WO2024196331A2 - Uav countermeasure system - Google Patents
Uav countermeasure system Download PDFInfo
- Publication number
- WO2024196331A2 WO2024196331A2 PCT/TR2024/050266 TR2024050266W WO2024196331A2 WO 2024196331 A2 WO2024196331 A2 WO 2024196331A2 TR 2024050266 W TR2024050266 W TR 2024050266W WO 2024196331 A2 WO2024196331 A2 WO 2024196331A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- uav
- wearable
- countermeasure
- signals
- countermeasure system
- Prior art date
Links
- 238000001514 detection method Methods 0.000 claims abstract description 32
- 238000004422 calculation algorithm Methods 0.000 claims description 20
- 238000000034 method Methods 0.000 claims description 19
- 238000012545 processing Methods 0.000 claims description 14
- 238000004458 analytical method Methods 0.000 claims description 7
- 230000002093 peripheral effect Effects 0.000 claims description 5
- 230000004913 activation Effects 0.000 claims description 4
- 230000000007 visual effect Effects 0.000 claims description 4
- 238000012544 monitoring process Methods 0.000 abstract description 8
- 238000001228 spectrum Methods 0.000 abstract description 8
- 238000013473 artificial intelligence Methods 0.000 description 8
- 238000011161 development Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000007635 classification algorithm Methods 0.000 description 2
- 230000007123 defense Effects 0.000 description 2
- 230000007704 transition Effects 0.000 description 2
- 238000013528 artificial neural network Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000010006 flight Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000003472 neutralizing effect Effects 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 238000010183 spectrum analysis Methods 0.000 description 1
Classifications
-
- F—MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
- F41—WEAPONS
- F41H—ARMOUR; ARMOURED TURRETS; ARMOURED OR ARMED VEHICLES; MEANS OF ATTACK OR DEFENCE, e.g. CAMOUFLAGE, IN GENERAL
- F41H11/00—Defence installations; Defence devices
- F41H11/02—Anti-aircraft or anti-guided missile or anti-torpedo defence installations or systems
Definitions
- the invention relates to a wearable spectrum monitoring, UAV detection, identification, classification and countermeasure system that can be carried by personnel, which performs wearable tactical UAV (Unmanned Aerial Vehicle) detection, identification, classification, spoofing, jamming and taking control (with hacking) operations.
- UAV Unmanned Aerial Vehicle
- UAV countermeasure systems are in the form of fixed stations or mobile station on the vehicle, and do not include all the detection, identification, classification, target location finding, direction finding and countermeasure features that are wearable by personnel.
- the applications detected on the subject as a result of the research are given below.
- TR2017/11161 comprises a jammer capability that allows UAVs, which have the ability to return to the starting point of flight when the connection with the remote control is lost, by taking advantage of this feature and sending them back to the place where they started the flight, developed to interrupt mobile phone and Wi-Fi signals in areas requiring special protection and also to prevent UAVs from flying over the protected area.
- US10915099B1 relates to a system for detecting and neutralizing a UAV that comprises a sensing antenna array and command control signal configured to detect the UAV in a 360-degree area.
- the system focuses on detecting signals in the 2.4GHz band and video signals.
- US11190233B2 and US11442141 B2 comprise the detection of aircraft by the technological method used by sampling the RF signal.
- the application numbered KR102054089B1 comprises a signal detector configured to detect wireless signals transmitted between a remote control unit and a remote controlled vehicle; a feature extractor configured to extract signal features from detected wireless signals; a classifier configured to determine whether the detected wireless signal and detected radio signals based on signal characteristics correspond to a known or unknown radio protocol; a remote control detected based on at least one of the classification and remote sensing data of the detected radio signals; a threat analyzer configured to determine whether said vehicle is a threat and an intrusion detection system for a remote control system using an unknown wireless protocol based on extracted signal characteristics.
- the applications numbered KR102155284B1 and US11074822B2 comprise the feature of detecting UAVs in a certain region (for example, a no-fly zone) and printing a false GNSS signal to land the detected UAVs in a different region, that is, spoofing.
- Non-wearable large-scale systems have high costs, high power consumption and are widely difficult to install and use in the operation field.
- UAV capabilities, behaviors and communication technologies are also developing rapidly with the development of technology. For example, for a UAV with a return-to-home feature, only cutting off communication with the command center is not enough, this feature can be configured differently in different UAV manufacturers and models. For example, if the threatening UAV is disconnected from the command control, it may land where it is instead of returning home, remain suspended in the air, and when its battery runs out, it may fall to the ground uncontrollably, causing loss of life and property. Besides, due to the developing UAV features, jamming alone is not enough to neutralize the UAV system, it is also necessary to use spoofing and taking control countermeasure.
- the ability of a wearable hardware to estimate the target direction with an integrated directional antenna and network support feature allows it to be used for jamming, spoofing and control tasks with lower power consumption, that is, for a longer period of time.
- the invention has been formed for the aim of defense against newly emerging threats and aims to solve the above-mentioned negativities.
- the invention is a wearable tactical UAV (Unmanned Aerial Vehicle) detection, identification, classification, spoofing, jamming and control system that can be carried by personnel and has the feature of operating with battery. Each user can protect the area within a certain range with the device on them and prevent UAV flights in this area.
- UAV Unmanned Aerial Vehicle
- This invention enables the region where personnel are located to be scanned at a certain range with the omnidirectional antenna it contains.
- the invention can perform spectrum analysis based on SDR (Software Defined Radio) and detect the signals in the ISM bands (2.4GHz, 5.8GHz, 433MHz, etc.) used by commercial and special production UAVs, the signals of special production UAVs operating in different frequency bands.
- SDR Software Defined Radio
- the invention can identify the UAV brand and model by using the previously formed model library on the detected signals. Embedded software algorithms and artificial intelligence competence are used as identification, classification method.
- the invention is capable of analyzing with its algorithms for systems that cannot be detected or identified, classified applying countermeasures according to the obtained signal characteristics, modulation type, and protocol. Additionally, it can record the signal segment and, when connected to a corporate or private network, send the unidentified signal cross section to the central software.
- the invention also comprises a central unit to keep wearable devices updated.
- the software contained in this unit enables the development of an identification, classification algorithm by analyzing the signal cross sections transmitted from the devices with artificial intelligence competence.
- the developed new identification, classification algorithms and other device updates can be sent to all devices via the central software.
- the system is kept up to date according to new UAV models, capabilities, behavior and communication technologies.
- the user can direction finding of the UAV by picking up the device and scanning in the air as soon as the UAV is detected.
- the user can follow the instructions on the device screen or the light, sound and vibration-based notifications on the device. By monitoring the change in intensity of these notifications during scanning, target detection can be made in the direction where the notification signal is maximum.
- the network function is activated and
- Users who determine the target direction using the directional antenna integrated on the device can estimate the target location with the AOA (Angle of Arrival) angle of incidence technique by sharing their current location information and target direction information with other users.
- AOA Angle of Arrival
- users can make location estimation using the TDOA (Time Difference of Arrival) arrival time difference technique, based on the delay of the incoming target signal compared to the GNSS reference clock.
- TDOA Time Difference of Arrival
- target location estimation can be made with the multilateration technique by using the range information from many users.
- the device on each user has standalone the functions of UAV detection, identification, classification and direction finding with directional antenna, jamming, spoofing and taking control with hacking.
- the hacked UAV can be landed to the desired location by controlling it with the command/control keypad on the device. From the warning and information screen, all functions, including but not limited to switching between menus, UAV detection, identification, classification warning, operation information, hacked UAV control, can be followed.
- UAV detection warning can be made with light, sound and vibration, and these warnings can be turned off if desired.
- countermeasure functions can also be performed with the directional antenna integrated into the device. In this way, the same tasks can be performed with lower RF power consumption. In addition, the possibility of friendly elements being affected by these broadcasts is reduced.
- the device can produce location, direction information and reference clock signals used for target location estimation with the integrated GNSS receiver, digital compass and reference clock generator.
- the invention eliminates security vulnerabilities that may arise as a result of malicious use of commercial/consumer or special production UAV platforms and provides protection against these threats at the personnel level.
- Figure 1 is a representative block diagram view of the system, which is subject of the invention.
- FIG. 2 is a flow diagram of the subject of the invention.
- FIG. 3 is a flow diagram of the central software unit.
- This invention is a wearable tactical Unmanned Aerial Vehicle (UAV) detection, identification, classification, spoofing, jamming and taking control system and it can detect activities by monitoring the spectrum in selected bands and the ISM band (2.4GHz, 5.8GHz, 433MHz, etc.) with its omnidirectional transceiver antenna (5) and directional transceiver antenna (6).
- the device can be operated in two basic modes.
- SDR Software Defined Radio
- UAV control can identify, classify UAV systems detected and defined by the algorithms and software on the device and inform the user about the system features.
- it can perform signal analysis for new model UAV systems or new frequencies that UAV systems use/will use, that is, for unidentified systems, and the user is informed if signal characteristics are detected. Spoofing, jamming can be applied for RC-Remote Control, Video, Telemetry, GNSS and other RF signals used by the UAV suitable for the system/signal features (protocol, modulation) reported to the user, and UAV control can be taken over.
- countermeasure can be provided with default/generic jamming or GNSS spoofing functions for RC-Remote Control, Video, Telemetry, GNSS signals.
- the user can terminate the function that he/she is applying at any time he/she desires.
- the system continues to operate in a cycle in accordance with the flow given in Figure 2.
- These functions are provided by the control unit (2), which has special algorithms developed for spectrum monitoring, embedded software and artificial neural networks, and algorithms and device software for detection, identification, classification and countermeasure.
- the navigation and timing unit (4) which comprises GNSS receiver, digital compass and reference clock generator equipment, forms data to determine the location of the target UAV. This data is shared with other devices via a defined protocol and wireless channel with network support function.
- the central unit (3) receives the data collected by the device and performs signal processing, classification, algorithm development and device updates. In addition, it enables the central unit user to form an algorithm based on the signal cross section by performing analysis with artificial intelligence capabilities for unidentified signals.
- control unit (2) For the received signal, whose direction is determined, it is first checked whether the control unit (2) is a predefined system with special algorithms, artificial intelligence and software capabilities. If it is a defined system, the features of the system are reported to the user. For the unidentified system, signal analysis is performed, signal properties are determined and the relevant signal cross section is recorded.
- the device generally consist of; a processor unit (1) has SDR (Software Defined Radio) whose processing, receiving, transmitting Radio Frequency (RF) signals, digital processing units (CPU, FPGA, DSP, etc.) and supporting peripherals that perform the functions of, a control unit (2), which comprises detection, identification, classification and countermeasure algorithms and device management software, an external central unit (3) for artificial intelligence-based algorithms and device updating, a navigation and timing unit with GNSS receiver, digital compass and reference clock generator (4), omnidirectional transceiver antenna (5), directional transceiver antenna (6).
- SDR Software Defined Radio
- RF Radio Frequency
- buttons (8) forturning on/off the device and device functions (jamming, spoofing, taking over UAV control, network support), frequency selection and adjusting the volume.
- Menu transitions and control of the hacked UAV are carried out via the keypad (9).
- Warning light, vibration and audio warning are provided on the information unit (10) for visual information in case of UAV detection.
- Selection and information in the menus are provided on the screen (11 ).
- Charging and data exchange with other devices are carried out through interfaces (12).
- the device comprises a replaceable, rechargeable internal battery (13).
- the processor unit (1) performs spectrum monitoring, signal analysis, detection, identification, classification and countermeasure functions with its SDR, digital processors, peripheral equipment and signal processing-specific algorithms and software provided by the control unit (2). Spectrum monitoring is carried out for detection, identification, classification and countermeasure by means of algorithms and device software running on the processor unit (1). It is carried out by the collaboration of the control unit (2) and processor units (1), which have algorithms and software running within the functions of spoofing, jamming and taking control.
- the central unit (3) is an externally running software that provides artificial intelligence-based central signal processing, classification, algorithm development and device updates functions. When the device is connected to the network, it can send the unidentified signal cross section on it to the central unit (3) in the direction of the flow in Figure 3, and if available, the device can receive updates and new algorithms from the central unit (3).
- the navigation and timing unit (4) comprises GNSS receiver, digital compass and reference clock generator hardware.
- the control unit (2) forms data to determine the location of the target UAV and shares it with other devices with the network support function.
- the omnidirectional transceiver antenna (5) which receives/transmits signals for detection/identification and countermeasure, is used for spectrum monitoring and omnidirectional spoofing, jamming and taking control functions.
- the directional transceiver antenna (6) receives and transmits signals for target direction determination and countermeasure functions (spoofing, jamming and taking control). New frequencies to be used in the operation area can be added with the expansion antenna input (7).
- the keypad (9) is used for switching between menus, other input operations and management of the hacked UAV.
- the information unit (10) forms warning lights, vibrations and audio warnings for visual information in case of UAV detection. Audio, visual and vibration are formed via the device, the intensity of which can be increased/decreased or turned off completely.
- the screen (11 ) enables selections to be made in the menus and to inform the personnel. Charging of the device battery (13) and integration of other external hardware units with the central software are carried out through interfaces (12).
- the battery (13) is rechargeable and replaceable.
- Devices operating in the same region can work together using AOA, TDOA, RSSI techniques to detect the location of the target once the user activates network support.
- the device is wearable and can be carried by a single personnel.
- the threat library can be updated both on the device and in the central unit (3) in line with new threats collected from the field by the devices.
- the threat library is constantly kept up to date using data received from the field, and the user device can receive new updates when connected to the network.
- Direction finding can be made for the detected UAV signals (RC-Remote Control, Video, Telemetry, etc.) using the directional transceiver antenna (6) integrated into the device.
- Direction determination is achieved by the user manually scanning the airspace where the device is located with the surface containing the directional transceiver antenna (6).
- the user can make an estimated location for the target UAV by sharing information on the basis of a defined RF channel and protocol over the omnidirectional antenna using the in-device SDR with the button (8) where network support is activated with other users in the same region.
- Users who determine the target direction by using a directional transceiver antenna (6) on the device can estimate the target position with the AOA (Angle of Arrival) angle of incidence technique by sharing their current location information and target direction information with other users via the defined RF channel.
- AOA Angle of Arrival
- the target signal coming to the users via the defined RF channel is transmitted through the control unit (2) and location estimation can be made using the TDOA (Time Difference of Arrival) arrival time difference technique, based on its delay compared to the GNSS reference time.
- an estimated range can be made by using RSSI (Received Signal Strength Indicator), the power levels of the signals of defined UAVs with known RF output power reaching the users and measured by the processor unit (1).
- RSSI Receiveived Signal Strength Indicator
- Target location estimation can be made with the range information received from a large number of users and the multilateration technique. It can identify model UAV systems defined by means of algorithms and device software running on the SDR and digital processors on the device and inform the user about the system features. In addition, it can perform signal analysis for new model UAV systems or new frequencies that UAV systems use/will use, that is, for unidentified systems, and the user is informed if signal characteristics are detected. Spoofing, jamming can be applied for RC-Remote Control, Video, Telemetry, GNSS and other RF signals used by the UAV, in accordance with the system/signal features (protocol, modulation) reported to the user, and UAV control can be taken over.
- model UAV systems defined by means of algorithms and device software running on the SDR and digital processors on the device and inform the user about the system features.
- signal analysis for new model UAV systems or new frequencies that UAV systems use/will use, that is, for unidentified systems, and the user is informed if signal characteristics are
- countermeasure can be provided with default/generic jamming or GNSS spoofing functions for RC-Remote Control, Video, Telemetry, GNSS signals.
- the user can terminate the function that he/she is applying by using the relevant button (8) whenever he/she wishes.
- the system has processing steps that occur in a cycle as shown in Figure 2. Additionally, the unidentified signal cross section can be recorded on the processor unit (1), and then when connected to the network, these records are transmitted to the central unit (3) with the algorithm and device software (capabilities) for analysis. In addition, the identities of the defined systems are recorded on the processor unit (1 ) along with time and location information.
- the user can make a function selection before the operation regarding the countermeasure (spoofing, jamming, taking control with hacking) that the device will apply after detection.
