A UAV Positioning Approach Using LoRa

To read the full-text of this research, you can request a copy directly from the author.


As the number of UAVs for commercial is increasing, ATC has found it difficult to manage a large amount of aircraft. In London Heathrow Airport and Gatwick Airport, the unidentified drones have caused airports to shut down for safety reason; However, there is no effective solution to prevent such issues. The primary objective of this project is to simulate an unmanned aerial vehicles (UAV) positioning devices that can equip on a drone for broadcasting its location. At the same time, it aims to discover a licence free technology to achieve simulating as a concept of the future positioning system. As the current developing technology ADS-B using 1090 MHz frequency requires WTA licence, an alternative approach using a licence free frequency must be discovered. The positioning devices might be implemented further on air traffic control positioning, collision avoidance and geo-fencing. In this project, a possible standard LoRa system using unlicenced 868 MHz frequency is constructed in this project

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

ResearchGate has not been able to resolve any citations for this publication.
Full-text available
The Geofencing system is the key to operate the Unmanned Aerial Vehicle (UAV) within the safe and appropriate zone to avoid public concerns and other privacy issues. The system is designed to keep the UAV away from geofenced obstacles using the onboard GNSS and IMU location. The Geofencing system is part of the H2020 GAUSS project and facilities other subsystems, for instance, to support the command and control link, which is the security measure to secure the UAV from hijacking and signal spoofing. The regulatory authorities expressed the concern of having UAVs flying in the no-fly zone and causing troubles from offending private privacy to hazards at airport airspace. Hence the geofence system shall provide guidance message, which enables the UAV to evacuate from no-fly-zone, based on real-time updated location. This thesis aims to first illustrate the generation of geofence and then apply the geofence system on UAV operation. This application enables UAV to fly in the designated area without human intervention. The project is built with JAVA using GIS-enabled Database Management System and Open Soured Map data powered by OpenStreetMap and OS map. This method has been tested by simulations which had results of high accuracy
Full-text available
Despite the Aircraft Communications, Addressing and Reporting System (ACARS) being widely deployed for over twenty years, little scrutiny has been applied to it outside of the aviation community. Whilst originally utilized by commercial airlines to track their flights and provide automated timekeeping on crew, today it serves as a multi-purpose air-ground data link for many aviation stakeholders including private jet owners, state actors and military. Such a change has caused ACARS to be used far beyond its original mandate; to date no work has been undertaken to assess the extent of this especially with regard to privacy and the various stakeholder groups which use it. In this paper, we present an analysis of ACARS usage by privacy sensitive actors-military, government and business. We conduct this using data from the VHF (both traditional ACARS, and VDL mode 2) and satellite communications subnetworks. Based on more than two million ACARS messages collected over the course of 16 months, we demonstrate that current ACARS usage systematically breaches location privacy for all examined aviation stakeholder groups, explaining the types of messages used to cause this problem.We illustrate the challenges with three case studies-one for each stakeholder group-to show how much privacy sensitive information can be constructed with a handful of ACARS messages. We contextualize our findings with opinions on the issue of privacy in ACARS from 40 aviation industry professionals. From this, we explore recommendations for how to address these issues, including use of encryption and policy measures.
Full-text available
LoRa is one of the promising techniques for enabling Low Power Wide Area Networks (LPWANs) for future Internet-of-Things (IoT) devices. Although LoRa allows flexible adaptations of coverage and data rates, it is subject to intrinsic types of interferences: co-SF interferences where end-devices with the same Spreading Factors (SFs) are subject to collisions, and inter-SF interferences where end-devices with different SFs experience collisions. Most current works have considered perfect orthogonality among different SFs. In this work, we provide a theoretical analysis of the achievable LoRa throughput in uplink, where the capture conditions specific to LoRa are included. Results show the accuracy of our analysis despite approximations, and the throughput losses from imperfect SF orthogonality, under different SF allocations. Our analysis will enable the design of specific SF allocation mechanisms, in view of further throughput enhancements.
