Skip to main content

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 340))

  • 2412 Accesses

Abstract

Nowadays, there are many researches on UAV (Unmanned Aerial Vehicle) control systems for disaster monitoring, national defense and surveillance applications, which mainly focus on flight performance of UAV or multiple UAV control by single operator. This paper presents design and implementation of an effective system for multiple operators to control UAVs based on RBAC (Role Based Access Control). In the proposed system, a UAV is connected to the UAV control server, and operators remotely access to the UAV by connecting to the server using various devices such as smart phones, desktops, and laptops at the same time. Each operator can control the UAV based on RBAC, in other words, operators are granted with permissions which are corresponding to the given roles. For example, the administrator may have all the permissions defined in the system and a pilot has a role where the flight control and flight status permissions are granted. In addition, operators may have a role with the camera tilt control and video access permissions. The major advantage of RBAC-based approach is to prevent unnecessary operational confusion, conflict and mistake under multi-operator UAV environments. Another advantage is to increase efficiency and accuracy of UAV mission control by allowing a mission to be decomposed into specific roles.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Grzonka, S., Grisetti, G., Burgard, W.: A Fully Autonomous Indoor Quadrotor. IEEE Transaction on Robotics 28(1) (2012)

    Google Scholar 

  2. LihuiGu, D., Pei, G., Ly, H., Gerla, M., Hong, X.: Hierarchical Routing for Multi-Layer Ad-Hoc Wireless Networks with UAVs. In: 21st Century Military Communications Conference Proceedings, MILCOM (2000)

    Google Scholar 

  3. Ly, H., Hong, H., Gerla, M., Pei, G., Lee, Y.: C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs. In: Wireless Communications and Networking Confernce, WCNC 2000 IEEE (2000)

    Google Scholar 

  4. Gancet, J., Hatten Berger, G., Alami, R., Lacroix, S.: Task planning and control for a multi-UAV system: architecture and algorithms. In: IEEE/RSJ International Conference on IROS Intelligent Robots and Systems (2005)

    Google Scholar 

  5. Ferraiolo, D., Richard Kuhn, D., Chandramouli, R.: Role-based Access Control (RBAC). Information Systems Control Journal 5 (2004)

    Google Scholar 

  6. Barkley, J., Beznosov, K., Uppal, J.: Supporting Relationships in Access Control Using Role Based Access Control

    Google Scholar 

  7. Glenn Brook Shear, J.: Computer Science An overview, 10th edn., pp. 135–141. Pearson (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeong, HJ., Ha, YG. (2012). RBAC-Based UAV Control System for Multiple Operator Environments. In: Kim, Th., Ramos, C., Kim, Hk., Kiumi, A., Mohammed, S., Ślęzak, D. (eds) Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity. Communications in Computer and Information Science, vol 340. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35267-6_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35267-6_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35266-9

  • Online ISBN: 978-3-642-35267-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics