The adoption and widespread use of unmanned aerial vehicles (UAVs) is constantly increasing in many areas. This is due to the ability of drones to record and relay real-time video and images along with the ability to fly and carry cargo. However, when using drones, a number of problems arise, because outsiders can gain access to information transmission channels to meet their own needs. Information attacks on UAVs lead to significant consequences, including commercial and non-commercial losses. The purpose of this work is to study UAVs and their vulnerability and protection during flight. To achieve the goal, the methods of searching scientific and technical literature, analysis, classification, systematization and generalization of available data on UAVs were used. On the basis of the found key industry publications, a comprehensive analysis of methods of protecting UAV radio channels against hacker attacks was carried out. The interception process is described as one of the options for UAV access threats, namely: signal interception, control interception, physical interception. The following methods of UAV radio channel protection are substantiated: signal encryption; use of spectral methods; authentication and authorization; use of physical barriers; creation of unique software for UAVs; Closing all radio communication channels on the UAV itself; returning it using a recorded route. The actual scientific and practical task, which consists in the theoretical and methodological substantiation of the approaches and principles of UAV radio channel protection in real time, has been solved. The variant of the mutual position in space of the UAV, the control panel (PU) and the radio electronic suppression station is presented, as well as the method of decentralized wireless interaction of these components. Prospects and advantages of using artificial intelligence are revealed.
Read full abstract