness of a Counter-Unmanned Aerial System Using a Cyber-Attack Approach

Existing counter-unmanned aerial system (C-UAS) defensive mechanisms rely heavily on radio frequency (RF) jamming techniques that require a large amount of energy to operate. The effects of RF jamming result in undesirable consequences, such as the jamming of other nearby friendly radio devices as w...

Full description

Bibliographic Details
Main Authors: Chee Hoe Lee, Christian Thiessen, Douglas L. Van Bossuyt, Britta Hale
Format: Article
Language:English
Published: MDPI AG 2022-08-01
Series:Drones
Subjects:
Online Access:https://www.mdpi.com/2504-446X/6/8/198
_version_ 1827600316021866496
author Chee Hoe Lee
Christian Thiessen
Douglas L. Van Bossuyt
Britta Hale
author_facet Chee Hoe Lee
Christian Thiessen
Douglas L. Van Bossuyt
Britta Hale
author_sort Chee Hoe Lee
collection DOAJ
description Existing counter-unmanned aerial system (C-UAS) defensive mechanisms rely heavily on radio frequency (RF) jamming techniques that require a large amount of energy to operate. The effects of RF jamming result in undesirable consequences, such as the jamming of other nearby friendly radio devices as well as the increase in RF footprint for local operators. Current cybersecurity analysis of commercial off-the-shelf (COTS) UASs have revealed multiple vulnerabilities that give rise to opportunities to conduct C-UAS operations in the cyber domain. This is achieved by performing cyber-attacks on adversarial UASs through hijacking the device-specific communication’s link on a narrow RF band and without the need for broad-spectrum RF energy bursts during C-UAS operations, which can result in lower energy usage to accomplish the same outcome. This article validates the cyber-attack C-UAS (CyC-UAS) concept through reviewing recent C-UAS operational experimental scenarios and conducting analysis on the collected data. Then, a simulation model of a defense facility is constructed to analyze and validate specific mission scenarios of interest and several proposed concepts of operation. A comparison of the energy requirements between CyC-UAS and existing C-UAS techniques is performed to assess energy efficiency and trade-offs of different C-UAS approaches. In this article, the comparison of energy requirements between the CyC-UAS prototype and existing C-UAS products that utilize RF jamming methods reveals that CyC-UAS achieves significant energy savings while not affecting other telecommunication devices operating at the same frequencies. While both the C-UAS techniques adopt the denial-of-service strategy, the CyC-UAS is able to achieve the same mission by consuming much less energy. Therefore, the CyC-UAS concept shows promise as a new, lower energy, and lower collateral damage approach to defending against UAS.
first_indexed 2024-03-09T04:33:21Z
format Article
id doaj.art-d6267a0379a64a13bfdc2b309ad5509d
institution Directory Open Access Journal
issn 2504-446X
language English
last_indexed 2024-03-09T04:33:21Z
publishDate 2022-08-01
publisher MDPI AG
record_format Article
series Drones
spelling doaj.art-d6267a0379a64a13bfdc2b309ad5509d2023-12-03T13:33:18ZengMDPI AGDrones2504-446X2022-08-016819810.3390/drones6080198A Systems Analysis of Energy Usage and Effectiveness of a Counter-Unmanned Aerial System Using a Cyber-Attack ApproachChee Hoe Lee0Christian Thiessen1Douglas L. Van Bossuyt2Britta Hale3Department of Systems Engineering, Naval Postgraduate School, Monterey, CA 93943, USADepartment of Information Science, Naval Postgraduate School, Monterey, CA 93943, USADepartment of Systems Engineering, Naval Postgraduate School, Monterey, CA 93943, USADepartment of Computer Science, Naval Postgraduate School, Monterey, CA 93943, USAExisting counter-unmanned aerial system (C-UAS) defensive mechanisms rely heavily on radio frequency (RF) jamming techniques that require a large amount of energy to operate. The effects of RF jamming result in undesirable consequences, such as