- the countermeasure spoofing, jamming, taking control with hacking
- autonomous mode is selected at device startup, the selected functions can be applied without user intervention.
- autonomous mode the device has the ability to provide all functions in manual mode, depending on the user's choice.
- informing with sound, light and vibration via the information unit (10) can be performed.
- the user can perform countermeasure functions such as jamming, spoofing, and taking control of the UAV (hacking) in line with the tactical operation decision, based on the warning received, by using the buttons (8) on the device.
- the buttons (8) on the device There is a keypad (9) on the device for menu transitions or management of the hacked UAV. The user can use the keypad (9) and buttons (8) to monitor the spectrum at different frequencies and to turn the device and functions on and off.
- the device has a processor unit (1 ) comprising SDR (Software Defined Radio), which performs the functions of receiving, transmitting and processing Radio Frequency (RF) signals, digital processing units (CPU, FPGA, DSP, etc.) and peripherals that support them and a control unit (1) comprising specialized system operation algorithm and software.
- SDR Software Defined Radio
- RF Radio Frequency
- Unidentified signals can be analyzed externally by artificial intelligence capabilities in the central unit (3) located at the center, and new algorithms can be sent from the center to all devices via the network connection to the interface (12). If the user gives approval via the interface (12), unidentified signal cross sections are transferred to the central unit. A new algorithm is developed for these signal cross sections analyzed by the artificial intelligence-based central unit (3), and when the devices are connected to the network, these updates are uploaded to the device, depending on the user approval. Thus, by keeping the system constantly updated against new UAV threats, all devices can provide effective protection against new UAV systems.
Landscapes
- Engineering & Computer Science (AREA)
- Aviation & Aerospace Engineering (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- General Engineering & Computer Science (AREA)
- Alarm Systems (AREA)
- Control Of Position, Course, Altitude, Or Attitude Of Moving Bodies (AREA)
- Burglar Alarm Systems (AREA)
Abstract
The invention relates to a wearable spectrum monitoring, UAV detection, identification, classification and countermeasure system that can be carried by personnel, which performs wearable tactical UAV (Unmanned Aerial Vehicle) detection, identification, spoofing, jamming and taking control (with hacking) operations.
Description
UAV COUNTERMEASURE SYSTEM
Technical Field
The invention relates to a wearable spectrum monitoring, UAV detection, identification, classification and countermeasure system that can be carried by personnel, which performs wearable tactical UAV (Unmanned Aerial Vehicle) detection, identification, classification, spoofing, jamming and taking control (with hacking) operations.
The State of Art
Today, detection and precautionary processes are important for UAVs (also used to include the word drone) and etc., which are used to ensure security in the military field. In the present art, UAV countermeasure systems are in the form of fixed stations or mobile station on the vehicle, and do not include all the detection, identification, classification, target location finding, direction finding and countermeasure features that are wearable by personnel. The applications detected on the subject as a result of the research are given below.
The application numbered TR2017/11161 comprises a jammer capability that allows UAVs, which have the ability to return to the starting point of flight when the connection with the remote control is lost, by taking advantage of this feature and sending them back to the place where they started the flight, developed to interrupt mobile phone and Wi-Fi signals in areas requiring special protection and also to prevent UAVs from flying over the protected area.
The application numbered US10915099B1 relates to a system for detecting and neutralizing a UAV that comprises a sensing antenna array and command control signal configured to detect the UAV in a 360-degree area. The system focuses on detecting signals in the 2.4GHz band and video signals.
The applications numbered US11190233B2 and US11442141 B2 comprise the detection of aircraft by the technological method used by sampling the RF signal.
The application numbered KR102054089B1 comprises a signal detector configured to detect wireless signals transmitted between a remote control unit and a remote controlled vehicle; a feature extractor configured to extract signal features from detected wireless
signals; a classifier configured to determine whether the detected wireless signal and detected radio signals based on signal characteristics correspond to a known or unknown radio protocol; a remote control detected based on at least one of the classification and remote sensing data of the detected radio signals; a threat analyzer configured to determine whether said vehicle is a threat and an intrusion detection system for a remote control system using an unknown wireless protocol based on extracted signal characteristics.
The applications numbered KR102155284B1 and US11074822B2 comprise the feature of detecting UAVs in a certain region (for example, a no-fly zone) and printing a false GNSS signal to land the detected UAVs in a different region, that is, spoofing.
Considering said applications, the deficiencies in the present art are described below;
• Applications in the present art have the characteristics of fixed stations or mobile stations and do not have wearable features.
• Non-wearable large-scale systems have high costs, high power consumption and are widely difficult to install and use in the operation field.
• UAV capabilities, behaviors and communication technologies are also developing rapidly with the development of technology. For example, for a UAV with a return-to-home feature, only cutting off communication with the command center is not enough, this feature can be configured differently in different UAV manufacturers and models. For example, if the threatening UAV is disconnected from the command control, it may land where it is instead of returning home, remain suspended in the air, and when its battery runs out, it may fall to the ground uncontrollably, causing loss of life and property. Besides, due to the developing UAV features, jamming alone is not enough to neutralize the UAV system, it is also necessary to use spoofing and taking control countermeasure.
• In addition, the ability of a wearable hardware to estimate the target direction with an integrated directional antenna and network support feature allows it to be used for jamming, spoofing and control tasks with lower power consumption, that is, for a longer period of time.
