Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities

Unmanned aerial vehicles (UAV) are among the major growing technologies that have many beneficial applications, yet they can also pose a significant threat. Recently, several incidents occurred with UAVs violating privacy of the public and security of sensitive facilities, including several nuclear power plants in France. The threat of UAVs to the security of nuclear facilities is of great importance and is the focus of this work. This paper presents an overview of UAV technology and classification, as well as its applications and potential threats. We show several examples of recent security incidents involving UAVs in France, USA, and United Arab Emirates. Further, the potential threats to nuclear facilities and measures to prevent them are evaluated. The importance of measures for detection, delay, and response (neutralization) of UAVs at nuclear facilities are discussed. An overview of existing technologies along with their strength and weaknesses are shown. Finally, the results of a gap analysis in existing approaches and technologies is presented in the form of potential technological and procedural areas for research and development. Based on this analysis, directions for future work in the field can be devised and prioritized.

[1]  Laurent Ciarletta,et al.  Towards a generic and modular geofencing strategy for civilian UAVs , 2016, 2016 International Conference on Unmanned Aircraft Systems (ICUAS).

[2]  Meng-Han Tsai,et al.  A review of rotorcraft Unmanned Aerial Vehicle (UAV) developments and applications in civil engineering , 2014 .

[3]  E. D. Cohen,et al.  Active electronically scanned arrays , 1994, Proceedings of IEEE National Telesystems Conference - NTC '94.

[4]  Peter A. Hancock,et al.  Workload, Situation Awareness, and Teaming Issues for UAV/UCAV Operations , 2001 .

[5]  Ronald S. Ross,et al.  Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems | NIST , 2016 .

[6]  Sergei Boeke,et al.  Civil-military relations and international military cooperation in cyber security: Common challenges & state practices across Asia and Europe , 2015, 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace.

[7]  Kim Hartmann,et al.  The vulnerability of UAVs to cyber attacks - An approach to the risk assessment , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[8]  Adam David Williams,et al.  Beyond a series of security nets: applying STAMP & STPA to port security , 2015 .

[9]  Peter Wellig,et al.  Detection and tracking of drones using advanced acoustic cameras , 2015, SPIE Security + Defence.

[10]  Gabriel C. Birch,et al.  UAS Detection Classification and Neutralization: Market Survey 2015 , 2015 .

[11]  Mary Lynn Garcia,et al.  The Design and Evaluation of Physical Protection Systems , 2001 .

[12]  Brian D. Rigling,et al.  Multisensor 3D tracking for counter small unmanned air vehicles (CSUAV) , 2008, SPIE Defense + Commercial Sensing.

[13]  Rick Dove,et al.  The Buck Stops Here: Systems Engineering Is Responsible for System Security , 2013 .

[14]  Bartholomew Elias,et al.  Unmanned Aircraft Operations in Domestic Airspace: U.S. Policy Perspectives and the Regulatory Landscape [January 27, 2016] , 2016 .

[15]  Stefan Kaufmann,et al.  Security Through Technology? Logic, Ambivalence and Paradoxes of Technologised Security , 2016 .

[16]  Rosanna Hertz,et al.  GUARDING AGAINST BOREDOM , 1989 .

[17]  K. J. Hofstetter,et al.  Application of UAVs at the Savannah River Site , 1996 .

[18]  Zhenyu Guo,et al.  Risk analysis of Unmanned Aerial Vehicle hijacking and methods of its detection , 2013, 2013 IEEE Systems and Information Engineering Design Symposium.

[19]  Vps Naidu,et al.  Geo-Fencing for Unmanned Aerial Vehicle , 2015 .

[20]  Vyacheslav Kharchenko,et al.  Reliability and survivability models of integrated drone-based systems for post emergency monitoring of NPPs , 2016, 2016 International Conference on Information and Digital Technologies (IDT).

[21]  Roger Clarke,et al.  Understanding the drone epidemic , 2014, Comput. Law Secur. Rev..

[22]  Todd E. Humphreys,et al.  Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.