메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색
질문

논문 기본 정보

자료유형
학술저널
저자정보
최성재 (충남대학교) 노정민 (한국과학기술원) 김상하 (충남대학교)
저널정보
육군사관학교 화랑대연구소 한국군사학논집 한국군사학논집 제78권 제3호
발행연도
2022.10
수록면
301 - 328 (28page)

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색
질문

초록· 키워드

오류제보하기
Technologies related to the drone industry are developing rapidly around the world. It goes beyond the level of simply shooting an image, and is equipped with various sensors suitable for the role it performs. It is used to monitor and strike enemies, to be used in disaster situations, and to transport goods and monitor the environment, and its utilization is rapidly increasing. Drones used for various purposes are combined with flight sensors such as wireless receivers, flight controllers, and gyroscopes. And it is composed of various equipment such as Lotus telecommunication module, GPS receiver, and camera. If we broadly group these devices, we can classify the "drone vehicle" that actually moves in the air, the ‘wireless communication part’ that distributes information, controls and controls drone flying vehicles, stores and ‘ground control system’ that is analyzed information obtained from sensors.
As the use of drones increases, various threats that interfere with the normal operation of drone components also increase. These threats sometimes pose not only a threat to the environment and individuals, but also a fatal threat to national security. In order to operate a drone stably, the confidentiality, integrity, and validity of the system constituting the drone and the data being distributed must be guaranteed. In addition, it is necessary to identify various threats of attackers attacking the drone system in advance and to remove the identified threats. To this end, various cyber threats that interfere with the normal operation of the drone system studied so far are systematically analyzed for each component of the drone, I would like to suggest a way to effectively eliminate the identified threats.

목차

ABSTRACT
Ⅰ. 서론
Ⅱ. 드론시스템의 사이버위협
Ⅲ. 드론 사이버위협 대응방안
Ⅳ. 결론
참고문헌

참고문헌 (0)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

이 논문과 함께 이용한 논문

최근 본 자료

전체보기

댓글(0)

0