ArticlePDF Available

A Review of Security Threats of Unmanned Aerial Vehicles and Mitigation Steps

Authors:

Abstract and Figures

The use of unmanned aerial vehicles (UAVs) has increased exponentially over the last decade for a broad range of applications. The recent commercial availability of a new generation of small UAVs has emphasised the growing threat posed by these machines. This paper is aimed at reviewing the security threats posed by UAVs in areas such as terrorist attacks, illegal surveillance and reconnaissance, smuggling, electronic snooping, and mid-air collisions, in addition to discussing on the categories of UAV intrusions in terms of intention and level of sophistication of the operators. Mitigation steps for UAV intrusions are also discussed, focusing on geofencing, detections systems (radar, and acoustic, radio frequency (RF) emission and electro-optical (EO) sensing), electronic defences (command link jamming and appropriation, and Global Navigation Satellite System (GNSS) jamming and spoofing), and kinetic defences (shooting down UAVs and net capture using interceptor UAVs).
Content may be subject to copyright.
A REVIEW OF SECURITY THREATS OF UNMANNED AERIAL VEHICLES AND
MITIGATION STEPS
Dinesh Sathyamoorthy
Science & Technology Research Institute for Defence (STRIDE), Ministry of Defence, Malaysia
E-mail: dinesh.sathyamoorthy@stride.gov.my
ABSTRACT
The use of unmanned aerial vehicles (UAVs) has increased exponentially over the last decade for a
broad range of applications. The recent commercial availability of a new generation of small UAVs
has emphasised the growing threat posed by these machines. This paper is aimed at reviewing the
security threats posed by UAVs in areas such as terrorist attacks, illegal surveillance and
reconnaissance, smuggling, electronic snooping, and mid-air collisions, in addition to discussing on
the categories of UAV intrusions in terms of intention and level of sophistication of the operators.
Mitigation steps for UAV intrusions are also discussed, focusing on geofencing, detections systems
(radar, and acoustic, radio frequency (RF) emission and electro-optical (EO) sensing), electronic
defences (command link jamming and appropriation, and Global Navigation Satellite System (GNSS)
jamming and spoofing), and kinetic defences (shooting down UAVs and net capture using interceptor
UAVs).
Keywords: Unmanned aerial vehicles (UAVs); security threats; geofencing, detection systems;
electronic and kinetic defences.
1. INTRODUCTION
Unmanned aerial vehicles (UAVs), also known as drones, are aircrafts that do not carry any crew, but
rather, are operated remotely by human operators, or autonomously via preprogrammed software or
robots. UAVs vary widely in size and capacity, and have become increasingly prevalent. Their use
has increased exponentially over the last decade for a broad range of applications, including
cartography and mapping, inspection of remote power lines and pipelines, delivery services,
telecommunications relay, police surveillance, traffic monitoring, border patrol and reconnaissance,
and emergency and disaster monitoring [1, 2].
From a military perspective, UAVs, which can be recoverable or expendable, are generally used to
operate in dangerous or hostile territories, without endangering the operators. It is employed for
surveillance and reconnaissance, information collection, detection of mines, and for combat purposes.
UAVs hold many attractions for the military. They are generally smaller, lighter and cheaper as
compared to manned aerial vehicles as they do not need equipment to support a crew. UAVs can also
be used for many hours in a stretch, while switching operators [1, 2].
The recent commercial availability of a new generation of small UAVs, often quadcopters or some
other form of rotorcraft, has emphasised the growing threat posed by these machines. These UAVs
can be easily purchased over the internet and can carry a payload of up to a few kilogrammes. They
are cheap, easy to fly and small enough to evade traditional security surveillance. A recreational UAV
costing a few hundred dollars can be turned into an aerial equivalent of an improvised explosive
device (IED), or be equipped with a camera and data downlink to become a spy UAV [3-7].
This paper is aimed at reviewing the security threats posed by UAVs, in addition to discussing on the
categories of UAV intrusions in terms of intention and level of sophistication of the operators.
Mitigation steps for UAV intrusions are also discussed, focusing on geofencing, detections systems,
and electronic and kinetic defences.
2. SECURITY THREATS
A few recent incidents have highlighted potential dangers posed by UAVs. In September 2013, a
UAV flew over a crowd and crash-landed right in front of the German Chancellor during a campaign
rally, which turned out to be a stunt staged by a protester (Figure 1(a)) [8]. In January 2015, a UAV
accidentally crashed into the compound of the White House, after evading the White House’s radar
that was calibrated to warn of much bigger threats, such as airplanes and missiles [9]. Four months
later, in May 2015, a man was arrested by the US Secret Service for flying a UAV close the White
House [10]. In March 2015, a UAV was illegally flown in the vicinity of Malaysia's Kuala Lumpur
International Airport (KLIA), taking photographs of an airplane landing [11]. In April 2015, a
protester landed a UAV on the roof of the Japanese Prime Minister's office. It carried a container of
sand with traces of non-harmful radioactive isotopes (Figure 1(b)) [12].
(a) (b)
Figure 1: UAV intrusions: (a) The UAV that crash-landed in front of the German Chancellor in
September 2013 [8]. (b) The UAV that landed on the roof of the Japanese Prime Minister's office [12].
These incidents, while harmless, are alarming and serve as a warning of the potential threats of UAVs
at the hands of terrorists. Miasnikov [13] summarised a set of advantages that make UAVs attractive
to terrorists:
Possibility to attack targets that are difficult to reach by land
Possibility of carrying out a wide-scale attack aimed at inflicting a maximum death rate on a
population
Covertness of attack preparation and flexibility in choice of a UAV launch site
Possibility of achieving a long range and acceptable accuracy with relatively inexpensive and
increasingly available technology
Poor effectiveness of existing air defences against targets such as low-flying UAVs
Relative cost effectiveness of UAVs as compared with ballistic missiles and manned airplanes
Possibility of achieving a strong psychological effect by scaring people and putting pressure
on politicians.
An attacker could strap guns or explosives to a UAV, and fly it into people or structures to inflict
physical damage or loss of life. The targets of these attacks may be individuals, buildings or
transportation infrastructure such as commercial airliners [3, 5, 7, 14]. In September 2011, a model
hobbyist was arrested and accused of planning to build explosive-laden UAVs to attack the Pentagon
and US Capitol [15]. In February 2014, a Moroccan national was caught in Connecticut, US for
plotting to fly UAVs with bombs into a school and a government building [16]. At a conference
hosted by the US Department of Homeland Security in January 2015, counterterrorism officials
displayed several models of UAVs that were fitted with explosives (Figure 2) [17]. Furthermore, an
attacker could use a UAV to spray a weaponised chemical or biological agent over a crowd of people
or in a urban area [3, 7, 13, 14].
