Building a Framework to Protect Your Privacy from Drones (2024)

Building a Framework to Protect Your Privacy from Drones (1)

Those lost at sea or caught in hostage situations would welcome a team of drones to find them.

However, if those persons were sunbathing in their backyard—perhaps not.

Because of the social and legal consequences of such intrusions, developers now put attention on privacy-protecting systems for unmanned aerial vehicles (UAVs).

Vienna University of Economics and Business researchers propose a privacy framework for UAVs that safeguards restricted areas—such as private property—and prevents the collection of personal data from, say, bystanders in a crowd who happen to be near a police response.

“Drones can cause privacy harms as they can potentially invade people’s private space, and accidentally expose them by processing personal data against their will. Additionally, privacy violations can occur through the unsuspecting collection of information concerning random citizens without any purpose, simply due to constant video recording while flying,” say the authors of“Privacy-Aware Restricted Areas for Unmanned Aerial Systems”in IEEE Security & Privacy. (Login may be required for full text.)

The proposed privacy framework, depicted below, distinguishes between four types of actors: system operators, service providers, citizens, and authentication service providers.

Building a Framework to Protect Your Privacy from Drones (2)

For example, a system operator could be a police officer at a control center while the service provider would be the police department. Additionally, the citizen would be anyone wanting to protect his or her privacy.

“Any citizen holding a legal property title may use the system to set their privacy preferences,” the authors say.

The authentication provider is assumed to be a trusted e-identity provider.

These four actors interact with the six different modules in the privacy framework, providing data input to the UAV via the unmanned aerial system (UAS) control program.

The property coordinates must first be represented using a specific geospatial projection and associated with certain attributes, such as specific permissions for flying over a property.

Here’s how it works.

“To enter data, citizens need to identify themselves via an authentication infrastructure, which is offered by an (external) authentication provider. After authentication, the citizens can enter details about their private properties using a web interface that is offered by the service provider. Based on the data input, a checking entity is required to confirm the correctness of the request,” the authors say.

“After the correctness check, convex hulls can be calculated to increase the efficiency of the calculation of the flight path. The system operator can select and request the flight path calculation from the system. If there is no intersection between flight path and restricted areas, the flight path can be submitted to a UAS control program. Finally, the UAS control program handles the communication to the UAV, allowing it to be dispatched according to the flight coordinates chosen,” they add.

The authors of the research are Peter Blank, a process and data analytics professional at PwC Switzerland and a former research assistant at Vienna University of Economics and Business;Sabrina Kirrane, a postdoctoral researcher at the same Vienna University; andSarah Spiekermann, a professor for business informatics also at the university.

Research related to drones in the Computer Society Digital Library

Login may be required for full text.

Building a Framework to Protect Your Privacy from Drones (3)

About Lori Cameron

Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. Contact her at [email protected]. Follow her on LinkedIn.

I'm an expert in the field of unmanned aerial vehicles (UAVs) and privacy protection systems. My background includes in-depth knowledge of the developments and challenges associated with the use of drones, particularly in addressing privacy concerns. I've closely followed research and advancements in this area, staying informed about the latest technologies and proposed frameworks to ensure the responsible and ethical use of UAVs.

The article discusses a significant aspect of UAV technology—the need for privacy-protecting systems. The researchers from Vienna University of Economics and Business propose a privacy framework for UAVs in their paper titled "Privacy-Aware Restricted Areas for Unmanned Aerial Systems," published in IEEE Security & Privacy. The researchers, Peter Blank, Sabrina Kirrane, and Sarah Spiekermann, address the potential privacy harms caused by drones and highlight the importance of safeguarding restricted areas, such as private properties, and preventing the unauthorized collection of personal data.

The proposed privacy framework involves four key actors: system operators (e.g., police officers), service providers (e.g., police departments), citizens, and authentication service providers. The framework comprises six modules that interact to ensure privacy protection while allowing UAVs to perform their tasks effectively.

One notable feature is the citizen's ability to set privacy preferences for their properties. Citizens with legal property titles can use the system to define their privacy preferences, contributing to a more personalized and user-centric approach to privacy protection.

