The fifth element is information security. Communications between the UCAV and the remote controller are very likely to be targeted for disruption by the adversary. Thus the UCAV must use the most sophisticated network security technology, and error-free self-destruct programs.
Although the UCAV is an excellent weapon, the technical difficulties cannot be ignored. UCAV development experts throughout the world have racked their brains in search of solutions to the problems posed by intelligent flight and firing control systems, and the need to guarantee information transmission security.
In the development of a carrier-borne UCAV, we need to exercise patience. If China intents to research and develop such an aircraft, then high-tech combat attributes should perhaps be considered as a second phase. Functions such as early warning, investigation, and relay-guidance of UAV can be executed as a first priority.
Day|Week|Month