ABSTRACT
As the use of drones continues to proliferate across various industries, ensuring their safe and secure operation becomes increasingly important. This abstract explores the techniques and strategies employed for drone identification and communication, aiming to enhance safety, security, and compliance. The paper highlights the significance of reliable drone recognition methods and effective communication protocols between drones and relevant parties. Specifically, it emphasizes the need for drones to adapt to restrictions, follow protocols, and communicate information in designated zones. Furthermore, the abstract emphasizes the importance of strict adherence to no-fly rules, precise identification of restricted airspace, and the establishment of robust communication protocols to prevent violations in high-security areas. The findings emphasize the significance of these techniques in promoting a safe and secure drone ecosystem and provide valuable insights for policymakers, drone operators, and stakeholders involved in managing and regulating drone operations.
- Beck, R. R., Vijeev, A., & Ganapathy, V. (2020). Privaros: A framework for privacy-compliant delivery drones. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security.Google ScholarDigital Library
- Aggarwal, S., & Kumar, N. (2020). Path planning techniques for unmanned aerial vehicles: A review, solutions, and challenges. Comput. Commun., 149, 270--299.Google ScholarDigital Library
- Giernacki, W., Rao, J., Sladic, S., Bondyra, A., Retinger, M., & Espinoza-Fraire, T. (2022). DJI Tello quadrotor as a platform for research and education in mobile robotics and control engineering. In 2022 International Conference on Unmanned Aircraft Systems (ICUAS) (pp. 735--744).Google ScholarCross Ref
- Stanford Theory Group. (n.d.). Introduction to A*. Stanford.edu. Retrieved from https://theory.stanford.edu/amitp/GameProgramming/AStarComparison.htmlGoogle Scholar
- Microsoft AirSim. (n.d.). Home - AirSim. Github.io. Retrieved from https://microsoft.github.io/AirSim/Google Scholar
- Meena, S. (2022). Attribute Based Access Control (ABAC) policy examples. Cloud RADIUS. Retrieved from https://www.cloudradius.com/attribute-based-access-control-abac-policy-examples/Google Scholar
- Federal Aviation Administration. (n.d.). No drone zone. Faa.gov. Retrieved from https://www.faa.gov/uas/resources/community_engagement/no_drone_zoneGoogle Scholar
Index Terms
- Poster: No Fly-Zone: Drone Policies for Ensuring Safe Operations in Restricted Areas
Recommendations
Privacy-Preserving Collision Detection for Drone-based Aerial Package Delivery using Secure Multi-Party Computation
MobiHoc '23: Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile ComputingAs drones become more widely available, they find applications in many different fields. One of the most promising applications of drones is to use them in deliveries of items/food within certain distances to offer quick service for the customers. In ...
No-Fly-Zone: Regulating Drone Fly-Overs Via Government and User-Controlled Authorization Zones
MobiHoc '23: Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile ComputingUnmanned Aerial Systems (UAVs), a.k.a., drones, are becoming increasingly popular, as several companies are incorporating them into highly-convenient, last-mile delivery systems. Given this market, concerns with non-consensual surveillance and ...
Ethical issues with use of drone aircraft
ETHICS '14: Proceedings of the IEEE 2014 International Symposium on Ethics in Engineering, Science, and TechnologyThis analysis is aimed at identifying the ethical issues related to a variety of types of Drone aircraft as they are currently deployed in recreational, civilian/commercial and military arenas. A series of examples will be examined in order to attempt ...
Comments