Next Article in Journal
Improved Active Disturbance Rejection Double Closed-Loop Control of a Rotary-Type VCM in a Moving Mirror Control System
Previous Article in Journal
Review of Thermal and Physiological Properties of Human Breast Tissue
Previous Article in Special Issue
Air Corridors: Concept, Design, Simulation, and Rules of Engagement
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Threats from and Countermeasures for Unmanned Aerial and Underwater Vehicles

1
Computer Systems Engineering Department, Mirpur University of Science and Technology (MUST), Mirpur 10250, AJK, Pakistan
2
VTT Technical Research Centre of Finland, Tietotie 3, 02150 Espoo, Finland
3
Electrical and Computer Engineering Department, North Carolina State University, Raleigh, NC 27606, USA
*
Author to whom correspondence should be addressed.
Submission received: 26 April 2022 / Revised: 16 May 2022 / Accepted: 17 May 2022 / Published: 20 May 2022
(This article belongs to the Special Issue Latest Advances in UAV Networks: Sensing, Communication, and Control)

Abstract

:
The use of unmanned aerial vehicles (UAVs) for different applications has increased tremendously during the past decade. The small size, high maneuverability, ability to fly at predetermined coordinates, simple construction, and affordable price have made UAVs a popular choice for diverse aerial applications. However, the small size and the ability to fly close to the terrain make the detection and tracking of UAVs challenging. Similarly, unmanned underwater vehicles (UUVs) have revolutionized underwater operations. UUVs can accomplish numerous tasks that were not possible with manned underwater vehicles. In this survey paper, we provide features and capabilities expected from current and future UAVs and UUVs, and review potential challenges and threats due to use of such UAVs/UUVs. We also overview the countermeasures against such threats, including approaches for the detection, tracking, and classification of UAVs and UUVs.

1. Introduction

A few decades ago, flying was restricted to a small group of wealthy individuals and large public- and private-sector entities. Flying was also strictly regulated under government and international laws. However, unmanned aerial vehicles (UAVs) have changed the paradigm. Nowadays, different types of UAVs are available commercially at affordable prices, and anybody with a basic knowledge of flying can operate them. Therefore, sales of UAVs have seen a surge in the recent decade and are expected to increase in the future [1]. UAVs are used in numerous applications including search and rescue, disaster management, surveillance, package delivery, and filming [2]. UAVs are also used to measure the depth of water channels and to study coastal areas [3,4,5], where UAVs are mainly used for remote sensing and imaging, as other methods of data collection in these terrains are challenging. Moreover, UAV manufacturing is one of the fastest-growing industries in the world. The advancement of technology in other fields (e.g., smartphone manufacturing and telecommunications) has greatly benefited the UAV industry. According to a Research and Markets report [6], the UAV market is estimated to reach USD 58.4 billion by 2026, from USD 27.4 billion in 2021.
In the recent past, many incidents have been reported with malicious UAVs. There are also numerous emerging threats from malicious UAVs in the near future [7]. UAVs have inherent stealth capabilities, mainly due to their small size and ability to fly close to terrain. Therefore, malicious UAVs are difficult to detect, track, and classify. The current detection, tracking, classification, and disabling methods for UAVs are not adequate to cover a wide spectrum of threats [8,9,10]. A significant investment for finding credible solutions to countering malicious UAVs is underway by research communities and organizations all over the world [11].
Similar to UAVs, unmanned underwater vehicles (UUVs) have revolutionized sea operations. UUVs can perform many tasks that were not possible with manned underwater vehicles (MUVs) [12]. For example, UUVs can remain submerged for a very long duration of time and can operate very deep in the oceans without risking the safety of the crew, and the initial and maintenance cost of UUVs is significantly smaller compared to MUVs. Therefore, a large number of UUVs can be used at different locations in the oceans for different applications. Overall, the detection, tracking, and classification of UUVs are significantly difficult compared to MUVs [13].
In this work, we will discuss the current and possible future capabilities and features of UAVs and UUVs, the threats and challenges from malicious UAVs and UUVs at present and in the future, the limitations of the current countermeasures, and future directions for countering malicious UAVs and UUVs. The rest of the paper is organized as follows. Section 2 discusses the features and capabilities of current and expected future UAVs, while the challenges and threats from malicious UAVs are provided in Section 3. The detection, tracking, and classification of UAVs with radar-based approaches is discussed in Section 4, and in Section 5 for methods other than radar systems. Section 6 covers future directions for the detection, tracking, and classification of UAVs. Section 7 provides characteristics of UUVs, and discusses the detection, tracking, and classification of UUVs, as well as future directions for countering malicious UUVs. Section 8 concludes the paper.

2. Current and Future UAVs

In this section, we will discuss current UAVs and their capabilities and provide ideal features and capabilities that are expected from future UAVs.

2.1. Structure, Flight Characteristics, and Capabilities of Current UAVs

The absence of a pilot in an aerial vehicle helps to change the aerodynamic design and accommodate more features compared to manned aerial vehicles (e.g., high maneuverability, larger payload capacity, and flight endurance). The current design of UAVs focuses mainly on flight endurance, secured and redundant communication links, and payload capabilities [14]. However, the speed and cognitive capabilities are limited. The current UAVs can be multi-rotors or fixed-wings. The flight endurance of fixed-wing UAVs is larger compared to multi-rotor UAVs for a given amount of input energy. The longer flight endurance for fixed-wing UAVs compared to multi-rotor UAVs is mainly due to additional lift and glide from the flat fixed wings. The multi-rotor UAVs have greater maneuverability compared to fixed-wing UAVs and can hover at a single location. However, multi-rotor UAVs are inherently unstable and, from a control point of view, highly non-linear systems [15].
The remotely controlled multi-rotor and fixed-wing UAVs require a radio link [16]. The control radio link exists between the onboard UAV flight controller and the ground controller either directly, through satellites, or through other aerial vehicles in the vicinity. The data collected from a given area using onboard UAV sensors (e.g., electro-optical and infrared (EO/IR) sensors) are sent via a radio link to the ground controller. The control and data radio links have different bandwidths, and the communications are encrypted. Different frequency-hopping sequences are also used to avoid jamming. Moreover, multi-rotor and fixed-wing UAVs can fly autonomously [17]. In the autonomous mode, either the UAV follows fixed Global Positioning System (GPS)/Global Navigation Satellite System (GNSS) way-points or uses data from real-time sensors (e.g., camera, radio sensors, and stored maps) for navigation to a particular location.
The majority of the currently available UAVs, either fixed-wing or multi-rotor, use propellers for propulsion. The shape, type, and number of propellers can vary among different types of UAVs. Moreover, the UAVs can carry different payloads. The maximum payloads of popular UAVs are provided in Table 1. The payload of fixed-wing UAVs is generally larger than that of multi-rotor UAVs. The payload capacity of fixed-wing UAVs is generally increased by increasing the size of the wings. On the other hand, the payload capacity of the multi-rotor UAV can be increased by increasing the size and number of propellers [18]. The maximum speed of a multi-rotor UAV can reach 73 m/s [19], whereas the maximum speed of a fixed-wing UAV can be close to 278 m/s [20]. The maximum flight ceiling of currently available UAVs is around 25 km. (Balloons in the Google’s Loon project were designed to fly in the stratosphere, at an altitude between 18 km and 25 km [21].) Popular current UAVs, types of sensors installed, and their functionalities and features are provided in Table 1.

2.2. Expected Structure and Flight Characteristics of the Future UAVs

The structure of the UAV of the future should be simple, lightweight, modular (adaptable to different scenario requirements), and cost effective, and should allow safe landings over harsh terrain and water. New capabilities (e.g., self-healing with the help of artificial intelligence (AI) and 3D printing on-board the UAVs) can be introduced. Different sensors and sources of energy can be used. The wing geometry can be varied during different phases of the flight. The variable wing geometry can provide different speed and payload options dependent on the scenario. The variable wing geometry and propellers can also help in vertical take-off and landing, as shown in Figure 1.
The UAV should be able to carry a large payload without significantly compromising the flight duration. The long flight duration can be accomplished through the use of smart fuels, optimum fuel usage, and keeping the weight of the UAV air-frame small. Variable sources of fuel can also be used during different phases of flight. Some noteworthy fuel sources are fossil fuel, synthetic fuel, solar, hydrogen, and chargeable batteries. The UAV charging stations can be set up in high-up locations (e.g., on top of tall buildings) to save energy during take-off from the ground. The UAVs can also charge wirelessly by flying near electricity transmission lines [22]. Wireless charging using transmission lines can help to achieve a long UAV flight duration without landing.
The UAV should be able to take off and land vertically on any kind of ground surface and over water. In case of a crash, air balloons can be used to minimize the damage to the airframe. UAVs should also be able to fly in a fully autonomous mode. In the fully autonomous mode, the complete UAV flight is controlled by an AI-driven flight controller and aided by onboard sensors. In the autonomous mode, the UAV should be equipped with redundant navigation systems, which can help to mitigate external navigation reference spoofing.

2.3. Expected Radio and Sensing Capabilities of Future UAVs

Radio communications play an important role in UAV operations. Future UAVs are expected to support broadband radio links that implement frequency hopping to provide resilience against radio frequency (RF) jamming. There should be redundant and secured communication channels between the ground station and the UAV for important tasks. Friendly UAVs, ground stations, satellites, and other airborne platforms should be able to communicate and share sensor data over a secured link, forming a network. The UAVs should also support seamless real-time augmented reality through streaming, with UAVs in the field relaying to UAV operators, for better situational awareness.
The UAV should be equipped with different types of sensors to obtain seamless real-time information about the surrounding environment. These sensors include EO/IR sensors, lasers, and other RF sensors. Future UAVs should also be equipped with sensors to detect radio jamming, hacking, and external navigation spoofing in a given environment. In addition, countermeasures should be available against radio jamming, hacking, and external navigation spoofing. An overall comparison of current and future UAV features and capabilities is provided in Table 2.

3. Challenges and Threats from Malicious UAVs

In this section, we will discuss current and possible future threats posed by malicious UAVs and challenges for the detection, tracking, and classification of malicious UAVs.

3.1. Challenging Features of UAVs

One of the major features of UAVs is inherent stealth. The size and the infrared and acoustic signatures of UAVs are significantly smaller compared to manned aerial vehicles. Moreover, UAVs can fly at significantly low altitudes compared to manned aerial vehicles. Therefore, UAVs offer inherent stealth capabilities and are difficult to detect and track by conventional methods. The shape of small UAVs is also similar to birds. Therefore, classification of UAVs from birds is challenging [23]. Furthermore, the small energy requirement for UAVs compared to manned aerial vehicles allows long-duration non-stop flight missions.
Different types of UAVs offer different features. The features offered by fixed-wing UAVs are arguably more advantageous compared to multi-rotor UAVs. For example, the fixed-wing UAVs with delta wing configuration can carry large payloads and fly at high speeds. Fixed-wing UAVs can be programmed to fly autonomously using electronic or mechanical procedures. If mechanical procedures are used to fly the UAV autonomously, then it is immune to all kinds of electronic countermeasures (ECM). Overall, fixed-wing UAVs flying autonomously and cognitively based on terrain, and using both electronic and mechanical procedures during different phases of flight, can pose a significant challenge. On the other hand, multi-rotor UAVs are more agile compared to fixed-wing UAVs and can hover. However, multi-rotor UAVs cannot be flown only through mechanical controls.

3.2. Autonomous UAVs

The flight controller onboard a UAV can be configured to work autonomously [24]. The autonomous flight mode is possible with the help of onboard sensors and external navigation references (e.g., GPS, and GNSS). There are two modes of autonomous UAV flight. Either predetermined waypoints are set for UAV to follow autonomously, or AI aided by on-board sensors can be used to make real-time decisions [25].
There are many challenging features offered by autonomous UAVs compared to remote-controlled UAVs. Long-range terrain-hugging flight is possible with autonomous UAVs [26]. The terrain hugging can be performed with the help of different types of RF and EO/IR sensors. In case of terrain hugging, the detection and tracking of the aerial vehicle becomes difficult. Autonomous UAVs can also be equipped to move over land and water autonomously. The ability to maneuver over land and water can provide an alternate route in case it is not possible to continue flight in a given area. Moreover, autonomous UAVs that do not require an external navigation reference like GPS are immune to the majority of ECM. Autonomous UAVs can change shapes by integration and disintegration of parts/UAVs based on the scenario. The integration and disintegration allows UAVs to perform diverse tasks in the air and on the ground. In the future, components of autonomous UAVs, and subsequently their shape, will be capable of being modified in real time using onboard 3D printing.

3.3. UAV Swarms

At present, a major challenge from UAVs is when they fly in swarms. In a UAV swarm, a large number of different sizes of autonomous UAVs can be used [27,28]. The rapidly and randomly time-varying trajectories of the UAVs in the swarm make their tracking difficult. A well-coordinated UAV swarm can outperform large, expensive, and complex UAVs/manned aerial vehicles. In general, there are many possibilities where UAV swarms can be used. Some example use case scenarios are as follows:
  • Each UAV in the swarm can be assigned a specific task [29], (e.g., EO/IR imaging, ECM, RF sensing). Moreover, if the payload is large, then it can be divided into modules and carried separately by individual UAVs in the swarm and can be combined during the flight when required.
  • In a UAV swarm, each UAV can either fly autonomously [30] following a pre-planned trajectory or cognitively adopt a trajectory [31] based on the real-time scenario using on-board sensors. AI algorithms can be used by each UAV in the swarm to coordinate with each other and/or the central controller. The central controller can be on the ground, a UAV in the swarm, or a manned aerial vehicle.
  • UAV swarms can adopt different shapes in the air [32] and can be equipped with the ability to integrate and disintegrate in the air when required.
  • UAV swarms can be used as airborne assets that can provide better situational awareness [33].
  • A swarm of UAVs in the air can also be used to create an antenna array [34]. Each UAV can carry an antenna element. The antenna array and subsequently the radiation pattern can be reconfigured by changing the position of the UAVs.
  • Miniaturized UAVs that have dimensions of a few inches can also be used in swarms [35]. The miniaturized UAVs in a swarm can work similarly to honey bees. There is a small effect of the environment on the flight of miniaturized UAVs (e.g., wind gusts). Miniaturized UAVs can also integrate to form large devices in the air in real time (e.g., to display patterns or to form a mobile phased array antenna in the air).

3.4. Electronic Countermeasures

Offensive and defensive electronic countermeasures (ECM) can pose a significant challenge to the detection, tracking, and classification of malicious UAVs. The UAVs can be equipped with various offensive and defensive ECM. Popular offensive ECM are jamming, spoofing, hacking, and high-energy radiation burst. The defensive ECM helps to shield against offensive ECM. Some popular defensive ECM are as follows:
  • The RF link between the UAV and the remote controller is vulnerable to jamming [36] and hacking [37]. The jamming can be avoided by spread-spectrum techniques and high frequency-hopping rates. The hacking attempts can be thwarted by using multi-layered authentication and encryption. The threat of jamming and hacking can also be reduced by using redundant RF links.
  • RF cognitive techniques can be used to analyze the energy distribution and hopping patterns of the RF jammer [38]. The analysis can help to adjust the RF parameters onboard the UAV accordingly to avoid jamming.
  • GPS spoofing can be eliminated by identifying the spoofed GPS signals [39]. The comparison of signals from multiple navigation references (both internal and external) can help to identify the spoofed GPS signal.
  • To save UAV onboard electronic equipment from high-energy electromagnetic (EM) radiation burst, metallic shielding can be used. Metallic and lead shielding can offer protection for the onboard electronic equipment against the EM radiation burst.

3.5. Types of Threats from Malicious UAVs

Conventional threats were perceived mainly from ground-based targets, and security measures were designed accordingly. However, UAVs have added another dimension to the conventional threats spectrum. Many threat scenarios can arise using UAVs. The major threats that involve malicious UAVs include [40,41,42,43]:
  • Hazardous payloads that can be carried by mischievous UAVs for long distances.
  • Surveillance and intelligence gathering by malicious UAVs (e.g., UAVs can be used to gather information near sensitive locations like police stations, borders, etc.).
  • Illegal activities using UAVs. Numerous activities can be carried out by using mischievous UAVs (eavesdropping, stealing personal data, unauthorized imaging, identity theft, and starting a fire, etc.).
  • Threats to governmental authorities, vehicles, and infrastructure. In particular, malicious UAVs can present a significant threat to sensitive infrastructure (e.g., nuclear power plants and chemical plants).
  • Threats to crowded areas.
  • Threats to the civil aviation industry. In the recent past, there were many reported incidents of mischievous UAVs interfering with the civilian flight operations [44].
  • UAV swarms. At present, the threat of UAV swarms is difficult to counter.
  • Unauthorized control of UAVs while flying. Hacking UAVs and flying them for malicious purposes.

4. Radar Systems for UAV Detection, Tracking, and Classification

Radar systems are mainly used for the detection, tracking, and classification of UAVs. In this section, we describe the detection, tracking, and classification of UAVs using radar systems. The limitations of the radar systems for the detection, tracking, and classification of UAVs are also discussed.

4.1. Conventional and Advanced Radar Systems

The performance of a radar system in a given terrain and for a given scenario (e.g., the type and number of aerial vehicles) depends on many factors including center frequency, bandwidth, modulation, sounding signal, pulse repetition frequency, receiver sensitivity, antenna beam characteristics, and clutter rejection ability [45]. The two main types of radar systems are pulse and continuous wave. Pulse and continuous wave radars are further sub-categorized as shown in Figure 2. Radar systems are generally configured/calibrated for conventional manned aerial vehicles, and modifications are required to detect, track, and classify small UAVs. Conventional radar systems use popular frequency bands including very high frequency (VHF), ultra high frequency (UHF), L, S, C, X, Ku, K, Ka, and millimeter wave.
In addition to conventional radar systems, there are advanced radar systems for detection, tracking, and classification of UAVs. Among the advanced radar systems, active electronically scanned array (AESA) radars are popular for the detection of small UAVs [46]. Advanced radar systems include passive, hybrid, multiple-input and multiple-output (MIMO), and cognitive radars. Passive radar systems can use different indirect illuminations (e.g., TV and FM radio broadcasting) for detection and tracking of UAVs [47,48,49,50]. Hybrid radar systems can also be used for precise positioning, detection, and tracking of aerial vehicles. In [51], a hybrid radar system using frequency-modulated continuous waves (FMCW) and interferometry is used for precise positioning. Similarly, in [52], a hybrid radar system consisting of active and passive radars is described. The hybrid active and passive radars in [52] provide better detection performance compared to single active/passive radar systems.
MIMO and cognitive radar systems can also be used for the detection and tracking of UAVs [53,54,55,56]. MIMO radars can provide better detection and tracking of small UAVs due to spatial diversity, which helps to improve ground clutter rejection. A 60 GHz FMCW MIMO radar [57] is shown in Figure 3. The FMCW MIMO radar in [57] is capable of detecting hovering and moving aerial vehicles simultaneously at tens of meters of range; however, UAV detection is not the main application of this radar, and it is included here rather for demonstration purpose. The main advantages of MIMO radar are high frame rate and ability to collect micro-Doppler data from multiple aerial vehicles simultaneously. Cognitive radars are also helpful in the detection and tracking of modern aerial threats. The parameters of the cognitive radar can be selected to be adaptively dependent on the aerial vehicle and the scenario. Adaptive parameter selection greatly helps in the detection, tracking, and classification of UAVs [58]. In addition, light detection and ranging (lidar) can also be used for the detection and tracking of UAVs [59]. Lidars can separate the background scene from a desired UAV easily compared to EO/IR imaging. The performance of UAV detection using lidar is better compared to other detection techniques in urban and cluttered environments. However, scanning using lidar takes a significant amount of time.

4.2. Detection of UAVs Using Radar Systems

The detection of an aerial vehicle by a radar system depends on the radar cross-section (RCS) of the aerial vehicle. The RCS of an aerial vehicle depends mainly on the frequency, polarization, and aspect angle. The RCS also depends on the physical characteristics of the aerial vehicle. The physical characteristics include the geometry and material of the aerial vehicle [60]. UAVs have significantly small RCS mainly due to their small size and largely non-metallic bodies. Small-RCS and low- and slow-flying UAVs are difficult for conventional radar systems to detect at long ranges without system calibrations [61]. The maximum range R max obtained using a radar after detection is given by the following:
R max = P T G 2 λ 2 σ P R , min ( 4 π ) 3 L 4 ,
where P T and P R , min are the transmit power and the minimum received power, respectively; G is the antenna gain; λ is the wavelength; σ is the RCS; and L represents the internal losses of the radar.
Detection using radar systems can be broadly classified as active or passive. Active radar systems are mainly used. Active radars have longer detection ranges and better tracking and classification compared to passive radars. Long-range detection is carried out using active search radars. The range and angular resolution of search radars are generally low compared to tracking/guidance radars. High-range and high-angular-resolution (but limited-range) active search radars using AESA or passive electronically scanned array (PESA) [62] can also be used. In comparison to active radars, passive radars/receivers use radio emissions from other radars or communications sources in the vicinity to detect the presence of an aerial vehicle. Passive radars are also popular for the detection of stealth aerial vehicles [63].
There are different radar systems for the detection of UAVs available at present [64,65]. FMCW, pulse-Doppler, ultra-wide-band, and phase interferometry radars are popular for the detection of UAVs [66,67,68,69]. AI techniques are also used for the detection of multiple UAVs simultaneously [70]. Similar to radar, lidar is helpful for the detection of UAVs [59].

4.3. Tracking of UAVs Using Radar Systems

Tracking of aerial vehicles can be performed either by a search radar or by a separate tracking radar [71]. A dedicated tracking radar is generally used to obtain continuous information of the aerial vehicle using narrow illumination beams [71]. Tracking radars have higher range and angular resolution beams compared to search radars. The tracking equation of radar is as follows:
S / N = P t G 2 λ 2 σ ( 4 π ) 3 R 4 k T s B n L ,
where S / N is the signal-to-noise ratio, R is the slant range between the radar and the aerial vehicle, k is the Boltzmann constant, T s is the total system temperature, and B n is the RX noise bandwidth. During tracking, the position coordinates, in 2D or 3D, and motion characteristics (velocity and trajectory) of the aerial vehicle are stored. The position coordinates includes range, azimuth, and elevation angles of the aerial vehicle from the radar reference.
Numerous techniques for UAV tracking are available in the literature [72,73]. The tracking of UAVs is challenging compared to manned aerial vehicles at long distances, mainly due to the small size of UAVs [74]. Trajectory tracking of highly maneuverable UAVs is discussed in [75], where a filtration algorithm is used for UAV trajectory tracking. The tracking using filtration algorithm in [75] provides better tracking of highly maneuverable UAVs in noisy environments compared to other techniques for tracking. Moreover, tracking of multiple aerial vehicles is complicated compared to single aerial vehicle tracking [76]. For example, the tracking becomes difficult for a large swarm of UAVs [77].
Based on the tracking information, future trajectory estimates are made using estimation algorithms [78]. The trajectory estimation helps in: (1) estimation of the point of the origin of the desired aerial vehicle; (2) estimation of the terminal point; (3) guidance towards an aerial vehicle; (4) target classification based on the trajectory features; and (5) predicting the intent of the aerial vehicle. AI algorithms are mainly used to forecast the trajectory of UAVs [79,80]. In addition to AI algorithms for trajectory estimation, other algorithms are available in the literature. In [81], dynamic Bayesian filters are used for tracking and estimation of UAV trajectory.

4.4. Classification of UAVs Using Radar Systems

Classification of aerial vehicles using conventional radar systems was not very refined. For example, the RCS and velocity of aerial vehicles were used for classification of different types of aerial vehicles. However, the exact classification of the type of aerial vehicle was not always made. Nowadays, aerial vehicles have grown in complexity and types, and new classification methods are available using radar systems [82]. In particular, the classification of UAVs compared to birds is challenging due to similar features [83]. Many techniques are available in the literature for the differentiation of small UAVs from birds [84,85].
The features of different types of UAVs also differ significantly [86]. These features are used for classification. For example, micro-Doppler radar signatures are used for enhanced detection of multi-rotor UAVs [87] and to differentiate small UAVs from birds [23]. In [88], experimental micro-Doppler signatures are studied to classify payload and intent. A micro-Doppler setup scenario for a four-blade helicopter and monostatic radar is shown in Figure 4. Range-velocity, micro-Doppler modulation plots are shown in Figure 5 and Figure 6, respectively. From Figure 5 and Figure 6, it can be observed that there are distinct contributions from the rotating blades and rotating central body (where the blades are attached). The micro-Doppler signatures in Figure 5 and Figure 6 help to classify the aerial vehicle.
The classification of UAVs using radar systems is greatly aided by AI algorithms [64]. In [89], laser mesh in the air is simulated to obtain the parameters of aerial vehicles. Different classification models are generated based on the AI classifiers, training data, and aerial vehicle classes in [89], given as follows:
M 1 = f ( NB ) M ( Tr ) , C ( Tr ) , M 2 = f ( LDA ) M ( Tr ) , C ( Tr ) , M 3 = f ( KNN ) M ( Tr ) , C ( Tr ) ,
where M i for i = 1 , 2 , 3 are the classification models based on the naive Bayes, linear discriminant analysis, and K-nearest neighbor classifiers; f ( NB ) , f ( LDA ) , and f ( KNN ) are the classifier functions for naive Bayes, linear discriminant analysis, and K-nearest neighbor, respectively; M ( Tr ) is the training matrix containing training data; and C ( Tr ) is the array containing the aerial vehicle classes in [89]. The estimation of a particular class using the predict function is given as follows:
C ( est , M i ) = predict M i , M ( eval ) ,
where M ( eval ) is the matrix containing the feature data of the aerial vehicle for evaluation.

4.5. Limitations of Radar Systems

There are various limitations of the radar systems for detecting and tracking modern aerial threats [91], mainly from UAVs. Similarly, offensive ECMs applied by UAVs provide a major challenge to any modern radar system. Limitations of radar systems are summarized as follows:
  • Radar systems are generally inefficient in terms of the energy transmitted and received. A large amount of transmit energy is required for the detection of small UAVs.
  • Active radar systems have the risk of detection due to energy emission.
  • There are limitations of the radar systems for detecting, tracking, and classifying small, low-flying UAVs in cluttered scenarios [92].
  • The detection of small RCS aerial vehicles (e.g., UAVs) requires careful calibration of the radar system and constant adjustment of the detection threshold. The pfa for small-RCS aerial vehicles in cluttered environments generally increases [93].
  • A large swarm of UAVs can overwhelm the majority of radar systems. The individual UAVs in a swarm are difficult to track by radar systems. Range and Doppler ambiguities are expected to increase for a given radar system detecting a large swarm of UAVs.
  • Offensive ECMs used by UAVs can jam and spoof radar systems.

5. Methods Other Than Radar Systems for UAV Detection, Tracking, and Classification

Due to limitations of the radar systems, as discussed in Section 4.5, there are numerous methods proposed in the literature for countering malicious UAVs. In this section, current methods of detection, tracking, and classification of UAVs other than radar systems are discussed. Current methods of disabling UAVs are also provided.

5.1. EO/IR

The popularity of EO/IR methods has increased in the recent decade [94]. The EO/IR imaging technologies can operate at different frequency bands. The selection of the frequency bands is dependent on the type of aerial vehicle and operating environment. EO/IR sensors can provide excellent detection, tracking, and classification of small UAVs in day/night conditions [95,96]. However, the performance of EO/IR sensors is dependent on the complexity of the background of the aerial vehicle and the thermal image saturation. Haze, fog, rain, and snow can also affect the performance of EO/IR imaging sensors. The EO/IR imaging technique has limitations in detecting small UAVs in highly cluttered environments. Moreover, the range of EO/IR imaging is limited by the horizon. The range of EO/IR imaging can be increased with the height of the sensors above the ground.

5.2. RF Analysis

The RF signature of signals between the UAV ground controller and the UAV onboard receiver is different for different types of controllers [97,98]. The particular signature or fingerprint of the RF link between the UAV ground controller and the onboard UAV receiver can be sensed passively to detect the presence of a UAV. The RF fingerprint of the communication link between the UAV ground controller and the UAV receiver is unique compared to other wireless communication devices. RF fingerprinting can also be used to determine the type of the UAV [99]. In [97], the RF link between the UAV and ground controller is analyzed, and machine learning methods are used for the classification of a particular type of ground controller. The RF analysis setup in [97] is shown in Figure 7. RF fingerprinting for the detection and classification of UAVs is only effective if there is an active RF link between the UAV ground controller and the UAV receiver. Autonomous UAVs that have no external RF link can fly in radio silence and cannot be detected by RF fingerprinting.

5.3. Acoustic Analysis

Different types of UAVs have different acoustic signatures. The acoustic signals from the propellers, engine, and motors are used to detect the presence of a UAV [100,101]. Microphones are used to collect the sound/noise from the flying UAV. The acoustic signals and AI algorithms can also be used to determine the type of a UAV [102]. Similar to RF fingerprinting, acoustic sensing works in a passive mode for the detection of UAVs. The major limitations of the acoustic approach are limited range and performance dependence on ambient noise.

5.4. Sensor Fusion

A combination of different sensors discussed above can be used for the detection, tracking, and classification of UAVs [103]. Sensor fusion can help to provide layered security around a given parameter. A network of different sensors placed at different locations can provide better spatial coverage compared to a single-location placement of a large sensor. The sensors can be placed on the ground or mounted on an airborne platform (e.g., a UAV or satellite). Airborne sensors have better visibility and coverage compared to ground-based sensors. Airborne sensors can also move to optimum locations based on the scenario.

5.5. Current Methods for Disabling UAVs

The current methods for disabling UAVs are divided into kinetic and non-kinetic methods [104]. The kinetic methods mainly use nets, prey birds, and guided or unguided projectiles. There are limitations of using nets and prey birds for countering UAVs. Nets have a limited range and require a precise tracking system to determine the exact coordinates of the desired UAV in space. The use of a net may not be effective against several spatially spaced UAVs. Countering UAVs with large prey birds is also challenging. The initial cost, training, and maintenance cost of prey birds is large. Prey birds are not effective in certain weather and light conditions. The prey birds also have limited efficacy against UAV swarms.
The non-kinetic methods include (1) GPS spoofing [39], (2) hacking RF control communications between the ground controller and the UAV [105], (3) high-energy EM radiation burst [106], and (4) high-energy laser [107]. There are limitations of non-kinetic methods also in disabling UAVs. GPS spoofing and hacking RF communications are not effective against autonomous UAVs that have no external RF link and require no external navigation reference. The high-energy EM radiation method also has limitations. High-energy EM radiation may be ineffective against electronic equipment that is shielded. In addition, the range of high-energy EM radiations is limited, and the cost is high. High-energy lasers may not be effective against a wide spectrum of UAV threats. A high-energy laser is less effective against highly mobile UAVs equipped with heat sensors. High-energy laser beams may also be ineffective against UAV swarms. Moreover, the initial cost and energy required for the laser beams are high.

6. Future Research Directions for UAV utilization and their Detection, Tracking, and Classification

The current countermeasures are not always effective against a broad spectrum of threats from UAVs. There are various research efforts to find novel methods to counter malicious UAVs. In this section, future directions for the potential uses of UAVs and their detection, tracking, and classification are discussed. A comparison of current and possible future countermeasures against malicious UAVs is provided in Table 3.

6.1. Potential Uses of UAVs

Smart UAVs are expected to revolutionize the evolving UAV technology and potential future applications. A major application of smart UAVs is in the field of civil infrastructure. The civil infrastructure market is expected to cover more than USD 45 billion of the UAV market share [108]. In particular, laser power beaming is envisaged to provide supplemental energy to smart UAVs when the solar energy is not adequate. Laser power beaming can allow smart UAVs to fly for weeks and months without landing [108]. In [109], use of intelligent UAVs to enhance the economic growth of a specific world region is discussed. The major sectors of the economy where intelligent UAVs can be used include precision agriculture, environmental pollution monitoring, geophysical processes monitoring, exploration of minerals, and monitoring of traffic and cattle/wild animals. The possibilities of UAVs used as remote sensing nodes for solving urban area issues are discussed in [110]. The use of UAVs as remote sensing nodes can provide solutions to different urban area issues, such as collection of data for urban planning, disaster management, and infrastructure monitoring. UAVs are also envisioned as an integral part of future smart cities [111]. UAVs in future smart cities can be used for traffic management, environmental and pollution monitoring, civil security management, and goods delivery.

6.2. Modern Radar Systems

There are new radar systems available in the literature for the detection of UAVs, such as MIMO radars with narrow beams and high angular resolution that are effective against small UAVs [53]. MIMO radar systems can be mounted on airborne platforms that can provide better spatial diversity and situational awareness. Moreover, reconfigurable antennas can be used for MIMO radars for better adaptability to a given scenario. Cognitive radars can also be effective against UAV threats [58]. Cognitive radars can select the transmit signal characteristics, illumination of the aerial vehicle, and receiver characteristics based on feedback from the environment and aerial vehicle. Cognitive radar systems are expected to gain significant attention in the future for detection, tracking, and classification of UAVs. Future cognitive radar systems are expected to have reconfigurable antennas and AI-driven cognitive engines.
Passive radars have also gained popularity for the detection of small UAVs and stealth aerial vehicles [112,113,114,115]. Different sources of illumination (e.g., TV, FM, and telecommunications signals) can be used. Passive radars in bi-static and multi-static configurations can also be used for early warning against UAVs [48,116]. A bi-static radar system with one emitter and four receivers/sensors is shown in Figure 8 (from [117]). In Figure 8, four ellipsoids indicate the coverage of the bi-static sensors. The fuse detection lies close to the intersection region of the ellipsoids and close to the actual position of the aerial vehicle. The estimated range R b using bi-static radar is given as follows [118]:
R b = j = 2 2 R c ( d + j ) . z ( d + j ) 2 ,
where R c ( x ) is the range at the range bin center; x, z ( x ) is the range cell voltage at cell x; and d is the range cell where detection is declared. Multiple antennas and polarization can be used for future passive radars for reception of scattered signals from UAVs. Moreover, beam steering can be used for passive radars that can help to receive weak aerial vehicle signals from a given direction.
Other modern radars include interferometry radars [69,119] for detection and tracking of UAVs. A combination of different radar techniques can also be used for the detection of modern aerial threats [51,52,85]. Micro-Doppler radars are popular for UAV classification [88]. The micro-Doppler radar returns are processed using various AI algorithms for the classification of UAVs [120]. A major limitation of micro-Doppler radars is their short range, high sampling rate requirement, and long post-processing time [82]. These limitations need to be overcome in future UAV classification applications.

6.3. AI Techniques

AI algorithms can help in the detection, tracking, and classification of UAVs using popular approaches, such as radar [121], EO/IR [122,123], acoustics [70], and RF analysis [98]. The detection and classification of UAVs using AI algorithms require a large database of training data. The training database can consist of size, shape, payload, flight characteristics, micro-Doppler, RF, infrared, and acoustic signatures of different types of UAVs. Major limitations of the AI techniques for detection, tracking, and classification of UAVs are the large training data and processing time requirements [124]. Future AI techniques for detection, tracking, and classification of UAVs are required to overcome these limitations by using smart training data and efficient AI algorithms.
Different types of UAVs follow specific trajectories for different flight trips. The trajectory of a UAV can be used to forecast the future track and intent of the UAV. A database of the trajectories of different types of UAVs for different flight operations can be created. The database and AI algorithms can be used to forecast the trajectory and intent of a detected UAV in real time. Moreover, the UAV trajectory estimates can be improved by combining trajectory estimates collected from multiple sensors at different spatial locations.

6.4. Laser Beams

The concept of using laser beams to detect, track, and classify different types of aerial vehicles is new. It was introduced in [89]. A mesh of laser beams can be created using at least two of the airborne platforms described in [89] and shown in Figure 9. The laser beams extend from the airborne platform to the ground. Any aerial vehicle that blocks the path of the laser beams will be detected and subsequently localized and classified. A major benefit of the laser mesh is that an aerial vehicle will be detected independent of the size, shape, and material. Moreover, the tracking and classification will be significantly simplified compared to radar systems. However, a major limitation of the laser beams setup is the large initial deployment cost. A possible solution to large initial cost is to use airborne infrastructure (e.g., satellite constellations) for dual purposes.

6.5. Space and Airborne Assets

Space and airborne assets (e.g., satellites, high-altitude tethered UAVs) can be used for long-range surveillance and can provide large area coverage and early warning against low-flying aerial vehicles. Different types of sensors can be used on space and airborne assets. For example, cameras and RF sensors can be used on tethered UAVs placed at different locations of important areas (e.g., airports) for additional visibility and better situational awareness. A major bottleneck for the operations of the airborne sensors is the wireless link between the airborne sensor and other communicating nodes. The wireless link between the airborne sensor and other communicating nodes is vulnerable to ECM (e.g., jamming and hacking). The operational cost of sensors onboard airborne platforms is also high compared to ground platforms. In the future, large satellite constellations could be used for remote UAV localization, in addition to other tasks.

6.6. Distributed Sensors

A layer of distributed sensors can be used for the early detection, tracking, and classification of UAVs. Small, simple, and off-the-shelf sensors can be used over a large area for the detection, tracking, and classification of UAVs. Small and off-the-shelf sensors distributed over a large area can compensate for large, complex, and expensive sensors installed at single or limited locations. For example, microphones and/or low-cost cameras can be installed on the rooftops of tall buildings, cellular towers, electricity transmission poles, and signboards for early detection, tracking, and classification of passing UAVs. A possible scenario using layers of distributed sensors is shown in Figure 10. In Figure 10, the sensors are used at three layers. The output of the first-layer sensors is fed to a central network that can provide early warning to the subsequent layers of sensors. A major limitation of using a distributed sensors network for UAV detection and tracking is the relay of information from distributed points to a central location. A possible solution to this limitation is to use already available telecommunication networks for information relaying.

6.7. Countering UAV Swarms

Radars can be more effective in the detection of UAV swarms at a large distance compared to other methods. However, radar systems have difficulty in tracking a large swarm of spatially spaced aerial vehicles simultaneously. In addition to current techniques available in the literature for detecting and tracking UAV swarms, a possible solution is to use area-based tracking. Multiple steerable antenna beams can be used for area-based tracking. Each beam can track a 3D area occupied by a cluster of UAVs instead of tracking individual UAVs. Each 3D area will contain a different number of UAVs at different scanning instances. Area-based tracking can better assist in tracking individual UAVs in a swarm.

6.8. Regulating UAV Traffic

In addition to the techniques available in the literature for UAV traffic management [125], in the future, aerial highways for UAVs can be envisioned. The UAVs can only pass through the aerial highways and will be tagged and registered. The tagged and registered UAVs will be considered legitimate traffic. An IP address is assigned dynamically to the UAV, and its international identification address will be registered before entering the aerial highway. Any UAV that does not follow the route can be fined and taken away from the air. A new base-station-like structure and available telecommunication base stations can be used as checkpoints. As the UAV moves across the aerial highways, its correspondence will be handed over to multiple checkpoints. In addition, every UAV should have a mandatory transponder installed for identification during the flight.

6.9. Terrain-Specific Countermeasures

The countermeasures effective in one terrain may not be effective in another. For example, in an urban environment, the acoustic detection method may not work efficiently. Similarly, short-range radar systems using the higher end of the spectral band may have difficulty detecting aerial vehicles in a mountainous area. Therefore, the countermeasures for UAVs can be adopted based on the specific terrain. In addition, long-range detection, tracking, and classification of UAVs in different terrains can be performed using assets in space. An example is a satellite multi-static radar system. The transmitter of the satellite multi-static radar can be located on the satellite, and the receivers can be placed at distributed locations on the ground to collect the reflected signals from UAVs. Terrain-specific countermeasures may work better compared to multi-terrain countermeasures; however, a specific countermeasure in a given terrain may not be fully effective in another terrain.

7. Unmanned Underwater Vehicles

In this section, the current and expected future capabilities of UUVs are described. The challenges and threats from intruding UUVs, and the detection, tracking, and classification of UUVs using active and passive sonar are also covered in this section.