Authentication is a crucial step in the process. Citizens need to identify themselves via an authentication infrastructure provided by an external authentication provider. After authentication, citizens can input details about their private properties using a web interface offered by the service provider.

A checking entity confirms the correctness of the request, and convex hulls are calculated to optimize the flight path calculation efficiency. The system operator can then request the flight path calculation from the system. If there is no intersection between the flight path and restricted areas, the flight path is submitted to the UAS control program, which handles communication with the UAV for dispatching according to the chosen flight coordinates.

The authors emphasize the importance of preventing privacy violations caused by unintentional data collection and the constant video recording capabilities of drones during flight. The proposed framework seeks to balance the operational needs of UAVs with the protection of individuals' privacy rights.

In summary, the research addresses the complex challenges associated with drone technology and privacy concerns, offering a comprehensive framework that involves multiple actors and modules to ensure responsible and privacy-aware use of UAVs.

Building a Framework to Protect Your Privacy from Drones (2024)

FAQs

How to stop drones invading your privacy? ›

Find the drone pilot and ask them to stop flying the drone over your home. Also, post signs on your property requesting that people don't fly drones in the area. It's illegal for you to forcibly remove the drone from the area above your property by shooting it down or using a net, signal jammer, or any other method.

How to protect against drones? ›

Nets and Net Guns

This rudimentary but effective counter-UAS technology involves using a net to stop the drone by prohibiting the rotor blades. There are three main delivery methods: Net cannons fired from the ground: can be hand-held, shoulder-launched, or turret-mounted. Anywhere from 20m to 300m effectiveness.

Is there a device that can stop drones from spying on you? ›

Use A Drone Jammer Or Anti-Drone Drone

This can cause the drone to lose control and crash. However, according to our knowledge, using a drone jammer is illegal in most countries. Have you ever heard of an anti-drone drone? An anti-drone drone detects, tracks, and disables other drones.

Can drones legally spy on you? ›

Criminal Code Section 934.50: Drones may not be used for surveillance in violation of another party's reasonable expectation of privacy; this includes law enforcement. However, police may use drones with a valid search warrant.

How do I block drone frequencies? ›

Drone Jammers

Jammers work by blasting electromagnetic noise at the radio frequencies that drones use to operate and emit information. Effectively, they drown out the conversation between a drone and its operator. This is usually either 2.4Ghz or 5.8Ghz, which are non-assigned, public frequencies.

Do buildings block drone signal? ›

Physical obstacles such as buildings, trees, and hills can block the signal between the drone and its controller, reducing the effective flight range. Optimising Flight Paths: Plan routes that avoid dense urban areas and natural obstacles.

What is the best weapon against drones? ›

High-powered lasers and microwave systems focus a light beam or an electromagnetic pulse toward the drone to physically damage its electronics. Nets and guns are fired from the ground or another drone to stop rogue drones' flight mechanisms and rotor blades.

What is the 1:1 rule for drones? ›

If you have a drone with a CE class 2 mark, under subcategory A2, as a general rule, keep the UA at a lateral distance from any uninvolved person that is not less than the height at which the drone is flying (this is the '1:1 rule', i.e. if the UA is flying at a height of 40 m, the distance from any uninvolved person ...

When not to fly your drone? ›

Do not fly your drone directly over people who are not involved in operating it, and fly at or below 400 feet. Be aware of airspace restrictions, including stadiums, schools, hospitals and power plants. The FAA's B4UFLY Smartphone App can help you find restrictions where you want to fly.

What is the safe distance from people flying drones? ›

Never fly over people who are crowded together, no matter what size of drone or model aircraft you have. 150m is the minimum distance. Be prepared to increase the distance if you need to do that to fly safely.

How to tell if a drone is watching you? ›

Erratic Movements: Surveillance drones might change directions frequently, especially if they're tracking something (or someone). Hovering: If you notice a 'star' that's been in the same spot for a tad too long, it might just be a drone keeping an eye on something below.

