Contingency Clarification Protocols For Reliable C
Contingency Clarification Protocols For Reliable C
This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TAES.2023.3313573
Abstract—Counter-drone technology plays a vital role in pro- detecting and classifying drones, different technologies such as
tecting airspace against unwanted and malicious drones. Counter- radar, optical systems, and acoustic sensors are used followed
drone systems increasingly rely on unmanned traffic management by signal processing systems and machine learning [12], [50].
services, such as remote identification and flight authorization
enforcement, for the detection and mitigation of unauthorized Similarly, a wide range of interdiction solutions are available
activities on the part of Unmanned Aerial Vehicles (UAV). These such as jamming, catching, or shooting [35], [43].
services support automated drone identification and verification Unmanned traffic management (UTM) services such as
of the drone activity’s compliance before taking any enforce- Drone Remote Identification (DRI) can make counter-drone
ment action. Available drone identification standards like ASTM
operations more effective [39]. When connected to a UTM,
F3411-22 for Drone Remote Identification (DRI) specify key re-
quirements for entities involved in UAV operations. However, DRI the counter-drone system can identify a drone and verify its
systems can fail for many technical and non-technical reasons flight authorization in the 4D space of interest as shown in
related to the drone itself, its operator, the identification system, Fig 2. Instead of classifying all sighted drones as unwanted,
other involved service suppliers, or the communication between the counter-drone system can now differentiate between legal
these actors. On the other hand, experience has shown that even
and illegal UAV operations. This allows for controlled drone
licensed drone operators can violate permitted flight parameters
mistakenly or for unavoidable reasons. In such contingency use in or close to sensitive areas.
situations, the counter-drone system should perform additional Some preliminary work has been done on standards for DRI
checks and interact with relevant agents before classifying the including the European EN 4709-002:2020 [14] and the US
drone as illegal and taking action against it. This paper presents ASTM F3411-22 [15]. The latter provides a partial list of
a set of protocols to formalize the interaction between the
counter-drone system and relevant agents to clarify possible the entities involved in drone operation, such as the UAVs,
failures and violations. The goal is to complement current DRI their operators, and the observers, which include anti-drone
systems mitigating the effect of erroneous drone identification and enforcement systems. Furthermore, DRI proposals encourage
supporting reliable decision-making. The simulation of worst-case the establishment of international UAV registries enabling
scenarios shows that executing the clarification protocols takes observers to use remote identification messages broadcasted
just a few seconds, and this delay is only notable in situations
where immediate action is required to neutralize illegal drones. by UAVs to access trustworthy information about the drone
and their operators. The proposed standards, however, do not
Index Terms—UAV, Counter-UAS, UTM, Remote Identifica-
cover contingency situations.
tion, Clarification Protocols.
Contingency planning and management is an essential
I. I NTRODUCTION objective of drone operations [22]. Altun et al. classified
contingency hazards in unmanned aircraft systems into five
The market of Unmanned Aerial Vehicles (UAVs), popularly
categories: technical failures, human-related failures, data-
known as drones, is rapidly growing with diverse applications
related issues, infrastructure-based failures, and environmental
in construction, agriculture, insurance, the oil and gas industry,
events [11]. Technical failures primarily affect drone operation
film-making, parcel delivery, journalism, law enforcement, and
and cause malfunctions such as loss-of-link, GPS failure,
civil defense [32]. Despite this, the management of UAVs
navigation degradation, camera failures, and engine and power
operation in urban areas is still in the exploratory stage [59].
failures. Human-related failures essentially stem from the per-
We can neither get our online orders delivered by drones nor
formance of pilots due to distractions for the pilot in command,
ride a taxi drone, although today’s UAVs are technically ready
medical issues, perception, and decision errors. Data-related
for such applications [25]. Indeed, flying a drone is associated
problems can arise from cyberattacks or the provision of
with security, privacy, and safety threats that challenge the
inaccurate or delayed geofence data, weather, or terrain data.
penetration of UAVs in the urban airspace [10], [33]. Safety
Infrastructure-based failures often affect vertiports and lead to
is, without doubt, a critical aspect of drone operation. World-
availability issues, surface contamination, or debris that may
wide reports on drone incidents and intrusions highlight the
interfere with take-off or landing. Environmental events, such
criticality of this issue [26], [27].
as adverse weather conditions, volcano eruptions, air pollution,
Counter-drone technology (also referred to as counter-
unmanned aerial systems (CUAS)) plays a vital role in pro-
tecting the airspace against unwanted and malicious drones.