7.1. Capabilities of Current and Future Unmanned Underwater Vehicles

The long duration and low-cost deepwater missions possible using UUVs have changed the paradigm of sea operations in favor of UUVs [126]. UUVs are similar to MUVs in shape and capabilities. However, the absence of humans allows a smaller size; higher maneuverability; low initial, operational, and maintenance costs; larger payload; higher maneuverability and speed; deepwater operations; longer duration; and quieter operation compared to MUVs. The small cost of UUVs compared to MUVs allows using multiple UUVs at different locations. The UUVs at different locations can form a network for sharing information. For example, the UUVs can be used in swarms [127] that can work as a distributed sensor network covering vast areas and various depths undersea. UUVs in a swarm can be used for different applications, such as underwater communications, surveillance, decoys, and escorts for underwater and surface vehicles. Moreover, simple sails can be used to convert UUVs into overwater unmanned vehicles. In Table 4, popular autonomous UUVs, types of sensors installed, dimensions, maximum endurance, and operating depths are provided.
UUVs can either be controlled remotely or work autonomously using AI. However, the communication link for remote control of UUVs has many challenges underwater. Radio waves cannot travel deep into the water, and acoustic communications have small bandwidth and large delays. Therefore, the majority of UUV operations are autonomous [128]. Autonomous UUVs face difficulties in transferring real-time information remotely while submerged. In addition, in the case of a robotic failure (e.g., due to a sudden change in the sea conditions), the UUV is lost in the majority of cases.
Another limitation of UUVs is the choice of energy source. Currently, battery-powered UUVs are used that have limited time duration underwater. Glider UUVs, on the other hand, requires a small amount of energy and can be used for long-duration operations [129]. However, glider UUVs are required to follow a specific up and down motion. Navigation reference for positioning is also challenging for UUVs underwater. Long baseline [130] and ultra-short baseline [131] are commonly used for positioning reference underwater. However, a UUV needs to be in the coverage area of the long and ultra-short baseline position systems, and the accuracy is dependent on the underwater position of the UUV.
Future UUVs are expected to have the following capabilities: (1) multiple communication links operating at different spectral bands to transfer real-time underwater data; (2) energy-efficient long-duration operations; (3) multiple sensors installed and controlled cognitively; (4) high positioning accuracy; (5) ability to communicate with nearby UUVs, forming a network; and (6) ability to operate underwater and overwater.

7.2. Challenges and Threats from Malicious UUVs

Compared to manned underwater vehicles, UUVs are difficult to detect, track, and classify undersea. The challenges in the detection, tracking, and classification of UUVs are mainly due to their small size (similar to common marine animals), deepwater operations, small noise generation while moving underwater, and the ability to remain submerged for a long period of time. Furthermore, UUVs coated with sound-absorbing material, able to move both over and under the sea, and equipped with autonomous cognitive abilities, present additional challenges to detection, tracking, and classification. The mischievous UUVs that work autonomously present major threats, and the threats can be categorized as follows:
  • Threat of unauthorized surveillance using malicious UUVs [132]. For example, UUVs can move close to coastal areas comparatively easily compared to manned underwater vehicles. While near the coastal areas, the UUVs can eavesdrop on the surroundings. Similarly, mischievous UUVs can be used to gather surveillance information while at sea by attaching to a large ship as a parasite.
  • Threat of unauthorized smuggling using malicious UUVs [133]. Malicious UUVs can be used to carry contraband items undersea without detection.
  • Threat of spoofing and jamming using mischievous UUVs. Malicious UUVs can be used to produce spoofed GPS signals that can divert ships. Malicious UUVs can also be used to hack/deny information between ships or between ship and air/ground transceivers.
  • Threat from a swarm of malicious UUVs. UUVs can operate autonomously in a swarm underwater [134,135]). A swarm of malicious UUVs can present a major threat to overseas and undersea vehicles. The countering of a swarm of UUVs is significantly challenging to date.
  • Threat to undersea infrastructure. Mischievous UUVs can present a threat to undersea infrastructure (e.g., optical fiber cables [136], and oil/gas pipelines undersea [137]).

7.3. Detection, Tracking, and Classification Using Active Sonar and Passive Sonar

Common EM waves cannot travel deep underwater due to high attenuation. Extremely low frequency (ELF) EM waves can be used for deepwater propagation [138]. However, ELF requires extremely large antennas. Compared to EM waves, the sound waves (acoustic signals) travel deeper and faster underwater. In addition, the intensity of the sound waves is higher underwater than in the air. Therefore, sound waves are well suited for underwater propagation [139]. However, compared to EM waves in the air, the speed of sound is not constant underwater. The speed and range of sound waves depend on the pressure, salinity, and temperature under the water.
Moreover, a thermocline layer is formed under seawater due to changes in water temperatures at certain depths [140]. The thermocline layer can affect sound wave signaling. In general, if the sound waves emitter/receiver and underwater vehicle are above and below the thermocline layer, then the probability of detecting the underwater vehicle is significantly low due to refraction (bending) of the sound waves from the thermocline layer. There are multipath sound signals due to refraction from the thermocline layer, refraction at large depths (before the bottom of the sea), reflection from the bottom of the sea, and reflections from different objects underwater. Multipath sound signals underwater make the detection and classification of underwater vehicles difficult.
Sonar is based on the transmission and reception of sound signals and is used for two major purposes. One is underwater environment mapping and imaging [141], and the other is underwater vehicle detection, tracking, and classification. The detection of an underwater vehicle can be performed using sonar in the active or passive mode [142]. Active sonar sends out particular frequency sound pulses into the water. The reflected sound waves from different objects are collected to determine the presence of an underwater vehicle. A signal processing diagram of active sonar is shown in Figure 11a. The selection of the frequency of the active sonar depends on the requirement. For example, low-frequency sound pulses can be used for long-range detection, whereas high frequency is used for high-resolution imaging. The different frequencies used by sonar and corresponding applications are shown in Table 5. The active sonar equation [143] is given as follows:
( S / N ) a ( d B ) = S L 2 T L ( N L D I ) + T S ,
where S L is the source level, T L is the transmission loss, N L is the noise level, D I is the directivity index of the receiver or array gain, and T S is the target strength. An active towed sonar array scenario is shown in Figure 12. An active sonar setup for the detection of UUV is shown in Figure 13, where the sonar is mounted on a remotely operated vehicle (ROV) or UUV. Active sonar is used to detect another ROV underwater. Imaging of the measurement environment is also obtained using the sonar in Figure 13.
A major limitation of active sonar is counter-detection [144]. Counter-detection is the detection of the originating source. Compared to active sonar, passive sonar only listens to the sound/noise from surrounding objects. A block diagram of signal processing using passive sonar is shown in Figure 11b. Differentiation of the sound of an underwater vehicle from the surroundings is a challenging task for passive sonar systems. Spectral analysis of the sounds/noise from various objects in the surroundings is generally carried out. The spectral analysis and a training database of possible underwater objects are used for underwater vehicle identification by passive sonar. The performance of the passive sonar depends mainly on the noise floor of the underwater environment. For example, near busy shipping lanes or fishing areas, the environment is noisy and cluttered; therefore, the detection of underwater vehicles becomes challenging. A possible solution to improve the detection performance in a noisy environment is to use a network of passive sonar. In the case of passive sonar, the target strength T S in (6) will be absent, so the equation will be as follows:
( S / N ) p ( d B ) = S L T L ( N L D I ) .
The conventional detection, tracking, and classification methods using sonar are currently not able to cover a wide spectrum of modern underwater threats. The conventional techniques to detect and track MUVs using sonar [145,146] may not be effective for UUVs, and new innovative techniques are required. In [147], narrowband and broadband acoustic passive signal processing is used for the detection, localization, and tracking of UUVs. In [148], an active non-imaging sonar is used for underwater detection and localization, which could be used for UUV. The active sonar in [148] uses consecutive transmission of reference and spiral signals. Bearing, range, radial velocities, and tracking of the underwater objects were also carried out in [148]. The classification of underwater objects is carried out using a convolutional neural network applied on sonar images in [149]. The classification is applied on sonar images obtained through a platform mounted on a UUV. The results show that deep learning provides better performance compared to other feature extraction methods in [149].
Target motion analysis (TMA) is a popular method for passive sonar systems to find and track underwater objects [150]. TMA provides the position, course, and speed of an underwater moving object. TMA uses standard geometric techniques for location estimation. However, TMA has limitations in simultaneously detecting multiple objects that are moving randomly (e.g., UUVs at different depths). Another popular approach for finding the location of an underwater moving object is by using an array of hydrophones [151]. The array of hydrophones can be mounted on the surface of MUVs or UUVs or towed away from the surface by underwater vehicles [152]. The spatially spaced array elements are used to capture sounds from different directions to find the location of the desired object. The hydrophone arrays can be one dimensional, two dimensional, or three dimensional. A one-dimensional array can only provide the range information, whereas azimuth angle information can be obtained by a two-dimensional array. A three-dimensional array can provide both azimuth angle information and the depth of the desired object underwater.

7.4. Future UUV Uses and Directions for Countering Malicious UUVs

There are many potential uses of UUVs in the future. In particular, autonomous UUVs are expected to dominate major future applications at sea. Major applications of UUVs include the following:
  • High-resolution underwater mapping of the seafloor, sea condition monitoring in a given area, and predicting turbulence and other unexpected changes in the water, similar to a weather forecast.
  • Monitoring of marine flora and fauna.
  • Navigation system similar to GPS using UUVs underwater.
  • UUVs can be used for search and rescue and to help in disaster management. UUVs can also be used by law enforcement departments at sea.
  • UUVs on the sea surface can provide radio beacons that can assist in long-distance communications in case the satellite link is down/not available. The radio beacons from UUVs can ensure that the ships move in designated lines and avoid collision.
  • An underwater network of sensor nodes using UUVs can be created that can assist in different remote sensing applications.
  • Monitoring and maintenance of underwater infrastructure, such as oil rigs and underwater oil and gas pipelines, power generation stations at sea, and optical fiber.
The detection, tracking, and classification of malicious UAVs over oceans can be performed with a network of UUVs. A network of mobile UUV sensor nodes can be established that covers vast areas of the oceans. The mobile sensor nodes can work autonomously to position themselves optimally for data collection and analysis. The UUVs in the sensor network can be assigned different tasks. For example, one group of UUVs can be assigned the task of communications with the infrastructure above the water, while another group of UUVs in the network can be assigned the task of positioning reference, and other members of the network can be equipped with hydrophones for detection and tracking.
Distributed sensors (e.g., submerged tethered hydrophones) can be installed on oil rigs, large cargo ships, fishing vessels, and so on. The distributed sensors can help to detect suspicious UUVs in the vicinity. The data from the distributed sensors can be relayed via satellite links to a central point for analysis. Satellite imaging specifically focused on detecting and tracking malicious UUVs when they surface over water can also be used. Furthermore, cognitive acoustic and software-defined sonar networks can be used for the detection and tracking of UUVs. The cognitive adjustment of sonar parameters can increase detection and tracking accuracy against malicious UUVs.

8. Conclusions

The challenges posed by UAVs and UUVs have significantly increased in the recent decade. However, there are limited capabilities at present to defend against these challenges. In this study, we have covered some of the key features and capabilities of UAVs and UUVs; the threats and challenges from UAVs and UUVs; and different detection, tracking, and classification methods currently available against malicious UAVs and UUVs. The limitations of the current methods and future directions for detection, tracking, and classification of UAVs and UUVs are also provided.

Author Contributions

The initial data collection was performed by Q.Y., J.G. and N.I.R. The measurement data and related discussion were led by V.S., W.K. helped in the data collection as well as organized the data, and performed mainly the writing task. I.G. provided overall analysis and comprehensive review of the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This work has been funded by NSF under grant id CNS-1708352.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Acknowledgments

We would like to thank Matins Ezuma for his contribution toward UAV detection and classification using RF analysis.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Valuates Reports. Unmanned Aerial Vehicle (UAV) Market Size to Reach USD 72320 Million by 2028 at a CAGR of 14.4%. Available online: https://www.prnewswire.com/in/news-releases/unmanned-aerial-vehicle-uav-market-size-to-reach-usd-72320-million-by-2028-at-a-cagr-of-14-4-valuates-reports-870953616.html (accessed on 23 April 2022).
  2. Nawaz, H.; Ali, H.M.; Massan, S. Applications of unmanned aerial vehicles: A review. Tecnol. Glosas InnovaciÓN Apl. Pyme. Spec. Issue 2019, 2019, 85–105. [Google Scholar] [CrossRef]
  3. Kim, J.S.; Baek, D.; Seo, I.W.; Shin, J. Retrieving shallow stream bathymetry from UAV-assisted RGB imagery using a geospatial regression method. Geomorphology 2019, 341, 102–114. [Google Scholar] [CrossRef]
  4. Nikolakopoulos, K.G.; Lampropoulou, P.; Fakiris, E.; Sardelianos, D.; Papatheodorou, G. Synergistic use of UAV and USV data and petrographic analyses for the investigation of beachrock formations: A case study from Syros Island, Aegean Sea, Greece. Minerals 2018, 8, 534. [Google Scholar] [CrossRef] [Green Version]
  5. Specht, C.; Lewicka, O.; Specht, M.; Dąbrowski, P.; Burdziakowski, P. Methodology for carrying out measurements of the tombolo geomorphic landform using unmanned aerial and surface vehicles near Sopot Pier, Poland. J. Mar. Sci. Eng. 2020, 8, 384. [Google Scholar] [CrossRef]
  6. Research and Markets. Unmanned Aerial Vehicle (UAV) Market by Point of Sale, Systems, Platform (Civil & Commercial, and Defense & Governement), Function, End Use, Application, Type, Mode of Operation, MTOW, Range, and Region-Global Forecast to 2026. Available online: https://www.researchandmarkets.com/reports/5350868/unmanned-aerial-vehicle-uav-market-by-point-of (accessed on 20 August 2021).
  7. Yaacoub, J.P.; Noura, H.; Salman, O.; Chehab, A. Security analysis of drones systems: Attacks, limitations, and recommendations. Internet Things 2020, 11, 100218. [Google Scholar] [CrossRef]
  8. Dudush, A.; Tyutyunnik, V.; Trofymov, I.; Bortnovs’ Kiy, S.; Bondarenko, S. State of the Art and Problems of Defeat of Low, Slow and Small Unmanned Aerial Vehicles. Adv. Mil. Technol. 2018, 13, 157–171. [Google Scholar] [CrossRef]
  9. Beaudoin, L.; Gademer, A.; Avanthey, L.; Germain, V.; Vittori, V. Potential threats of UAS swarms and the countermeasure’s need. In Proceedings of the European Conference on Information Warfare and Security (ECIW), Tallinn, Estonia, 7–8 July 2011. [Google Scholar]
  10. Hartmann, K.; Giles, K. UAV exploitation: A new domain for cyber power. In Proceedings of the IEEE International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, 31 May–3 June 2016; pp. 205–221. [Google Scholar]
  11. Palestini, C. Countering Drones: Looking for the Silver Bullet. Available online: https://www.nato.int/docu/review/articles/2020/12/16/countering-drones-looking-for-the-silver-bullet/index.html (accessed on 20 August 2021).
  12. Budiyono, A. Advances in unmanned underwater vehicles technologies: Modeling, control and guidance perspectives. Indian J. -Geo-Mar. Sci. 2009, 38, 282–295. [Google Scholar]
  13. Johnson, E.A. Unmanned Undersea Vehicles and Guided Missile Submarines: Technological and Operational Synergies; Number 27, Center for Strategy and Technology, AirWar College; Air University: Islamabad, Pakistan, 2002. [Google Scholar]
  14. Irizarry, J.; Johnson, E.N. Feasibility Study to Determine the Economic and Operational Benefits of Utilizing Unmanned Aerial Vehicles (UAVs); Technical Report; Georgia Institute of Technology: Atlanta, GA, USA, 2014. [Google Scholar]
  15. Kotarski, D.; Piljek, P.; Kasać, J. Design Considerations for Autonomous Cargo Transportation Multirotor UAVs. In Self-Driving Vehicles and Enabling Technologies; IntechOpen: London, UK, 2020. [Google Scholar]
  16. Neji, N.; Mostfa, T.; Sebbane, Y.B. Technology assessment for radio communication between uav and ground: Qualitative study and applications. In Proceedings of the IEEE Vehicular Technology Conference IEEE, Kuala Lumpur, Malaysia, 28 April–1 May 2019; pp. 1–6. [Google Scholar]
  17. Elmokadem, T.; Savkin, A.V. Towards Fully Autonomous UAVs: A Survey. Sensors 2021, 21, 6223. [Google Scholar] [CrossRef] [PubMed]
  18. Khan, M.S.; Shah, S.I.A.; Javed, A.; Qadri, N.M.; Hussain, N. A critical analysis of small but heavy-lift multirotor and their flight controllers. In Proceedings of the International Bhurban Conference on Applied Sciences and Technologies (IBCAST), Islamabad, Pakistan, 12–16 January 2021; pp. 132–151. [Google Scholar]
  19. Ward, T. The Fastest Drone On Earth Just Reached Speeds Over 163 MPH. Available online: https://futurism.com/the-fastest-drone-on-earth-just-reached-speeds-over-163-mph (accessed on 7 March 2022).
  20. Global Security. Sukhoi S-70 Okhotnik-B. Available online: https://www.globalsecurity.org/military/world/russia/su-70-specs.htm (accessed on 7 March 2022).
  21. Katikala, S. Google project loon. InSight: Rivier Acad. J. 2014, 10, 1–6. [Google Scholar]
  22. Simic, M.; Bil, C.; Vojisavljevic, V. Investigation in wireless power transmission for UAV charging. Procedia Comput. Sci. 2015, 60, 1846–1855. [Google Scholar] [CrossRef] [Green Version]
  23. Molchanov, P.; Egiazarian, K.; Astola, J.; Harmanny, R.I.A.; de Wit, J.J.M. Classification of small UAVs and birds by micro-Doppler signatures. In Proceedings of the IEEE European Radar Conference, Nuremberg, Germany, 9–11 October 2013; pp. 172–175. [Google Scholar]
  24. Wang, C.; Wang, J.; Wang, J.; Zhang, X. Deep-Reinforcement-Learning-Based Autonomous UAV Navigation With Sparse Rewards. IEEE Internet Things J. 2020, 7, 6180–6190. [Google Scholar] [CrossRef]
  25. Bouhamed, O.; Ghazzai, H.; Besbes, H.; Massoud, Y. A UAV-Assisted Data Collection for Wireless Sensor Networks: Autonomous Navigation and Scheduling. IEEE Access 2020, 8, 110446–110460. [Google Scholar] [CrossRef]
  26. Javed, M.I.; Afghani, S.; Ali, S.I.; Baluch, M.F. Skill Free Tele-operation of Terrain Hugging UAV using an Advance Technique of Supervisory Command Optimization. Int. J. Adv. Eng. Technol. 2012, 3, 117. [Google Scholar]
  27. Qi, D.; Zhang, J.; Liang, X.; Li, Z.; Zuo, J.; Lei, P. Autonomous Reconnaissance and Attack Test of UAV Swarm Based on Mosaic Warfare Thought. In Proceedings of the IEEE International Conference on Robotics and Automation Engineering (ICRAE), Guangzhou, China, 19–22 November 2021; pp. 79–83. [Google Scholar]
  28. Tahir, A.; Böling, J.; Haghbayan, M.H.; Toivonen, H.T.; Plosila, J. Swarms of unmanned aerial vehicles—A survey. J. Ind. Inf. Integr. 2019, 16, 100106. [Google Scholar] [CrossRef]
  29. Lu, Y.; Ma, Y.; Wang, J.; Han, L. Task assignment of UAV swarm based on wolf pack algorithm. Appl. Sci. 2020, 10, 8335. [Google Scholar] [CrossRef]
  30. Bürkle, A.; Segor, F.; Kollmann, M. Towards autonomous micro UAV swarms. J. Intell. Robot. Syst. 2011, 61, 339–353. [Google Scholar] [CrossRef]
  31. Cai, Y.; Zhao, H.; Li, M.; Huang, H. 3D real-time path planning based on cognitive behavior optimization algorithm for UAV with TLP model. Clust. Comput. 2019, 22, 5089–5098. [Google Scholar] [CrossRef]
  32. Azam, M.A.; Mittelmann, H.D.; Ragi, S. UAV formation shape control via decentralized markov decision processes. Algorithms 2021, 14, 91. [Google Scholar] [CrossRef]
  33. You, H. Mission-driven autonomous perception and fusion based on UAV swarm. Chin. J. Aeronaut. 2020, 33, 2831–2834. [Google Scholar]
  34. Kocaman, I. Distributed Beamforming in a Swarm UAV Network; Technical Report; Naval Postgraduate School: Monterey, CA, USA, 2008. [Google Scholar]
  35. Lang, F. New Algorithm Allows a Swarm of Mini Drones to Fly Together. Available online: https://interestingengineering.com/new-algorithm-allows-a-swarm-of-mini-drones-to-fly-together (accessed on 15 May 2022).
  36. Pärlin, K. Jamming of Spread Spectrum Communications used in UAV Remote Control Systems. Master’s Thesis, Thomas Johann Seebeck Department of Electronics, School of Information Technologies, Tallinn University of Technology, Tallinn, Estonia, 2018. [Google Scholar]
  37. Siddiqi, M.A.; Iwendi, C.; Jaroslava, K.; Anumbe, N. Analysis on security-related concerns of unmanned aerial vehicle: Atacks, limitations, and recommendations. Math. Biosci. Eng. 2022, 19, 2641–2670. [Google Scholar] [CrossRef]
  38. Bhattacharya, S.; Başar, T. Game-theoretic analysis of an aerial jamming attack on a UAV communication network. In Proceedings of the IEEE American Control Conference, Baltimore, MD, USA, 30 June–2 July 2010; pp. 818–823. [Google Scholar]
  39. Kerns, A.J.; Shepard, D.P.; Bhatti, J.A.; Humphreys, T.E. Unmanned aircraft capture and control via GPS spoofing. J. Field Robot. 2014, 31, 617–636. [Google Scholar] [CrossRef]
  40. Sathyamoorthy, D. A review of security threats of unmanned aerial vehicles and mitigation steps. J. Def. Secur 2015, 6, 81–97. [Google Scholar]
  41. Dunkel, D. Drones: Security Threats from Above. Available online: https://www.securitymagazine.com/articles/95789-drones-security-threats-from-above (accessed on 15 May 2022).
  42. Rogers, J. Future Threats: Military UAS, Terrorist Drones, and the Dangers of the Second Drone Age. Available online: https://www.japcc.org/chapters/c-uas-future-threats-military-uas-terrorist-drones-and-the-dangers-of-the-second-drone-age/ (accessed on 15 May 2022).
  43. Townsend, K. Sky-high concerns: Understanding the Security Threat Posed by Drones. Available online: https://blog.avast.com/what-security-threats-are-posed-by-drones (accessed on 15 May 2022).
  44. Lykou, G.; Moustakas, D.; Gritzalis, D. Defending airports from UAS: A survey on cyber-attacks and counter-drone sensing technologies. Sensors 2020, 20, 3537. [Google Scholar] [CrossRef]
  45. Meikle, H. Modern Radar Systems; Artech House: Norwood, MA, USA, 2008. [Google Scholar]
  46. ReGuard. Multi-Role 3D Radar for the Detection and Tracking of Ground and Low-Flying Targets. Available online: https://www.retia.eu/wp-content/uploads/2021/04/ReGUARD.pdf (accessed on 26 February 2022).
  47. Mata-Moya, D.; Rey-Maestre, N.; Gómez-del Hoyo, P.J.; Rosado-Sanz, J.; Jarabo-Amores, M.P. 4D Passive Radar for Drone Detection and Tracking. In Proceedings of the IEEE International Radar Symposium (IRS), Berlin, Germany, 21–22 June 2021; pp. 1–10. [Google Scholar]
  48. Jarabo-Amores, M.P.; Mata-Moya, D.; Gómez-del Hoyo, P.J.; Bárcena-Humanes, J.; Rosado-Sanz, J.; Rey-Maestre, N.; Rosa-Zurera, M. Drone detection feasibility with passive radars. In Proceedings of the IEEE European Radar Conference (EuRAD), Madrid, Spain, 26–28 September 2018; pp. 313–316. [Google Scholar]
  49. Karpovich, P.; Kareneuski, S.; Zieliński, T.P. Practical Results of Drone Detection by Passive Coherent DVB-T2 Radar. In Proceedings of the IEEE International Radar Symposium (IRS), Warsaw, Poland, 5–8 October 2020; pp. 77–81. [Google Scholar]
  50. Venu, D.; Rao, N.K. A cross-correlation approach to determine target range in passive radar using FM Broadcast Signals. In Proceedings of the IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 23–25 March 2016; pp. 524–529. [Google Scholar]
  51. Wang, G.; Gu, C.; Inoue, T.; Li, C. A Hybrid FMCW-Interferometry Radar for Indoor Precise Positioning and Versatile Life Activity Monitoring. IEEE Trans. Microw. Theory Tech. 2014, 62, 2812–2822. [Google Scholar] [CrossRef]
  52. Wang, F.; Li, H. Joint Waveform and Receiver Design for Co-Channel Hybrid Active-Passive Sensing With Timing Uncertainty. IEEE Trans. Signal Process. 2020, 68, 466–477. [Google Scholar] [CrossRef] [Green Version]
  53. Al-Nuaim, T.; Alam, M.; Aldowesh, A. Low-Cost Implementation of a Multiple-Input Multiple-Output Radar Prototype for Drone Detection. In Proceedings of the IEEE International Symposium ELMAR, Zadar, Croatia, 23–25 September 2019; pp. 183–186. [Google Scholar]
  54. Yang, F.; Qu, K.; Hao, M.; Liu, Q.; Chen, X.; Xu, F. Practical Investigation of a MIMO Radar System for Small Drones Detection. In Proceedings of the IEEE International Radar Conference (RADAR), Toulon, France, 23–27 September 2019; pp. 1–5. [Google Scholar]