Conference Paper
Full-text available
Protecting the security of the cyber-physical systems that make up the world’s critical infrastructures has been a recent hotly debated topic. Legacy wireless communication infrastructure is often an impediment to quickly improving these crucial systems, as cryptographic solutions prove impossible to deploy. In this article, we propose the establishment of a separate verification layer for sensitive wireless data powered by crowdsourced sensors connected to the Internet and apply it to the aviation domain. We first validate the need for independent data verification in air traffic control networks, where all wireless communication is conducted in the clear and thus subject to manipulation. To counter this threat, we develop a comprehensive model for the verification of wireless communication based on massively distributed data collection and outline how it can be used to immediately improve the security of unprotected air traffic control networks. By combining several different methods based on the content and the physical characteristics of aircraft signals, our system is able to detect typical injection, modification and jamming attacks. We further develop a trust model to defend against potential insider threats based on compromised sensors. We illustrate our approach using the crowdsourced sensor network OpenSky, which captures large parts of civil air traffic communication around the globe. We analyse the security of our approach and show that it can quickly, cheaply, and effectively defend against even sophisticated attacks.
Full-text available
More than a dozen wireless technologies are used by air traffic communication systems during different flight phases. From a conceptual perspective, all of them are insecure as security was never part of their design. Recent contributions from academic and hacking communities have exploited this inherent vulnerability to demonstrate attacks on some of these technologies. However, not all of these contributions have resonated widely within aviation circles. At the same time, the security community lacks certain aviation domain knowledge, preventing aviation authorities from giving credence to their findings. In this paper, we aim to reconcile the view of the security community and the perspective of aviation professionals concerning the safety of air traffic communication technologies. To achieve this, we first provide a systematization of the applications of wireless technologies upon which civil aviation relies. Based on these applications, we comprehensively analyze vulnerabilities, attacks, and countermeasures. We categorize the existing research on countermeasures into approaches that are applicable in the short term and research of secure new technologies deployable in the long term. Since not all of the required aviation knowledge is codified in academic publications, we additionally examine existing aviation standards and survey 242 international aviation experts. Besides their domain knowledge, we also analyze the awareness of members of the aviation community concerning the security of wireless systems and collect their expert opinions on the potential impact of concrete attack scenarios using these technologies.
Conference Paper
Full-text available
Automatic Dependent Surveillance-Broadcast (ADS-B) is one of the key components of the next generation air transportation system. Since ADS-B will become mandatory by 2020 for most airspaces, it is important that aspects such as capacity, applications, and security are investigated by an independent research community. However, large-scale real-world data was previously only accessible to a few closed industrial and governmental groups because it required specialized and expensive equipment. To enable researchers to conduct experimental studies based on real data, we developed OpenSky, a sensor network based on low-cost hardware connected over the Internet. OpenSky is based on off-the-shelf ADS-B sensors distributed to volunteers throughout Central Europe. It covers 720,000 sq km2, is able to capture more than 30% of the commercial air traffic in Europe, and enables researchers to analyze billions of ADS-B messages. In this paper, we report on the challenges we faced during the development and deployment of this participatory network and the insights we gained over the last two years of operations as a service to academic research groups. We go on to provide real-world insights about the possibilities and limitations of such low-cost sensor networks concerning air traffic surveillance and further applications such as multilateration.
