Detecting and tracking hypersonic glide vehicles: A cybersecurity-engineering analysis of academic literature

  • Law Y
  • Gliponeo J
  • Singh D
  • et al.
N/ACitations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

Hypersonic vehicles are vehicles travelling faster than Mach 5 (five times the speed of sound). Hypersonic technologies have existed since the end of the 1950s, but recent developments of defence applications have led to their resurgence. Hypersonic weapons can be hypersonic (powered) cruise missiles or hypersonic glide vehicles (HGVs). The near-space trajectories of HGV, combined with their superior manoeuvrability, enable HGVs to evade existing space and terrestrial sensors used to track ballistic missiles, posing an immediate threat to today’s radar networks and making HGVs well-suited for intercontinental (> 5500 km) targets. Securing HGV detection and tracking systems is of great interest to at-risk nations and cybersecurity researchers alike.   However, like hypersonic flight technologies, HGV defence technologies are heavily guarded secrets. The shortage of public-domain information did not stop academia from proposing various detection and tracking schemes, but a reasonable question is: “How credible and useful is current public-domain information, including academic publications, on HGV detection and tracking for academic researchers to base their cybersecurity research on?” To answer this question, we scanned and critically reviewed public-domain literature on HGV detection and tracking. We then identified ambiguities and knowledge gaps in the literature. In this paper, we provide a concise version of our multivocal literature review and an analysis of the identified ambiguities and knowledge gaps in our attempt to answer our earlier question.

Cite

CITATION STYLE

APA

Law, Y. W., Gliponeo, J. J., Singh, D., McGuire, J., Liang, J., Ho, S.-Y., & Slay, J. (2023). Detecting and tracking hypersonic glide vehicles: A cybersecurity-engineering analysis of academic literature. International Conference on Cyber Warfare and Security, 18(1), 189–198. https://doi.org/10.34190/iccws.18.1.950

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free