A Cross-Frequency Protective Emblem: Protective Options for Medical Units and Wounded Soldiers in the Context of (fully) Autonomous Warfare

The protection of non-combatants in times of (fully) autonomous warfare raises the question of the timeliness of the international protective emblem. Incidents in the recent past indicate that it is becoming necessary to transfer the protective emblem to other dimensions of transmission and representation. (Fully) Autonomous weapon systems are often launched from a great distance to the aiming point and there may be no possibility for the operators to notice protective emblems at the point of impact. In this case, the weapon system would have to detect such protective emblems and, if necessary, disintegrate autonomously or request an abort via human-in-the-loop. In our paper, we suggest ways in which a cross-frequency protective emblem can be designed. On the one hand, the technical deployment, e.g. in the form of RADAR beacons, is considered, as well as the interpretation by methods of machine learning. With regard to the technical deployment, possibilities are considered to address different sensors and to send signals out as resiliently as possible. When considering different signals, approaches are considered as to how software can recognise the protective emblems under the influence of various boundary conditions and react to them accordingly. In particular, a distinction is made here between the recognition of actively emitted signals and passive protective signals, e.g. the recognition of wounded or surrendering persons via drone-based electro-optical and thermal cameras. Finally, methods of distribution are considered, including encryption and authentication of the received signal, and ethical aspects of possible misuse are examined.

[1]  K. Minaoui,et al.  DMLAR: Distributed Machine Learning-Based Anti-Collision Algorithm for RFID Readers in the Internet of Things , 2022, Comput..

[2]  Osama M. Mohsen,et al.  A machine learning approach to predict production time using real-time RFID data in industrialized building construction , 2022, Adv. Eng. Informatics.

[3]  Filippo Costa,et al.  A Review of RFID Sensors, the New Frontier of Internet of Things , 2021, Sensors.

[4]  Xujuan Zhou,et al.  Remote Patient Monitoring Using Radio Frequency Identification (RFID) Technology and Machine Learning for Early Detection of Suicidal Behaviour in Mental Health Facilities , 2021, Sensors.

[5]  Brian Fitzgerald,et al.  Taxonomy of Centralization in Public Blockchain Systems: A Systematic Literature Review , 2020, Inf. Process. Manag..

[6]  A.K.M. Najmul Islam,et al.  A Critical Review of Concepts, Benefits, and Pitfalls of Blockchain Technology Using Concept Map , 2020, IEEE Access.

[7]  Seema Patil,et al.  A Survey on Road Traffic Sign Recognition System using Convolution Neural Network , 2018 .

[8]  M. Sridevi,et al.  Automatic traffic sign recognition system using fast normalized cross correlation and parallel processing , 2017, 2017 International Conference on Intelligent Communication and Computational Techniques (ICCT).

[9]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[10]  Rob Nicholls,et al.  Implanting Military RFID: Rights and Wrongs , 2017, IEEE Technology and Society Magazine.

[11]  Hauptadministrator,et al.  QR code , 2016, The Fairchild Books Dictionary of Fashion.

[12]  David Hyunchul Shim,et al.  Real-time Traffic Sign Recognition system with deep convolutional neural network , 2016, 2016 13th International Conference on Ubiquitous Robots and Ambient Intelligence (URAI).

[13]  Enis Bilgin,et al.  Road sign recognition system on Raspberry Pi , 2016, 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT).

[14]  Gregory D. Durgin,et al.  Long range and low powered RFID tags with tunnel diode , 2015, 2015 IEEE International Conference on RFID Technology and Applications (RFID-TA).

[15]  Chien-Chen Chen,et al.  RFID-based human behavior modeling and anomaly detection for elderly care , 2010, Mob. Inf. Syst..

[16]  Kwan-Wu Chin,et al.  A Survey and Tutorial of RFID Anti-Collision Protocols , 2010, IEEE Communications Surveys & Tutorials.

[17]  B. Rolle,et al.  The emblem that cried wolf: ICRC study on the use of the emblems , 2009, Revue Internationale de la Croix-Rouge.

[18]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[19]  T. Hasegawa,et al.  Machine learning approach to self-localization of mobile robots using RFID tag , 2007, 2007 IEEE/ASME international conference on advanced intelligent mechatronics.

[20]  Qinghan Xiao,et al.  RFID Security Issues in Military Supply Chains , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[21]  Ron Weinstein,et al.  RFID: a technical overview and its application to the enterprise , 2005, IT Professional.

[22]  David W. Chadwick,et al.  Role-Based Access Control With X.509 Attribute Certificates , 2003, IEEE Internet Comput..

[23]  Mark A. Buckner,et al.  MICLOG RFID tag program enables total asset visibility , 2002, MILCOM 2002. Proceedings.

[24]  N J Mangus,et al.  Smart Munitions: An Introduction to the Concepts, the Technologies, and the Systems Primer and Briefing Manual. , 1987 .