Figure 2: A UAV equipped with 3 lbs of mock explosive.
Source: Poulsen [17]
In addition to the threats posed by terrorists, defence forces are being offered ever more capable
UAVs in the micro and mini sectors [5]. For example, Aeronautics developed a UAV bomb, known as
Orbiter IK (Figure 3). It is a loitering mini-UAV with a wingspan of 2.2 m and can carry up to 2 kg of
explosives in its fuselage. It can be controlled by an operator, or is capable of being given a waypoint
and independently scanning the area to detect and destroy a stationary or moving target [18].
Figure 3: Aeronautics’ Orbiter IK UAV, which can carry up to 2 kg of explosives in its fuselage.
Source: Air Recognition [18]
An operator could also use a UAV to reconnoitre targets for attack, or monitor the actions of
individuals or law enforcement (Figure 4) [3, 4, 14]. Off-the-shelf UAVs are being used by both sides
of the Ukrainian civil war for intelligence gathering missions [19]. The rapid spread of hobbyist
UAVs makes this scenario both the most likely threat involving UAVs and the most difficult to
identify. In the past few years, there have been many cases in which it was difficult to determine
whether the UAV was being used for recreational use, newsgathering, activism, or for an activity that
could result in harming public safety [3, 4, 14].
There have also been a number of cases where criminal organisations or individuals have used UAVs
to smuggle illicit material, usually across borders or into prisons [4, 14]. UAVs were spotted flying
over the walls of prisons in Quebec, Canada [20] and Melbourne, Australia [21] in November 2013
and March 2014 respectively, while staff at a prison in Bedfordshire, UK discovered a crashed UAV
that appeared to be delivering contraband [4]. In January 2015, a smuggler's UAV flying from Mexico
crash-landed just south of the US border city of San Ysidro, California in a failed drug delivery
(Figure 5) [22].
Figure 4: A UAV fitted with a camera for illegal surveillance.
Source: Yutim [11]
Figure 5: The UAV carrying small packages of drugs that crashed near the US-Mexico border.
Source: Valencia & Martinez [22]
UAVs could also be used for electronic snooping. At the Black Hat security conference held in
Singapore in March 2014, SensePost unveiled its Snoopy UAV, which can steal data from
unsuspecting smartphone users. The UAV uses the company's software, which is installed on a
computer attached to a UAV. The code can be used to hack smartphones and steal personal data
without the user's knowledge. This method could be used to particular effect in a crowded
environment where many people have their cell phones automatically searching for WiFi networks
[14, 23]. In February 2015, it was revealed that AdNear, a Singapore-based marketing firm, was using
UAVs to determine the locations and movements of mobile phones by collecting signal strengths and
other wireless data from passersby below. With this data in hand, AdNear could then deliver hyper-
targeted advertisements and other promotions to potential customers as they are walking past a
storefront in the hopes of incentivising a customer to enter the store [24].
Pilots have expressed concern regarding the proliferation of commercially available small UAVs. For
example, if a UAV got into the engine of an aeroplane, it could stop the engine. Furthermore, as
UAVs get larger and more capable, the potential and consequences of mid-air collisions increase [4,
11]. Helicopter pilots have reported several near-miss incidents with UAVs [25], while there have
cases of near-misses between commercial passenger jets and UAVs [26, 27]. In July 2015, it was
reported that hobbyist UAVs that were flown in into forest fires areas, allegedly to capture images of
the fires, were forcing firefighting helicopters to be grounded until the UAVs could be removed from
the area (Figure 6) [28].
Figure 6: Warnings about flying UAVs in forest fire areas issued by the US Forest Service.
Source: BBC [28]
Humphreys [6] divided the threat of UAVs into three categories based on the operators’ intention and
level of sophistication:
Category 1: Accidental intrusions, whether the UAV operators are sophisticated or not
Category 2: Intentional intrusions by unsophisticated operators
Category 3: Intentional intrusions by sophisticated operators, those who can assemble a UAV
from components, and modify its hardware and software.
Mitigation of the first two categories of intrusions can be done using geofencing, and detection
systems such as radar, and acoustic, radio frequency (RF) emission and electro-optical (EO) sensing.
However, the third category of UAV intrusions is much more difficult to counter. A sophisticated
attacker could mount a kamikaze-style attack against a sensitive target using a fixed-wing powered
glider with an explosive lightweight payload. The UAV glider could be launched from a significant
distance from the target. It could cut its engine on the final approach to evade acoustic detectors, and
could be built of poorly-radar-reflective material (e.g., styrofoam) to evade radar detection. The UAV
could be configured to operate under radio silence, ignoring external RF control commands and
emitting no RF signals of its own. The UAV would thus be difficult to detect and would be
impervious to command link jamming or hijacking. Moreover, the attacker could configure the
autopilot to ignore Global Navigation Satellite System (GNSS) signals during the final approach to
the target, relying instead on an inexpensive magnetometer-disciplined inertial navigation system
(INS). Such a modification would render GNSS jamming or spoofing useless during the final
approach [6].
Another risk factor with the commercialisation of UAVs is the potential for attackers to intercept the
signals of a legitimate UAV and then take control of the UAV. In 2009, Iraqi militants used a Russian
software developed to steal satellite television signals to intercept real-time video feed from US
surveillance UAVs flying over Iraq. In 2011, a keylogging computer virus infected the ground
stations of US Predator and Reaper UAVs [3, 29]. While there is a large technological leap between
either intercepting video feeds or infecting a computer with a virus, and being able to take over a
UAV’s command link, there is certainly a potential risk that attackers will develop this capability.
This threat may be small for the US UAV fleet of Predators and Reapers because their command links
are encrypted [30]. However, the unencrypted command links of commercial UAVs could easily be
hacked by attackers. Moreover, Shephard et al. [31] demonstrated that GNSS spoofing can be used to
hijack UAVs. With increasing proliferation of commercial UAVs, UAV hacking and hijacking is a
real threat to consider [3, 32].
3. MITIGATION STEPS
3.1 Geofencing
Commercial UAV manufacturers can play a key role by implementing GNSS-enforced geofences
within their systems that prevent their UAVs from being flown within exclusion zones around
airports, sports stadiums, government buildings, military bases and other security-sensitive sites [6,
14]. For example, DJI, one of the biggest UAV manufacturers, has embedded geofencing software in
its UAVs that prevents them from flying over thousands of sites worldwide where UAV operation is
illegal [33] (Figure 7). This would be an effective mitigation step for UAV intrusions from
unsophisticated operators. However, sophisticated operators could hack the software to disable the
geofencing [6, 14].
Figure 7: Exclusion zones for Malaysia set in DJI’s geofencing software.
Source: DJI [14]
3.2 Detection Systems
3.2.1 Radar
Existing air surveillance radar systems are ineffective against small UAVs as they are developed to
detect large aerial platforms moving at high speeds. As UAVs fly at similar speeds and altitudes to
birds, the two could be indistinguishable from each other [3, 6, 34]. For high-risk events and known
appearances of high-risk personnel, it may be necessary to bring in radars that have the fidelity to
detect such small objects, such as the Blighter system developed by Plextek (Figure 8), and operators
trained to distinguish between birds and UAVs [3, 35]. Further complicating matters, to avoid radar
detection, UAVs may be built using poorly-radar-reflective materials and fly below the altitude of 100
ft [6].
Figure 8: The Blighter radar system developed by Plextek for detection of UAVs.
Source: Baker [35]
3.2.2 Acoustic Sensing
Acoustic sensors operate by identifying the distinct noise made by the motors that drive the propellers
of UAVs [4, 6]. DroneShield's acoustic sensor (Figure 9) was designed to provide high detection rates
with low false alarms. It contains a database of common UAV acoustic signatures so that false alarms
are reduced (e.g., lawn mowers and leaf blowers) and in many cases the type of UAV is also included
in the alert [36]. This system is being used by law enforcement officers in the US to enforce “no UAV
zones” [4]. A significant advantage of acoustic sensing is that is that it has low cost, even when
implemented as a network of sensing devices placed around the protection perimeter [6]. However, it
is incapable of detecting fixed-wing UAVs operating as gliders or rotorcraft UAVs in free fall.
Sophisticated operators could change the sound signature of a UAV by buying different propellers or
making other modifications. It is unlikely to offer reliable detection at more than a 500 m standoff
range and is ineffective in urban areas with a lot of ambient noise [6, 37]. Furthermore, it can be
spoofed through playback of an audio recording of a UAV [6].
Figure 9: The acoustic sensor developed by DroneShield for detection of UAVs.
Source: DroneShield [36]
3.2.3 Radio Frequency (RF) Emission Sensing
UAVs typically send data back to their controller through a wireless data link. Using a directional
antenna or a network of synchronised ground stations, such RF emissions can be detected and located
(Figure 10). In order to be economical and offer rapid detection, the system must have some
knowledge of the emission centre frequency and bandwidth, which are regulated for commercial
UAVs [3, 6, 7]. Drone Labs’ DD610AR UAV detection system employs RF emission sensing of a
UAV’s command and data links to identify the coordinates of the UAV and its operator, and the
unique identifier of the UAV, which can be used to prove that a particular incursion was done using a
specific UAV (Figure 11) [37, 38]. However, RF emission sensing can be easily evaded by
sophisticated operators by maintaining radio silence [6].
3.2.4 Electro-Optical (EO) Sensing
EO sensors in the form of optical and thermal cameras can be quite effective at detecting UAVs [6].
Dedrone's DroneTracker (Figure 12), which combines optical and thermal cameras, can be used to
form an EO sensing network to increase the chances of detecting a UAV [39]. However, optical
cameras would have a difficult time distinguishing birds from UAVs. By utilising computer
algorithms that look at flight patterns, it is expected that a bird will fly a more random pattern than a
UAV would. However, this notion fails in a place where birds glide, such as seagulls, which ride wind
currents and stay at a steady level, and this fools optical systems. Furthermore, hobbyist UAVs are
mostly made of plastic and use electric motors, and thus, do not produce a lot of heat. Thermal
cameras would more likely detect a bird a UAV in most cases [37].
Figure 10: Detection of a UAV via RF emission sensing.
Source: Wiesback [7]
Figure 11: Drone Labs’ DD610AR RF emission sensing system for detection of UAVs.
Source: Drone Labs [38]
Figure 12: Dedrone’s DroneTracker can be used to form an EO sensing network.
(Source: Dedrone [39])
3.3 Electronic Defence
3.3.1 Command Link Jamming and Appropriation
Modern commercial UAVs are controlled by one or more wireless links to the operator’s control
equipment. Traditional radio control (RC) controllers are still used as a backup means of control even
for UAVs capable of a high degree of autonomy. These controllers send low-level commands to the
autopilot system, or directly to the UAV’s motors or servos that actuate the UAV’s control surfaces
[6]. Jamming a UAV' command link could effectively eliminate the ability of the UAV operator to
conduct accurate targeting within the denied area [3, 6, 14].
Figure 13 shows how a jammer operates by raising the RF noise level in the vicinity of the area to be
defended. The further the UAV travels from the controller, the signal from the controller becomes
weaker; while the closer the UAV moves towards the jammer, the RF noise level from the jammer
becomes stronger. This makes it harder for the controller to overcome the RF noise of the jammer.
Once the signal from the controller falls below the RF noise level, the operator would no longer be
able to control the UAV. In order to overcome the jammer, the operator would have to increase the
transmission power or get closer to the target area, both of which increases the chances of detection
[3, 40].
To avoid the effects of command link jamming, the UAV can simply transition to an autonomous
operational mode soon after takeoff, accepting no further external commands [6, 14]. Furthermore,
command link jamming could also disrupt other communication devices, such as mobile phones and
mobile wireless devices. To help mitigate the interference, jamming could be used with detection
systems so that the jammer is only switched on of if UAVs are detected [3].
Figure 13: Simplified RF jamming effect.
Source: Card [3]
Command link appropriation could be used to take control of a UAV. However, to appropriate the
command link, the defender would need first need to determine the communications protocol, channel
(from a potentially large number of channels (e.g., 100)) and code being used [6, 7]. Furthermore, the
command link could be encrypted [6].
3.3.2 Global Navigation Satellite System (GNSS) Jamming and Spoofing
Virtually all modern commercial UAVs capable of autonomous flight are navigated using GNSS
satellites. Civilian GNSS signals are weak, rendering them susceptible to jamming [41], and
unencrypted and unauthenticated, rendering them susceptible to spoofing [42]. The defender could
take advantage of the weak security of GNSS to confuse or commandeer the UAV (Gettinger, 2015;
Humphreys, 2015). Shephard et al. [31] demonstrated that GNSS spoofing could be used to take over
a UAV by transmitting a series of false coordinates (Figure 14).
GNSS jamming would force attackers to operate either using line-of-sight (LOS) RC control, or non-
GNSS autonomous navigation. LOS control exposes the operator to visual detection and recognition,
and can be denied by command link jamming. Non-GNSS autonomous navigation in an unmapped
environment is either expensive (e.g., a navigation- or tactical-grade INS initialised with GNSS) or
can only be applied accurately over short time intervals (e.g., a microelectromechanical systems
(MEMs)-grade magnetometer-disciplined INS) [6].
Figure 14: Global Positioning System (GPS) spoofing conducted by Shephard et al. [31].
However, GNSS jamming would cause substantial collateral damage, denying the use of civilian
GNSS signals in a wide area around the protected site. For example, automobile commuters would be
denied use of their in-car navigation systems, cell towers could no longer be synchronised by GNSS,
and approaches to airports could no longer benefit from GNSS for safety and efficiency. GNSS
spoofing would potentially be even more damaging to surrounding civil systems [6, 43, 44].
Furthermore, an attacking UAV can simply disregard GNSS signals during the final approach to the
target, relying on a low-cost MEMS-grade magnetometer-disciplined INS, which over a 60 s interval
may only exhibit a 5 m drift in perceived location [6].
3.4 Kinetic Defence
Commercial UAVs are in general fragile in the face of hard-contact kinetic attacks, such as small
guided missiles, cannon-fired smart munitions, lasers and firearms [5, 6]. However, in urban
environments, where attacks are more likely, law enforcement and military will be averse to shooting
UAVs down because any projectile used may cause collateral damage when it returns to the ground
[3, 6, 14]. Furthermore, a kinetic model for defending a target in an urban environment could require
several systems with trained operators to be in place along likely air avenues of approach in order to
adequately defend the area. This would increase the cost of defending against UAV threats [3].
Net capture of UAVs by interceptor UAVs has been demonstrated (Figure 11), though it not yet
considered as a mature technology. Net capture has the additional benefit of enabling eviction of the
intruder UAV from the vicinity of the site to be protected [6, 45].
Figure 15: A Malou Tech MP200 interceptor UAV catching an intruder UAV with a net.
Source: Gayle [6]
4. CONCLUSION
This manuscript provided a review of the security threats of UAVs and mitigation steps. UAV
intrusions can be divided into three categories based on the operators’ intention and level of
sophistication: accidental intrusions, whether the UAV operators are sophisticated or not; intentional
intrusions by unsophisticated operators; and intentional intrusions by sophisticated operators.
Mitigation steps for UAV intrusions include geofencing by UAV manufacturers, detection systems
(radar, and acoustic, RF emission and EO sensing), electronic defences (command link jamming and
appropriation, and GNSS jamming and spoofing), and kinetic defences (shooting down UAVs and net
capture using interceptor UAVs).
REFERENCES
[1] Dinesh, S., Key defence R&D fields to develop the national defence industry: Focus on C4ISR in
support of network centric operations and unmanned vehicles. Defence S&T Tech. Bull., 3: 43-
60, 2010.
[2] Bhattacharjee, D., Unmanned Aerial Vehicles and Counter Terrorism Operations. Indian Council
of World Affairs, New Delhi, 2015.
[3] Card, B., The Commercialization of UAVs: How Terrorists Will Be Able to Utilize UAVs to
Attack the United States. University of Texas at El Paso, El Paso, Texas, 2014.
[4] Baraniuk, C., No drone zone. New Scientist, 2 May 2015, 22, 2015.
[5] Chuter, A., Mini drones spark heightened interest in countering threat. Defense News, 22 June
2015.
[6] Humpreys, T., Statement on the Security Threat Posed by Unmanned Aerial Systems and
Possible Countermeasures. Statement to the Subcommittee on Oversight and Management
Efficiency of the House Committee on Homeland Security, 18 March 2015, Washington D.C.,
2015.
[7] Wiesback, W., Unmanned aerial vehicles UAV, drones detection, tracking, control. 20
th
LS
Summit, 10 June 2015, Lichtenau, Germany, 2015.
[8] Gallagher, S., German Chancellor’s Drone “Attack” Shows the Threat of Weaponized UAVs.
Available online at: http://arstechnica.com/information-technology/2013/09/german-chancellors-
drone-attack-shows-the-threat-of-weaponized-uavs (Last access date: 14 July 2015).
[9] Shear, M.D. & Schmidt, M.S., A Drone, Too Small for Radar to Detect, Rattles the White House.
Available online at: http://www.nytimes.com/ 2015 /01/28/ us/white-house-drone.html?_r=0
(Last access date: 14 July 2015).
[10] Schmidht, M.S., Secret Service Arrests Man After Drone Flies Near White House. Available
online at: http://www.nytimes.com/2015/05/15/us/white-house-drone-secret-service.html (Last
access date: 14 July 2015).
[11] Yutim, H., DCA Lodges Police Report Over Prohibited Flying Drone Near KLIA. Available
online at: http://english.astroawani.com/malaysia-news/dca-lodges-police-report-over-prohibited-
flying-drone-near-klia-54955 (Last access date: 14 July 2015).
[12] Ripley, W., Drone With Radioactive Material Found on Japanese Prime Minister's Roof.
Available online at: http://edition.cnn.com/2015/04/22/asia/ japan-prime-minister-rooftop-drone
(Last access date: 14 July 2015).
[13] Miasnikov, E., Threat of Terrorism Using Unmanned Aerial Vehicles: Technical Aspects. Center
for Arms Control, Energy and Environmental Studies, Moscow Institute of Physics and
Technology, Moscow, 2015.
[14] Gettinger, D., Domestic Drone Threats. Available online at: http://dronecenter.bard.edu/what-
you-need-to-know-about-domestic-drone-threats (Last access date: 14 July 2015).
[15] Brandon, A., FBI: Man Plotted to Fly Drone-Like Toy Planes With Bombs Into School. Available
online at: http://www.cbsnews.com/news/fbi-man-in-connecticut-plotted-to-fly-drone-like-toy-
planes-with-bombs-into-school (Last access date: 15 July 2015).
[16] Finn, P., Mass. Man Accused of Plotting to Hit Pentagon and Capitol With Drone Aircraft.
Available online at: http://www.washingtonpost.com/ national/national-security/mass-man-
accused-of-plotting-to-hit-pentagon-and-capitol-with-drone-
aircraft/2011/09/28/gIQAWdpk5K_story.html (Last access date: 15 July 2015).
[17] Poulsen, K., Why the US Government Is Terrified of Hobbyist Drones. Available online at:
http://www.wired.com/2015/02/white-house-drone (Last access date: 25 July 2015).
[18] Air Recognition, Aeronautics' New Orbiter 1K Kingfisher MUAS to be Unveiled at Paris Air
Show 2015. Available online at:
http://www.airrecognition.com/index.php? option=com_content&task=view&id=1792 (Last
access date: 14 July 2015).