  55. Wang, Q.; Li, M.; Guo, Y. Cognitive radar waveform optimization for stealth target RCS estimation. In Proceedings of the IEEE International Conference on Signal, Information and Data Processing (ICSIDP), Chongqing, China, 11–13 December 2019; pp. 1–6. [Google Scholar]
  56. Christiansen, J.M. Fully Adaptive Radar for Detection and Tracking. Ph.D. Thesis, The Ohio State University, Columbus, OH, USA, 2020. [Google Scholar]
  57. Forstén, H.; Kiuru, T.; Hirvonen, M.; Varonen, M.; Kaynak, M. Scalable 60 GHz FMCW Frequency-Division Multiplexing MIMO Radar. IEEE Trans. Microw. Theory Tech. 2020, 68, 2845–2855. [Google Scholar] [CrossRef]
  58. Bell, K.L.; Baker, C.J.; Smith, G.E.; Johnson, J.T.; Rangaswamy, M. Cognitive Radar Framework for Target Detection and Tracking. IEEE J. Sel. Top. Signal Process. 2015, 9, 1427–1439. [Google Scholar] [CrossRef]
  59. Hammer, M.; Hebel, M.; Laurenzis, M.; Arens, M. Lidar-based detection and tracking of small UAVs. In Emerging Imaging and Sensing Technologies for Security and Defence III; and Unmanned Sensors, Systems, and Countermeasures; International Society for Optics and Photonics: Bellingham, WA, USA, 2018; Volume 10799, p. 107990S. [Google Scholar]
  60. Knott, E.F.; Schaeffer, J.F.; Tulley, M.T. Radar Cross Section; SciTech Publishing: Raleigh, NC, USA, 2004. [Google Scholar]
  61. Nowak, A.; Naus, K.; Maksimiuk, D. A method of fast and simultaneous calibration of many mobile FMCW radars operating in a network anti-drone system. Remote Sens. 2019, 11, 2617. [Google Scholar] [CrossRef] [Green Version]
  62. Budge, M.C.; German, S.R. Basic RADAR Analysis; Artech House: Norwood, MA, USA, 2020. [Google Scholar]
  63. Oikonomou, D.; Nomikos, P.; Limnaios, G.; Zikidis, K. Passive Radars and their use in the Modern Battlefield. J. Comput. Model. 2019, 9, 37–61. [Google Scholar]
  64. Coluccia, A.; Parisi, G.; Fascista, A. Detection and Classification of Multirotor Drones in Radar Sensor Networks: A Review. Sensors 2020, 20, 4172. [Google Scholar] [CrossRef]
  65. Farlik, J.; Kratky, M.; Casar, J.; Stary, V. Multispectral detection of commercial unmanned aerial vehicles. Sensors 2019, 19, 1517. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  66. Lee, J.; Park, M.; Eo, I.; Koo, B. An X-Band FMCW Radar for Detection and Tracking of Miniaturized UAVs. In Proceedings of the IEEE International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 14–16 December 2017; pp. 1844–1845. [Google Scholar]
  67. Wang, C.; Tian, J.; Cao, J.; Wang, X. Deep Learning-Based UAV Detection in Pulse-Doppler Radar. IEEE Trans. Geosci. Remote Sens. 2021, 60, 1–12. [Google Scholar] [CrossRef]
  68. Guvenc, I.; Ozdemir, O.; Yapici, Y.; Mehrpouyan, H.; Matolak, D. Detection, localization, and tracking of unauthorized UAS and Jammers. In Proceedings of the IEEE Digital Avionics Systems Conference (DASC), St. Petersburg, FL, USA, 17–21 September 2017; pp. 1–10. [Google Scholar]
  69. Jian, M.; Lu, Z.; Chen, V.C. Drone detection and tracking based on phase-interferometric Doppler radar. In Proceedings of the IEEE Radar Conference, Oklahoma City, OK, USA, 23–27 April 2018; pp. 1146–1149. [Google Scholar]
  70. Taha, B.; Shoufan, A. Machine Learning-Based Drone Detection and Classification: State-of-the-Art in Research. IEEE Access 2019, 7, 138669–138682. [Google Scholar] [CrossRef]
  71. Howard, D.D.; Skolnik, M. Tracking radar. In Radar Handbook; McGraw-Hill: New York, NY, USA, 1990; pp. 18–43. [Google Scholar]
  72. Pulford, G.W. A Survey of Manoeuvring Target Tracking Methods. arXiv 2015, arXiv:1503.07828. [Google Scholar]
  73. Koch, W. Overview of problems and techniques in target tracking. In Proceedings of the IEE Colloquium on Trget Tracking: Algorithms and Applications, London, UK, 11–12 November 1999; pp. 1/1–1/4. [Google Scholar]
  74. Guerra, A.; Dardari, D.; Djuric, P.M. Dynamic Radar Networks of UAVs: A Tutorial Overview and Tracking Performance Comparison With Terrestrial Radar Networks. IEEE Vehic. Technol. Mag. 2020, 15, 113–120. [Google Scholar] [CrossRef]
  75. Kalinov, I.; Agishev, R. Effective Detection of Real Trajectories of Highly Maneuverable UAVs Under Strong Noise Conditions. In Proceedings of the IEEE Engineering and Telecommunication Conference (EnT-MIPT), Moscow, Russia, 15–16 November 2018; pp. 193–196. [Google Scholar]
  76. Karode, S.; Fusco, V. Multiple target tracking using retrodirective antenna arrays. In Proceedings of the IEEE National Conference on Antennas and Propagation, York, UK, 31 March–1 April 1999; pp. 178–181. [Google Scholar]
  77. Easthope, P.F. Tracking simulated UAV swarms using particle filters. In Proceedings of the IET Conferenec on Data Fusion Target Tracking Algorithms and Applications, Liverpool, UK, 30 April 2014; pp. 1–6. [Google Scholar]
  78. Kaniewski, P.; Gil, R.; Konatowski, S. Estimation of UAV position with use of smoothing algorithms. Metrol. Meas. Syst. 2017, 24, 127–142. [Google Scholar] [CrossRef]
  79. Choi, Y.; Jimenez, H.; Mavris, D.N. Two-layer obstacle collision avoidance with machine learning for more energy-efficient unmanned aircraft trajectories. Robot. Auton. Syst. 2017, 98, 158–173. [Google Scholar] [CrossRef]
  80. Gu, J.; Su, T.; Wang, Q.; Du, X.; Guizani, M. Multiple Moving Targets Surveillance Based on a Cooperative Network for Multi-UAV. IEEE Communs. Mag. 2018, 56, 82–89. [Google Scholar] [CrossRef]
  81. Banerjee, P.; Corbetta, M. In-Time UAV Flight-Trajectory Estimation and Tracking Using Bayesian Filters. In Proceedings of the IEEE Aerospace Conference, Big Sky, MT, USA, 7–14 March 2020; pp. 1–9. [Google Scholar]
  82. Chen, V.C. The Micro-Doppler Effect in Radar; Artech house: Norwood, MA, USA, 2019. [Google Scholar]
  83. Torvik, B.; Olsen, K.E.; Griffiths, H. Classification of birds and UAVs based on radar polarimetry. IEEE Geosci. Remote Sens. Lett. 2016, 13, 1305–1309. [Google Scholar] [CrossRef]
  84. Wojtanowski, J.; Zygmunt, M.; Drozd, T.; Jakubaszek, M.; Życzkowski, M.; Muzal, M. Distinguishing Drones from Birds in a UAV Searching Laser Scanner Based on Echo Depolarization Measurement. Sensors 2021, 21, 5597. [Google Scholar] [CrossRef]
  85. Zhang, X.; Mehta, V.; Bolic, M.; Mantegh, I. Hybrid AI-enabled Method for UAS and Bird Detection and Classification. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC), Toronto, ON, Canada, 11–14 October 2020; pp. 2803–2807. [Google Scholar]
  86. Patel, J.S.; Fioranelli, F.; Anderson, D. Review of radar classification and RCS characterisation techniques for small UAVs or drones. IET Radar Sonar Navig. 2018, 12, 911–919. [Google Scholar] [CrossRef]
  87. Zhang, Y.D.; Xiang, X.; Li, Y.; Chen, G. Enhanced Micro-Doppler Feature Analysis for Drone Detection. In Proceedings of the IEEE Radar Conference (RadarConf21), Atlanta, GA, USA, 7–14 May 2021; pp. 1–4. [Google Scholar]
  88. De Wit, J.J.; Gusland, D.; Trommel, R.P. Radar Measurements for the Assessment of Features for Drone Characterization. In Proceedings of the IEEE European Radar Conference (EuRAD), Utrecht, The Netherlands, 10–15 January 2021; pp. 38–41. [Google Scholar]
  89. Khawaja, W.; Ozturk, E.; Guvenc, I. Doors in the Sky: Detection, Localization and Classification of Aerial Vehicles using Laser Mesh. arXiv 2021, arXiv:2111.07231. [Google Scholar] [CrossRef]
  90. MathWorks. Introduction to Micro-Doppler Effects. Available online: https://www.mathworks.com/help/radar/ug/introduction-to-micro-doppler-effects.html (accessed on 7 February 2022).
  91. Newman, J.F.; LaDue, D.; Heinselman, P.L. Identifying critical strengths and limitations of current radar systems. In Proceedings of the Preprints, 24th Conference on Severe Local Storms, Savannah, GA, USA, 24–31 October 2008; Volume 7. [Google Scholar]
  92. Ezuma, M.; Ozdemir, O.; Anjinappa, C.K.; Gulzar, W.A.; Guvenc, I. Micro-UAV Detection with a Low-Grazing Angle Millimeter Wave Radar. In Proceedings of the IEEE Radio and Wireless Symposium (RWS), Orlando, FL, USA, 20–23 January 2019; pp. 1–4. [Google Scholar]
  93. Chahrour, H.; Dansereau, R.M.; Rajan, S.; Balaji, B. Target Detection Through Riemannian Geometric Approach With Application to Drone Detection. IEEE Access 2021, 9, 123950–123963. [Google Scholar] [CrossRef]
  94. Waldron, G. Rafael Introduces New Miniaturised EO/IR Sensor. Available online: https://www.flightglobal.com/singapore-air-show-2020/rafael-introduces-new-miniaturised-eo/ir-sensor/136634.article (accessed on 20 September 2021).
  95. Tufano, F.; Angelino, C.V.; Cicala, L. Visual target detection and tracking in UAV EO/IR videos by moving background subtraction. In Proceedings of the International Conference on Advanced Concepts for Intelligent Vision Systems, Lecce, Italy, 24–27 October 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 547–558. [Google Scholar]
  96. Siewert, S.B.; Andalibi, M.; Bruder, S.; Rizor, S. Slew-to-Cue Electro-Optical and Infrared Sensor Network for small UAS Detection, Tracking and Identification. In Proceedings of the AIAA Scitech 2019 Forum, San Diego, CA, USA, 7–11 January 2019; p. 2264. [Google Scholar]
  97. Ezuma, M.; Erden, F.; Anjinappa, C.K.; Ozdemir, O.; Guvenc, I. Micro-UAV Detection and Classification from RF Fingerprints Using Machine Learning Techniques. In Proceedings of the IEEE Aerospace Conference, Big Sky, MT, USA, 2–9 March 2019; pp. 1–13. [Google Scholar]
  98. Nemer, I.; Sheltami, T.; Ahmad, I.; Yasar, A.U.H.; Abdeen, M.A. RF-Based UAV Detection and Identification Using Hierarchical Learning Approach. Sensors 2021, 21, 1947. [Google Scholar] [CrossRef]
  99. Ezuma, M.; Erden, F.; Kumar Anjinappa, C.; Ozdemir, O.; Guvenc, I. Detection and Classification of UAVs Using RF Fingerprints in the Presence of Wi-Fi and Bluetooth Interference. IEEE Open J. Commun. Soc. 2020, 1, 60–76. [Google Scholar] [CrossRef]
  100. Welschen, S.; Leuchtmann, P.; Leuthold, J.; Schüpbach, C.; Paine, S.; Böniger, U. Localization of Micro Unmanned Aerial Vehicles using Digital Audio Broadcast Signals. In Proceedings of the IEEE Radar Conference (RadarConf20), Florence, Italy, 21–25 September 2020; pp. 1–6. [Google Scholar]
  101. Yang, B.; Matson, E.T.; Smith, A.H.; Dietz, J.E.; Gallagher, J.C. UAV Detection System with Multiple Acoustic Nodes Using Machine Learning Models. In Proceedings of the IEEE International Conference on Robotic Computing (IRC), Naples, Italy, 25–27 February 2019; pp. 493–498. [Google Scholar]
  102. Al-Emadi, S.; Al-Ali, A. Audio-Based Drone Detection and Identification Using Deep Learning Techniques with Dataset Enhancement through Generative Adversarial Networks. Sensors 2021, 21, 4953. [Google Scholar] [CrossRef]
  103. Kratky, M.; Farlik, J.; Casar, J.; Stary, V. Commercial UAVs Multispectral Detection; NATO: Washington, DC, USA, 2011. [Google Scholar]
  104. Knight, J. Countering Unmanned Aircraft Systems. Ph.D. Thesis, Naval Postgraduate School, Monterey, CA, USA, 2019. [Google Scholar]
  105. Malimban, J.; Payne, B.R.; Abegaz, T.T. Drone Hacking: Applying the Cyber Kill Chain to Hijack Unmanned Aerial Systems. QRBD 2021, 8, 213. [Google Scholar]
  106. Science Focus. Drone-Killer Fires Microwave Beams to Disable UAVs. Available online: https://www.sciencefocus.com/future-technology/drone-killer-fires-microwave-beams-to-disable-uavs/ (accessed on 18 February 2022).
  107. Chaari, M.Z.; Al-Maadeed, S. Testing the efficiency of laser technology to destroy the rogue drones. Secur. Def. Q. 2020, 32, 31–38. [Google Scholar] [CrossRef]
  108. Shakhatreh, H.; Sawalmeh, A.H.; Al-Fuqaha, A.; Dou, Z.; Almaita, E.; Khalil, I.; Othman, N.S.; Khreishah, A.; Guizani, M. Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges. IEEE Access 2019, 7, 48572–48634. [Google Scholar] [CrossRef]
  109. Mukhamediev, R.I.; Symagulov, A.; Kuchin, Y.; Zaitseva, E.; Bekbotayeva, A.; Yakunin, K.; Assanov, I.; Levashenko, V.; Popova, Y.; Akzhalova, A.; et al. Review of Some Applications of Unmanned Aerial Vehicles Technology in the Resource-Rich Country. Appl. Sci. 2021, 11, 10171. [Google Scholar] [CrossRef]
  110. Noor, N.M.; Abdullah, A.; Hashim, M. Remote sensing UAV/drones and its applications for urban areas: A review. In Proceedings of the IOP Conference Series: Earth and Environmental Science, Volume 169, 9th IGRSM International Conference and Exhibition on Geospatial & Remote Sensing (IGRSM 2018), Kuala Lumpur, Malaysia, 24–25 April 2018; IOP Publishing: Bristol, UK, 2018; Volume 169, p. 012003. [Google Scholar]
