At present, the control of the UAV more than the use of radio communication technology, through the target UAV to launch high-power interference signal, the control signal to suppress, you can force the UAV landing or return.
There are many companies in this country to carry out research and development, and achieved remarkable results, such as Xiamen, the United States and Asia Park, Shanghai, Hong Electronics and other high-tech companies have introduced a portableanti-man-machine gun, in some technical indicators even more than DroneDefender electron gun. For example, in the effective interference distance, Shanghai Houhong electronic products reached 500 to 2000 meters.
At present, under normal circumstances the vast majority of consumer-class UAVs will be preferred GPS navigation for flight control, and civilian GPS signal is non-encrypted, which left the available space.
The main principle of GPS spoofing is to send false geographical coordinates to the control system of the UAV, thus controlling the navigation system and inducing the UAV to fly to the wrong location. GPS signals can be generated by the generator, can also be recorded in advance and then replay. As the UAV GPS signal is always the signal of the strongest signal source prevail, so the ground artificial GPS signal as long as the intensity is large enough, you can cover the real GPS signal from space, so as to deceive the UAV GPS receiver module. At present, each country has a no-fly zone in the core area, many UAV manufacturers in the UAV built-in firmware was set in the no-fly zone UAV can not take off, even if the no-fly zone will reach Automatic landing.
Therefore, as long as the ground man-made GPS signal will be simulated as the geographical location of the no-fly zone coordinates, you can force the UAV landing on their own. At the 2015 World Hacking Conference on DEFCON23, the 360 security team demonstrated the GPS spoofing of unmanned aerial vehicles and successfully landed a flying unmanned aerial vehicle on the ground.
Now, the control signals used by UAVs are mostly in the conventional civil frequency bands such as 1.2GHz, 2.4GHz, 5.8GHz, and with the rapid development of open source hardware such as Arduino and raspberry, and the popularity of software radio (SDR) technology. You can also use the hardware purchased from the network and the software source code from the forum to simulate the remote control to send control signals to the UAV, and cover the real remote control signal, in order to obtain control of the UAV. In 2015, GeekPwn intelligent equipment security contest opening project, from Tencent's security team through this method successfully hijacked a flight of the Xinjiang Uygur 3 UAV, the following year the CCTV "3.15 party" also The presentation was reported and received wide attention. Subsequently, the company on the official website of the Xinjiang openly recognized the loopholes, and related products were upgraded to repair.