I. Introduction
Advances in inexpensive and widely available commercial and consumer grade unmanned aerial vehicles (UAVs) or “drones” have expanded their overall use. These rapid developments and deployment of wide spread applications of UAVs have led to an increased need to address various concerns related to public safety and privacy. It is critical detect and identify malicious UAVs flying in unauthorized or restricted areas [1]. Malicious UAVs can be considered as those that are outfitted with explosive payloads or that are used to collect data in restricted territory. Low altitude flights may allow them to operate in restricted areas without triggering traditional air-space security measures. Restricted air-spaces can be understood as areas (land or water/ocean) above which unauthorized UAVs are not permitted under certain conditions. To illustrate the overall concept, a typical system model is depicted in Fig. 1 where we can see UAVs, UAV-restricted area and UAV-monitoring area.
System model for detecting malicious UAVs with UAV restricted zone and monitoring area.