Fig. 1 shows the two main functions of a typical counter-
drone system: detection & classification and interdiction. For
Center of Cyber-Physical Systems, Khalifa University, Abu Dhabi, UAE
(emails: Abdulhadi.shoufan, Ernesto.damiani @ku.ac.ae) Fig. 1. Conventional counter-drone system
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
This article has been accepted for publication in IEEE Transactions on Aerospace and Electronic Systems. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TAES.2023.3313573
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
This article has been accepted for publication in IEEE Transactions on Aerospace and Electronic Systems. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TAES.2023.3313573
UTM systems are still in their infancy. Some authors have drones, usually by using a net. The net is launched either
highlighted key challenges and issues in the design of these manually by a skilled operator on the ground or autonomously
systems. Wolter et al. pointed out multiple obstacles in the by another flying drone [13]. Finally, a variety of aerial take-
current experimental setups which relate to standardization, down technologies was presented. These include hunting by
information quality, and the transition from human-centric eagles [37] and shooting by machine guns or laser [43].
design to automation [57]. Other authors addressed the security
of UTM systems and presented their vulnerabilities to various
C. Coordination between UTM and Counter-Drone Systems
cyber and physical attacks [7], [9], [47], . The lack of a
consistent legal framework for UTM system operations was Despite the close relation between UTM services and
highlighted in [44]. The authors described the fundamentals counter-drone systems, interoperability between these systems
of such a legal framework which should provide the needed remained unaddressed in the literature. Recently, Park et.
certainty for all stakeholders. al [39] presented a comprehensive review of counter-drone
systems and highlighted the necessity of integrating DRIs and
B. Counter-Drone Systems counter-drone systems. Sandor has highlighted the need to
The counter-drone industry has boomed in recent years. A define the problems, the scope, and the operational environ-
report published by the ”Center for the Study of the Drone” ment of UTMs [46]. The author defined and classified many
at Bard College shows that there are 537 counter-unmanned functions related to UTM and interestingly listed surveillance
aerial systems (CUAS) on the market [34]. Researchers among key UTM services, mentioning a panoply of tech-
showed wide interest in this field, especially regarding the nologies for the detection of cooperative and non-cooperative
detection and classification of small UAVs. vehicles. However, the author did not mention interdiction, a
Counter-drone systems can use a variety of technolo- critical function of a counter-drone system. Apart from this,
gies for drone detection and classification [56]: radar [28], we are not aware of any literature that has addressed counter-
acoustic detectors [12], computer vision [31], and radio fre- drone operations in a UTM context.
quency [5]. Each technology has its advantages and disadvan-
tages. For example, low-cost frequency-modulated continuous III. R EQUIREMENT S PECIFICATION
wave (FMCW) radars are highly resistant to fog, cloud, and
In this section, we first describe the functional requirements
dust, and they do not require line-of-sight. However, their
for the clarification protocols highlighting the problems to be
effectiveness in detecting drones is limited due to the small
resolved and the clarification outcomes. Based on the func-
radar cross-sections of drones. Acoustic detectors, such as
tional requirements, the essential technical requirements for
microphone arrays, are cost-effective and do not require line-
executing the protocols are identified. Finally, the performance
of-sight. However, they are sensitive to ambient noise and
requirements for the protocols are specified.
wind conditions, and they require a comprehensive database
of acoustic signatures for different types of drones. Com-
puter vision-based detection can utilize low-cost cameras like A. Functional requirements
CCTVs and leverage deep learning techniques for classi- The clarification protocols work based on the following
fication. However, computer vision detectors require line- assumptions:
of-sight, and their performance can be affected by adverse
1) All drones must be registered and operated by certified
weather conditions such as dust, fog, cloud, and daytime
pilots.
lighting unless thermal or laser-based cameras are employed.
