RAND:新兴技术和风险分析 无人机系统智能集群技术(2024)

VIP文档

ID:69647

大小:0.61 MB

页数:24页

时间:2024-02-16

金币:10

上传者:战必胜
HS AC
S
A
A
A
n FFRDC operated by the RAND Corporation under contract with DHS
HOMELAND SECURITY
OPERAT IONAL ANALYSIS CENTER
RESEARCH REPORT
DANIEL M. GERSTEIN, ERIN N. LEIDY
Emerging
Technology and
Risk Analysis
Unmanned Aerial Systems Intelligent
Swarm Technology
U
nmanned aerial systems (UASs)
or drone technologies, both
individual systems and swarms
of UASs, have proliferated over
the past 25 years for a wide variety of
applications. As a result, this technol-
ogy and the ability to employ these UAS
capabilities represent both a current and
a growing threat as the technology con-
tinues to mature.
For this assessment, we delineate
drone swarm technology into three cat-
egories: (1)multioperator-coordinated
groups of individual drones; (2) drones
that have been programmed in a coor-
dinated manner to fly individually, in
a leader-follower configuration, or in
multidrone formations with a human
operator controlling multiple drones; and
(3)intelligent drone swarms that can
communicate among individual drones
and respond to external stimuli. The first
two categories represent what we call in
this assessment surrogate swarm tech-
nology, while the third category has been
designated intelligent swarm technology.
1
KEY FINDINGS
Unmanned aerial systems (UASs), or drone technologies, for both
individual systems and for surrogate swarms represent a current
threat and, in the case of intelligent swarms, a growing threat
given continued advances in range, payload, and power as UAS
technology continues to mature.
The maturing of intelligent swarms will come at the convergence
of multiple technologies, including artificial intelligence, big data,
Internet of Things, and fifth-generation cellular (5G), which will
combine to support the development and employment of these
capabilities.
The risks of the illicit use of intelligent swarms will continue to
grow over time; however, attacks will likely remain localized, with
the potential for impacts to be felt regionally in some cases, such
as cyber or electromagnetic attacks against the electrical grid.
This would mean the consequences are likely to remain moderate
because they are not likely to have a national impact.
Vulnerabilities and consequences will likely be challenging to
mitigate for homeland security defenders (e.g., law enforce-
ment officers, first responders, planners, and workers in critical
infrastructure sectors), because fielding detection systems and
countermeasures across the range of potential targets could be
extremely costly.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