[19] Tucker, P., In Ukraine, Tomorrow’s Drone War Is Alive Today. Available online at:
http://www.defenseone.com/technology/2015/03/ukraine-tomorrows-drone-war-alive-
today/107085 (Last access date: 9 March 2015).
[20] Aubry, M., Drone Drug Drops Common at Quebec Jails: Guards. Available online at:
http://www.winnipegsun.com/2013/11/27/drone-drug-drops-common-at-quebec-jails-guards
(Last access date: 15 July 2015).
[21] Anderson, B., How Drones Help Smuggle Drugs Into Prison. Available online at:
http://motherboard.vice.com/read/how-drones-help-smuggle-drugs-into-prison (Last access date:
15 July 2015).
[22] Valencia, N. & Martinez, M., Drone Carrying Drugs Crashes South of U.S. Border. Available
online at: http://edition.cnn.com/2015/01/22/world/drug-drone-crashes-us-mexico-border (Last
access date: 15 July 2015).
[23] Gittleson, K., Data-Stealing Snoopy Drone Unveiled at Black Hat. Available online at:
http://www.bbc.com/news/technology-26762198 (Last access date: 15 July 2015).
[24] Bi, F., Drones Are Intercepting Cell Phone Signals in L.A. Available online at:
http://www.forbes.com/sites/frankbi/2015/02/23/drones-are-already-intercepting-cell-phone-
signals-in-l-a/ (Last access date: 15 July 2015).
[25] Chip, Drones a danger for helicopters. Chip, July 2015, 35.
[26] BBC, Lufthansa Plane in Near Miss With Drone on Warsaw Approach. Available online at:
http://www.bbc.com/news/world-europe-33605869 (Last access date: 22 July 2015).
[27] BBC, Drone Pilots Warned After Close Call With Passenger Jet. Available online at:
http://www.bbc.com/news/technology-33612631 (Last access date: 22 July 2015).
[28] BBC, Drones Hamper US Firefighting Efforts. Available online at:
http://www.bbc.com/news/technology-33593981 (Last access date: 22 July 2015).
[29]
Goodman, M., Criminals and Terrorists Can Fly Drones Too: Remote-Controlled Aircraft and
Robot Technology Can be Used for Bad Just As Easily As for Good. Available online at:
http://ideas.time.com/2013/01/31/ criminals-and-terrorists-can-fly-drones-too (Last access date:
15 July 2015).
[30] Shachtman, N. & Axe, D., Most U.S. Drones Openly Broadcast Secret Video Feeds. Available
online at: http://www.wired.com/2012/10/hack-proof-drone (Last access date: 15 July 2015).
[31] Shepard, D.P. & Humphreys, T.E., Characterization of receiver response to spoofing attacks.
ION GNSS 2011, 19-23 September 2011, Portland.
[32] Coward, J., UAV Cyber Security: What Does It Take to Hack a Drone? Available online at:
http://www.totallyunmanned.com/2014/10/27/uav-cyber-security (Last access date: 15 July
2015).
[33] DJI, No Fly Zones. Available online at: http://flysafe.dji.com/no-fly (Last access date: 14 July
2015).
[34] Lele, A. & Mishra, A., Aerial terrorism and the threat from unmanned aerial vehicles. J. Defence
Stud., 3: 54-65, 2009.
[35] Baker, B., When Drones Go Rogue - Plextek takes on Small Enemy UAVs. Available online at:
http://www.army-technology.com/features/feature-when-drones-go-rogue-plextek-small-enemy-
uavs (Last access date: 14 July 2015).
[36] DroneShield, DroneShield: Drone Detection and Response. Available online at:
http://www.droneshield.org/products (Last access date: 14 July 2015).
[37] Naboulsi, Z., Drone Detection: What Works and What Doesn't. Available online at:
http://www.net-security.org/article.php?id=2297 (Last access date: 14 July 2015).
[38] Drone Labs, Drone Detector. Available online at: http://www.dronedetector.com (Last access
date: 14 July 2015).
[39] Dedrone, Dedrone. Available online at: http://www.dedrone.com (Last access date: 14 July
2015).
[40] Adamy, D.L., EW 104: Electronic Warfare Against a New Generation of Threats. Artech House,
Norwood, Massachusetts.
[41] Dinesh, S., Mohd Faudzi., M. & Zainal Fitry, M.A., Evaluation of the effect of radio frequency
interference (RFI) on Global Positioning System (GPS) accuracy via GPS simulation. Defence
Sci. J., 62: 338-347., 2012.
[42] Dinesh, S., Mohd Faudzi., M., Nor Irza Shakhira, B., Siti Robiah, A., Shalini, S., Jamilah, J.,
Aliah, I., Lim, B.T., Zainal Fitry, M.A., Mohd. Rizal, A.K., & Mohd Hasrol, H.M.Y., Evaluation
of Global Positioning System (GPS) performance during simplistic GPS spoofing attacks.
Defence S&T Tech. Bull., 5: 99-113, 2012.
[43] Dinesh, S., Vulnerabilities of civilian Global Navigation Satellite Systems (GNSS) signals: A
review. Defence S&T Tech. Bull., 2: 100-114, 2009.
[44] Dinesh, S., Global Navigation Satellite System (GNSS) spoofing: A review of growing risks and
mitigation steps. Defence S&T Tech. Bull., 6: 42-61, 2013.
[45] Gayle, D., The Drone Catcher: Flying Net Is Designed to Stop Terrorists from Flying Bomb-
Laden Gadgets Into Nuclear Power Stations. Available online at:
http://www.dailymail.co.uk/news/article-2948062/The-drone-catcher-France-reveals-flying-net-
stop-terrorists-flying-bomb-laden-gadgets-nuclear-power-stations-following-spate-sightings.html
(Last access date: 14 July 2015).
... It has been demonstrated that even professional UAVs employed for delicate and important tasks such as enemy observation and law enforcement operations have security vulnerabilities. When they are compromised, the UAV can be remotely disabled, hijacked, taken away or stolen by terrorists and criminals for illegal surveillance and unmanned attacks (Dinesh, 2015;Khan et al., 2021;Vinay et al., 2021). ...
... GNSS jamming is considered as one of the serious risks to UAVs due to its feasibility and ease to conduct (Dinesh 2015;Dinesh et al., 2020;Khan et al., 2021;Nurhakimah et al., 2022;Sabitha Banu & Padmavathi, 2022). Numerous actual instances of signal interferences have been documented in the last decade, including an event at Newark Airport in 2013. ...
... Detection, Kinetic Energy Systems (Ammunition), Collider and Interceptor UAV [21], [22]. ...