2) Any drone in flight must broadcast remote identification
On the other hand, radio frequency-based detectors employ
as per regulations.
low-cost sensors and do not require line-of-sight, offering
3) Any drone flying in the operation zone of a CUAS is
long-range capabilities. However, they are not effective for
required to have authorization. The authorization data
drones operating in autonomous mode since these drones
should contain information about the drone ID and the
are typically not controlled using radio frequency signals. In
mission’s date, time, and path.
critical areas, a combination of multiple technologies, known
4) Remote identification and authorization data must be
as multi-modal technologies, can be utilized to complement
accessible through registries.
each other’s strengths and weaknesses [45].
Parallel to the advances in detection and classification The contingency clarification protocols address the follow-
technologies, researchers investigated technical solutions for ing cases:
drone interdiction. Wyder et al. classify these technologies 1) The CUAS receives no remote identification.
according to their impact on the target drone, coming up with 2) The CUAS receives an unknown remote identification.
three main categories: signal interception, propeller restriction, 3) The CUAS receives an expired remote identification.
and aerial take-down [58]. Due to its undisruptive nature, 4) The CUAS finds no flight authorization data for the
signal interception has received substantial attention for UAV drone.
interdiction in urban areas. Depending on the operation mode 5) The CUAS observes a violation of the authorized flight
of the drone, Roth et al. identified two methods of signal time.
interception-based interdiction: drone hacking and GPS spoof- 6) The CUAS observes deviation from the authorized flight
ing [43]. Propeller restriction refers to capturing uncooperative path or zone.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
This article has been accepted for publication in IEEE Transactions on Aerospace and Electronic Systems. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TAES.2023.3313573
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
This article has been accepted for publication in IEEE Transactions on Aerospace and Electronic Systems. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TAES.2023.3313573
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
This article has been accepted for publication in IEEE Transactions on Aerospace and Electronic Systems. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TAES.2023.3313573
Fig. 6. Protocol 1 (CASE 5 and CASE 6). The drone operator claims that
ID transmission is restored.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
This article has been accepted for publication in IEEE Transactions on Aerospace and Electronic Systems. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TAES.2023.3313573
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
This article has been accepted for publication in IEEE Transactions on Aerospace and Electronic Systems. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TAES.2023.3313573
Fig. 10. Protocol 7 (Clarify Area Violation, CASE 1). The operator violates
the flight zone and does not respond to the authority.
Fig. 11. Protocol 7 (Clarify Area Violation, CASE 2 and CASE 3). The Fig. 13. Clarification time of executing the proposed protocols for different
operator responds to the authority message. numbers of drones.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
This article has been accepted for publication in IEEE Transactions on Aerospace and Electronic Systems. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TAES.2023.3313573
clarified. The box-and-whisker plot in Figure 14 demonstrates Based on these estimations, Table VII summarizes the
the data distribution more clearly. Taking Protocol 1 and the impact of the clarification time on the CUAS’s response time
case of 250 drones as an example, we can see that the system for the three outcomes of decisions: tolerance, interdiction
can clarify 75% of the cases in less than seven seconds while after a timeout, and immediate interdiction. Accordingly, when
the maximum clarification time is 7.5 seconds only. the authority decides to tolerate the drone, the clarification
We evaluate the clarification time tclarif y based on its time has no impact. When the drone is to be neutralized after
contribution to the total response time tresponse of the counter- a timeout of 25 seconds, the clarification time extends the
drone system as illustrated in Figure 15. Here, td&c , tout , and response time by 9%. In the case of immediate interdiction,
tinterdiction refer to the time needed to detect and classify the the clarification time worsens the response time by 68%. In
drone, the timeout before initiating the interdiction, and the other words, the clarification would delay the interdiction by
interdiction time, respectively. Accordingly, the impact of the approximately 2.5 sec.