  111. Mohamed, N.; Al-Jaroodi, J.; Jawhar, I.; Idries, A.; Mohammed, F. Unmanned aerial vehicles applications in future smart cities. Technol. Forecast. Soc. Chang. 2020, 153, 119293. [Google Scholar] [CrossRef]
  112. Fang, G.; Yi, J.; Wan, X.; Liu, Y.; Ke, H. Experimental Research of Multistatic Passive Radar With a Single Antenna for Drone Detection. IEEE Access 2018, 6, 33542–33551. [Google Scholar] [CrossRef]
  113. Poullin, D. Countering illegal UAV flights: Passive DVB radar potentiality. In Proceedings of the IEEE International Radar Symposium (IRS), Bonn, Germany, 20–22 June 2018; pp. 1–10. [Google Scholar]
  114. Zhe, Z.Y.M.D.W.; Kao, Z. Radar Scattering Characteristic Test and Analysis of Two Stealth Aircraft Models. J. Beijing Univ. Aeronaut. Astronaut. 2003, 29, 147–150. [Google Scholar]
  115. El-Kamchouchy, H.; Saada, K.; Hafez, A.E.D.S. Optimum stealthy aircraft detection using a multistatic radar. In Proceedings of the IEEE International Conference on Advanced Communication Technology, Pyeongchang, Korea, 16–19 February 2014; pp. 337–342. [Google Scholar]
  116. Liu, Y.; Wan, X.; Tang, H.; Yi, J.; Cheng, Y.; Zhang, X. Digital television based passive bistatic radar system for drone detection. In Proceedings of the IEEE Radar Conference (RadarConf), Seattle, WA, USA, 8–12 May 2017; pp. 1493–1497. [Google Scholar]
  117. MathWorks. Tracking Using Bistatic Range Detections. Available online: https://www.mathworks.com/help/fusion/ug/track-using-bistatic-range-detections.html (accessed on 15 February 2022).
  118. Hoffmann, F.; Ritchie, M.; Fioranelli, F.; Charlish, A.; Griffiths, H. Micro-Doppler based detection and tracking of UAVs with multistatic radar. In Proceedings of the IEEE radar conference (RadarConf), Philadelphia, PA, USA, 2–6 May 2016; pp. 1–6. [Google Scholar]
  119. Wang, X.; Liang, H.; Wang, P. Detection and Tracking of UAVs using Interferometric Radar. In Proceedings of the IEEE International Radar Conference (RADAR), Toulon, France, 23–27 September 2019; pp. 1–6. [Google Scholar]
  120. Sun, Y.; Abeywickrama, S.; Jayasinghe, L.; Yuen, C.; Chen, J.; Zhang, M. Micro-Doppler Signature-Based Detection, Classification, and Localization of Small UAV With Long Short-Term Memory Neural Network. IEEE Trans. Geosci. Remote Sens. 2021, 59, 6285–6300. [Google Scholar] [CrossRef]
  121. Gusland, D.; Rolfsjord, S.; Torvik, B. Deep temporal detection—A machine learning approach to multiple-dwell target detection. In Proceedings of the IEEE International Radar Conference (RADAR), Washington, DC, USA, 28–30 April 2020; pp. 203–207. [Google Scholar]
  122. Lee, D.; Gyu La, W.; Kim, H. Drone Detection and Identification System using Artificial Intelligence. In Proceedings of the IEEE International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea, 17–19 October 2018; pp. 1131–1133. [Google Scholar]
  123. Behera, D.K.; Bazil Raj, A. Drone Detection and Classification using Deep Learning. In Proceedings of the IEEE International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 13–15 May 2020; pp. 1012–1016. [Google Scholar]
  124. Partridge, D.; Wilks, Y. The Foundations of Artificial Intelligence: A Sourcebook; Cambridge University Press: Cambridge, UK, 1990. [Google Scholar]
  125. Rumba, R.; Nikitenko, A. The wild west of drones: A review on autonomous- UAV traffic-management. In Proceedings of the PIEEE International Conference on Unmanned Aircraft Systems (ICUAS), Athens, Greece, 1–4 September 2020; pp. 1317–1322. [Google Scholar]
  126. Yang, Y.; Xiao, Y.; Li, T. A Survey of Autonomous Underwater Vehicle Formation: Performance, Formation Control, and Communication Capability. IEEE Communs. Surv. Tutorials 2021, 23, 815–841. [Google Scholar] [CrossRef]
  127. Liu, J.; Wang, Z.; Peng, Z.; Cui, J.H.; Fiondella, L. Suave: Swarm underwater autonomous vehicle localization. In Proceedings of the IEEE INFOCOM Conference, Toronto, ON, Canada, 27 April–2 May 2014; pp. 64–72. [Google Scholar]
  128. Griffiths, G. Technology and Applications of Autonomous Underwater Vehicles; CRC Press: Boca Raton, FL, USA, 2002; Volume 2. [Google Scholar]
  129. Jenkins, S.A.; Humphreys, D.E.; Sherman, J.; Osse, J.; Jones, C.; Leonard, N.; Graver, J.; Bachmayer, R.; Clem, T.; Carroll, P.; et al. Underwater Glider System Study; eScholarship: Oakland, CA, USA, 2003. [Google Scholar]
  130. Wu, Y.; Yan, S.; Li, S.; Song, H. An acoustic positioning of underwater vehicles using synthetic long baseline navigation. In Proceedings of the IEEE OCEANS Conference, Shanghai, China, 10–13 April 2016; pp. 1–5. [Google Scholar]
  131. Luo, Q.; Yan, X.; Ju, C.; Chen, Y.; Luo, Z. An Ultra-Short Baseline Underwater Positioning System with Kalman Filtering. Sensors 2021, 21, 143. [Google Scholar] [CrossRef] [PubMed]
  132. Azad, S.; Casari, P.; Zorzi, M. Coastal patrol and surveillance networks using AUVs and delay-tolerant networking. In Proceedings of the IEEE Oceans—Yeosu, Yeosu, Korea, 21–24 May 2012; pp. 1–8. [Google Scholar]
  133. Keller, J. Coast Guard Looks for Unmanned Ocean Vehicles to Hunt Smugglers, Poachers, and Icebergs. Available online: https://www.militaryaerospace.com/unmanned/article/16719196/coast-guard-looks-for-unmanned-ocean-vehicles-to-hunt-smugglers-poachers-and-icebergs (accessed on 15 May 2022).
  134. Petritoli, E.; Cagnetti, M.; Leccese, F. Simulation of Autonomous Underwater Vehicles (AUVs) Swarm Diffusion. Sensors 2020, 20, 4950. [Google Scholar] [CrossRef] [PubMed]
  135. Vedachalam, N.; Ramesh, R.; Jyothi, V.B.N.; Doss Prakash, V.; Ramadass, G. Autonomous underwater vehicles-challenging developments and technological maturity towards strategic swarm robotics systems. Mar. Georesources Geotechnol. 2019, 37, 525–538. [Google Scholar] [CrossRef]
  136. Eleftherakis, D.; Vicen-Bueno, R. Sensors to increase the security of underwater communication cables: A review of underwater monitoring sensors. Sensors 2020, 20, 737. [Google Scholar] [CrossRef] [Green Version]
  137. Tipsuwan, Y.; Hoonsuwan, P. Design and implementation of an AUV for petroleum pipeline inspection. In Proceedings of the IEEE International Conference on Information Technology and Electrical Engineering (ICITEE), Chiang Mai, Thailand, 29–30 October 2015; pp. 382–387. [Google Scholar]
  138. Bannister, P. ELF propagation update. IEEE J. Ocean. Eng. 1984, 9, 179–188. [Google Scholar] [CrossRef] [Green Version]
  139. Lurton, X. An Introduction to Underwater Acoustics: Principles and Applications; Springer: Berlin/Heidelberg, Germany, 2002; Volume 2. [Google Scholar]
  140. Feng, H.; Yu, J.; Huang, Y.; Qiao, J.; Wang, Z.; Xie, Z.; Liu, K. Adaptive coverage sampling of thermocline with an autonomous underwater vehicle. Ocean Eng. 2021, 233, 109151. [Google Scholar] [CrossRef]
  141. Fitzpatrick, A.; Singhvi, A.; Arbabian, A. An Airborne Sonar System for Underwater Remote Sensing and Imaging. IEEE Access 2020, 8, 189945–189959. [Google Scholar] [CrossRef]
  142. Bienvenu, G. Signal sonar processing. In Proceedings of the IEEE International Conference on Digital Signal Processing Proceedings, Santorini, Greece, 1–3 July 2002; Volume 1, pp. 441–446. [Google Scholar]
  143. MIT OpenCourseWare. Introduction to Sonar. Available online: https://ocw.mit.edu/courses/mechanical-engineering/2-011-introduction-to-ocean-science-and-engineering-spring-2006/readings/hw5_sonar_leonar.pdf (accessed on 19 February 2022).
  144. Curtis, T. Sonar Technology-Past and Current; Tethnical Rexport; Curtis Technology Ltd.: Southall, UK, 2004; Available online: http://www.curtistech.co.uk/papers/sonarpc.pdf (accessed on 20 April 2022).
  145. Pike, J. Uderwater Detection and Tracking Systems. Available online: https://fas.org/man/dod-101/navy/docs/fun/part09.htm (accessed on 16 March 2022).
  146. Nuclear Threat Initiative. Submarine Detection and Monitoring: Open-Source Tools and Technologies. Available online: https://www.nti.org/analysis/articles/submarine-detection-and-monitoring-open-source-tools-and-technologies/#:~:text=Military%20ASW%20employs%20technologies%20such,high%2Dresolution%20satellite%20imagery%20to (accessed on 16 March 2022).
  147. Ferguson, B.G.; Lo, K.W. Acoustic detection, localization, and tracking of tactical autonomous aerial and underwater vehicles. J. Acoust. Soc. Am. 2016, 140, 3119. [Google Scholar] [CrossRef]
  148. Dzikowicz, B.; Kost, J.L.; Heddings, J.T.; Brown, D.A. Spiral wave front sonar for active target localization on an unmanned underwater vehicle. J. Acoust. Soc. Am. 2019, 146, 3020. [Google Scholar] [CrossRef]
  149. Zhu, P.; Isaacs, J.; Fu, B.; Ferrari, S. Deep learning feature extraction for target recognition and classification in underwater sonar images. In Proceedings of the IEEE Conference on Decision and Control (CDC), Melbourne, VIC, Australia, 12–15 December 2017; pp. 2724–2731. [Google Scholar]
  150. Becker, K. Three-dimensional target motion analysis using angle and frequency measurements. IEEE Trans. Aerosp. Electron. Syst. 2005, 41, 284–301. [Google Scholar] [CrossRef]
  151. Pallayil, V. Ceramic and fibre optic hydrophone as sensors for lightweight arrays—A comparative study. In Proceedings of the OCEANS—Anchorage, Anchorage, AK, USA, 18–21 September 2017; pp. 1–13. [Google Scholar]
  152. Holmes, J.D.; Carey, W.M.; Lynch, J.F. Results from an autonomous underwater vehicle towed hydrophone array experiment in Nantucket Sound. J. Acoust. Soc. Am. 2006, 120, EL15–EL21. [Google Scholar] [CrossRef] [Green Version]
Figure 1. The high-level design of a futuristic UAV. Multiple sensors and sources of energy can be used. In particular, variable wing geometry can be used during different modes of flight. The variable wing geometry can help to obtain different flight speeds and to make vertical take-off and landing possible.
Figure 1. The high-level design of a futuristic UAV. Multiple sensors and sources of energy can be used. In particular, variable wing geometry can be used during different modes of flight. The variable wing geometry can help to obtain different flight speeds and to make vertical take-off and landing possible.
Sensors 22 03896 g001
Figure 2. Different types of radars for detection, identification, and tracking of aerial vehicles. Primary radars are used for detection of aerial objects, whereas secondary radars are used for identification. Primary radars are sub-categorized into continuous wave and pulse radar.
Figure 2. Different types of radars for detection, identification, and tracking of aerial vehicles. Primary radars are used for detection of aerial objects, whereas secondary radars are used for identification. Primary radars are sub-categorized into continuous wave and pulse radar.
Sensors 22 03896 g002
Figure 3. Detection and tracking of multiple UAVs with the help of 60 GHz FMCW frequency-division multiplexing MIMO radar [57].
Figure 3. Detection and tracking of multiple UAVs with the help of 60 GHz FMCW frequency-division multiplexing MIMO radar [57].
Sensors 22 03896 g003
Figure 4. A micro-Doppler simulation scenario using a monostatic radar and four-blade helicopter [90]. The monostatic radar is immovable and is placed at the origin. The initial helicopter coordinates are ( 700 , 0 , 700 ) . The blades of the helicopter rotate at four revolutions per second, and the velocity of the helicopter is 80 m/s.
Figure 4. A micro-Doppler simulation scenario using a monostatic radar and four-blade helicopter [90]. The monostatic radar is immovable and is placed at the origin. The initial helicopter coordinates are ( 700 , 0 , 700 ) . The blades of the helicopter rotate at four revolutions per second, and the velocity of the helicopter is 80 m/s.
Sensors 22 03896 g004
Figure 5. The range-velocity plot of the setup is shown in Figure 4 (reprinted from [90]). The major power concentration is centered at ( 66.6 m/s, 975 m) due to the central rotation part of the helicopter. The other two minor concentrations are due to the radar returns from the tips of the blades.
Figure 5. The range-velocity plot of the setup is shown in Figure 4 (reprinted from [90]). The major power concentration is centered at ( 66.6 m/s, 975 m) due to the central rotation part of the helicopter. The other two minor concentrations are due to the radar returns from the tips of the blades.
Sensors 22 03896 g005
