Next Article in Journal / Special Issue
Mechanical Chaotic Duffing System with Magnetic Springs
Previous Article in Journal
Organization of Control of the Generalized Power Quality Parameter Using Wald’s Sequential Analysis Procedure
Previous Article in Special Issue
Equivalent Exchange Method for Decision-Making in Case of Alternatives with Incomparable Attributes
 
 
Article
Peer-Review Record

Information Protection in Complexes with Unmanned Aerial Vehicles Using Moving Target Technology

by Vitaly Pikov, Anatoly Ryapukhin * and Daniela Veas Iniesta
Reviewer 1: Anonymous
Reviewer 2:
Submission received: 15 November 2022 / Revised: 12 December 2022 / Accepted: 5 January 2023 / Published: 11 January 2023
(This article belongs to the Collection Feature Innovation Papers)

Round 1

Reviewer 1 Report

Please read the attachment. Thank you.

Comments for author File: Comments.pdf

Author Response

Comment: Please shorten the title, and it should be maximized within ten words.

Answer: The title of the article is changed to "Information Protection in Complexes with Unmanned Aerial Vehicles Using Moving Target Technology".

 

Comment: Please provide between 5 and 10 keywords that should not repeat the words/phrases that appeared on the manuscript title.

Answer: There are 5 keywords which do not appeared on the manuscript title.

 

Comment: Introduction: “UAV are one of the main trends in aviation in recent years”. This sentence tense is wrong, please rewrite it.

Answer: The sentence is rewritten.

 

Comment: Figure 7: substitute arrows for links between boxes instead of curly braces.

Answer: The figure is corrected.

 

Comment: Please combine Section 3 and Section 4. It should be “Results and Discussion.”

Answer: Section 3 and Section 4 are combined.

 

Comment: References: Please consider adding the following state–of–the–art work (https://doi.org/10.3390/drones6110363) to do a literature review for your drone’s security system.

Answer: The following reference is added.

 

Comment: Please add a flowchart of the study process.

Answer: The article discusses the hypothesis that it is possible to organize information protection in complexes with unmanned aerial vehicles using moving target technology. Previously, this technology for drones has never been used. The educational process is not provided.

 

Comment: Please make a table to compare the accuracy of your approach with that of others.

Answer: The article discusses the hypothesis that it is possible to organize information protection in complexes with unmanned aerial vehicles using moving target technology. Previously, this technology for drones has never been used. The article proposes a variant of testing the hypothesis using a model created using GNS3 tool. Estimating accuracy is not possible. The model in the form of a test network in the emulator just recreates the proposed method. To evaluate and obtain at least some adequate indicators, it is necessary to use full-scale modeling, with a real complex with drones.

 

Comment: How did the authors validate the results? What is the main limitation of this study?

Answer: The article discusses the hypothesis that it is possible to organize information protection in complexes with unmanned aerial vehicles using moving target technology. Previously, this technology for drones has never been used. The results (hypothesis) are confirmed by a model created using GNS3 tool. The main limitation of this study is the lack of experimental results on real unmanned aerial vehicles. It is necessary to take into account the fact that the model in the form of a test network in the emulator only recreates the proposed method. To evaluate and obtain at least some adequate indicators, it is necessary to use full-scale modeling, with a real complex with drones.

 

Comment: Please provide some applications of the proposed approach for different fields in the practical industry. (Please add in Section 5. Conclusions)

Answer: "Conclusion" section is added: The method of information protection proposed in the study in complexes with unmanned aerial vehicles using moving target technology, when implemented in practice, does not impose any restrictions on the size of an unmanned aerial vehicle, as well as its scope (military or civil purposes).

Author Response File: Author Response.docx

Reviewer 2 Report

Title: Method for Improving the Efficiency of the System for Protecting Information from Unauthorized Access of Complexes with Unmanned Aerial Vehicles Using Moving Target Defense Technology

 

The article discusses the features and types of confidential information processed in complexes with UAV.  A review of the experience of using MTD technology has been made. A method has been developed to improve the effectiveness of the system for protecting information from unauthorized access of complexes with UAV using the technology of MTD. Approbation of the method is proposed. It was concluded that as a result of using a method to increase the effectiveness of the system for protecting information from unauthorized access of complexes with UAV using MTD technology, the effectiveness of the harmful impact on the system was reduced by three times. 

 

I really appreciate the style of presentation of this paper, authors need to incorporate the underneath mentioned points for a better and possible publication by the journal. I therefore, recommend for major revision.

 

1. Title of the manuscript can be more comprehensive.

2. The abstract should be had the main achievement and emphasise the novelty, so please rewrite it considering these points.

3. What is the motivation behind conducting the research. It is recommended to highlight major contributions of the work. Novelty of the work is not highlighted.

4. The critical literature review should be presented to indicate the drawbacks of existed approaches, then, well define the main stream of research direction, how did those previous studies performed, which problem still requires to be solved and why is the proposed approach suitable to be used to solve the critical problem?

