A Configurable Radio Jamming Prototype for Physical Layer Attacks Against Malicious Unmanned Aerial Vehicles

The goal of this paper is to design and prototype a radio jamming system that is able to interfere the communication drone-remote control, in particular, disabling the motion control system. The drone adopted in the experimental session is the AEE Toruk AP10 Pro, characterized by a digital wireless control system centered at 868MHz. We have created a configurable jamming prototype for limit as much as possible the interference with other radio systems and study the effect of the signal band on the motion control system. We will present our system with both simulation and experimental validation.

[1]  Hao Zhang,et al.  A new electromagnetic jamming system for unmanned aerial vehicles , 2017, 2017 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM).

[2]  Todd E. Humphreys,et al.  Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.

[3]  Xilun Ding,et al.  A Net-Launching Mechanism for UAV to Capture Aerial Moving Target , 2018, 2018 IEEE International Conference on Mechatronics and Automation (ICMA).

[4]  Qingqing Wu,et al.  Securing UAV Communications via Joint Trajectory and Power Control , 2018, IEEE Transactions on Wireless Communications.

[5]  Muhammad Mahtab Alam,et al.  Jamming of UAV remote control systems using software defined radio , 2018, 2018 International Conference on Military Communications and Information Systems (ICMCIS).

[6]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[7]  Stoica P M Comparative analysis of methods to detect radio controlled commercial UAVs , 2018, Scientific Bulletin of Naval Academy.

[8]  Qingqing Wu,et al.  Safeguarding Wireless Network with UAVs: A Physical Layer Security Perspective , 2019, IEEE Wireless Communications.

[9]  Kim-Kwang Raymond Choo,et al.  Unmanned Aerial Vehicles (UAVs) Threat Analysis and a Routine Activity Theory Based Mitigation Approach , 2019, NCS.