Development of the Concept of a Uav Detection and Neutralization System Using Interceptor Drones

2025;
: pp. 235 - 246
1
Lviv Polytechnic National University, Ukraine
2
Lviv Polytechnic National University, Ukraine

The article presents the concept of a hardware and software system for detecting and neutralizing unmanned aerial vehicles (UAVs) using interceptor drones. The proposed system uses passive radars that combine different physical detection principles, such as acoustic, radio, and optical. The data obtained is combined to accurately determine the target’s coordinates in airspace. Target coordinates are calculated based on geometric models of a sphere and a spheroid, which ensure an error of no more than 0.3%. The use of interceptor drones makes it possible to cost-effectively neutralize enemy UAVs due to their high maneuverability and the ability to use precision guidance. The successful implementation of the system can significantly increase airspace security and improve the defense capabilities of the ground forces. It has been demonstrated that spheroid-based calculations provide higher accuracy due to the conformity of the WGS 84 model to the shape of the Earth, while the spherical model is easier to implement. The obtained results confirm the feasibility of creating such systems for use in modern conditions of military threats.

  1. Zabunov S., Mardirossian G. Four innovative drone interceptors. Proceedings of the Bulgarian Academy of Sciences, 2024. 77, Article 02. Doi: https://doi.org/10.7546/CRABS.2024.02.09.
  2. Noureddine A. Do we need to gossip? A structural analysis of gossip and its functional manifestations in society. Journal of Sociology and Communication. 2023. 27. 1358–1370.
  3. Kumar T., Vasireddy I., Swaroopa D. Analysis of Raft consensus algorithm. International Journal of Distributed Systems. 2020. 15. 2350–0557.
  4. Sahyoun J. Passive speaker system. Journal of the Acoustical Society of America. 2003. 113, Article 1584121. Doi: https://doi.org/10.1121/1.1584121.
  5. Maksymiuk R., Hoyo P., Abratkiewicz K., Samczynski P., Kulpa K. 5G-based passive radar on a moving platform-Detection and imaging. IET Radar, Sonar & Navigation, 2024. Doi: https://doi.org/10.1049/rsn2.12559.
  6. Abdulzahra S., Al-Qurabat A. Exploring radio frequency-based UAV localization techniques: A comprehensive review. International Journal of Computing and Digital Systems. 2024. 15. 1565–1581. Doi: https://doi.org/10.12785/ijcds/1501111.
  7. Mikhnionok E., Khizniak A. Features of the application of the detection algorithm based on the background subtraction method in the scanning optoelectronic surveillance system. Doklady BGUIR. 2022. 20. 30–36. Doi: https://doi.org/    10.35596/1729-7648-2022-20-6-30-36.
  8. Zhao W., Ding H. Maneuvering target tracking algorithm in multi-radar networking based on interacting multiple model-virtual observation Kalman filter. Information and Control. 2015. 44. 15–20. Doi: https://doi.org/ 10.13976/ j.cnki.xk.2015.0015.
  9. Geodetic problems. (n.d.). URL:http://www.geoguide.com.ua/survey/survey.php?part=geod&art= geod010.
  10. DSM2 Grid Map. (n.d.). URL: https://github.com/Prafulljohri/gmap-tile-generator/blob/master/gmaps-tile- creator/src/gov/ca/maps/tile/geom/GlobalMercator.java.
  11. Algorithms for geodesics. (n.d.). URL: https://arxiv.org/pdf/1109.4448.
  12. Stavrakakis D., Giantsidi D., Bailleu M., Sändig P., Issa S., Bhatotia P. Anchor: A library for building secure persistent memory systems. Proceedings of the ACM on Management of Data. 2023. 1. 1–31. Doi: https://doi.org/10.1145/3626718.
  13. Data driven security hardening in Android. 2021. URL: https://security.googleblog.com/2021/01/data- driven-security-hardening-in.html.
  14. A proactive approach to more secure code. 2019. URL: https://msrc.microsoft.com/blog/2019/07/a- proactive-approach-to-more-secure-code/.
  15. Memory safety. 2019. URL: https://www.chromium.org/Home/chromium-security/memory-safety/.
  16. Implications of rewriting a browser component in Rust. 2019. URL: https://hacks.mozilla.org/2019/ 02/rewriting-a-browser-component-in-rust/.