Figure 6. Micro-Doppler modulation due to (1) rotating blades and (2) a constant Doppler shift from the central rotating part of the helicopter (reprinted from [90]). The sinusoidal behavior is due to the rotation of the blades.
Figure 6. Micro-Doppler modulation due to (1) rotating blades and (2) a constant Doppler shift from the central rotating part of the helicopter (reprinted from [90]). The sinusoidal behavior is due to the rotation of the blades.
Sensors 22 03896 g006
Figure 7. Setup for detection of a UAV using RF analysis. The RF link is between the ground controller and flight controller. Based on the energy detection of the RF link, a UAV can be detected and subsequently classified (reproduced from [97]).
Figure 7. Setup for detection of a UAV using RF analysis. The RF link is between the ground controller and flight controller. Based on the energy detection of the RF link, a UAV can be detected and subsequently classified (reproduced from [97]).
Sensors 22 03896 g007
Figure 8. Bi-static sensors placed at different locations are shown as inverted triangles for aerial vehicle detection (reprinted from [117]). Four ellipsoids indicate the coverage of the respective bi-static sensors. A single emitter is shown as a purple circle at the origin. The aerial vehicle is shown as a white diamond wrapped around by a yellow circle indicating fused detections. The fused detections due to the overlapping of the ellipsoids are close to the actual position of the aerial vehicle. The trajectory is shown as a grey line.
Figure 8. Bi-static sensors placed at different locations are shown as inverted triangles for aerial vehicle detection (reprinted from [117]). Four ellipsoids indicate the coverage of the respective bi-static sensors. A single emitter is shown as a purple circle at the origin. The aerial vehicle is shown as a white diamond wrapped around by a yellow circle indicating fused detections. The fused detections due to the overlapping of the ellipsoids are close to the actual position of the aerial vehicle. The trajectory is shown as a grey line.
Sensors 22 03896 g008
Figure 9. A mesh of laser beams was created using two airborne UAVs (reprinted from [89]). Each airborne UAV produces a uniformly spaced array of laser beams. A mesh is formed by the appropriate positioning of the airborne UAVs. The laser mesh can be used to detect, track, and classify different types of targets [89].
Figure 9. A mesh of laser beams was created using two airborne UAVs (reprinted from [89]). Each airborne UAV produces a uniformly spaced array of laser beams. A mesh is formed by the appropriate positioning of the airborne UAVs. The laser mesh can be used to detect, track, and classify different types of targets [89].
Sensors 22 03896 g009
Figure 10. In addition to conventional layers for countering UAVs (layers 2 and 3), we have introduced layer 1 sensors. The first layer sensors are placed at different locations. The first layer can help in the early detection, tracking, and classification of intruding UAVs.
Figure 10. In addition to conventional layers for countering UAVs (layers 2 and 3), we have introduced layer 1 sensors. The first layer sensors are placed at different locations. The first layer can help in the early detection, tracking, and classification of intruding UAVs.
Sensors 22 03896 g010
Figure 11. Block diagram of signal processing for (a) active sonar, (b) passive sonar.
Figure 11. Block diagram of signal processing for (a) active sonar, (b) passive sonar.
Sensors 22 03896 g011
Figure 12. A towed active sonar carried by a surface ship for detection of a submerged UUV/MUV. The sonar is towed to avoid noise (sound) from the carried vessel.
Figure 12. A towed active sonar carried by a surface ship for detection of a submerged UUV/MUV. The sonar is towed to avoid noise (sound) from the carried vessel.
Sensors 22 03896 g012
Figure 13. Sonar-based detection of a remotely operated underwater vehicle. Active sonar equipment is mounted on a remotely operated underwater vehicle. Detection is highlighted in yellow in the sonar scan.
Figure 13. Sonar-based detection of a remotely operated underwater vehicle. Active sonar equipment is mounted on a remotely operated underwater vehicle. Detection is highlighted in yellow in the sonar scan.
Sensors 22 03896 g013
Table 1. Popular categories of UAVs, major types of sensors installed, and their functionalities and features are provided. All the UAVs are equipped with GPS receivers, internal navigation unit(s), and control and data communication links.
Table 1. Popular categories of UAVs, major types of sensors installed, and their functionalities and features are provided. All the UAVs are equipped with GPS receivers, internal navigation unit(s), and control and data communication links.
UAV NameCategoryPowered by and Sensors InstalledFunctionalitiesMaximum Payload, Speed, Flight Altitude and Duration
Malat MosquitoMicro/nano, fixed-wingBattery, camera, EO sensorSurveillance and reconnaissance0.25 kg, 13 m/s, 0.15 km, 1 h
Aurora SkateMicro/nano, fixed-wingArticulating motor pods, camera, EO/IR sensorsSurveillance and reconnaissance, tracking objects0.2 kg, 25 m/s, 4.3 km, 1 h
CyberQuad miniMicro/nano, multi-rotorBattery, camera, and multiple sensors for detecting gases and pollutantsUrban aerial reconnaissance, detection of gases, industrial and other pollutants1.5 kg, 18 m/s, -, 0.67 h
RQ-11 RavenSmall/mini, fixed-wingBattery, camera, infrared sensor, miscellaneous sensorsSurveillance, mapping, imaging and object detection and classification0.2 kg, 22.5 m/s, 4.2 km, 1.5 h
Matrice-600Small/mini, multi-rotorBattery, camera, intelligent batteriesImaging and surveillance, high data rate live streaming6 kg, 18 m/s, 2.5 km, 0.67 h
SkyEye Sierra VTOLSmall/mini, fixed-wing and multi-rotorBattery/petrol engine, camera, surveying and surveillance equipment, multiple sensorsImaging, mapping, inspection, and surveillance, and other sensing applications3 kg, 30 m/s, 3 km, 5 h
WatchkeeperMedium, fixed-wingRotary Wankel engine, camera, EO/IR sensor, motion filterImaging, surveillance and reconnaissance150 kg, 40 m/s, 4.9 km, 14 h
Eagle Eye, Bell HV-911Medium, tiltrotorTurboshaft engine, camera, surveillance sensors, rescue equipmentSearch and rescue, surveillance, reconnaissance (mainly at sea)90 kg, 103 m/s, 6 km, 5.5 h
Skyeye-R4EMedium, fixed-wingTwin rotor rotary engine, camera, surveillance and miscellaneous sensorsImaging, surveillance, pesticide spraying, border patrols82 kg, 55 m/s, 4.6 km, 8 h
Global HawkLarge, fixed-wingTurbofan engine, camera, EO/IR sensors, laser and radar warning receivers, ECM equipment, MTI systemLong endurance and high-altitude and wide area ground/sea surveillance and reconnaissance, communications1400 kg, 175 m/s, 18 km, 33 h
Zephyr 8Large, fixed-wingSolar-powered, Amprius lithium-ion batteries, communication systemsAirborne communications: as a mobile communication relay5 kg, 9.5 m/s, 21.3 km, 26 days
Table 2. Comparison of current and expected future UAV features and capabilities.
Table 2. Comparison of current and expected future UAV features and capabilities.
Serial #Current UAV Features and CapabilitiesFuture UAV Features and Capabilities
1Multi-rotor or fixed-wingHybrid of multi-rotor and fixed-wing, variable wing geometry
2Aerial flyingAerial, over- and underwater, and on-ground maneuvering
3Propeller propulsionJet engine propulsion in addition to propeller propulsion
4Battery and fossil fuelSolar, synthetic, hydrogen fuel, and battery charging while flying
5Small and medium payloadsLarge, multi-purpose payloads
6Limited maneuverability for fixed-wing UAVsHigh maneuverability for fixed-wing UAVs
7Cost varies, and dependent on the size of UAVReduction in price of different sizes of UAVs
8Flight duration dependent on the payloadLong flight duration, and less dependent on the payload
9Weather and light affects performanceAll weather, day and night high performance
10Small to medium RCSVery small RCS
11Limited and vulnerable communication linksRedundant and secured communication links
12Semi-autonomous operationsFully autonomous and AI-controlled options available
13Limited ECM capabilitiesEnhanced ECM capabilities
Table 3. Comparison of current and future research directions for countering malicious UAVs.
Table 3. Comparison of current and future research directions for countering malicious UAVs.
Current Countermeasures Cgainst UAVsFuture Cirections of Countermeasures against UAVs
  • Radars
  • Acoustic analysis
  • RF analysis
  • EO/IR imaging
  • RF jamming, remote hacking, and GPS spoofing
  • High-power laser and EM radiation
  • Nets and prey birds
  • Modifications to current radar systems specifically for UAVs
  • Mesh of laser beams
  • Distributed sensors at different locations
  • AI-aided cognitive analysis of the threat using multiple sensors
  • Regulating legitimate UAV aerial traffic through tagging
  • Use of satellite networks for UAV detection and tracking
Table 4. Popular UUVs, types of sensors installed, dimensions of the UUVs, and maximum endurance and depths underwater are provided. All the UUVs provided here are autonomous and are used for deepwater and seafloor imaging/mapping and oceanography research.
Table 4. Popular UUVs, types of sensors installed, dimensions of the UUVs, and maximum endurance and depths underwater are provided. All the UUVs provided here are autonomous and are used for deepwater and seafloor imaging/mapping and oceanography research.
Sr. #UUAV NamePowered by and Sensors InstalledDimensions, Endurance and Depth
1MBARI’s Dorado-classBattery, 200 kHz multibeam sonar, 100 kHz and 410 kHz chirp sidescan sonars0.5 m diameter, 6.4 m length, 20 h endurance, 6 km depth
2SentryBattery, conductivity, temperature and depth sensors, digital camera, reodx potential probe1.8 m height, 2.2 m width, 2.9 m length, 24 h endurance, 6 km depth
3Qianlong-1Battery, camera, obstacle avoidance sonar, side-scan sonar0.8 m diameter, 4.6 m length, 24 h endurance, 6 km depth
4SeaBED ClassBattery, Imagenex Delta-T imaging sonar, camera2 m length, 1.5 m height, 1.2 m width, 24 h endurance, depth 5 km
5Urashima (hybrid)Battery, multi-beam echo sounder, Niskin water sampler, interferometric synthetic aperture sonar, gravimeter system1.3 m width, 10 m length, 24 h endurance, depth 3.5 km
6Aster x/Idef xBattery, multi-beam echo sounders, multiple sensors, sub-bottom profilers, spectrometers0.7 m diameter, 4.5 m length, 16 h endurance, depth 3 km
7BlueROV2Battery, gyroscope, accelerometer, magnetometer, pressure/depth and temperature sensor457 mm × 338 mm × 254 mm, 4.5 m, 4 h endurance, depth 300 m
Table 5. Different frequencies and applications of sonar.
Table 5. Different frequencies and applications of sonar.
Serial #FrequenciesApplication
13–30 Hz, ELF bandUnderwater communications and pinging
230–300 Hz, super low frequency (SLF) bandUnderwater submarine communications
3300 Hz–3 kHz, ultra low frequency (ULF) bandUnderwater communications through dirt and rocks
43 kHz–30 kHz, very low frequency (VLF) bandNear-sea-surface communications, navigation beacons
530 kHz–300 kHz, low frequency (LF) bandNear-sea-surface communications, navigation beacons
63 kHz–30 kHz, VLF bandNear sea surface communications, navigation beacons
7Less than 1 kHz, 1 kHz–10 kHz, greater than 10 kHz, and less than 30 kHzActive sonar operation
850 kHz, 120 kHz, 200 kHz, and 455 kHzSport fishing
9120 kHz, and 200 kHzSea floor imaging using deep towed sonar, and swath phase-bathymetric mapping
10100 kHz–1 MHzSide-scan sonar
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Khawaja, W.; Semkin, V.; Ratyal, N.I.; Yaqoob, Q.; Gul, J.; Guvenc, I. Threats from and Countermeasures for Unmanned Aerial and Underwater Vehicles. Sensors 2022, 22, 3896. https://0-doi-org.brum.beds.ac.uk/10.3390/s22103896

AMA Style

Khawaja W, Semkin V, Ratyal NI, Yaqoob Q, Gul J, Guvenc I. Threats from and Countermeasures for Unmanned Aerial and Underwater Vehicles. Sensors. 2022; 22(10):3896. https://0-doi-org.brum.beds.ac.uk/10.3390/s22103896

Chicago/Turabian Style

Khawaja, Wahab, Vasilii Semkin, Naeem Iqbal Ratyal, Qasim Yaqoob, Jibran Gul, and Ismail Guvenc. 2022. "Threats from and Countermeasures for Unmanned Aerial and Underwater Vehicles" Sensors 22, no. 10: 3896. https://0-doi-org.brum.beds.ac.uk/10.3390/s22103896

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop