ArticlePublisher preview available

Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Unmanned aerial vehicles (UAV) are among the major growing technologies that have many beneficial applications, yet they can also pose a significant threat. Recently, several incidents occurred with UAVs violating privacy of the public and security of sensitive facilities, including several nuclear power plants in France. The threat of UAVs to the security of nuclear facilities is of great importance and is the focus of this work. This paper presents an overview of UAV technology and classification, as well as its applications and potential threats. We show several examples of recent security incidents involving UAVs in France, USA, and United Arab Emirates. Further, the potential threats to nuclear facilities and measures to prevent them are evaluated. The importance of measures for detection, delay, and response (neutralization) of UAVs at nuclear facilities are discussed. An overview of existing technologies along with their strength and weaknesses are shown. Finally, the results of a gap analysis in existing approaches and technologies is presented in the form of potential technological and procedural areas for research and development. Based on this analysis, directions for future work in the field can be devised and prioritized.
ORIGINAL ARTICLE
Analyzing the threat of unmanned aerial vehicles
(UAV) to nuclear facilities
Alexander Solodov
1,2
Adam Williams
3
Sara Al Hanaei
1
Braden Goddard
4
Published online: 18 April 2017
Macmillan Publishers Ltd 2017
Abstract Unmanned aerial vehicles (UAV) are among the major growing tech-
nologies that have many beneficial applications, yet they can also pose a significant
threat. Recently, several incidents occurred with UAVs violating privacy of the
public and security of sensitive facilities, including several nuclear power plants in
France. The threat of UAVs to the security of nuclear facilities is of great impor-
tance and is the focus of this work. This paper presents an overview of UAV
technology and classification, as well as its applications and potential threats. We
show several examples of recent security incidents involving UAVs in France, USA,
and United Arab Emirates. Further, the potential threats to nuclear facilities and
measures to prevent them are evaluated. The importance of measures for detection,
delay, and response (neutralization) of UAVs at nuclear facilities are discussed. An
overview of existing technologies along with their strength and weaknesses are
shown. Finally, the results of a gap analysis in existing approaches and technologies
is presented in the form of potential technological and procedural areas for research
and development. Based on this analysis, directions for future work in the field can
be devised and prioritized.
SAND2017-4308J: Unclassified, unlimited release. Sandia National Laboratories is a multiprogram
laboratory operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation,
for the U.S. Department of Energy’s National Nuclear Security Administration under contract DE-
AC04-94AL85000.
&Alexander Solodov
alexander.solodov@gmail.com
1
Department of Nuclear Engineering, Khalifa University, Abu Dhabi, UAE
2
Gulf Nuclear Energy Infrastructure Institute (GNEII), Abu Dhabi, UAE
3
Sandia National Laboratories, Albuquerque, NM, USA
4
Department of Mechanical and Nuclear Engineering, Virginia Commonwealth University,
Richmond, VA, USA
Secur J (2018) 31:305–324
https://doi.org/10.1057/s41284-017-0102-5
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
... The aim is to damage critical components like the propulsion system, control surfaces, or payload, rendering the drone inoperable or causing it to crash. Kinetic attacks are a traditional and often effective method of countering drones, especially when aiming for complete incapacitation [99]. ...
... They involve the use of high-powered laser beams to target and damage vulnerable areas of the drone, such as optical components, sensors, or surface materials [99]. The intense heat generated by the laser can weaken its structural integrity, burn through essential components, or cause the drone to malfunction. ...
Article
Full-text available
Unmanned Aerial Vehicles (UAV), are rapidly advancing across various sectors. However, this growth is accompanied by escalating security risks, as UAV become prime targets for sophisticated cyber and physical attacks. Although several surveys on UAV security exist in the literature, there is a lack of a practical guide to assist stakeholders in assessing and mitigating security risks in diverse UAV application sectors. Motivated by this gap, the main contribution of this tutorial is to describe a hands-on security assessment methodology for UAV services, by integrating fundamental background knowledge of UAV technology with actionable security strategies. The methodology is based on established standards, combining risk assessment with penetration testing. The goal is to assist practitioners and stakeholders of UAV services in understanding threat modeling, vulnerability analysis, and targeted risk mitigation. Initially, the underlying UAV technologies, architectures, and applications are presented. Then, a taxonomy of security attacks and countermeasures for UAV is provided. Based on the presented UAV characteristics and security needs, a practical step-by-step security assessment methodology for UAV services is presented. To demonstrate the practicality of the presented methodology, it is applied to a real-world-inspired scenario, showcasing its effectiveness in identifying attack vectors, assessing risks, and deploying countermeasures.
... On the other hand, the development and spread of small UAVs have led to a new class of menace [3]: espionage, terrorism, transportation of prohibited goods, air traffic complications, property damage. Today in the leading countries of the world the solution of problems of neutralization of menace from the use of small UAVs and the creation of appropriate protection systems is brought to the level of national security [4,5]. Therefore, important tasks are to track UAVs and control the activities allowed for them. ...
Article
Full-text available
The article shows the relevance of the problem of development and analysis of algorithms for tracking small-sized UAVs according to video surveillance. A Kalman-type correlation algorithm for tracking of a small-sized UAV in the presence of spatially uncorrelated interference, which is the most common in practice, is synthesized. In the obtained algorithm, the UAV motion parameters are estimated independently along the axes of a rectangular coordinate system. Positioning accuracy analysis using the correlation algorithm, as well as the correlation algorithm for tracking UAVs based on the Kalman filter, was carried out by statistical modeling in the Matlab programming environment.
... Despite their benefits, the use of UAVs in chemical process plants poses some risks to operators and facilities. UAVs can lose control and communication due to electromagnetic signal disruption, leading to collisions with plant equipment that can damage facilities and threaten personnel safety (Solodov et al., 2018). Additionally, the use of UAVs may raise privacy and security concerns, as they have the potential to collect private information or interfere with plant operations if not appropriately secured (Finn and Wright, 2012). ...
... With their ability to perform a wide range of missions, such drones have brought new capabilities to a large part of the world's population, ranging from precision agriculture [2], to leisure activities and parcel delivery [3], and represent a hot topic in several research fields [4] [5] [6] [7]. Following the UAS application set expansion, a growing security concern for Private, Public, and State institutions has emerged, reflecting the increasing safety and security risks posed by LSS drones [8] [9] [10] [11] [12]. Whether unintentionally (or not) misused, these machines will represent a growing threat in the future [13]. ...
Conference Paper
Being able to reliably deal with rogue low, slow, and small (LSS) unmanned aerial systems (UASs) is paramount to ensure safety of Private, Public, and State institutions. Either in peace or war times, various precedents worldwide, such as the numerous airspace intrusions in airports, attempted attacks on people, or the current ongoing events in Ukraine, illustrate the critical aspect of the threat posed by those UASs. In this review, a compilation of existing counter-UAS systems, combining both sensors and (low collateral damage) effectors, is presented, and a comparison between real-world experience and expected technology outcomes is provided, whenever possible.
... Task offloading techniques are predominantly utilized in engineering, Operations Research & Management Science [138,139], and have been a focal point since 2013, particularly within the transportation sector. The technology also extends its influence in fields such as Business & Economics, Education, Construction & Building Technology, Thermodynamics, Social Sciences, and Nuclear Science & Technology [140][141][142][143]. ...
Article
Full-text available
UAV path planning, as a key technology in the field of automatic control and intelligent systems, has demonstrated significant potential in various applications, including logistics and distribution, environmental monitoring, and emergency rescue. A comprehensive reassessment of the existing representative literature reveals that most reviews in this field focus on specific aspects and are largely confined to methodological investigations, primarily qualitative analyses that lack empirical data to support their conclusions. To address this gap, this study employs the mapping knowledge domain (MKD) method of bibliometrics, utilizing CiteSpace, VOSviewer, and Bibliometrix R package to analyze a total of 4416 documents from the Web of Science Core Collection (WOSCC) spanning from 2000 to 2024. Through retrospective analysis and scientific knowledge mapping, we first review the development of UAV path planning and categorize it into four distinct stages. Secondly, we identify key external features of the field. Using techniques such as co-citation analysis and keyword clustering, we then identify research trends, burst papers, and hotspots. Finally, we highlight five typical application scenarios of UAV path planning. The results of the study indicate that the field of UAV path planning has made significant advancements over the past two decades, particularly since 2018. These studies encompass various disciplinary areas, underscoring the increasing necessity for the integration of multidisciplinary approaches to UAV path planning in recent years. The aim of this study is to provide researchers with a comprehensive reference and new research perspectives while offering technical guidelines for professionals working in related applications.
... In May 2017, Kunming Kunming Changshui International Airport, China was disturbed by drones, resulting in the forced landing of 35 flights and the closure of the airport runway for 45 min [7]. In August 2018, Venezuelan President Maduro was attacked by a drone during a televised speech, further causing social panic [6,8,9]. Therefore, developing early warning and defense technology for UAVs has become an urgent problem for all countries [10,11]. ...
