Unmanned Aerial Vehicle Disruption System Using Spoofing and Jamming Techniques, with AES-256 Encryption
DOI:
https://doi.org/10.58299/mica.v8i16.106Keywords:
Anechoic Chamber, LoRa (Long Range), Software-Defined Radio (SDR), Spectral Analysis, TelemetryAbstract
The increasing use of Unmanned Aerial Vehicles (UAVs) in civil and military applications has driven the need for efficient detection and monitoring systems. This work presents an innovative system based on LoRa (Long Range) technology, designed for the detection and tracking of UAVs. Using LILYGO TTGO LoRa32 915 MHz V1.6.1 modules equipped with SX1276 transceivers and ESP32 microcontrollers, the system operates under a point-to-point (P2P) architecture without reliance on LoRaWAN infrastructure, optimizing energy consumption and maximizing operational autonomy. AES-256 encryption was implemented to ensure data integrity and confidentiality, mitigating risks of interception and data tampering. The system was evaluated in both controlled and operational environments, demonstrating high performance across key metrics such as effective communication range, packet error rate, transmission latency, and resistance to electromagnetic interference. The results validate its technical feasibility and highlight its potential for critical applications in surveillance and defense.
References
Amna, M., Akram, W., Li, G., Akram, M. Z., Faheem, M., Omar, M. M., & Hassan, M. G. (2025). Machine vision-based automatic fruit quality detection and grading. Frontiers of Agricultural Science and Engineering, 12(2), 274–287. https://doi.org/10.15302/J-FASE-2023532
Arroyo, P., Herrero, J. L., Lozano, J., & Montero, P. (2022). Integrating LoRa-Based Communications into Unmanned Aerial Vehicles for Data Acquisition from Terrestrial Beacons. Electronics, 11(12), 1-11. https://doi.org/10.3390/electronics11121865
Barker, E., & Mouha, N. (2017). Recommendation for the triple data encryption algorithm (TDEA) block cipher. NIST Special Publication 800-67 Rev. 2, 1–25. https://doi.org/10.6028/NIST.SP.800-67r2.
Bhowmick, J., Singh, A., Gupta, H., & Nallanthighal, R. (2021, 4–6 febrero). A novel approach to computationally lighter GNSS-denied UAV navigation using monocular camera [Ponencia]. 2021 7th International Conference on Automation, Robotics and Applications (ICARA), Prague, Czech Republic. https://doi.org/10.1109/ICARA51699.2021.9376432
Caparra, G., Wullems, C., & Ioannides, R. T. (2017, 14–16 diciembre). An autonomous GNSS anti-spoofing technique [Ponencia]. Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC), Noordwijk, The Netherlands. https://doi.org/10.1109/NAVITEC.2017.8332624
Guevara-Bonilla, M., Meza-Leandro, A. S., Esquivel-Segura, E. A., Arias-Aguilar, D., Tapia-Arenas, A., & Masís-Meléndez, F. (2020). Uso de vehículos aéreos no tripulados (VANT’s) para el monitoreo y manejo de los recursos naturales: una síntesis. Revista Tecnología en Marcha, 33(4), 77–88. https://doi.org/10.18845/tm.v33i4.4528
Kalantari, A., & Larsson, E. G. (2020). Statistical test for GNSS spoofing attack detection by using multiple receivers on a rigid body. Journal on Advances in Signal Processing, 2020(8), 1-16. https://doi.org/10.1186/s13634-020-00667-1
Kuusniemi, H., Airos, M., Bhuiyan, M. Z. H., & Kröger, T. (2012). GNSS jammers: How vulnerable are consumer grade satellite navigation receivers? European Journal of Navigation, 10(2), 14–21. https://www.researchgate.net/profile/Heidi-Kuusniemi/publication/230751479_GNSS_jammers_how_vulnerable_are_consumer_grade_satellite_navigation_receivers/links/0fcfd50c9d662ab933000000/GNSS-jammers-how-vulnerable-are-consumer-grade-satellite-navigation-receivers.pdf
Liberatori, M. C. (2006). Desarrollo de encriptado AES en FPGA [Tesis de maestría, Universidad Nacional de La Plata]. Repositorio Institucional de la UNLP. https://doi.org/10.35537/10915/4101
Motella, B., Savasta, S., Margaria, D., & Dovis, F. (2010). A method to assess robustness of GPS C/A code in presence of CW interferences. International Journal of Navigation and Observation, 2010, 1–8. https://doi.org/10.1155/2010/294525
Shakhatreh, H., Sawalmeh, A. H., Al-Fuqaha, A., Dou, Z., Almaita, E., Khalil, I., Othman, N. S., Khreishah, A., & Guizani, M. (2019). Unmanned aerial vehicles: A survey on civil applications and key research challenges. IEEE Access, 7, 48572–48634. https://doi.org/10.1109/ACCESS.2019.2909530
Zidane, Y., Silva, J. S., & Tavares, G. (2024). Jamming and spoofing techniques for drone neutralization: An experimental study. Drones, 8(12), 1-18. https://doi.org/10.3390/drones8120743