Amateur Drone Surveillance: Applications, Architectures, Enabling Technologies, and Public Safety Issues: Part 2

Zeeshan Kaleem, Mubashir Husain Rehmani, Ejaz Ahmed, Abbas Jamalipour, Joel J.P.C. Rodrigues, Hassna Moustafa, Wael Guibene

Research output: Contribution to journalEditorial

14 Scopus citations

Abstract

The nine articles in this special section focus on amateur drone surveillance system implementation issues such as software-defined radio solutions for amateur drone surveillance, context-aware amateur drone localization, and moving target surveillance based on a cooperative drone network. The drone can be the key enabler to provide high-speed wireless communication for fifth-generation systems. But its deployment poses several public safety threats to national institutions such as atomic plants, historical places, and presidential houses because it may carry explosive and destructive chemicals or surveillance equipment. To cope with these security threats, surveillance drone deployment is required for counter-surveillance of amateur drones. The main motivation of deploying surveillance drones is to keep an eye on the amateur drones, which may lead to serious disasters if no precautionary measures are taken. The Feature Topic articles in this issue highlight the most recent advances in amateur drone survelliance system implementation issues such as software- defined radio solutions for amateur drone surveillance, context-aware amateur drone localization, and moving target surveillance based on a cooperative drones network.

Original languageEnglish
Pages (from-to)66-67
Number of pages2
JournalIEEE Communications Magazine
Volume56
Issue number4
DOIs
StatePublished - Apr 2018
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 1979-2012 IEEE.

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Amateur Drone Surveillance: Applications, Architectures, Enabling Technologies, and Public Safety Issues: Part 2'. Together they form a unique fingerprint.

Cite this