How to detect a drone with your phone? ›

Drone Scanner is designed to turn a phone or tablet into a drone scanner and track all the nearby flights over direct/broadcast Remote ID standards. Users can browse real-time data about drones on a detailed map highlighting specific flying space zones. The Drone Scanner is available to download for free.

Are drones a violation of privacy? ›

Fourth, California AB 856 (2015) expands individuals right to privacy noting that if an individual is using a drone over someone's home and has the intent to knowingly capture video, pictures or sound from the person or persons at the home then that may be considered an invasion of privacy.

How do you get rid of a spying drone? ›

Notify Local Law Enforcement and the FAA

Contact your local law enforcement and the FAA to report illegal drone activity. Give them the information you gathered with your counter drone. The more information that the authorities have, the easier it is for them to prosecute the pilot.

Why are drones flying over my house at night? ›

Police and security agencies often use drones in low-light conditions. And, because of their resolution capabilities, many police departments around the world use night vision drones for nighttime surveillance.

How do you stay hidden from drones? ›

Another technique is using thermal blankets or materials to shield yourself from the drone's heat-seeking sensors. These blankets reflect heat, making it harder for the drone to spot a human body among other sources of heat. Additionally, hiding in structures can prove effective in avoiding detection by drones.

Top Articles
How credit cards work - Canada.ca
Balance Transfer Calculator: How Much Can You Save With A Balance Transfer?
Is Sam's Club Plus worth it? What to know about the premium warehouse membership before you sign up
Cold Air Intake - High-flow, Roto-mold Tube - TOYOTA TACOMA V6-4.0
Craigslist Niles Ohio
Wizard Build Season 28
Readyset Ochsner.org
Apex Rank Leaderboard
Elden Ring Dex/Int Build
Atrium Shift Select
Skip The Games Norfolk Virginia
Oppenheimer & Co. Inc. Buys Shares of 798,472 AST SpaceMobile, Inc. (NASDAQ:ASTS)
Elizabethtown Mesothelioma Legal Question
Missing 2023 Showtimes Near Landmark Cinemas Peoria
Sony E 18-200mm F3.5-6.3 OSS LE Review
Gino Jennings Live Stream Today
Munich residents spend the most online for food
Tamilrockers Movies 2023 Download
Katherine Croan Ewald
Diamond Piers Menards
The Ultimate Style Guide To Casual Dress Code For Women
Site : Storagealamogordo.com Easy Call
Is Windbound Multiplayer
Filthy Rich Boys (Rich Boys Of Burberry Prep #1) - C.M. Stunich [PDF] | Online Book Share
Integer Division Matlab
Sandals Travel Agent Login
Horn Rank
Ltg Speech Copy Paste
Random Bibleizer
Craigslist Fort Smith Ar Personals
The Clapping Song Lyrics by Belle Stars
Poe T4 Aisling
R/Sandiego
Kempsville Recreation Center Pool Schedule
Rogold Extension
Beaver Saddle Ark
Log in or sign up to view
A Man Called Otto Showtimes Near Amc Muncie 12
Powerspec G512
Saybyebugs At Walmart
2007 Jaguar XK Low Miles for sale - Palm Desert, CA - craigslist
Miami Vice turns 40: A look back at the iconic series
Love Words Starting with P (With Definition)
Tlc Africa Deaths 2021
Youravon Com Mi Cuenta
Nope 123Movies Full
Kushfly Promo Code
Diario Las Americas Rentas Hialeah
Game Akin To Bingo Nyt
Marion City Wide Garage Sale 2023
Latest Posts
Article information

Author: Msgr. Refugio Daniel

Last Updated:

Views: 5382

Rating: 4.3 / 5 (54 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Msgr. Refugio Daniel

Birthday: 1999-09-15

Address: 8416 Beatty Center, Derekfort, VA 72092-0500

Phone: +6838967160603

Job: Mining Executive

Hobby: Woodworking, Knitting, Fishing, Coffee roasting, Kayaking, Horseback riding, Kite flying

Introduction: My name is Msgr. Refugio Daniel, I am a fine, precious, encouraging, calm, glamorous, vivacious, friendly person who loves writing and wants to share my knowledge and understanding with you.