Therefore, it appears that state of the art countermeasure systems are insufficient to protect personnel in the field who work in remote locations and have limited access to energy, in the face of increasing and diversifying UAV threats. It has been determined
that the use of wearable technologies has become necessary for an effective defense against attacks using low-cost mini-UAVs, which are easily accessible to consumers.
As a result, it has become necessary to make innovations in the relevant technical field due to the negativities described above and the inadequacy of existing solutions.
Object of the Invention
The invention has been formed for the aim of defense against newly emerging threats and aims to solve the above-mentioned negativities.
The invention is a wearable tactical UAV (Unmanned Aerial Vehicle) detection, identification, classification, spoofing, jamming and control system that can be carried by personnel and has the feature of operating with battery. Each user can protect the area within a certain range with the device on them and prevent UAV flights in this area.
This invention enables the region where personnel are located to be scanned at a certain range with the omnidirectional antenna it contains.
The invention can perform spectrum analysis based on SDR (Software Defined Radio) and detect the signals in the ISM bands (2.4GHz, 5.8GHz, 433MHz, etc.) used by commercial and special production UAVs, the signals of special production UAVs operating in different frequency bands.
The invention can identify the UAV brand and model by using the previously formed model library on the detected signals. Embedded software algorithms and artificial intelligence competence are used as identification, classification method.
The invention is capable of analyzing with its algorithms for systems that cannot be detected or identified, classified applying countermeasures according to the obtained signal characteristics, modulation type, and protocol. Additionally, it can record the signal segment and, when connected to a corporate or private network, send the unidentified signal cross section to the central software.
The invention also comprises a central unit to keep wearable devices updated. The software contained in this unit enables the development of an identification, classification algorithm by analyzing the signal cross sections transmitted from the devices with artificial intelligence competence. The developed new identification, classification algorithms and other device updates can be sent to all devices via the central software.
Thus, the system is kept up to date according to new UAV models, capabilities, behavior and communication technologies.
In the invention, with the directional antenna feature integrated into the device, the user can direction finding of the UAV by picking up the device and scanning in the air as soon as the UAV is detected. During the detection process, the user can follow the instructions on the device screen or the light, sound and vibration-based notifications on the device. By monitoring the change in intensity of these notifications during scanning, target detection can be made in the direction where the notification signal is maximum.
In the invention, if the UAV that poses a threat is detected by more than one device in the same region, the network function is activated and;
• Users who determine the target direction using the directional antenna integrated on the device can estimate the target location with the AOA (Angle of Arrival) angle of incidence technique by sharing their current location information and target direction information with other users.
• As the second method, users can make location estimation using the TDOA (Time Difference of Arrival) arrival time difference technique, based on the delay of the incoming target signal compared to the GNSS reference clock.
• As the third method, after making an estimated range based on the RSSI (Received Signal Strength Indicator) power levels of the signals of defined UAVs with known RF output power reaching the users, target location estimation can be made with the multilateration technique by using the range information from many users.
In the invention, the device on each user has standalone the functions of UAV detection, identification, classification and direction finding with directional antenna, jamming, spoofing and taking control with hacking. The hacked UAV can be landed to the desired location by controlling it with the command/control keypad on the device. From the warning and information screen, all functions, including but not limited to switching between menus, UAV detection, identification, classification warning, operation information, hacked UAV control, can be followed. UAV detection warning can be made with light, sound and vibration, and these warnings can be turned off if desired.
In the invention, in addition to target UAV detection, countermeasure functions can also be performed with the directional antenna integrated into the device. In this way, the same tasks can be performed with lower RF power consumption. In addition, the possibility of friendly elements being affected by these broadcasts is reduced. The device can produce location, direction information and reference clock signals used for target location estimation with the integrated GNSS receiver, digital compass and reference clock generator.
The invention eliminates security vulnerabilities that may arise as a result of malicious use of commercial/consumer or special production UAV platforms and provides protection against these threats at the personnel level.
The structural and characteristic features and all the advantages of the invention will be more clearly understood by means of drawings given below and the detailed description written with references to these drawings, and therefore the evaluation needs to be made by taking these drawings and the detailed description into consideration.
Drawings Assisting Understanding of The Invention
Figure 1, is a representative block diagram view of the system, which is subject of the invention.
Figure 2, is a flow diagram of the subject of the invention.
Figure 3, is a flow diagram of the central software unit.
Description of Piece References
1. Processor unit
2. Control unit
3. Central unit
4. Navigation and timing unit
5. Omnidirectional transceiver antenna
6. Directional transceiver antenna
7. Expansion antenna input
8. Button
9. Keypad
10. Information unit
11 . Screen
12. Interface
13. Battery
Detailed Description of the Invention
In this detailed description, the preferred embodiments of the UAV countermeasure system, which is the subject of the invention, are described only for a better understanding of the subject.
This invention is a wearable tactical Unmanned Aerial Vehicle (UAV) detection, identification, classification, spoofing, jamming and taking control system and it can detect activities by monitoring the spectrum in selected bands and the ISM band (2.4GHz, 5.8GHz, 433MHz, etc.) with its omnidirectional transceiver antenna (5) and directional transceiver antenna (6). The device can be operated in two basic modes.
The device to the wearable UAV countermeasure system, which is subject of the invention comprises at least one omnidirectional transceiver antenna (5) for omnidirectional detection of UAV RF signals and omnidirectional countermeasure, at least one directional transceiver antenna (6), which detects and transmits the target direction for the detected UAV signals, a processor unit (1), which recognizes the signals it receives by analyzing them with digital signal processing techniques, and applies spoofing, jamming and taking control functions according to the determined signal characteristics, comprises SDR (Software Defined Radio), which performs the functions of receiving, transmitting and processing Radio Frequency (RF) signals, digital processing units (CPU, FPGA, DSP, etc.) and peripheral units that support them.
