• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

SECURITY CHALLENGES IN UAV DEVELOPMENT

September 16, 2010 by

SECURITY CHALLENGES IN UAV DEVELOPMENT
By Eur Ing Paul Parkinson, Senior Systems Architect, Wind River

Abstract

The expanded development and diverse mission operations of unmanned air vehicles (UAV) has exposed information security (InfoSec) and communication security (ComSec) concerns that are not easily addressed in traditional federated or currently deployed integrated modular avionics (IMA) systems. The need to operate military UAVs in civil airspace communicating over unclassified links to foreign air traffic control systems and keep sensitive and/or classified information separated without increasing space, weight, and power (SWaP) poses challenges to UAV systems architecture. In this paper the MILS (multiple independent levels of security) software architecture is discussed in relation to how it can fulfil these disparate UAV system design requirements.

The Advent of Unmanned Systems

In recent years, there has been very rapid growth in the development and deployment of UAVs. These unmanned systems are being used in a very diverse range of roles, from urban reconnaissance to high-altitude, long-endurance (HALE) operations. In many cases, program developments have been driven primarily by operational requirements to deploy systems in environments deemed to be too hazardous or too hostile for human operators. However, the development of these unmanned systems has not overcome the technical challenges to fulfil these operational requirements along with producing additional tangible benefits.

UAVs do not need to be encumbered by life-support systems for a human operator, often enabling the design to be physically smaller and lighter than a manned vehicle. In the case of military UAVs, this can contribute toward a reduced radar cross-section (RCS) resulting in a lower probability of intercept (LPI) by hostile forces. This can also reduce the need to use stealth, supersonic, or hypersonic capabilities currently used for high-altitude spy planes (such as the U-2, SR-71, and successor aircraft).

UAVs are also capable of performing much longer, extended missions than those restricted by the limits of an individual human operator. This is because they provide the ability to coordinate operation through a number of remote operators working in shifts. This capability provides military planners with the ability to have increased loiter time on target, which can be invaluable for a changing situation on the ground.

There is also the additional benefit that military UAVs can be used in theaters that present a higher risk of intercept than would be acceptable for manned aircraft, including airborne reconnaissance to provide invaluable battlefield intelligence. They can even be used as active decoys, penetrating deep into enemy territory in offensive air operations1. Armed combat variants are now being deployed (usually referred to as unmanned combat air vehicles or UCAVs).

Modular Avionics in the Extreme

Aircraft systems are becoming more and more complex in order to implement more and more advanced functionality. As a result, the software content in these systems continues to grow at an astonishing rate. For example, in the 1980s, the software content in the avionics systems of military fast jets was around 100,000 source lines of code (SLOC), and this has increased significantly in recent years. It has been estimated that the F-35 Lightning II will have around 7 million SLOC.

The increasing complexity of these systems has required an increase in system performance and therefore the physical footprint in terms of SWaP. However, there are pressing requirements to reduce the physical footprint of systems within aircraft and especially within UAVs due to their physical size constraints. So a significant increase in processing density is essential.

This problem is being addressed through the adoption of IMA. This architecture comprises common computing platforms that can host multiple applications co

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
  • GoExporting logo
  • Supercat logo
  • Galvion logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • On D-Day Anniversary, Austin, Milley Call on All to Defend Democracy

    June 6, 2023
    Read more
  • BATTLESPACE Counter Unmanned Air System (C-UAS) Supplement

    June 6, 2023
    Read more
  • PARLIAMENTARY QUESTIONS

    June 2, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT