Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3565287.3617633acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article
Open access

No-Fly-Zone: Regulating Drone Fly-Overs Via Government and User-Controlled Authorization Zones

Published: 16 October 2023 Publication History

Abstract

Unmanned Aerial Systems (UAVs), a.k.a., drones, are becoming increasingly popular, as several companies are incorporating them into highly-convenient, last-mile delivery systems. Given this market, concerns with non-consensual surveillance and destruction of drones and private property have been raised. To address these concerns, this paper presents No-Fly-Zone, a solution that proposes developing a series of physical spaces, a.k.a., zones, that utilize Attribute-Based Access Control (ABAC) to allow users, e.g., homeowners, to define flight authorization for drones. With zones that highlight no-fly air-spaces, companies will be able to launch their drones with a lowered chance of human interference or liability, allowing for property owners to determine which level of privacy they wish to enforce. Moreover, using a map that incorporates zoning preferences, a drone path planning algorithm can safely designate a path for any commercial drone flight. No-Fly-Zone also provides a a user-friendly application for collecting and deploying zoning data to pathing algorithms with limited setbacks, thus encouraging the future integration of No-Fly-Zone with existing and future drone flight management systems.

References

[1]
Amazon Inc. 2022. Amazon Prime Air prepares for drone deliveries. https://www.aboutamazon.com/news/transportation/amazon-prime-air-prepares-for-drone-deliveries. Last Accessed: July 2022.
[2]
Rakesh Rajan Beck, Abhishek Vijeev, and Vinod Ganapathy. 2020. Privaros: A Framework for Privacy-Compliant Delivery Drones. In Proc. of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS '20). Association for Computing Machinery, Virtual Event, USA, 181--194.
[3]
Peter Blank, Sabrina Kirrane, and Sarah Spiekermann. 2018. Privacy-Aware Restricted Areas for Unmanned Aerial Systems. IEEE Security & Privacy 16, 2 (2018), 70--79.
[4]
C. O'Donovan. 2022. Amazon drones are coming to town. Some locals want to shoot them. https://www.washingtonpost.com/technology/2022/06/20/amazon-delivery-drones-california-cowboy-horses/. Last Accessed: July 2022.
[5]
Ade Candra, Mohammad Andri Budiman, and Kevin Hartanto. 2020. Dijkstra's and A-Star in Finding the Shortest Path: a Tutorial. In 2020 Int. Conf. on Data Science, Art. Int., and Business Analytics (DATABIA). IEEE, Medan, Indonesia, 28--32.
[6]
Chung, David Ferraiolo, David Kuhn, Adam Schnitzer, Kenneth Sandlin, Robert Miller, and Karen Scarfone. 2019. Guide to Attribute Based Access Control (ABAC) Definition and Considerations. https://tsapps.nist.gov/publication/getpdf.cfm?pubid=927500.
[7]
Federal Aviation Administration. 2019. Accident & incident data. www.faa.gov/dataresearch/accidentincident. Last Accessed: July 2022.
[8]
Federal Aviation Administration. 2022. B4UFLY App. https://www.faa.gov/uas/gettingstarted/b4ufly. Last Accessed: August 2022.
[9]
Federal Aviation Administration. 2022. Drones by the numbers. www.faa.gov/uas/resources/bythenumbers/. Last Accessed: July 2022.
[10]
Federal Aviation Administration (FAA). 2023. Daylight operations. 14 Code of Federal Regulations (CFR) Part 107, § 107.29. Available at: https://www.ecfr.gov/current/title-14/part-107.
[11]
Federal Aviation Administration (FAA). 2023. Operation in certain airspace. 14 Code of Federal Regulations (CFR) Part 107, § 107.41. Available at: https://www.ecfr.gov/current/title-14/part-107.
[12]
IBM. 2021. Projected coordinate systems. www.ibm.com/docs/en/db2-warehous e?topic=SSCJDQ/com.ibm.db2.luw.spatial.topics.doc/doc/csb3022b.html. Last Accessed: July 2022.
[13]
Ben Nassi, Ron Bitton, Ryusuke Masuoka, Asaf Shabtai, and Yuval Elovici. 2021. SoK: Security and Privacy in the Age of Commercial Drones. In 2021 IEEE Symposium on Security and Privacy (SP). "IEEE", Virtual Conference, 1434--1451.
[14]
Python Package Index. 2019. easytello 0.0.7. https://pypi.org/project/easytello/. Last Accessed: August 2023.
[15]
Carlos E. Rubio-Medrano, Shaishavkumar Jogani, Maria Leitner, Ziming Zhao, and Gail-Joon Ahn. 2019. Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies. In Proc. of the 24th ACM Symp. on Access Control Models and Technologies (SACMAT '19). ACM, Toronto, Canada, 195--206.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiHoc '23: Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing
October 2023
621 pages
ISBN:9781450399265
DOI:10.1145/3565287
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 October 2023

Check for updates

Author Tags

  1. unmanned aerial systems (UAS)
  2. drones
  3. fly-overs
  4. attribute-based access control (ABAC)
  5. path planning
  6. zoning

Qualifiers

  • Research-article

Funding Sources

Conference

MobiHoc '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 296 of 1,843 submissions, 16%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 191
    Total Downloads
  • Downloads (Last 12 months)177
  • Downloads (Last 6 weeks)24
Reflects downloads up to 14 Nov 2024

Other Metrics

Citations

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media