LEAVE A Message
Spoofing uav jamming system
In principle, as long as the range of the radio suppression signal is strong enough and the frequency can cover the above satellite navigation frequency points, then the uav will lose the ability to automatically navigate.
From the analysis of the last article, it can be seen that there is no technical difficulty in suppressing the compressed uav, because the frequency points of communication data link and navigation signal are all open. As long as a noise signal with the same frequency point and strong enough amplitude is produced, it can suppress the effect. In short, this is the simplest, roughest, and least technical solution! But it is simple and effective.
Of course, in addition to the low, slow and small systems used by consumers, this simple suppression method is also effective for some professional drones, even military ones, but the requirement for launch power is higher. I'm not going to discuss it here.
Compared with the simple radio jamming countermeasures, the spoofing or induced countermeasures have a higher technical content. Spoofing consists of data link spoofing and navigation signal spoofing.
The difficulty of data link to cheat is higher, first of all, we must achieve detecting uav data link and parsing, if able to decode the data link frequency, bandwidth and modulation mode and communication protocol, etc. All the parameters, this means that we can for the illegal invasion of unmanned aerial vehicle (uav) can realize completely take over! The difficulty of this work is relatively large, for frequency-hopping communication and the use of different encryption and decryption technology of the data chain, it is very difficult! The amount of work and difficulty would be almost impossible if the various drones on the market were to be countered with a data-link cracking technique. Even if it is successful to crack a certain drone, if the manufacturer adjusts the technical system and encryption method of the data link, all the work has to start again!
Counterattack systems based on data link cracking technology are often used by the military to research and crack a specific type of local military drone and take over the capture. Iran has repeatedly captured American RQ47 drones using this technical route.
The spoofing of satellite navigation signals is interference, which is mainly aimed at GPS/GLONASS/BD navigation system, sending false satellite navigation signals. If the fake satellite navigation signal is far more powerful than the real GPS navigation signal, the uav will follow the fake navigation signal until it flies out of the protected area and lands or crashes on its own to protect the critical area.
The frequency and format of navigation signals are relatively fixed, and even transparent, so it is simpler to use false satellite navigation signals to carry out countermeasures than the technology of data link tube. If the false navigation signal can be used to induce the illegal uav to land and make a perfect arrest, it will be more effective for the detection and collection of evidence in the future. This is a much more technical regime than rudely jamming a drone and having it land and crash.
Of course, the best technical solution is that it can not only take over the data link, but also release false navigation signals, perfect arrest of the drone does not provide evidence to solve the case! However, in the civil field, the economy of all kinds of countermeasures is also very important. If a lot of human and material resources are spent, just for a few thousand yuan or tens of thousands of yuan "low slow small", it seems not worth it; A perfectly captured American RQ47 (like Iran's), or an Israeli heron series, would be significant.