It can identify, classify UAV systems detected and defined by the algorithms and software on the device and inform the user about the system features. In addition, it can perform signal analysis for new model UAV systems or new frequencies that UAV systems use/will use, that is, for unidentified systems, and the user is informed if signal characteristics are detected. Spoofing, jamming can be applied for RC-Remote Control, Video, Telemetry, GNSS and other RF signals used by the UAV suitable for the
system/signal features (protocol, modulation) reported to the user, and UAV control can be taken over. In case that the signal characteristics cannot be detected, countermeasure can be provided with default/generic jamming or GNSS spoofing functions for RC-Remote Control, Video, Telemetry, GNSS signals. The user can terminate the function that he/she is applying at any time he/she desires. The system continues to operate in a cycle in accordance with the flow given in Figure 2. These functions are provided by the control unit (2), which has special algorithms developed for spectrum monitoring, embedded software and artificial neural networks, and algorithms and device software for detection, identification, classification and countermeasure.
The navigation and timing unit (4), which comprises GNSS receiver, digital compass and reference clock generator equipment, forms data to determine the location of the target UAV. This data is shared with other devices via a defined protocol and wireless channel with network support function.
It contains buttons (8) where settings for jamming, spoofing, taking control, and network support activation are performed. The central unit (3) receives the data collected by the device and performs signal processing, classification, algorithm development and device updates. In addition, it enables the central unit user to form an algorithm based on the signal cross section by performing analysis with artificial intelligence capabilities for unidentified signals.
For the received signal, whose direction is determined, it is first checked whether the control unit (2) is a predefined system with special algorithms, artificial intelligence and software capabilities. If it is a defined system, the features of the system are reported to the user. For the unidentified system, signal analysis is performed, signal properties are determined and the relevant signal cross section is recorded.
The device generally consist of; a processor unit (1) has SDR (Software Defined Radio) whose processing, receiving, transmitting Radio Frequency (RF) signals, digital processing units (CPU, FPGA, DSP, etc.) and supporting peripherals that perform the functions of, a control unit (2), which comprises detection, identification, classification and countermeasure algorithms and device management software, an external central unit (3) for artificial intelligence-based algorithms and device updating, a navigation and timing unit with GNSS receiver, digital compass and reference clock generator (4), omnidirectional transceiver antenna (5), directional transceiver antenna (6). In addition, there are expansion antenna inputs (6) to support different frequency bands. There are
different buttons (8) forturning on/off the device and device functions (jamming, spoofing, taking over UAV control, network support), frequency selection and adjusting the volume. Menu transitions and control of the hacked UAV are carried out via the keypad (9). Warning light, vibration and audio warning are provided on the information unit (10) for visual information in case of UAV detection. Selection and information in the menus are provided on the screen (11 ). Charging and data exchange with other devices are carried out through interfaces (12). The device comprises a replaceable, rechargeable internal battery (13).
The processor unit (1) performs spectrum monitoring, signal analysis, detection, identification, classification and countermeasure functions with its SDR, digital processors, peripheral equipment and signal processing-specific algorithms and software provided by the control unit (2). Spectrum monitoring is carried out for detection, identification, classification and countermeasure by means of algorithms and device software running on the processor unit (1). It is carried out by the collaboration of the control unit (2) and processor units (1), which have algorithms and software running within the functions of spoofing, jamming and taking control. The central unit (3) is an externally running software that provides artificial intelligence-based central signal processing, classification, algorithm development and device updates functions. When the device is connected to the network, it can send the unidentified signal cross section on it to the central unit (3) in the direction of the flow in Figure 3, and if available, the device can receive updates and new algorithms from the central unit (3).
The navigation and timing unit (4) comprises GNSS receiver, digital compass and reference clock generator hardware. The control unit (2) forms data to determine the location of the target UAV and shares it with other devices with the network support function.
The omnidirectional transceiver antenna (5), which receives/transmits signals for detection/identification and countermeasure, is used for spectrum monitoring and omnidirectional spoofing, jamming and taking control functions. The directional transceiver antenna (6) receives and transmits signals for target direction determination and countermeasure functions (spoofing, jamming and taking control). New frequencies to be used in the operation area can be added with the expansion antenna input (7).
On the device, there is;
Device on/off,
• Jamming function,
• Spoofing function,
• UAV taking control (hacking) function,
• Network support activation,
• Frequency setting,
• Buttons (8) for adjusting the warning volume
The keypad (9) is used for switching between menus, other input operations and management of the hacked UAV. The information unit (10) forms warning lights, vibrations and audio warnings for visual information in case of UAV detection. Audio, visual and vibration are formed via the device, the intensity of which can be increased/decreased or turned off completely.
The screen (11 ) enables selections to be made in the menus and to inform the personnel. Charging of the device battery (13) and integration of other external hardware units with the central software are carried out through interfaces (12). The battery (13) is rechargeable and replaceable.
Devices operating in the same region can work together using AOA, TDOA, RSSI techniques to detect the location of the target once the user activates network support.
The device is wearable and can be carried by a single personnel. The threat library can be updated both on the device and in the central unit (3) in line with new threats collected from the field by the devices.
There are spoofing, jamming and taking control functions on the same device.
Centrally, the threat library is constantly kept up to date using data received from the field, and the user device can receive new updates when connected to the network.
