• 热门标签

当前位置: 主页 > 航空资料 > 国外资料 >

时间:2012-03-16 12:23来源:蓝天飞行翻译 作者:航空
曝光台 注意防骗 网曝天猫店富美金盛家居专营店坑蒙拐骗欺诈消费者

Data links are susceptible to jamming and intrusion by hostile forces.  Jamming may degrade the ability of the system to transmit signals between the ground station and the UA, especially if the antenna on the UA is omni-directional, vice steerable.  UA operating within radio line of sight from their control stations are more likely to use an omni-directional antenna approach, while UA operating through communication satellites are more likely to employ a steerable dish antenna with a relatively narrow beam.  Unintentional jamming from friendly or neutral communications emitters may also degrade the UA’s capabilities.  Hostile forces may intrude into either the C2 or the data link in order to take over the UA or degrade the UA control or payload data reception so that it cannot carry out its intended mission.  
Navigation equipment, often augmented by GPS, and mission management software provide the UA the capability to fly a given route and collect the desired information.  Because such navigation systems are dependent upon receiving GPS satellite signals, any denial of GPS service will impact the mission effectiveness of the UA, perhaps even causing its loss.  Although events like the jamming or destruction of a GPS satellite are beyond the control of the UA operator, that jamming or destruction would essentially bring most UA operations to a rapid halt.
Finally, the mission management software can be affected through several means either before or after the aircraft is launched.  Viruses, Trojan horses, and other hostile software agents can infect the UAS’ software and keep the system from fulfilling its mission.  
Payloads
Payloads vary according to UA type and mission, with the overwhelming majority of UA payloads being imaging payloads; therefore this discussion will be limited to imaging payload survivability.  Payloads can be either external, as in a ball or pod that hangs from the aircraft, or internal.  In smaller, less expensive UAS, locating the payload internally does not dramatically decrease vulnerability. Payloads are generally not specifically targeted in the smaller aircraft because it is just as easy to destroy or degrade the UA itself.
Payloads are susceptible to physical threats; even though the payload is not likely to be targeted specifically it may suffer collateral damage from an attack on the UA.  Passive payloads may be degraded by electronic attack, but a relatively long dwell time is required to cause permanent damage.  However active sensors, such as radars, are more susceptible to electronic attack.  Even a short-term attack can cause significant long-term damage.
APPENDIX K – SURVIVABILITY
Page K-3
UAS ROADMAP 2005

Dissemination Means
UAS normally disseminate information via data links.  Depending upon the system, information may be processed onboard the aircraft or transmitted to the ground for processing.  In either case, the communications channel is susceptible to detection, radio direction finding, intercept, and electronic attack efforts.  If the UA is transmitting a live video feed, the communication channel is likely to be wideband and continually emitting.  Encryption of the data links would reduce the possibility of successful intercept and exploitation.  Depending upon the UA system, the dissemination data links and the command and control links may share the same frequencies and be interwoven through multiplexing schemes.
 
中国航空网 www.aero.cn
航空翻译 www.aviation.cn
本文链接地址:无人机系统路线图 Unmanned Aircraft Systems Roadmap(203)