Friend-or-Foe Recognition Algorithm Development for the Corresponding Software Building

M.I. Ogurtsov


The year 2022 showed an urgent need to improve the existing systems for recognizing objects in the aerial space, which is caused by the significant increase in the number of technical means (especially unmanned aerial vehicles) on the battlefield. Such a sharp increase in the number of objects that simultaneously take part in combat operations in the air requires the improvement of military object recognition systems, both qualitatively and quantitatively. This requires the development of appropriate new generation Friend-or-Foe algorithms for the objects’ recognition.

The main requirements for recognition systems of aerial objects of civil application were determined. They includes: maximum com- patibility; support for a large number of objects; outdated recognition complexes support; support for alternative ways of recognition; support for alternative data entry methods; determining the coordinates of aerial objects in an emergency situation.

Friend-or-foe recognition systems for military applications are also considered. In contrast to civilian systems, the following basic requirements have been identified for them: 1) Maximum speed of the recognition process. 2) Protection against false positives. 3) Protection against legitimate aerial object imitation. 4) Support for a large number of objects. 5) Protection against cases of loss of a legitimate aerial object. 6) Rotation of the secret part. 7) Protection against false-negative results to prevent friendly fire. 8) Protection against man-in-the-middle attacks. 9) Flexible integration with the NATO block recognition system. 10) Availability of opportunities for purely domestic production and support of the object recognition system. 11) Protection against electronic warfare means. 12) Support for several recognition modes. 13) Automatic blocking of the launch of ground-to-air and air-to-air weapons against objects that confirm their legitimacy by a correct response to a request. 14) Determining the coordinates of aerial objects in an emergency.

Based on the formulated requirements, a new friend-or-foe algorithm for the state identification system for military use is proposed, built based on the state standards, and taking into account the features of its software implementation in order to increase speed. Its implementation will ensure sufficient scalability, stability, reliability, and multi-level recognition.

Prombles in programming 2022; 3-4: 387-395


vehicles recognition; friend-or-foe; cryptography; cryptanalysis; UAV

Full Text:



The Government Portal. (2022) The General Staff of the Armed Forces, the Ministry of Digital Transformation and UNITED24 are gathering the "Army of Drones". The Government Portal. 1st July, 13:25. Available from: zbirayut-armiyu-droniv. [Accessed: 2nd July 2022].

ERMAK, S.N., KASANIN, O.A. & KHOZHEVETS, S.N., (2017) The Construction and Operation Principles of Ground Means of the State Identification System. Minsk: BGUIR.

UNITED STATES OF AMERICA. Defense Technical Information Center, Department of Defense (1996) Fratricide: Incorporating DESERT STORM Lessons Learned. VA: Defense Technical Information Center.

ZAKREVSKYI O. (2014) Friend-or-foe. [Online] June 11, 2014. Available from: [Accessed: 2nd July 2022].

NATO (2016) STANAG 4193:2016. Technical Characteristics of the IFF Mk XIIA System Part I: System Description and General Characteristics. NATO.

KAMALTINOV G.G., et al. (2016) Recognition of objects on the battlefield. Analysis of world experience. Armament and military equipment. 4. p. 22-26.

Putatunda, R., Gangopadhyay, A., Erbacher, R. F., & Busart, C. (2022, May). Camouflaged object detection system at the edge. In Automatic Target Recognition XXXII (Vol. 12096, pp. 177-187). SPIE.

Pearce, N. and Hamilton, S., (2021, October). IFF using Beamforming in Telemetry Beacons. In 2021 IEEE Western New York Image and Signal Processing Workshop (WNYISPW) (pp. 1-5). IEEE.

ZHUYKOV V.Y. et al. (2016) Adjustable power supply filters to protect information in microcontrollers. Monograph. Kyiv, 184.

MINISTRY OF ECONOMIC DEVELOPMENT (2014) DSTU 7624:2014 Information technologies. Cryptographic protection of information. Algorithm of symmetric block transformation. SE "UkrNDNC": SSY.

Korolyov V.Y., Ogurtsov M.I. & Kochubinskyi A.I. (2021) Identification of Technical Objects in the Special Networks According to the Principle of "Friend or Foe". Control Systems and Computers. 4. p. 2-14.

OGURTSOV M.I. (2021) Development of a special algorithm for multifactor users’ authentication. In International Scientific Conference "Mathematical modeling, optimization and information technologies". Chişinău – Kyiv – Batumi, 15 - 19 November, 2021. p. 27.

Kuperberg, M. and Klemens, R., (2022). Integration of Self-Sovereign Identity into Conventional Software using Established IAM Protocols: A Survey. Open Identity Summit 2022.


  • There are currently no refbacks.