clarification time on the response time can be defined by the
following ratio:
VI. D ISCUSSION
tclarif y According to the performance evaluation, the use of clarifi-
R= (1)
td&c + tclarif y + tout + tinterdiction cation protocols can significantly affect the response of the
counter-drone system only when the drone is identified as
In the following, we evaluate R for the case of a single drone illegal and requires immediate neutralization. However, even
where tclarif y ≈ 2.5 seconds in the worst case according to in such cases, the delay in response is only a few seconds.
the simulation. For this, we first provide some estimation for This delay is a compromise for dealing with legal UAVs
td&c , tout , and tinterdiction . that may have technical or non-technical issues. Whether or
not to accept this compromise depends on the criticality of
Detection and classification time (td&c ): Reports on the time the particular zone and the level of experience with drone
needed to detect and classify a drone are scarce. Basak et al. operations in and around that zone. Such experience can
[17] proposed a combined drone detection and classification provide insight into the likelihood of encountering contingency
framework using YOLO Lite. They reported a mean inference issues versus illegal operations, but unfortunately, there is
time of 1.16 seconds for detecting and classifying one drone. currently no data available to inform these decisions. Future
research may shed light on this topic.
Timeout (tout ): The timeout depends on the outcome of the There are some limitations to this study, specifically related
clarification protocol as follows: to the accuracy of determining clarification time. The simu-
lation was run on a single computer without real network-
ing, whereas a real deployment would involve a distributed
system that introduces network and communication delays.
Additionally, the simulation assumed that the authority and
operators would respond without delay, which may not be
practically feasible. Therefore, actual implementation and real-
time measurements in the future could provide more accurate
timing data. Furthermore, the protocols were implemented
Fig. 15. Illustrating the components of the CUAS’s response time at the application layer, but in a real deployment, security
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
This article has been accepted for publication in IEEE Transactions on Aerospace and Electronic Systems. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TAES.2023.3313573
TABLE VII [7] Ruba Alkadi, Noura Alnuaimi, Chan Yeob Yeun, and Abdulhadi
I MPACT OF CLARIFICATION ON SYSTEM LATENCY Shoufan. Blockchain interoperability in unmanned aerial vehicles
networks: State-of-the-art and open issues. Ieee Access, 10:14463–
Protocol Outcome Impact of clarification on response time 14479, 2022.
Tolerance R = 2.5/(1.16 + 2.5 + ∞) = 0% [8] Ruba Alkadi and Abdulhadi Shoufan. Unmanned aerial vehicles traffic
Interdiction after a timeout R = 2.5/(1.16 + 2.5 + 25) = 9% management solution using crowd-sensing and blockchain. IEEE Trans-
Immediate interdiction R = 2.5/(1.16 + 2.5 + 0) = 68% actions on Network and Service Management, 20(1):201–215, 2022.
[9] Azza Allouch, Omar Cheikhrouhou, Anis Koubâa, Khalifa Toumi,
Mohamed Khalgui, and Tuan Nguyen Gia. Utm-chain: blockchain-based
secure unmanned traffic management for internet of drones. Sensors,
measures at lower layers, such as using SSL sessions between 21(9):3049, 2021.
the Counter-Unmanned Aerial System (CUAS) and encrypted [10] Riham Altawy and Amr M Youssef. Security, privacy, and safety aspects
of civilian drones: A survey. ACM Transactions on Cyber-Physical
messaging with the authority server, could be beneficial. Systems, 1(2):1–25, 2016.
Lastly, the study did not define message formats, as this is [11] Arinc Tutku Altun, Yan Xu, and Gokhan Inalhan. Contingency man-
not relevant at this stage of research and should be addressed agement concept generation for u-space system. In 2022 Integrated
Communication, Navigation and Surveillance Conference (ICNS), pages
in the context of standardization activities. 1–12. IEEE, 2022.