All features of the invention can be used together in a product, or they can be offered piece by piece as different product versions.
In case of selecting manual mode (selected using the keypad (9) from the device menu)
Direction finding can be made for the detected UAV signals (RC-Remote Control, Video, Telemetry, etc.) using the directional transceiver antenna (6) integrated into the device. Direction determination is achieved by the user manually scanning the airspace where the device is located with the surface containing the directional transceiver antenna (6). After detecting the target direction, the user can make an estimated location for the target UAV by sharing information on the basis of a defined RF channel and protocol over the omnidirectional antenna using the in-device SDR with the button (8) where network support is activated with other users in the same region. Users who determine the target direction by using a directional transceiver antenna (6) on the device can estimate the target position with the AOA (Angle of Arrival) angle of incidence technique by sharing their current location information and target direction information with other users via the defined RF channel. As the second method, the target signal coming to the users via the defined RF channel is transmitted through the control unit (2) and location estimation can be made using the TDOA (Time Difference of Arrival) arrival time difference technique, based on its delay compared to the GNSS reference time. As a third method, an estimated range can be made by using RSSI (Received Signal Strength Indicator), the power levels of the signals of defined UAVs with known RF output power reaching the users and measured by the processor unit (1). Target location estimation can be made with the range information received from a large number of users and the multilateration technique. It can identify model UAV systems defined by means of algorithms and device software running on the SDR and digital processors on the device and inform the user about the system features. In addition, it can perform signal analysis for new model UAV systems or new frequencies that UAV systems use/will use, that is, for unidentified systems, and the user is informed if signal characteristics are detected. Spoofing, jamming can be applied for RC-Remote Control, Video, Telemetry, GNSS and other RF signals used by the UAV, in accordance with the system/signal features (protocol, modulation) reported to the user, and UAV control can be taken over. If signal characteristics cannot be detected, countermeasure can be provided with default/generic jamming or GNSS spoofing functions for RC-Remote Control, Video, Telemetry, GNSS signals. The user can terminate the function that he/she is applying by using the relevant button (8) whenever he/she wishes. The system has processing steps that occur in a cycle as shown in Figure 2. Additionally, the unidentified signal cross section can be recorded on the processor unit (1), and then when connected to the network, these records are transmitted to the central unit (3) with the algorithm and device software
(capabilities) for analysis. In addition, the identities of the defined systems are recorded on the processor unit (1 ) along with time and location information.
In case that autonomous mode is selected (using the keypad (9) from the device menus)
The user can make a function selection before the operation regarding the countermeasure (spoofing, jamming, taking control with hacking) that the device will apply after detection. If autonomous mode is selected at device startup, the selected functions can be applied without user intervention. In autonomous mode, the device has the ability to provide all functions in manual mode, depending on the user's choice.
In case of UAV detection, informing with sound, light and vibration via the information unit (10) can be performed. After the UAV detection and identification process, the user can perform countermeasure functions such as jamming, spoofing, and taking control of the UAV (hacking) in line with the tactical operation decision, based on the warning received, by using the buttons (8) on the device. There is a keypad (9) on the device for menu transitions or management of the hacked UAV. The user can use the keypad (9) and buttons (8) to monitor the spectrum at different frequencies and to turn the device and functions on and off. There is a replaceable, rechargeable internal battery (13) on the device. In order to provide all these functions, the device has a processor unit (1 ) comprising SDR (Software Defined Radio), which performs the functions of receiving, transmitting and processing Radio Frequency (RF) signals, digital processing units (CPU, FPGA, DSP, etc.) and peripherals that support them and a control unit (1) comprising specialized system operation algorithm and software.
Unidentified signals can be analyzed externally by artificial intelligence capabilities in the central unit (3) located at the center, and new algorithms can be sent from the center to all devices via the network connection to the interface (12). If the user gives approval via the interface (12), unidentified signal cross sections are transferred to the central unit. A new algorithm is developed for these signal cross sections analyzed by the artificial intelligence-based central unit (3), and when the devices are connected to the network, these updates are uploaded to the device, depending on the user approval. Thus, by keeping the system constantly updated against new UAV threats, all devices can provide effective protection against new UAV systems.
Claims
1. A wearable UAV countermeasure system, characterized by comprising;
• a device comprising the following, o at least one omnidirectional transceiver antenna (5) for omnidirectional detection of UAV RF signals and omnidirectional countermeasure, o at least one directional transceiver antenna (6), which detects target direction for detected UAV signals and takes countermeasure, o a processor unit (1), which performs the functions of receiving, transmitting and processing RF signals and has SDR, digital processing units and supporting peripheral units, o a control unit (2), which determines the signal cross section by analyzing the signals it receives with digital processing and applies spoofing, jamming and taking control functions according to the determined signal cross section, o a navigation and timing unit (4), which includes GNSS receiver, digital compass and reference clock generator equipment, forms data to determine the location of the target UAV and shares it with other devices with the network support function, o at least one button (8) where jamming, spoofing, taking control, network support activation settings are made,
• a central unit (3), which receives the data collected by the device, performs analysis for unidentified signals, forms an algorithm according to the signal cross section and performs device updates.
2. A wearable UAV countermeasure system according to claim 1 , characterized by comprising; said device comprises at least one omnidirectional transceiver antenna (5) that receives/transmits signals for detection/identification, classification and countermeasure.
3. A wearable UAV countermeasure system according to claim 1 , characterized by comprising; said device comprises at least one directional transceiver antenna (6) that receives/transmits signals for detection/identification, classification and countermeasure and determines target direction.