the jamming of other nearby friendly radio devices as well as the increase in RF footprint for local operators. Current cybersecurity analysis of commercial off-the-shelf (COTS) UASs have revealed multiple vulnerabilities that give rise to opportunities to conduct C-UAS operations in the cyber domain. This is achieved by performing cyber-attacks on adversarial UASs through hijacking the device-specific communication’s link on a narrow RF band and without the need for broad-spectrum RF energy bursts during C-UAS operations, which can result in lower energy usage to accomplish the same outcome. This article validates the cyber-attack C-UAS (CyC-UAS) concept through reviewing recent C-UAS operational experimental scenarios and conducting analysis on the collected data. Then, a simulation model of a defense facility is constructed to analyze and validate specific mission scenarios of interest and several proposed concepts of operation. A comparison of the energy requirements between CyC-UAS and existing C-UAS techniques is performed to assess energy efficiency and trade-offs of different C-UAS approaches. In this article, the comparison of energy requirements between the CyC-UAS prototype and existing C-UAS products that utilize RF jamming methods reveals that CyC-UAS achieves significant energy savings while not affecting other telecommunication devices operating at the same frequencies. While both the C-UAS techniques adopt the denial-of-service strategy, the CyC-UAS is able to achieve the same mission by consuming much less energy. Therefore, the CyC-UAS concept shows promise as a new, lower energy, and lower collateral damage approach to defending against UAS.https://www.mdpi.com/2504-446X/6/8/198unmanned aerial systemcounter-unmanned aerial systemC-UAScyber-attackcybersecurity
spellingShingle Chee Hoe Lee
Christian Thiessen
Douglas L. Van Bossuyt
Britta Hale
A Systems Analysis of Energy Usage and Effectiveness of a Counter-Unmanned Aerial System Using a Cyber-Attack Approach
Drones
unmanned aerial system
counter-unmanned aerial system
C-UAS
cyber-attack
cybersecurity
title A Systems Analysis of Energy Usage and Effectiveness of a Counter-Unmanned Aerial System Using a Cyber-Attack Approach
title_full A Systems Analysis of Energy Usage and Effectiveness of a Counter-Unmanned Aerial System Using a Cyber-Attack Approach
title_fullStr A Systems Analysis of Energy Usage and Effectiveness of a Counter-Unmanned Aerial System Using a Cyber-Attack Approach
title_full_unstemmed A Systems Analysis of Energy Usage and Effectiveness of a Counter-Unmanned Aerial System Using a Cyber-Attack Approach
title_short A Systems Analysis of Energy Usage and Effectiveness of a Counter-Unmanned Aerial System Using a Cyber-Attack Approach
title_sort systems analysis of energy usage and effectiveness of a counter unmanned aerial system using a cyber attack approach
topic unmanned aerial system
counter-unmanned aerial system
C-UAS
cyber-attack
cybersecurity
url https://www.mdpi.com/2504-446X/6/8/198
work_keys_str_mv AT cheehoelee asystemsanalysisofenergyusageandeffectivenessofacounterunmannedaerialsystemusingacyberattackapproach
AT christianthiessen asystemsanalysisofenergyusageandeffectivenessofacounterunmannedaerialsystemusingacyberattackapproach
AT douglaslvanbossuyt asystemsanalysisofenergyusageandeffectivenessofacounterunmannedaerialsystemusingacyberattackapproach
AT brittahale asystemsanalysisofenergyusageandeffectivenessofacounterunmannedaerialsystemusingacyberattackapproach
AT cheehoelee systemsanalysisofenergyusageandeffectivenessofacounterunmannedaerialsystemusingacyberattackapproach
AT christianthiessen systemsanalysisofenergyusageandeffectivenessofacounterunmannedaerialsystemusingacyberattackapproach
AT douglaslvanbossuyt systemsanalysisofenergyusageandeffectivenessofacounterunmannedaerialsystemusingacyberattackapproach
AT brittahale systemsanalysisofenergyusageandeffectivenessofacounterunmannedaerialsystemusingacyberattackapproach