... [23], [24]. It can also be imitated by playing an audio recording of a UAV [22]. ...
Article
Unmanned aerial vehicle technological improvement has had a direct influence on today's warfare. As today's battles take place in cities, the distinction between civilians and soldiers has grown increasingly hazy. There is a wealth of literature on autonomy and ethical concerns concerning autonomous weapon systems. Unmanned aerial vehicles must contend with a slew of security risks, ranging from electronic jammers to missile strikes. The societal acceptance of these techniques, ethical value judgments, and long-term consequences are all important topics to discuss. Unmanned aerial vehicles have a wide range of applications in the military, from gathering intelligence to destroying targets, and in the civilian arena, from agriculture to photography. Furthermore, unmanned aerial vehicles have the potential to be used not just for military or commercial goals, but also for international crimes. Nowadays unmanned aerial vehicles are used in electronic warfare to monitor enemy positions, prevent their communications by jamming systems, instantly monitor the country's border security, render the electronic systems of the determined targets inoperable, and listen for information via communication systems. Under the conditions specified above, the study seeks to provide a hybrid approach to unmanned aerial vehicles. The cybersecurity of unmanned aerial vehicles, software security, physical security, and social and cultural security will all be handled from a single point of view.
... Drones are progressively being used in the rapid delivery of packages and recreational uses such as for photography and videography. However, drones themselves provide a huge security risk as they have the potential to be used for criminal activities and are difficult to detect [1,2]. It is expected that the use of drones will increase by an order of magnitude over coming years, so more robust surveillance methods are required [3]. ...
... To be consistent, in this work, PLL upconversion is used which generates a signal that is a multiple of f clk and is also coherent. Therefore, using this technique, if the local oscillator is not stable in frequency or has an offset from its nominal frequency, the carrier frequency will also have a frequency error as denoted by Equation (1). ...
Article
Full-text available
The application and uses of drones in all areas are continuously rising, especially in civilian use cases. This increasing threat requires reliable drone surveillance in urban environments. Radar is the obvious candidate with its ability to detect small objects at range, in all weather conditions. The use of an L‐band networked radar for urban sensing of S‐UAS targets is explored. Small echoes from S‐UAS places a premium on synchronisation, which is the fundamental key for high performance networked radar. The effect of timing errors on the operation of the network radar is investigated theoretically and experimentally, and the processing tools for synchronising data based on the direct signal returns of the transmitter are developed. Also, drone detection using bistatic L‐band staring radar is achieved both in simulation and then in real field trials where the SNR and detection performance are computed and analysed. The updated direct signal synchronisation method for bistatic staring radar is shown to provide comparable SNR and positional accuracy for S‐UAS targets as the monostatic staring radar.
... To counter a drone assault, many Counter Unmanned Aircraft Systems (C-UAS) have been developed, which are primarily split into two categories: hard and soft interception (kinetic or non-kinetic solution). Intercepting a drone with I a trained bird of prey, (ii) a net gun [1], (iii) a laser beam, and (iv) a weapon are among the kinetic options. Non-kinetic options include I GPS spoofing [1] and (ii) RF jamming. ...
... Intercepting a drone with I a trained bird of prey, (ii) a net gun [1], (iii) a laser beam, and (iv) a weapon are among the kinetic options. Non-kinetic options include I GPS spoofing [1] and (ii) RF jamming. Regardless of the approach adopted for any situation, the existence of a drone should be recognised and identified in advance. ...
Article
Despite various positive uses, drones are also utilised for illegal purposes like as drug trafficking, weapon smuggling, and posing dangers to security-sensitive locations such as airports and nuclear power plants. Existing drone localisation and neutralisation solutions are predicated on the drone having previously been discovered and categorised. Despite significant progress in the sensor sector over the last decade, no viable drone detection and classification approach has been suggested in the literature. The frequency signature of the sent signal is used in this research to identify and classify drones using radio frequency (RF). Using commercial drones, we built an unique drone RF dataset and provided a comprehensive comparison of a two-stage and integrated detection and classification framework. Both frameworks' detection and classification results are demonstrated for a single-signal and simultaneous multi-signal situation. We demonstrate that the You Only Look Once (YOLO) framework outperforms the Goodness-of-Fit (GoF) spectrum sensing framework in a simultaneous multi-signal situation, and that it outperforms the Deep Residual Neural Network (DRNN) framework in classification
... While there is a significant technological gap between capturing video feeds or infecting a computer with a virus and controlling a drone's command link, there is a possibility that attackers will obtain this capability. This threat may be minimal because the US drone fleet's Predators and Reapers' command links are encrypted [246,251]. Commercial drones' unencrypted command links, on the other hand, might be easily exploited by attackers. The study by Shephard et al. [261] also demonstrated that global navigation satellite system (GNSS) spoofing may be used to kidnap drones. ...
... In February 2015, AdNear, a Singapore-based marketing firm, was discovered to be using drones to acquire signal strengths and other wireless data from bystanders to determine the whereabouts and motions of mobile phones. AdNear may then utilize this information to provide hypertargeted ads and other promotions to users walking past a storefront in the hopes of getting them to enter their marketing firm [246]. ...
Article
Full-text available
This paper presented an exhaustive survey on the security and privacy issues of drones. These security concerns were thoroughly dissected, particularly the aspect of cybersecurity, which was classified into nine levels. These levels include emerging issues, communication-based attacks, sensors, hardware, hardware-based attacks, software attacks, and physical attacks on the drone itself. Furthermore, we discussed the other non-cybersecurity challenges of drones, such as terrorism, mid-air collisions, illegal surveillance, smuggling, electronic snooping, and reconnaissance, alongside proffering possible solutions. Many of the discovered aspects of drone cybersecurity issues were then quantitatively analyzed using a multi-criteria decision-making problem-solving technique. The questionnaire responses from the general public, experts, and stakeholders in the aviation industry were analyzed. The findings revealed variations in cyber-attack techniques such as distributed denial-of-service (DDoS), denial-of-service (DoS), hacking, jamming, spoofing, electronic snooping, eavesdropping, advanced persistent threat (APT), reconnaissance, hijacking, man-in-the-middle attack, and so on. However, the majority of the participants in the survey, which constitute 70%, were unaware of the existing drone cybersecurity challenges. The remaining 30% were aware of the current drone security issues. Meanwhile, both parties are looking for an immediate solution that will fully provide an atmosphere of prospects in the drone industry. Following that, we presented our experience with drone security and privacy, as well as potential future research directions. This paper is unique in that it discusses the various types of drone cyber-attacks and non-cyber-attack scenarios that threaten the socio-economic system, aviation industry, national security, as well as public security and privacy concerns. It also offers solutions to the cyber-attack and non-cyber-attack cases that have been investigated. As a result, the findings of this study could be used to create, develop, and implement more secure cloud systems to safeguard drones from cyber and non-cyber-attacks.
