There are many solutions in the world used to combat unmanned aerial vehicles (UAV) in a non -kinetic way. Considering the costs associated with the kinetic control of UAV, technological development makes it possible to replace such annihilation of the threat in favor of non-kinetic control. However, the degree of complexity in developing effective non-kinetic control does not allow the easy introduction of appropriate solutions to ensure high efficiency. An important element of combat systems UAVs is to detect threats, but the use of appropriate measures to combat the threat depends on the effectiveness. Considering the latest technical solutions, UAVs systems have interference-proof control systems, enabling them to return to the starting place, as well as other elements hindering their eradication. There are few solutions in the world combining kinetic and non-kinetic control. Considering the degree of technical sophistication of such systems, there is not much of such systems in the world. The most common are manual systems that enable electromagnetic pulse interaction or the transmission of appropriate interference signals. In the civil market, UAVs systems most often use frequencies close to Wi-Fi. Connectivity relationships can easily be distorted by commercially available Wi-Fi interfering devices. A more difficult issue is military UAVs systems. The possibility of communication between the operator and the aircraft expands to more available radio spectrum, as well as technologies to boost their immunity. Therefore, the article presents an analysis of current methods do not kinetic combat UAVs systems. Next, the solutions of non-kinetic UAV control were reviewed to present the conclusions from the multifaceted tactical and technical analysis of the possibilities of currently used solutions in the subject area. Based on the knowledge from the area of the advantages and disadvantages of these systems it is possible to submit a proposal to increase the resistance against the destructive non-kinetic combat UAVs.
One of the most important aspects in contemporary alliance and coalition communication is to ensure an adequate level of security for data and voice transmission. Continuous technological development is a factor that significantly hinders the development of the coalition standard aimed at protecting real-time data transmission (audio and video) in a reliable and safe way. For a long period of time, the coalition nations encountered problems connected with establishing a correct transmission between national systems. In order to achieve interoperability of communication systems, the United States government has made available and presented the standard FNBDT (Future Narrowband Digital Terminal) which in the course of time took the name SCIP (Secure Communication Interoperability Protocol). This protocol is being developed to this day by working groups consisting of representatives of scientific institutions and companies from the armed industry of NATO countries. Thanks to international cooperation the Protocol was adopted as standard STANAG 5068. It allows the use of cryptographic mechanisms to block the transmission of voice and data in a standardized way, ensuring interoperability of existing and newly formed allied and coalition communication systems for voice transmission. The SCIP protocol is based on two speech codecs: MELPe and G.729D. The article will discuss the current work carried out in NATO working groups on the definition of the COMSEC function and the way it is implemented in broadband radio stations to develop a broadband waveform for coalition activities. Also, the national waveform to secure communication in the broadband radio station will be presented. In the next chapter there will be the presentation of selected experimental results of broadband radio R-450C with the above-mentioned implemented mechanisms to protect voice communication. The obtained results will allow to evaluate the implemented mechanisms in terms of security. The developed analysis and obtained measurement results may be helpful both for people organizing radio communication using broadband radios as well as for those responsible for the proper operation of electronic warfare systems.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.