[12] Muhammad Zohaib Anwar, Zeeshan Kaleem, and Abbas Jamalipour.
VII. C ONCLUSION Machine learning inspired sound-based amateur drone detection for
public safety applications. IEEE Transactions on Vehicular Technology,
Currently, the development of UTM systems and counter- 68(3):2526–2534, 2019.
drone systems is taking place independently, while drone oper- [13] Michael J Armstrong, George R Hutchins, and Timothy A Wachob.
Interdiction and recovery for small unmanned aircraft systems, Septem-
ators are still benefiting from the current legal situation, which ber 3 2019. US Patent 10,401,129.
prohibits the interdiction of aerial vehicles. Many efforts are [14] ASD. Direct remote id – introduction to the european uas digital remote
ongoing to change this situation, leading to precise regulations id technical standard, 2020. standard.
[15] ASTM. ASTM F3411-19. standard specification for remote id and
for counter-drone operations. Like always, however, regula- tracking, 2019. doi: 10.1520/F3411-19. URL: http://www.astm.org/
tions matter for those who plan to follow them. Management cgi-bin/resolver.cgi?F3411-19.
of drone operations must be able to deal with malfunctions, [16] Joshua E Baculi and Corey A Ippolito. Onboard decision-making for
nominal and contingency suas flight. In AIAA Scitech 2019 Forum, page
technical failures, and malicious users. Real-time coordination 1457, 2019.
of the drone and counter-drone operation is a challenge. We [17] Sanjoy Basak, Sreeraj Rajendran, Sofie Pollin, and Bart Scheers. Com-
claim that the protocol suite proposed in this paper provides bined rf-based drone detection and classification. IEEE Transactions on
Cognitive Communications and Networking, 2021.
the first organic approach to this problem, and our simulation [18] Oussama Bekkouche, Miloud Bagaa, and Tarik Taleb. Toward a utm-
results are promising. However, we are fully aware that real based service orchestration for uavs in mec-nfv environment. In 2019
deployments and pilot tests are required to fully understand all IEEE Global Communications Conference (GLOBECOM), pages 1–6.
IEEE, 2019.
details of the problem and the hurdles to overcome. We hope [19] Kais Belwafi, Ruba Alkadi, Sultan A Alameri, Hussam Al Hamadi, and
that the proposed protocols will provide guidance to system Abdulhadi Shoufan. Unmanned aerial vehicles’ remote identification: A
developers working on integrating CUAS and UTM systems tutorial and survey. IEEE Access, 10:87577–87601, 2022.
[20] Philip Boucher. Domesticating the drone: the demilitarisation of
and attract attention to the need for standardization. unmanned aircraft for civil markets. Science and engineering ethics,
21(6):1393–1412, 2015.
[21] Newton H Campbell, Michael J Acheson, and Irene M Gregory. Dy-
ACKNOWLEDGEMENT namic vehicle assessment for intelligent contingency management of
This work was funded by the C2PS research center at urban air mobility vehicles. In AIAA Scitech 2021 Forum, page 1001,
2021.
Khalifa University. [22] Carlos Capitán, Jesús Capitán, Ángel R Castaño, and Anı́bal Ollero.
Threat management methodology for unmanned aerial systems operating
R EFERENCES in the u-space. IEEE Access, 10:70476–70490, 2022.
[23] Anjan Chakrabarty, Corey A Ippolito, Joshua Baculi, Kalmanje S Krish-
[1] Counter-UAS - What is a Drone Detection radar — weibelradars.com. nakumar, and Sebastian Hening. Vehicle to vehicle (v2v) communication
https://weibelradars.com/drone-detection/what-is-drone-detection/#: for collision avoidance for multi-copters flying in utm–tcl4. In AIAA
∼:text=Our%20drone%20detection%20radars%20are,and%20high% Scitech 2019 Forum, page 0690, 2019.