Full-text available
Introduction: Central to precision farming and natural resources monitoring is the ability to locate any position in a field, forest, or rangeland area accurately so that soil, plant, pest, and yield data specific to that site can be georeferenced. These georeferenced data can be used for generating attribute and site-specific management maps. In the past, dead-reckoning (measurement of velocity and heading) and inertial navigation (measurement of linear and rotational acceleration) have been used for positioning. In recent years, GPS has become the method of "choice" for positioning purposes. The GPS technology uses the simple concept of triangulation to determine the position of a point. Triangulation: Location of any point P in a two dimensional (2-D) plane can be uniquely determined, if its distances from three known points (A, B and C) are known as shown in figure 1. Essentially point P is the intersection of three circles whose radii correspond to the distances of points A, B, and C from point P respectively (i.e, two circles intersect at two points and three circles intersect at a point). This principle of positioning, known as triangulation, is used for locating points using GPS technology. Since we are interested in locating a point in a three dimensional (3-D) space, distances of the point from four known positions are necessary to uniquely locate the point (i.e. two spheres intersect in a circle; three spheres intersect at two points; four spheres intersect at a point). However, to determine the location of a point on the surface of the earth, only three distance measurements from three known points are sufficient. Although three spheres intersect at two points, one of the points will be far away from the surface of the earth and can be discarded. The GPS technology uses radio waves from satellites to determine distances of any desired location from the satellites to determine position of that point. Global Positioning System: The GPS consists of 24 satellites that circle the earth in six, 12- hour orbits2. These satellites, known as NAVSTAR (NAVigation by Satellite Timing And Ranging), have been launched and maintained by the department of defense (DOD) to provide all weather ranging 24 hours a day anywhere on the surface of the earth. Each orbit is at an altitude of 20,200 km (12,500 miles) and contains four satellites. These satellites are equipped with four atomic clocks each to provide accurate timing. They transmit two radio frequencies on two separate L-bands (L1 = 1575.42 MHz and L2=1227.60 MHz). The L1 signal consists of a Course/Acquisition (C/A) and a Precision (P) code. The L2 signal contains only the P-code. Only the C/A code of the L1 signal, known as the standard positioning service (SPS), is available for civilian use. The L1 and L2 signals are available for military and other authorized users and provide a
Conference Paper
Among the Low-Power Wide Area technologies available today, LoRa is one of the most successful, as it enables robust long-distance low-power communications in the unlicensed sub_GHz Industrial, Scientific and Medical band. A number of solution providers and network operators show much interest in this technology for Industry 4.0 applications. In addition, LoRa represent a promising candidate for boosting future Industrial Internet of Things networks and services. However, the current standardized LoRaWAN Medium Access Control (MAC) protocol over LoRa does not fully cope with the requirements of industrial networks, in particular as far as the scheduling of real-time data flow is concerned. To overcome this limitation, this paper proposes Industrial LoRa, a novel medium access strategy for LoRa that enables the implementation of industrial wireless networks for Industrial Internet of Things and Industry 4.0 applications. The paper describes the proposed MAC scheme and the advantages it provides. A simulative assessment shows the performance of the proposed approach in a realistic scenario that is compliant with the requirements of soft real-time applications in Industry 4.0.
Conference Paper
Finding the shortest path between two points on Earth is important especially in navigation. Since the Earth does not exactly follow one of the geometric shapes, calculating the distance on its surface is one of the important challenges. Haversine and Vincenty formulas are the two major formulas used for calculating distances on a sphere and elliptic shapes, respectively. Since the Earth is neither a perfect sphere nor ellipse, using these formulas gives approximate results about the real distances. This paper presents and evaluates the two formulas by applying them on location -- based context-aware recommender system. As a result, the paper concludes that Haversine is more appropriate in the field of recommendation.
Fundamentals of GPS receivers covers GPS receivers theory and practice. The book begins with the basics of GPS receivers and moves onward to more advanced material. The book examines three types of GPS receiver implementations: first is the custom design by the author; second is an industry standard design, now part of the open source network; the third relates to the receiver designed by JPL /NASA. Each receiver is unique allowing the reader to see how each design solves the same problems. Chapters discuss carrier phase measurements and GPS time and frequency measurements. The overall text is measurement oriented as opposed to processing the measurements. With a focus on the fundamentals of measurements the reader will be building their intuition for the physical phenomenon at work. © Springer Science+Business Media, LLC 2012. All rights reserved.
Conference Paper
This work studies the security of next generation air traffic surveillance technology based on Automatic Dependent Surveillance – Broadcast (ADS-B). ADS-B is already supported by a majority of international aircraft and will become mandatory in 2020 for most airspaces worldwide. While it is known that ADS-B might be susceptible to different spoofing attacks, the complexity and impact of launching these attacks has been debated controversially by the air traffic control community. Yet, the literature remains unclear on the requirements of launching ADS-B attacks in real-world environments, and on the constraints which affect their feasibility. In this paper, we take a scientific approach to systematically evaluate realistic ADS-B attacks. Our objective is to shed light on the practicability of different threats and to quantify the main factors that impact the success of such attacks. Our results reveal some bad news: attacks on ADS-B can be inexpensive and highly successful. Using a controlled experimental design, we offer insights from a real-world feasibility analysis that leads to the conclusion that any safety-critical air traffic decision process should not rely exclusively on the ADS-B system.
6 ats surveillance services and procedures. Enroute Information
Aeronautical Information Service. Enr 1.6 ats surveillance services and procedures. Enroute Information, 2018. URL pamslight-@@@BCCFFFDAEFFDAAFFFFFFFFFFFFFFF//FEEQZZFFFXUS/EN/AIP/ ENR/EG_ENR_____en_____--.pdf.
A Guide to Business Analysis Body of Knowledge (BABOK Guide)
  • K Brennan
  • B A Carkenord
  • M Gorman
  • K B Hass
  • B Kerton
  • E Larson
  • R Larson
  • J Questor
  • L Paton
K. Brennan, B. A. Carkenord, M. Gorman, K. B. Hass, B. Kerton, E. Larson, R. Larson, J. Questor, and L. Paton. A Guide to Business Analysis Body of Knowledge (BABOK Guide). International Institute of Business Analysis, 2009.
Unmanned aircraft system operations in UK airspace: Guidance. The Stationery Office, 6 edition
  • U Caa
U. CAA. Unmanned aircraft system operations in UK airspace: Guidance. The Stationery Office, 6 edition, 2015.
Ecc report 261 -spectrum
  • Cept Ecc
CEPT ECC. Ecc report 261 -spectrum, Jan 2017. URL international/cept/ecc-reports/ecc-report--SRD---MHz.
Navstar gps and glonass: global satellite navigation systems
  • P Daly
P. Daly. Navstar gps and glonass: global satellite navigation systems. Electronics & Communications Engineering Journal, 5(6):349, 1993. doi: 10.1049/ecej:19930069.
Dragino lora gps tracker
  • D Guo
D. Guo. Dragino lora gps tracker, Jul 2016. URL id/Dragino-LoRa-GPS-Tracker-/.
Opensky report 2018: Assessing the integrity of crowdsourced mode s and ads-b data
  • I Martinovic
  • M Strohmeicr
  • M Smith
  • M Fuchs
  • V Lenders
  • M Schafer
I. Martinovic, M. Strohmeicr, M. Smith, M. Fuchs, V. Lenders, and M. Schafer. Opensky report 2018: Assessing the integrity of crowdsourced mode s and ads-b data. 2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC), 2018. doi: 10.1109/dasc.2018.8569833.
Network opensky explorer alerts opensky iframe facts receiver ranking
  • M Meides
M. Meides. Network opensky explorer alerts opensky iframe facts receiver ranking, 2019. URL
Analysis and evaluation of register transfer logic software defined radio performance
  • S Michelini
  • K D Mahalingam
S. Michelini and K. D. Mahalingam. Analysis and evaluation of register transfer logic software defined radio performance. WPI-MIT Lincoln Laboratory, oct 2016.
Nooelec nesdr mini sdr & dvb-t usb stick (rtl2832 r820t) w/ antenna and remote control
  • Nooelec
Nooelec. Nooelec nesdr mini sdr & dvb-t usb stick (rtl2832 r820t) w/ antenna and remote control, 2019. URL nesdr-mini-rtl -r t.html.
Short range devices operating in the 863 -870 mhz
  • Ofcom
Ofcom. Short range devices operating in the 863 -870 mhz..., Aug 2010. URL https://www. / /final_report.pdf.
Uk frequency allocation table (ukfat)
  • Ofcom
Ofcom. Uk frequency allocation table (ukfat), Jul 2018. URL uk/static/spectrum/fat.html.
Aeronautical licensing
  • Ofcom
Ofcom. Aeronautical licensing, Mar 2019. URL https://www.ofcom. aeronautical-licensing.
Ads-b and other means of surveillance implementation status. SESAR Deployment Manager
  • C Pradera
  • H Teper
C. Pradera and H. Teper. Ads-b and other means of surveillance implementation status. SESAR Deployment Manager, May 2018.
U-space blueprint. U-space Blueprint Brochure
  • Sesar
SESAR. U-space blueprint. U-space Blueprint Brochure, 2017. doi: 10.2829/335092.
Screen reader navigation
  • Uk Caa
UK CAA. Screen reader navigation, 2019. URL
Heathrow airport: Drone sighting halts departures
BBC. Heathrow airport: Drone sighting halts departures, Jan 2019. URL