... GPS spoofing attacks can unfold in diverse scenarios, presenting distinct threats and consequences. For instance, a delivery drone system may be compromised as malicious actors manipulate GPS signals, causing the drone to deliver packages to unintended locations, potentially resulting in theft or unauthorized access to sensitive deliveries [19,20]. In the realm of surveillance, GPS spoofing could deceive drones monitoring critical infrastructure or borders, allowing illicit activities to go unnoticed. ...
Article
Full-text available
Self-Supervised Representation Learning (SSRL) has become a potent strategy for addressing the growing threat of Global Positioning System (GPS) spoofing to small Unmanned Aerial Vehicles (UAVs) by capturing more abstract and high-level contributing features. This study focuses on enhancing attack detection capabilities by incorporating SSRL techniques. An innovative hybrid architecture integrates Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) models to detect attacks on small UAVs alongside two additional architectures, LSTM-Recurrent Neural Network (RNN) and Deep Neural Network (DNN), for detecting GPS spoofing attacks. The proposed model leverages SSRL, autonomously extracting meaningful features without the need for many labelled instances. Key configurations include LSTM-GRU, with 64 neurons in the input and concatenate layers and 32 neurons in the second layer. Ablation analysis explores various parameter settings, with the model achieving an impressive 99.9% accuracy after 10 epoch iterations, effectively countering GPS spoofing attacks. To further enhance this approach, transfer learning techniques are also incorporated, which help to improve the adaptability and generalisation of the SSRL model. By saving and applying pre-trained weights to a new dataset, we leverage prior knowledge to improve performance. This integration of SSRL and transfer learning yields a validation accuracy of 79.0%, demonstrating enhanced generalisation to new data and reduced training time. The combined approach underscores the robustness and efficiency of GPS spoofing detection in UAVs.
... The model concludes with a thorough review of the detection and classification strengths of current state-of-the-art FMCW radars. [1] (H. V. R. M, 2022) The paper presents a comprehensive framework for drone recognition and classification, leveraging multimodal, systematic deep learning methodologies. ...
Article
Full-text available
Drones are becoming more and more common, which has advantages but also concerns. They can be used to support illegal operations like drug trafficking and endanger places that are important to security. While advances in sensor technology haven't produced reliable answers in the literature, current drone detection and neutralization methods frequently require previous detection and categorization. Using radio frequency (RF) signals and a frequency signature-based deep learning model, this work promotes an environmentally friendly and multidisciplinary method of drone identification and categorization. Using commercial drones, we generated a novel drone RF dataset and thoroughly evaluated two-stage and combined detection-classification frameworks, assessing their efficacy in simultaneous multi-signal and single-signal scenarios. According to our investigation, the Deep Residual Neural Network (DRNN) framework achieves classification performance that is equivalent to that of the YOLOV5 framework, but it offers improved detection performance in multi-signal settings when compared to traditional Goodness-of-Fit (GoF) spectrum sensing. This study opens the door for multidisciplinary efforts to address new security concerns by showcasing the possibility of long-term, data-driven drone detection methods.
... However, their widespread use has also made them vulnerable to attacks, e.g. GPS spoofing, since for example, UAVs rely on GPS to navigate and operate in their environment [2]. Spoofing attack involves fake GPS signals with inaccurate data, causing UAVs to misjudge their position, velocity, or timing. ...
Article
The review emphasizes ways for identifying and removing existing drone technology that the air defense system (ADS) should implement in order to avoid future drone strikes. Because radar systems are no longer effective for contemporary drone identification, alternative sensors based on sound (microphones), light (cameras), and radio frequency (RF) can be used. Methodologies such as RF jammers, GPS spoofers, and high-power microwave (HPM), and high-energy lasers should also be utilized for drone eradication. These methods are ideally suited for non-stealthy unmanned aerial vehicles (UAVs) and small drones. For stealth, other methods such as quantum radar and quantum LiDAR and space-based infrared detectors can be utilized. The paper investigates signatures of micro-Doppler effect due to the back-and-forth motion of two blades single-propeller drones. Furthermore, numerical study of other stealth aircraft detection methods such as quantum radar and quantum LiDAR and space-based infrared detectors is reviewed in-depth.
Article
Full-text available
At present, an increasing number of small UAVs(Unmanned Aerial Vehicles) are commercialized and common, and the application of small UAVs has very good development prospects, such as UAV distribution services, UAV aerial photography services, and UAV formation performance. However, the misuse of small drones poses a significant threat. Lawbreakers use small drones equipped with various sensors to spy on personal privacy, steal corporate secrets, and threaten national conferences, which have had many adverse effects on society. In future wars, these small drones will perhaps be used on the battlefield along with high-end weapons. Therefore, it is necessary to find a solution for effectively identifying the basic information of UAV. For the existence of UAV and various small UAV types, this paper proposes a combination of RF sensing and target detection techniques with target detection algorithms to learn RF signal frequency frequency hopping features to detect UAV presence and identify the detected UAV. First, the RF signal of the UAV was obtained in real time by a software radio, and the time-frequency analysis of the short-time Fourier transform and wavelet transform is performed to generate frequency domain images with retained frequency hopping features. Then, the improved Yolov5-7.0 target detection model was employed for training, and finally, the trained model was used for identification and classification. The results showed that the method can effectively assist the detection and classification of UAVs that were obtained by identifying and classifying 5400 unlabeled images. The F1 score was 0.93, and the three assessment measures of P(Precision), R(Recall), and mAP(mean Average Precision) were 1.00, 1.00, and 0.967, respectively.
Article
Full-text available
Unmanned Aerial Vehicles are the main dimension that technology has brought in art of warfare. It has been used in various propensities, but the manner in which it has been used in Counter-Terrorism operations, will be discussed in the paper.