2Dpower%20systems%20respectively. [Accessed 09-Jul-2023]. [24] Christopher Chin, Karthik Gopalakrishnan, Maxim Egorov, Antony
[2] Federal Aviation Administration. UAS Remote Identification Overview, Evans, and Hamsa Balakrishnan. Efficiency and fairness in unmanned
2021. URL: https://www.faa.gov/uas/getting started/remote id/. air traffic flow management. IEEE Transactions on Intelligent Trans-
[3] European Union Aviation Safety Agency. Commission Delegated portation Systems, 2021.
Regulations (EU) 2020/1058, 2020. URL: https://eur-lex.europa.eu/ [25] Christopher Courtin, Michael J Burton, Alison Yu, Patrick Butler,
legal-content/EN/TXT/PDF/?uri=CELEX:32020R1058&from=EN. Parker D Vascik, and R John Hansman. Feasibility study of short takeoff
[4] Gregorius Airlangga and Alan Liu. A novel architectural design for and landing urban air mobility vehicles using geometric programming.
solving lost-link problems in uav collaboration. In 2021 28th Asia- In 2018 Aviation Technology, Integration, and Operations Conference,
Pacific Software Engineering Conference (APSEC), pages 380–389. page 4151, 2018.
IEEE, 2021. [26] Gordon Darroch. Gatwick airport: Drones ground flights. BBC, 2018-
[5] Sara Al-Emadi and Felwa Al-Senaid. Drone detection 20-12. URL: https://www.bbc.com/news/uk-england-sussex-46623754.
approach based on radio-frequency using convolutional [27] DeDrone. Worldwide drone incidents, 2020.
neural network. In 2020 IEEE International Conference on [28] Martins Ezuma, Chethan Kumar Anjinappa, Mark Funderburk, and
Informatics, IoT, and Enabling Technologies (ICIoT), pages Ismail Guvenc. Radar cross section based statistical recognition of
29–34, 2020. https://doi.org/10.1109/ICIoT48696.2020.9089489 uavs at microwave frequencies. IEEE Transactions on Aerospace and
doi:10.1109/ICIoT48696.2020.9089489. Electronic Systems, 58(1):27–46, 2021.
[6] Saba Alimadadi, Ali Mesbah, and Karthik Pattabiraman. Understanding [29] FAA. UAS data exchange (LAANC), 2020. URL: https://www.faa.gov/
asynchronous interactions in full-stack javascript. In Proceedings of the uas/programs partnerships/data exchange/.
38th International Conference on Software Engineering, pages 1169– [30] FAA. Unmanned aircraft system (uas) traffic management (utm) concept
1180, 2016. of operation. Technical report, 2020.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/
This article has been accepted for publication in IEEE Transactions on Aerospace and Electronic Systems. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TAES.2023.3313573
[31] Abdel Gafoor Haddad, Muhammad Ahmed Humais, Naoufel Werghi, [53] Inc. The MathWorks. Stateflow toolbox, 2021.
and Abdulhadi Shoufan. Long-range visual uav detection and tracking [54] Colin Theodore, Dale Rowley, Adnan Ansar, Larry Matthies, Steve
system with threat level assessment. In IECON 2020 The 46th Annual Goldberg, David Hubbard, and Matthew Whalley. Flight trials of a rotor-
Conference of the IEEE Industrial Electronics Society, pages 638– craft unmanned aerial vehicle landing autonomously at unprepared sites.
643, 2020. https://doi.org/10.1109/IECON43393.2020.9254816 doi: In Annual forum proceedings-American helicopter society, volume 62,
10.1109/IECON43393.2020.9254816. page 1250. AMERICAN HELICOPTER SOCIETY, INC, 2006.
[32] Mostafa Hassanalian and Abdessattar Abdelkefi. Classifications, applica- [55] Stefan Tilkov and Steve Vinoski. Node.js: Using javascript to build high-
tions, and design challenges of drones: A review. Progress in Aerospace performance network programs. IEEE Internet Computing, 14(6):80–83,
Sciences, 91:99–131, 2017. 2010.