Article
Full-text available
With the wide application of UAVs in modern intelligent warfare as well as in civil fields, the demand for C-UAS technology is increasingly urgent. Traditional detection methods have many limitations in dealing with “low, slow, and small” targets. This paper presents a pure laser automatic tracking system based on Geiger-mode avalanche photodiode (Gm-APD). Combining the target motion state prediction of the Kalman filter and the adaptive target tracking of Camshift, a Cam–Kalm algorithm is proposed to achieve high-precision and stable tracking of moving targets. The proposed system also introduces two-dimensional Gaussian fitting and edge detection algorithms to automatically determine the target’s center position and the tracking rectangular box, thereby improving the automation of target tracking. Experimental results show that the system designed in this paper can effectively track UAVs in a 70 m laboratory environment and a 3.07 km to 3.32 km long-distance scene while achieving low center positioning error and MSE. This technology provides a new solution for real-time tracking and ranging of long-distance UAVs, shows the potential of pure laser approaches in long-distancelow, slow, and small target tracking, and provides essential technical support for C-UAS technology.
Chapter
As the world grapples with an existential threat of climate change, the newly emerged technologies such as Artificial General Intelligence (AGI) drones, are being explored to find promising solutions for environmental monitoring and mitigation. However, the deployment of AGI drones brings with itself a myriad of security risks that target software, hardware, networks, and communication channels in drones or unmanned aerial vehicles (UAVs). This study initially explains the critical role of AGI drones in climate change mission. Furthermore, a comprehensive analysis is conducted to investigate threats to UAV networks, establishing a classification approach for threat categorization, and evaluating defense mechanisms using OSI model. Additionally, the review also analyzes UAV routing protocols from a cybersecurity perspective in order to reveal vulnerabilities and assess potential risks. Consequently, the study discusses best security practices for AGI drones protection against cyber-attacks and future research directions to enhance UAV cybersecurity in climate-related applications.
Article
The rapid adoption of mini-Unmanned Aerial Vehicles (mini-UAVs) has brought significant security challenges, particularly due to their capacity for payload delivery and unauthorized surveillance. This paper introduces a real-time detection and identification system for mini-UAVs, leveraging radio frequency (RF) signal features and a customized Multi-Layer Perceptron (MLP) model to address these threats. Our approach utilizes a Software-Defined Radio (SDR) platform to capture and analyze RF signals exchanged between mini-UAVs and their control stations. By extracting key RF parameters—such as center frequency, Peak-to-Average Power Ratio (PAPR), spectral flatness, and spectral entropy—we effectively differentiate UAV communications from other RF signals. The core of our system is a tailored MLP model, optimized with a novel SinLU activation function and the Lion optimizer, which enhances the model’s ability to capture complex non-linear relationships. Trained on a comprehensive dataset of extracted RF features, the proposed model demonstrates high accuracy in identifying UAV signals. The system’s effectiveness is validated through rigorous experiments using SDR-recorded RC signals, confirming its applicability in real-world scenarios. This research makes a significant contribution to the ongoing efforts to enhance UAV detection capabilities through advanced RF signal analysis and machine learning techniques.
Article
Full-text available
The article presents key concepts, issues and empirical results from a social scientific examination of preliminary technologisation trends in the security sector. This examination largely takes the form of a critique which deals with the ambivalence, unintended effects and paradoxes of such processes. The causes and dynamics behind the preliminary technologisation of security arise not least from a reflection on the intrinsic vulnerability of liberal societies. Globally networked structures are addressed as a security problem. This recursive loop, that technolo- gisation itself evokes sui generis uncertainties, also applies to security technology. The article systematically explores how security and insecurity are interwoven. It combines different technosociological perspectives as well as empirically examin- ing significant dimensions and typical patterns of technological ambivalence. (1) Its starting point is the view of normative theory that technology always involves the materialization of expectations which give rise to specific follow-up actions and effects. (2) In a praxeological view the interesting fact is that security technology, despite such normative effects, still remains more or less open to context-specific adaptation. Differences in use, unintended and counterproductive effects are to be expected. (3) The concept of hybrid actors is drawn upon in considering the potential for new technology to profoundly transform security bodies and practices. (4) Based on the premise that technology provides a constitutive framework which lends stability, durability and specific formats to social processes and social forms in the first place, individual lines of thought can be conflated with the question of what power political and sociopolitical significance is to be found in the technologisation of security.