Article
Full-text available
Global Navigation Satellite Systems (GNSS) are being increasingly used for a variety of important applications, including public safety services (police, fire, rescue and ambulance), marine and aircraft navigation, vehicle theft monitoring, cargo tracking, and critical time synchronization for utility, telecommunications, banking and computer industries. At present, there are two types of GNSS signals; military GNSS signals (LI P(Y) and L2 for the case of GPS, and high precision (HP) for GLONASS) and civilian GNSS signals (LI coarse acquisition (C/A) for GPS, and standard precision (SP) for GLONASS). Usage of LI P(Y) and L2, and HP signals are limited to the US and Russian militaries respectively. Other users only have access to civilian GNSS signals. Usage of civilian GNSS signals is growing rapidly due the quality of service provided by GNSS, ease of use and low user cost. However, unlike military GNSS signals, civilian GNSS signals are unencrypted and unauthenticated, making them vulnerable to jamming and spoofing (also known as counterfitting or meaconing). Jamming and spoofing of civilian GNSS signals are surprisingly simple to conduct by even relatively unsophisticated adversaries. Jamming refers to the blocking of GNSS signals, rendering GNSS receivers in the affected areas inoperable, while spoofing refers to forging and transmission of navigation messages in order to manipulate the navigation solutions of GNSS receivers. Jamming is not surreptitious and affects both civilian and military GNSS signals, while spoofing is surreptitious and primarily affects civilian GNSS signals; military GNSS signals are less affected by spoofing as they are encrypted and authenticated. Due to the increasing reliance of various industries on GNSS, the consequences of GNSS service disruption can be severe, in terms of safety, environmental and economic damage. Hence, GNSS vulnerability mitigations steps should be given emphasis, including navigation/positioning/timing backups, making full use of ongoing GNSS modernization programs, integrity monitoring and augmentation, and anti-jamming and counter-spoofing technologies. This article is aimed at reviewing the vulnerabilities of civilian GNSS signals to jamming and spoofing, and the steps that need to be taken to mitigate these vulnerabilities.
Article
Full-text available
In this study, Global positioning system (GPS) simulation is employed to study the effect of radio frequency interference (RFI) on the accuracy of two handheld GPS receivers; Garmin GPSmap 60CSx (evaluated GPS receiver) and Garmin GPSmap 60CS (reference GPS receiver). Both GPS receivers employ the GPS L1 coarse acquisition (C/A) signal. It was found that with increasing interference signal power level, probable error values of the GPS receivers increase due to decreasing carrier-to-noise density (C/N 0) levels for GPS satellites tracked by the receivers. Varying probable error patterns are observed for readings taken at different locations and times. This was due to the GPS satellite constellation being dynamic, causing varying GPS satellite geometry over location and time, resulting in GPS accuracy being location/time dependent. In general, the highest probable error values were observed for readings with the highest position dilution of precision (PDOP) values, and vice versa.
Article
Full-text available
This paper is aimed at conducting a critical assessment of two key defence R&D elds that are important in supporting the development of the national defence industry, in particular in supporting the achievement of the objectives of the Fourth Dimension Malaysian Armed Forces (4D MAF) capability plan in terms of operational awareness and mission capability. The elds that will be discussed, determined based on the author's literature review and opinions of the MAF's capabilities and requirements, and current and expected future trends of global defence technology development, are Command, Control, Communications, Computers, Intelligence, Surveillance & Reconnaissance (C4ISR) in support of network centric operations (NCO) and unmanned vehicles (UVs).On the whole, the overall capabilities of the national defence industry to produce indigenous equipment and assets that meet the requirements of the 4D MAF plan in these two elds of defence R&D are still relatively limited. Nevertheless, signi cant progress has been, and is being, made through collaborations with relevant agencies, institutes and industries, both local and foreign. Active participation in defence R&D, in these two elds, in addition to other elds of defence technology, including vehicle & aerospace engineering challenges, emergent naval technology, smart weapons, personnel protection & performance, and biological, nuclear & chemical terrorism countermeasures, is required to further catalyze the development of the national defence industry. Keywords: Defence R&D; Fourth Dimension Malaysian Armed Forces (4D MAF); national defence industry; network centric warfare (NCO); unmanned vehicles.
Article
Full-text available
Global Navigation Satellite Systems (GNSS) are being increasingly used for a variety of marine and aircraft navigation, vehicle theft monitoring, cargo tracking, and critical time synchronisation for utility, telecommunications, banking and computer industries. At present, there are two types of GNSS signals; military GNSS signals (L1 P(Y) and L2 P(Y) for the case of GPS, and L1 for GLONASS) and civilian GNSS signals (L1 coarse acquisition (C/A) for GPS, and standard precision (SP) for GLONASS). Usage of L1 P(Y) and L2 P(Y), and HP signals are limited to the US and Russian militaries respectively. Other users only have access to civilian GNSS signals. Usage of civilian GNSS signals is growing rapidly due the quality of service provided by GNSS, ease of use and low user cost. However, unlike military GNSS signals, civilian GNSS signals are unencrypted and unauthenticated, making them signals is surprisingly simple to conduct by even relatively unsophisticated adversaries. Due can be severe, in terms of safety, environmental and economic damage. Hence, GNSS vulnerability mitigations steps should be given emphasis, including positioning/ navigation / timing (PNT) backups, making full use of on-going GNSS modernisation programmes, This paper is can be taken to mitigate this vulnerability.
Article
Full-text available
This study is aimed at evaluating Global Positioning System (GPS) performance during simplistic GPS spoofing attacks, whereby spoofing is conducted using a standalone GPS simulator, which at present poses the greatest near-term threat. The study is conducted on two handheld GPS receivers; Garmin GPSmap 60CSx (evaluated GPS receiver) and Garmin GPSmap 60CS (reference GPS receiver). Both receivers employ the GPS L1 coarse acquisition (C/A) signal. Varying minimum spoofing signal power levels, times between position fix lost and spoofing, and probable error patterns are observed for different dates and times. This is due to the GPS satellite constellation being dynamic, causing varying GPS satellite geometry over time, resulting in GPS performance being time dependent. Variation in other GPS error parameters, including ionospheric and tropospheric delays, satellite clock, ephemeris and multipath errors, and unintentional signal interferences and obstructions, could have also resulted in the variation of GPS performance. As the spoofing signal power level is increased, probable error values increase due to decreasing carrier-to-noise density (C/N 0) levels for GPS satellites tracked by the receiver. For all the readings, the highest probable errors occur at the minimum spoofing power levels. After spoofing takes place, the probable errors reduce to levels that are lower as compared to prior to transmission of the spoofing signal, as at this point, the spoofing signal power levels are relatively large, resulting in high C/N 0 levels and hence, improved accuracy. Keywords: Global Positioning System (GPS) spoofing; position dilution of precision (PDOP); probable errors; location fix loss; signal synchronisation. 99
Article
Technology to ground drones is taking off, finds Chris Baraniuk
The Commercialization of UAVs: How Terrorists Will Be Able to Utilize UAVs to Attack the United States
  • B Card
Card, B., The Commercialization of UAVs: How Terrorists Will Be Able to Utilize UAVs to Attack the United States. University of Texas at El Paso, El Paso, Texas, 2014.