[33] Chao Lin, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, [56] Jian Wang, Yongxin Liu, and Houbing Song. Counter-unmanned aircraft
Alexey Vinel, and Xinyi Huang. Security and privacy for the internet system (s)(c-uas): State of the art, challenges, and future trends. IEEE
of drones: Challenges and solutions. IEEE Communications Magazine, Aerospace and Electronic Systems Magazine, 36(3):4–29, 2021.
56(1):64–69, 2018. [57] Cynthia Wolter, Lynne Martin, and Kimberly Jobe. Human-system in-
[34] Arthur Holland Michel. Counter-drone systems, 2019. teraction issues and proposed solutions to promote successful maturation
[35] Thomas Multerer, Alexander Ganis, Ulrich Prechtel, Enric Miralles, of the utm system. In 2020 AIAA/IEEE 39th Digital Avionics Systems
Askold Meusling, Jan Mietzner, Martin Vossiek, Mirko Loghi, and Conference (DASC), pages 1–7. IEEE, 2020.
Volker Ziegler. Low-cost jamming system against small drones using [58] Philippe Martin Wyder, Yan-Song Chen, Adrian J Lasrado, Rafael J
a 3d mimo radar based tracking. In 2017 European Radar Conference Pelles, Robert Kwiatkowski, Edith OA Comas, Richard Kennedy, Arjun
(EURAD), pages 299–302. IEEE, 2017. Mangla, Zixi Huang, Xiaotian Hu, et al. Autonomous drone hunter
[36] Natasha Neogi, Siddhartha Bhattacharyya, Daniel Griessler, Harshitha operating by deep learning and all-onboard computations in gps-denied
Kiran, and Marco Carvalho. Assuring intelligent systems: Contingency environments. PloS one, 14(11), 2019.
management for uas. IEEE Transactions on Intelligent Transportation [59] Chenchen Xu, Xiaohan Liao, Junming Tan, Huping Ye, and Haiying Lu.
Systems, 2021. Recent research progress of unmanned aerial vehicle regulation policies
[37] James O’Malley. The no drone zone. Engineering & Technology, and technologies in urban low altitude. IEEE Access, 8:74175–74194,
14(2):34–38, 2019. 2020.
[38] Bizhao Pang, Ee Meng Ng, and Kin Huat Low. Uav trajectory [60] Jiazhen Zhou, Dawei Sun, Inseok Hwang, and Dengfeng Sun. Con-
estimation and deviation analysis for contingency management in urban trol protocol design and analysis for unmanned aircraft system traffic
environments. In AIAA Aviation 2020 Forum, page 2919, 2020. management. IEEE Transactions on Intelligent Transportation Systems,
[39] Seongjoon Park, Hyeong Tae Kim, Sangmin Lee, Hyeontae Joo, and 2021.
Hwangnam Kim. Survey on anti-drone systems: Components, designs, [61] Jin Zhou and Chiman Kwan. A high performance contingency planning
and challenges. IEEE Access, 9:42635–42659, 2021. system for uavs with lost communication. In 2018 ieee international
[40] Timothy Patterson, Sally McClean, Philip Morrow, Gerard Parr, and conference on prognostics and health management (icphm), pages 1–8.
Chunbo Luo. Timely autonomous identification of uav safe landing IEEE, 2018.
zones. Image and Vision Computing, 32(9):568–578, 2014.
[41] Victoria Pimentel and Bradford G Nickerson. Communicating and
displaying real-time data with websocket. IEEE Internet Computing,
16(4):45–53, 2012.