Article
Full-text available
Port security is an increasing concern given the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality – ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systems and control theory. The associated analysis process – System Theoretic Process Analysis (STPA) – identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. This article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.
Conference Paper
Full-text available
Considering the significant number of non‐military unmanned aerial vehicles (UAVs) that can be purchased to operate in unregulated air space and the range of such devices, the potential for security and privacy problems to arise is significant. This can lead to consequent harm for critical infrastructure in the event of these UAVs being used for criminal or terrorist purposes. Further, if these devices are not being detected, there is a privacy problem to be addressed as well. In this paper we test a specific UAV, the Parrot AR Drone version 2, and present a forensic analysis of tests used to deactivate or render the device inoperative. It was found that these devices are open to attack, which means they could be controlled by a third party.
Conference Paper
This paper presents the approach to research integrated drone-based systems for post emergency monitoring of NPPs as systems with a multi-level degradation. Reliability block diagrams of the systems are built. Degradation levels, conditions which determine them and formulae for calculating the reliability functions of the systems on these levels are proposed. The possibility of using developed models for research systems with a multi-level degradation and using drones are shown
Conference Paper
This paper introduces the reasoning and concepts behind a generic and modular approach to obstacle avoidance based on geofencing. The issue of UAV safety is tackled from a practical point of view and a collision avoidance system based on practical usage and safety considerations is presented. Before doing so, the need for a reference model of geographic geometry is discussed, looking at global positioning in different reference systems and how to switch between the associated coordinates systems. The concept of fence is defined and the practical aspects of these fences definitions and mapping are detailed. A collision avoidance strategy is proposed that works in the case of autonomous flight as well as in the case of piloted flight. To our knowledge, this second scenario has not been extensively covered and we feel it deserves some attention since most of the civilian UAVs flying today are piloted manually by an operator. This avoidance is based on constrained optimization to find an input for the controller which prevents collision while staying as true as possible to the original command from the human operator. This strategy allows for smooth collision avoidance since it gently and continuously restricts the flight possibilities of the UAV while giving as much control freedom as possible to the operator. We also discuss how this work can be extended by taking the actual vehicle dynamic into consideration in order to make it work for a larger variety of controllers. The concept behind the “closest point” approach used above is detailed, and its limitations and possible extensions are discussed. Finally, we present the simulation framework used to test this geofencing strategy and discuss the simulation results as a proof of concept for our future implementation on real-world vehicles.
Conference Paper
Recent events of drones flying over city centers, official buildings and nuclear installations stressed the growing threat of uncontrolled drone proliferation and the lack of real countermeasure. Indeed, detecting and tracking them can be difficult with traditional techniques. A system to acoustically detect and track small moving objects, such as drones or ground robots, using acoustic cameras is presented. The described sensor, is completely passive, and composed of a 120-element microphone array and a video camera. The acoustic imaging algorithm determines in real-time the sound power level coming from all directions, using the phase of the sound signals. A tracking algorithm is then able to follow the sound sources. Additionally, a beamforming algorithm selectively extracts the sound coming from each tracked sound source. This extracted sound signal can be used to identify sound signatures and determine the type of object. The described techniques can detect and track any object that produces noise (engines, propellers, tires, etc). It is a good complementary approach to more traditional techniques such as (i) optical and infrared cameras, for which the object may only represent few pixels and may be hidden by the blooming of a bright background, and (ii) radar or other echo-localization techniques, suffering from the weakness of the echo signal coming back to the sensor. The distance of detection depends on the type (frequency range) and volume of the noise emitted by the object, and on the background noise of the environment. Detection range and resilience to background noise were tested in both, laboratory environments and outdoor conditions. It was determined that drones can be tracked up to 160 to 250 meters, depending on their type. Speech extraction was also experimentally investigated: the speech signal of a person being 80 to 100 meters away can be captured with acceptable speech intelligibility.
Article
Design and Evaluation of Physical Security Systems, 2e, includes updated references to security expectations and changes since 9/11. The threat chapter includes references to new threat capabilities in Weapons of Mass Destruction, and a new figure on hate crime groups in the US. All the technology chapters have been reviewed and updated to include technology in use since 2001, when the first edition was published. Garcia has also added a new chapter that shows how the methodology described in the book is applied in transportation systems. College faculty who have adopted this text have suggested improvements and these have been incorporated as well. This second edition also includes some references to the author's recent book on Vulnerability Assessment, to link the two volumes at a high level.