5. Inappropriate methodology for answering your hypothesis, mention methodology in abstract.

6. The results appear to be too preliminary and incomplete for publication at the present time.

7. Inaccurate conclusions

8. The quality of figures is less than normal, increasing the quality of figures.

9. Regarding English language the text must be clearly improved. There are lot of typos and English structural mistakes. The paper must be proof-read by native English-speaking persons seriously.

10. Key results are poorly explained

11. Make comparisons with previous work in the field and include articles that have a clear statement of the improvements made to justify publication.

12. The conclusion section must be extracted and authors should use important outcomes that they obtained from the results section. Also discuss how this research can lead to future enhancements.

13. In some references, year is written at the end and in some references in between. Please follow uniform format.

Author Response

Comment: Title of the manuscript can be more comprehensive.

Answer: The title of the article is changed to "Information Protection in Complexes with Unmanned Aerial Vehicles Using Moving Target Technology".

 

Comment: The abstract should be had the main achievement and emphasise the novelty, so please rewrite it considering these points.

Answer: The article put forward a hypothesis that it is possible to organize information security in complexes with unmanned aerial vehicles using moving target technology. Previously, this technology for drones has never been used. This is the main novelty of this study.

 

Comment: What is the motivation behind conducting the research. It is recommended to highlight major contributions of the work. Novelty of the work is not highlighted.

Answer: The article is devoted to the problem of information security in complexes with unmanned aerial vehicles. The essence of the approaches to information security of complexes with unmanned aerial vehicles described in well-known sources is to obtain up-to-date models of threats and the intruder, followed by the creation of a set of organizational and software and hardware information security tools: information security system. When creating, the fact that the offender is constantly changing and improving the attack technologies used by him is not taken into account, and the information protection system created at the design stage does not change during the life cycle of the complex with unmanned aerial vehicles.

The article put forward a hypothesis that it is possible to organize information security in complexes with unmanned aerial vehicles using moving target technology. Previously, this technology for drones has never been used. This is the main novelty of this study.

 

Comment: The critical literature review should be presented to indicate the drawbacks of existed approaches, then, well define the main stream of research direction, how did those previous studies performed, which problem still requires to be solved and why is the proposed approach suitable to be used to solve the critical problem?

Answer: The article analyzes the known approaches to ensuring the security of information of complexes with unmanned aerial vehicles. References are provided.

 

Comment: Inappropriate methodology for answering your hypothesis, mention methodology in abstract.

Answer: The abstract is changed.

 

Comment: The results appear to be too preliminary and incomplete for publication at the present time.

Answer: The article discusses the hypothesis that it is possible to organize information protection in complexes with unmanned aerial vehicles using moving target technology. Previously, this technology for drones has never been used.

The results (hypothesis) are confirmed by a model created using GNS3 tool.

The main limitation of this study is the lack of experimental results on real unmanned aerial vehicles.

It is necessary to take into account the fact that the model in the form of a test network in the emulator only recreates the proposed method.

To evaluate and obtain at least some adequate indicators, it is necessary to use full-scale modeling, with a real complex with drones.

 

Comment: Inaccurate conclusions.

Answer: The Conclusions are added and changed.

 

Comment: The quality of figures is less than normal, increasing the quality of figures.

Answer: Picture quality is changed.

 

Comment: Regarding English language the text must be clearly improved. There are lot of typos and English structural mistakes. The paper must be proof-read by native English-speaking persons seriously.

Answer: English is improved.

 

Comment: Key results are poorly explained.

Answer: The article discusses the hypothesis that it is possible to organize information protection in complexes with unmanned aerial vehicles using moving target technology. Previously, this technology for drones has never been used.

The results (hypothesis) are confirmed by a model created using GNS3 tool.

The main limitation of this study is the lack of experimental results on real unmanned aerial vehicles.

It is necessary to take into account the fact that the model in the form of a test network in the emulator only recreates the proposed method.

To evaluate and obtain at least some adequate indicators, it is necessary to use full-scale modeling, with a real complex with drones.

 

Comment: Make comparisons with previous work in the field and include articles that have a clear statement of the improvements made to justify publication.

Answer: The article provides an analysis of known approaches to ensuring the security of information in complexes with unmanned aerial vehicles. After that, a hypothesis is put forward that it is possible to organize information protection in complexes with unmanned aerial vehicles using moving target technology. Previously, this technology for drones has never been used. This is the main novelty of this study.

The article provides an overview of moving target technology. References are provided.

 

Comment: The conclusion section must be extracted and authors should use important outcomes that they obtained from the results section. Also discuss how this research can lead to future enhancements.

Answer: The Conclusions are added and changed.

 

Comment: In some references, year is written at the end and in some references in between. Please follow uniform format.

Answer: The format of the references is changed.

Author Response File: Author Response.docx

Round 2

Reviewer 2 Report

The authors have revised the paper according to the comments, and this paper can be accepted in current form.

Back to TopTop