[42] Colleen Reiche, Adam P Cohen, and Chris Fernando. An initial
assessment of the potential weather barriers of urban air mobility. IEEE
Transactions on Intelligent Transportation Systems, 2021. Abdulhadi Shoufan Abdulhadi Shoufan (Member,
[43] Julian Rothe, Michael Strohmeier, and Sergio Montenegro. A concept IEEE) received the Dr.-Ing. degree from Technische
for catching drones with a net carried by cooperative uavs. In 2019 University Darmstadt, Germany, in 2007. He is cur-
IEEE International Symposium on Safety, Security, and Rescue Robotics rently an Associate Professor of electrical engineer-
(SSRR), pages 126–132. IEEE, 2019. ing and computer science with Khalifa University,
[44] Richard Ryan, Saba Al-Rubaye, Graham Braithwaite, and Dimitrios Abu Dhabi. His research interests include drone
Panagiotakopoulos. The legal framework of utm for uas. In 2020 security, safe operation, embedded security, cryptog-
AIAA/IEEE 39th Digital Avionics Systems Conference (DASC), pages raphy hardware, learning analytics, and engineering
1–5. IEEE, 2020. education.
[45] Stamatios Samaras, Eleni Diamantidou, Dimitrios Ataloglou, Nikos
Sakellariou, Anastasios Vafeiadis, Vasilis Magoulianitis, Antonios Lalas,
Anastasios Dimou, Dimitrios Zarpalas, Konstantinos Votis, et al. Deep
learning on multi sensor data for counter uav applications—a systematic
review. Sensors, 19(22):4837, 2019.
[46] Zsolt Sándor. Challenges caused by the unmanned aerial vehicle
in the air traffic management. Periodica polytechnica transportation Ernesto Damiani Ernesto Damiani (Senior Member,
engineering, 47(2):96–105, 2019. IEEE) is currently a Full Professor with the Univer-
[47] Abdulhadi Shoufan, Chan Yeob Yeun, and Bilal Taha. esim-based au- sitàdegli Studi di Milano, Italy, the Senior Director
thentication protocol for uav remote identification. Security and Privacy of the Robotics and Intelligent Systems Institute,
in the Internet of Things: Architectures, Techniques, and Applications, and the Director of the Center for Cyber Physical
pages 91–122, 2021. Systems (C2PS), Khalifa University, United Arab
[48] Mia Stevens and Ella Atkins. Geofence definition and deconfliction for Emirates. He is also the Leader of the Big Data
uas traffic management. IEEE Transactions on Intelligent Transportation Area with the Etisalat British Telecom Innovation
Systems, 2020. Center (EBTIC) and the President of the Consortium
[49] Indreswari Suroso and Erwhin Irmawan. Analysis of uav multicopter of Italian Computer Science Universities (CINI). He
of air photography in new yogyakarta international airports. TELKOM- is also part of the ENISA Ad-Hoc Working Group
NIKA, 17(1):521–528, 2019. on Artificial Intelligence Cybersecurity. He has pioneered model-driven data
[50] Bilal Taha and Abdulhadi Shoufan. Machine learning-based drone analytics. He has authored more than 650 Scopus-indexed publications and
detection and classification: State-of-the-art in research. IEEE Access, several patents. His research interests include cyber-physical systems, big
7:138669–138682, 2019. data analytics, edge/cloud security and performance, artificial intelligence, and
[51] Yiwen Tang, Yan Xu, and Gokhan Inalhan. An integrated approach machine learning. He was a recipient of the Research and Innovation Award
for on-demand dynamic capacity management service in u-space. IEEE from the IEEE Technical Committee on Homeland Security, the Stephen Yau
Transactions on Aerospace and Electronic Systems, 58(5):4180–4195, Award from the Service Society, the Outstanding Contributions Award from
2022. https://doi.org/10.1109/TAES.2022.3159317 doi:10.1109/ IFIP TC2, the Chester-Sall Award from IEEE IES, the IEEE TCHS Research
TAES.2022.3159317. and Innovation Award, and a Doctorate Honoris Causa from INSA-Lyon,
[52] Hugo Eduardo Teomitzi and Joerg R Schmidt. Concept and requirements France, for his contribution to big data teaching and research.
for an integrated contingency management framework in uas missions.
In 2021 IEEE Aerospace Conference (50100), pages 1–17. IEEE, 2021.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/