4. A wearable UAV countermeasure system according to claim 1 , characterized by comprising; said device comprises at least one expansion antenna input (7) that allows adding new frequencies.
5. A wearable UAV countermeasure system according to claim 1 , characterized by comprising; said device comprises a keypad (9) that enables switching between menus, other input operations and management of the hacked UAV.
6. A wearable UAV countermeasure system according to claim 1 , characterized by comprising; said device comprises an information unit (10) that forms warning light, vibration and audio warnings for visual information in case of UAV detection.
7. A wearable UAV countermeasure system according to claim 1 , characterized by comprising; said device comprises a screen (11) where selections are made from the menus and the personnel is informed.
8. A wearable UAV countermeasure system according to claim 1 , characterized by comprising; said device comprises a rechargeable and replaceable battery (13).
9. A wearable UAV countermeasure system according to claim 1 , characterized by comprising; said device comprises the control unit (2) that receives the target signal from the transceiver antennas in manual mode and makes location estimation using the TDOA arrival time difference technique, based on the delay of the signal according to the GNSS reference time provided by the navigation and timing unit (4).
10. A wearable UAV countermeasure system according to claim 1 , characterized in that; it activates the user's network support of devices located in the same region and detects the location of the target using AOA, TDOA, RSSI techniques.
11. A wearable UAV countermeasure system according to claim 1 , characterized by comprising; said device comprises a button (8) that enables the selection of jamming, spoofing, taking control (with hacking) UAV countermeasure functions in
line with the tactical operation decision in case of UAV detection, and network support activation and device mode selection functions.
12. A wearable UAV countermeasure system according to claim 1 , characterized by comprising; the central unit (3) located externally in the center, which transmits unidentified signals to all devices via the network connection to the interface (12).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TR2023003097 | 2023-03-21 | ||
TR2023/003097 TR2023003097A2 (en) | 2023-03-21 | COUNTER-UAV MEASURES SYSTEM |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2024196331A2 true WO2024196331A2 (en) | 2024-09-26 |
WO2024196331A3 WO2024196331A3 (en) | 2024-10-17 |
Family
ID=92842472
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/TR2024/050266 WO2024196331A2 (en) | 2023-03-21 | 2024-03-18 | Uav countermeasure system |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2024196331A2 (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9715009B1 (en) * | 2014-12-19 | 2017-07-25 | Xidrone Systems, Inc. | Deterent for unmanned aerial systems |
WO2018135522A1 (en) * | 2017-01-19 | 2018-07-26 | 日本電気株式会社 | Mobile body control system, mobile body control device, mobile body control method, and recording medium |
RU2769037C2 (en) * | 2020-06-26 | 2022-03-28 | Российская Федерация, от имени которой выступает Федеральное государственное казенное учреждение "Войсковая часть 68240" | Multifunctional complex of means of detection, tracking and radio countermeasures to the application of small-class unmanned aerial vehicles |
KR102670206B1 (en) * | 2021-06-22 | 2024-05-29 | 주식회사 삼정솔루션 | Jammer for small uav interlocked with hard-kill |
-
2024
- 2024-03-18 WO PCT/TR2024/050266 patent/WO2024196331A2/en unknown
Also Published As
Publication number | Publication date |
---|---|
WO2024196331A3 (en) | 2024-10-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220319182A1 (en) | Systems, methods, apparatuses, and devices for identifying, tracking, and managing unmanned aerial vehicles | |
US10025993B2 (en) | Systems, methods, apparatuses, and devices for identifying and tracking unmanned aerial vehicles via a plurality of sensors | |
US10317506B2 (en) | Systems, methods, apparatuses, and devices for identifying, tracking, and managing unmanned aerial vehicles | |
US20240015267A1 (en) | Systems, methods, apparatuses, and devices for radar-based identifying, tracking, and managing of unmanned aerial vehicles | |
US10025991B2 (en) | Systems, methods, apparatuses, and devices for identifying, tracking, and managing unmanned aerial vehicles | |
US11022407B2 (en) | UAV defense system | |
US11488385B2 (en) | Identifying, tracking, and disrupting unmanned aerial vehicles | |
CA3085049C (en) | Drone defense system | |
US8254847B2 (en) | Distributed wireless communications for tactical network dominance | |
EP3610633B1 (en) | System and method for detecting and controlling contraband devices | |
GB2559475A (en) | Radio control transmissions | |
KR20180043912A (en) | System for cooperative anti-drone and method for cooperation control of anti-drones | |
WO2020236328A2 (en) | Uas detection and negation | |
US20220317275A1 (en) | Methods and systems for detecting and passively monitoring communications of an unmanned aerial vehicle | |
US12033524B2 (en) | Systems and methods for detecting, monitoring, and mitigating the presence of unauthorized drones | |
Sun et al. | Drone privacy shield: A WiFi based defense | |
US20230043724A1 (en) | Identifying, tracking, and disrupting unmanned aerial vehicles | |
US20220329346A1 (en) | Processing information related to one or more monitored areas | |
WO2024196331A2 (en) | Uav countermeasure system | |
TR2023003097A2 (en) | COUNTER-UAV MEASURES SYSTEM | |
Intwala et al. | System to capture WiFi based Drones using IoT | |
WO2020065454A1 (en) | Apparatus, system, and method of jamming an unmanned aerial vehicle | |
KR20240129286A (en) | Drone jamming device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 24775316 Country of ref document: EP Kind code of ref document: A2 |