DESIGNING A SECURE COMMUNICATION FRAMEWORK FOR UAV-TO-TOC OPERATIONS IN MILITARY AND EMERGENCY ENVIRONMENTS
UDC: 355.415.1:004.77.056
DOI:
https://doi.org/10.46763/ETIMA2531349mKeywords:
Bandwidth Optimization, Blockchain, Military UAV Communication, Network Security, Secure UAV-to-TOC Communication, Tactical Data Links.Abstract
Ensuring secure and reliable communication between Unmanned Aerial Vehicles (UAVs) and Tactical Operations Centers (TOCs) is critical for mission success in military and emergency response operations. Traditional UAV-to-TOC communication frameworks often suffer from vulnerabilities, including electronic warfare threats, cyberattacks, bandwidth limitations, and interoperability constraints. This paper proposes a Secure Communication Framework for UAV-to-TOC Operations (SCF-UAVTOC) designed to enhance resilience, security, and efficiency in hostile and high-risk environments. The framework integrates end-to-end encryption, blockchain-based authentication, and adaptive frequency management to mitigate jamming and signal interception risks. Additionally, software-defined radios (SDR) optimize spectrum utilization, ensuring reliable communication even in contested environments. To counter cyber threats, intrusion detection systems (IDS) powered by real-time AI monitoring are incorporated, enabling proactive threat mitigation. Furthermore, the framework ensures multi-protocol interoperability, allowing seamless integration of UAV systems within joint military and emergency response operations. The effectiveness of the SCF-UAVTOC model is validated through comparative analysis and simulation-based testing, demonstrating superior performance in secure data transmission, resilience to electronic warfare, and adaptability to dynamic operational conditions. By adopting this framework, defense organizations and emergency agencies can significantly enhance UAV communication security, mission reliability, and overall operational effectiveness in complex battlefield and disaster scenarios.
Downloads
References
[1] Alotaibi, Ahad / Chatwin, Chris / Birch, Phil: A Secure Communication Framework for Drone Swarms in Autonomous Surveillance Operations. Journal of Computer and Communications, 2024, pp. 1–25.
[2] Bedford, John C. / Davis, Sandra / Levis, Alexander H.: The Limitless Sky: Air Force Science and Technology Contributions to the Nation. Air Force History and Museums Program, 2004.
[3] Duguma, Daniel Gerbi / Astillo, Philip Virgil / Kim, Jiyoon / Ko, Yongho / Pau, Giovanni / You, Ilsun: Drone Secure Communication Protocol for Future Sensitive Applications in Military Zones. Sensors, 2021, 21, 2057, pp. 1–25.
[4] Frater, Michael / Ryan, Michael: Communications Electronic Warfare and the Digitized Battlefield. Land Warfare Studies Centre, 2001.
[5] Friesendorf, Cornelius (Ed.): Strategies Against Human Trafficking: The Role of the Security Sector. National Defence Academy & Austrian Ministry of Defence and Sports, Geneva Centre for the Democratic Control of Armed Forces (DCAF), 2009.
[6] Gao, Jing: Analysis of Military Application of Software Radio Communication Technology. Operation Software and Simulation Research Institute of Dalian Naval Academy, China, 2019.
[7] Hammons, Terry: Future Tactical Communications Networks: Challenges and Opportunities. U.S. Army Research Laboratory, 2004.
[8] Ko, Yongho / Kim, Jiyoon / Duguma, Daniel Gerbi / Astillo, Philip Virgil / You, Ilsun / Pau, Giovanni: Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone. Sensors, 2021, 21, 2057, pp. 1–25.
[9] Kravaica, Tomislav: Advanced Military Communications: Strategies for the Next Generation. NATO Research Report, 2020.
[10] Levis, Alexander H. / Bedford, John C. / Davis, Sandra: The Limitless Sky: Air Force Science and Technology Contributions to the Nation. Air Force History and Museums Program, 2004.
[11] Marine Corps Combat Development Command (MCRP 5-12A): Operational Terms and Graphics. Department of the Army, 2004.
[12] Mustafovski, Rexhep: The Security Vulnerabilities and Challenges on the IoT Technologies. 2024.
[13] NATO Science & Technology Organization: Resilient and Adaptive Battlefield Communications: The Path Forward. NATO Technical Report, 2023.
[14] Ouadah, Meriem / Merazka, Fatiha: Securing UAV Communication: Authentication and Integrity. IEEE Conference on Telecommunications and UAV Security, 2024, pp. 1–10.
[15] Ryan, Michael / Frater, Michael: Electronic Warfare for the Digitized Battlefield. Artech House, 2001.
[16] U.S. Army: Army Unmanned Aircraft System Operations (FMI 3-04.155). Department of the Army, 2006.
[17] U.S. Department of Defense: Military Communication Systems Study: Battlefield Networking and Secure Tactical Radio Systems. Department of Defense, 2018.
[18] U.S. Defense Advanced Research Projects Agency (DARPA): Quantum-Safe Encryption for Military Networks. DARPA Technical Report, 2024.
[19] U.S. Joint Forces Command: Military Satellite Communications: Current Capabilities and Future Developments. Department of Defense, 2024.
[20] U.S. Marine Corps: Operational Terms and Graphics (MCRP 5-12A). Department of the Navy, 2004.