The principle that drones are easily disturbed

The device consists of a handheld host and a battery pack. The handheld host is an integrated design of a three-band transmitter antenna, which can simultaneously generate unlicensed flight control interference signals and satellite positioning interference signals for the 2.4 GHz/5.8 GHz band, through the uplink flight control channel and satellite positioning channel of the UAV. Blocking interference causes it to lose flight control commands and satellite positioning information, making it unable to fly normally. According to the design of the drone, it will result in return control, landing and falling control effects.

The principle that drones are easily disturbed

In the offensive and defensive posture, there is usually a certain distance between the drone's manipulators and the sensitive areas that need to be fortified. The drone takes off near the manipulator and gradually flies to the fortification area. When the drone reaches the vicinity of the fortified area and is capable of effective detection or sabotage, the distance from the drone to the fortified area is usually much closer to the operator than it is to the drone.

In the above situation, all the uplink signals sent by the manipulator (from the ground to the drone) will be weak because of the distance. With the same power, the defender is closer to the drone and the signal will be stronger than the manipulator. Defenders will also receive stronger downlink signals than operators. However, the defensive goal of the downlink signal is to make it impossible for the operator to receive it. At this time, the distance from the drone to the manipulator is similar to the distance from the defender to the manipulator. Therefore, the blocking of the downlink signal does not occupy the terrain advantage.

From the above analysis, it can be seen that the interference of the uplink signal is more favorable. It happens that the uplink signal is usually a remote control signal and is directly related to the control of the drone. If the uplink signal is disturbed, the drone will lose instant control and can only be operated according to the procedure preset (usually landing or hovering). The downlink signals are mainly telemetry and images. Although sensitive information may also exist, it is less important than the control signal. Coupled with the fact that defenders do not dominate in the situation, they usually take a laissez-faire attitude toward the downlink signals.

GPS relies on medium-orbit satellites. In the popular sense, the signal reaches the surface of the earth after tens of thousands of kilometers, and it is already very weak. Therefore, it is relatively easy to interfere with GPS signals when the drone is in close proximity to the defender. If you want to deceive it, you need to simulate GPS satellites with more complicated means, which will be much more difficult.

The principle that drones are easily disturbed

Signal interference

At present, the control of drones uses radio communication technology. By transmitting high-power interference signals to target drones and suppressing control signals, drones can be forced to land on their own or return.

The United States uses this principle. The gun mounts an electronic jammer on the frame of the rifle. Once the trigger is pulled, the jammer will send a full-range of jamming signals to the drone, which will make the drone out of the operator's control and receive no control signal. Automatically lands on the ground.

Once the drone signal is in a state of chaos, it usually has three options: drop to the ground, return to the operator, or drop steadily. This rifle has an effective range of 500 to 2000 meters.

GPS fraud

At present, most of the consumer drones will use GPS navigation for flight control under normal circumstances. The civilian GPS signal is non-encrypted, which leaves us with space available.

The main principle of GPS spoofing is to send false geographic coordinates to the UAV's control system to control the navigation system and induce the drone to fly to the wrong place. The GPS signal can be generated by the generator, or it can be recorded in advance and then played back. Since UAVs receive GPS signals always based on the signal with the strongest signal, ground-based GPS signals can cover the true GPS signals transmitted from space as long as the intensity is large enough to deceive the UAV. GPS receiver module.

At present, all countries have set no-fly zones in the core area. Many drone manufacturers have set up drones with built-in firmware. In the no-fly zone, drones cannot take off, even if they reach the no-fly zone. Automatic landing. Therefore, as long as ground-based GPS signals simulate the geographic location as the coordinates of the no-fly zone, the UAV can be forced to land on its own.

The principle that drones are easily disturbed

Radio Hijacking

Most UAVs currently use control signals at 1.2GHz, 2.4GHz, 5.8GHz, and other common civilian frequencies. With the rapid development of open source hardware such as Arduino and Raspberry Pi and the popularity of Software Defined Radio (SDR) technology, ordinary enthusiasts It is also possible to simulate the remote control sending a control signal to the drone using the hardware bought from the network and the software source code obtained from the forum, and cover the signal of the real remote controller so as to obtain the control right of the drone.

Hacker technology

Many drones use Wi-Fi to interact with mobile devices such as mobile phones and tablets. In this way, some hacker technologies that are already mature on the Internet can be directly applied to drones.

For example, through the open port or password guessing method in the UAV control system, the control system is implemented to control the UAV. Samy Kamkar, the legendary hacker who developed the Sami worm, used this principle to write a drone hijacking software called SkyJack and installed the software to specially configured unmanned people. In the plane, SkyJack flies in the air and looks for other drones in the Wi-Fi range, and then invades the drone and takes control.

The principle that drones are easily disturbed

Industry professionals involved in the application of anti-drone drones said that the current domestic anti-drone drone technology is still in the phase of exploration. The radio hijacking technology is difficult to achieve because each drone manufacturer encrypts radio signals. Hacker technology The threshold is relatively high and it is not easy to commercialize. Therefore, the currently used technology is mainly based on interference blocking.

Wired Industrial Barcode Scanner

Wired Industrial Barcode Scanner,Industrial Barcode Reader,Industrial Handheld Barcode Scanner,Industrial Fixed Barcode Scanner

Guangzhou Winson Information Technology Co., Ltd. , https://www.barcodescanner-2d.com