Chapter 13
Chapter 13
The student will learn about the data-link function of the UAS which allows for bi-directional
communication and data transmissions between UAV and its ground station. The Data Link is
a vital component of an UAS. The student will learn the respective functions of each compo-
nent part and considerations are necessary and how to evaluate their importance when devel-
oping a UAS. While the focus of the lesson will be on military applications, the considerations
will be equally important for those designing and deploying UAS for civilian purposes. While
the design of the Datalink must have requisite attributes that allow the system to function as
intended in various environments globally, it must be able to do so securely and effectively.
Issues such as Data Link security, interception, deception and signal latency are all attributes
that must be balanced to achieve fast and secure data communications between the compo-
nents of the UAS.
What are the Types of UAV’s and how are they Categorized?
UAV’s are most often divided into four categories based upon their mission duration and oper-
ational radius.
• High Altitude, Long Endurance (“HALE”) most often deployed for reconnaissance, inter-
ception or attack;
• Medium altitude, moderate range most often used for reconnaissance and combat effect
assessment;
• Low cost, short range small UAV’s. (See Figure 13-1.)
There are four essential communication and data processing operations the UAS must be able
to efficiently and effectively carry out. These functions are vital to the ability of the remote
operator or autonomous operation system (auto-pilot) to immediately issue a command, have
it processed and executed and send feedback to the operator or auto-pilot confirming its exe-
cution by the UAV.
Source: Jang, C. (2017). Taking Drones to The Next Level – Cooperative Distributed Unmanned –
Aerial- Vehicular Networks for Small Drones and Mini Drones. IEEE Vehicular Technology Maga-
zine, Volume 12, Issue 3, pp. 73-82.
No matter the category of UAV, the UAS must at a minimum have the capability of the remote
operator having the ability to communicate data commands to the UAV wirelessly and the UAV
in turn, must be able to receive data, process commands and transmit sensor, avionic and per-
formance data which then must be transmitted back to the ground station all of which must be
safely and securely transmitted via wireless radio frequency communication.
When designing, developing and deploying UAS, there are many considerations that are vital
to the successful development and robust deployment for a given application. At its core an
unmanned system is designed to operate remotely in theatre by a pilot located a few feet or, as
in military applications thousands of miles away.
The Data-Link is the pathway by which the UAV communicates with the ground station and
operator as well as how the operator send commands to the UAV to control the its mission,
evaluate changing threat vectors, navigate, respond to terrain and atmospheric condition dur-
ing the mission and respond thereto as well as control intelligence gathering and in military
applications, payload delivery.
The challenges presented to the UAS designer, especially when it comes to the Data-Link is
how to maximize the strength of the Data-Link signal while maintaining the security of the data
transmitted while protecting against possible countermeasures and threats including, but not
limited to Data Jamming (“DJ), Data or Signal Deception and Anti-Radiation Munitions (“ARM”)
R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, W.D. Lonstein, C. Carter, and J.P. Hood | 279
Figure 13-2 Remote-Controlled Attack UAS, MQ-9
Source: Deadliest Unmanned Killing Machines in USA Arsenal. (January 01, 2011). Retrieved from
https://tarwa.blogspot.com/2011/01/deadliest-unmanned-killing-machines-in.htm
All essential functions required of the UAS Data- Link communication system are:
• A ground station from which the operator can communicate via radio uplink permitting
the operator to control the UAV, in terms of navigation and payload deployment.
• A downlink which is used to relay sensor, payload, and avionics data from the UAV back to
the ground station and to the operator of the UAS.
• Bi-directional communication regarding distance and azimuth to the UAV to aid in pre-
cise navigation and targeting accuracy (Fahlstrom, 2012).
In addition, the Data-Link must be designed to seamlessly interface with systems onboard the
UAV through the Air Data Terminal (ADT) and associated antenna arrays needed to receive
radio signals from the Ground Station or satellite relayed signals in UAS that operate in beyond
line of sight UAS designs.
No matter the method of transmission of the uplink or by Radio Frequency (“RF”) signals of
varying frequencies are usually secured by spread spectrum techniques. (Kakar, 2017). See Fig-
ure 13-3 for a simple Data-Link.
Source: Whitlock, C. (June 20, 2014). When drones fall from the sky. https://www.washington-
post.com/sf/investigative/2014/06/20/when-drones-fall-from-the-sky/?noredi-
rect=on&utm_term=.09b5d3e895bd
“It is important to understand that the concept of data security in terms of the transmission,
processing, storage and interpretation. It is not so much a static process but a fluid one. Given
the speed with which modern technology is developed or hacked, the UAS designer should
view security as a temporary” (Schneier, 2000).
“If you think technology can solve your security problems, then you don’t understand
the problems and you don’t understand the technology.” (Schneier, 2000).
It is a certainty that the security of the Data Link will never be a static secure condition, it must
have a robust and reactive architecture that allows it to function in geographically diverse and
R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, W.D. Lonstein, C. Carter, and J.P. Hood | 281
distant theatres globally. What may be an effective Data Link in a Nebraska field may not be in
the mountains of Afghanistan.
The current consensus is that there are seven “must have” attributes of the Data Link for a UAS
(Fahlstrom, 2012).
Globally available secure frequency with sufficient bandwidth and assignability. Absent this
Data Link will be unable to support regular global training, testing and immediate deployment
should the need arise.
There is a significant amount of crossover between technologies and design elements of one
attribute which may also influence another. We will discuss those “tradeoffs” in the next chap-
ter.
What is Radio Frequency? Broadly defined in the context of UAS Data Link development it is
electromagnetic radiation (EMR) being used to transfer energy and information by radio waves.
Most Data Links currently use some form of wireless RF communication. Consult Figure 13-4
EMS. Certain frequencies or bands may not be available in disparate regions of the globe where
conflicting RF frequencies may be in use or may not be available. Failure to account for this
Without designing a UAS with global availability, the likelihood of training and testing blackout
zones increases, thereby compromising rapid global deployment. The best practice is an ample
consideration and allocation of frequencies available to meet known as well as unexpected con-
tingencies. Considering that by some estimates in 2035 commercial UAS usage significantly
exceed military, and governmental UAS deployments (Kakar, 2017).
Table 13-1 demonstrates the airwaves are populated with a wide array of civilian, commercial,
and military Radio Frequency applications. Table 13-2 shows the RF band designations. Con-
sidering future technologies, such as global Wi-Fi, the availability of bandwidth will likely con-
tract, while the risk of unintentional interference expands. Given the crowded low frequency
airwaves, the design trend is towards VHF and even L band Data Links. This may have a positive
effect upon the UAS since using higher frequency bands allows more data to be transmitted
faster (Jain, 2017).
R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, W.D. Lonstein, C. Carter, and J.P. Hood | 283
Table 13-1 Standard Definitions of Radio Spectrum Segments
Many of us who are old enough to remember the analog age will remember the heyday of AM
(amplitude modulation) radio broadcasting from the 1950’s to mid – 1970’s. Although not capa-
ble of providing high quality sound, AM radio was an excellent broadcasting technology for
long distances where terrain and structures may cause line of sight challenges. The downside
of AM broadcasting is that is it subject to significant interference from other electromagnetic
interference such as powerlines, fluorescent lights, environmental conditions and competing
broadcasts. The result can be static, inconsistent signals, or even signal echo on the same fre-
quency.
The availability and allocation of overused civilian frequencies may result in new spectrums
which may be more robust, powerful and secure. Incorporating new communication technolo-
gies into the UAS will help to ameliorate the challenge of Data Link interference from uninten-
tional or environmental sources (Jain, 2017).
Examples of recently implemented tools to mitigate interference include using cellular tech-
nology and power control framework (Yajnanarayana, 2018). Encryption of RF signals may
provide additional interference protection as will new cable, connector and power supply
shielding (Cannon Corporation, 2017). Lastly novel approaches are currently being developed
including a self-interference cancellation solution where the UAS Data Link will self-detect and
correct interference by situationally moving to other RF bands and frequencies (Chen, 2014).
LPI is a vital attribute for the Datalink if for no other reason than it is the most likely source of
human casualties. In most instances it is desirable to have the ground station in proximity to
the operator or pilot of the UAV. Distance matters in UAS design since the greater the distance
data must travel, the greater the latency.
R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, W.D. Lonstein, C. Carter, and J.P. Hood | 285
The threat of interception of the RF emissions from the ground station an essential attribute
of the uplink design. Less likely, though still a design concern is in certain instances the down-
link can be targeted for interception. One scenario where interception risk to the downlink
increases is when a UAV is hovering for extended periods of time. Not only will this put the
UAV at risk of attack but also the risk that the downlink communications may be intercepted
increases and consequentially the target of the surveillance may be alerted to its presence,
causing them to camouflage or cease activities.
Electronic Support Measurement (ESM) systems allow adversaries to locate the source of RF
emissions in an area. This technology is especially effective in locating the ground station since
it is usually stationary for extended periods of time. The longer a source emits radiation, the
greater the chance of interception. Since it is not feasible to constantly move the ground sta-
tion increasing LPI can seem to be daunting task. Another relatively simple, yet effective meth-
ods to minimize the risk of intercept is by increasing armaments and location of the ground
station. Shielding vital components and pilots from an attack can help ensure UAS and per-
sonnel survivability in the case of a successful interception attack. Finally, designers should
not be comfortable in the assumption that LPI is inherent higher in a moving UAV. Innovative
technologies capable of detecting and intercepting signal emanations from moving objects are
becoming more effective and readily available.
Effective enhancement of LPI can be accomplished by some of the following tactics and tech-
nologies:
Best practice in all areas of information security is constantly enhancing inaccessibility of the
data and components of a network or system. This seemingly simple concept is no less relevant
when designing a UAS Data Link. The wireless RF Data Link is an enticing target one which if
successfully attacked can disable or damage multiple systems connected to the Data Link. Here
is a list of some recent Data Link hacks upon civilian, commercial and military UAS.
1. Maldrone, where malware is injected into critical areas of the UAS operation system
through security flaws in the Datalink.
2. GPS Spoofing is a hack which essentially can alter or delay UAV commands via GPS and
accordingly can cause collisions, faulty guidance and theoretically virtual UAV hijacking
whereby a civilian UAV can be turned into an attack vector against military UAV’s even
though military GPS systems are well protected. This was used by the Iranian military to
capture a United States military drone in 2011.
3. Zigbee and Killerbee which are essentially sniffing and penetration tools which when
successful can cause a major threat to UAS by Denial of Service attacks (Rodday, 2015).
Data encryption is a vital tool to create a secure Data Link. Just as in wired computer networks,
the wireless UAS employs CPU’s and operating systems to perform functions involving massive
amounts of data which must be immediately processed and transmitted internally and exter-
nally.
An exciting new protocol is the Commercial Solutions for Classified Program (“CSfC”), devel-
oped United States National Security Agency – Central Security Service. This is a layered
R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, W.D. Lonstein, C. Carter, and J.P. Hood | 287
approach to data security for UAS where two or more commercially available encryption and
cybersecurity protocols provide enhanced Data Links security. The layered approach is ben-
eficial since it reduces development time and expense while leveraging crossover of cyberse-
curity threat similarities across civilian, commercial or military applications (Keller, 2016). See
Figure 13-6 Harris KGV-72 encryption device for secure messages.
Whatever the protocol or technology Data Link security must not only address the threats
known today but also capable of adjusting to new threats as they are discovered. Constant
evaluation, testing, and even “white hat” hacking is one of the best insurance policies against
attacks. It is far better to discover a vulnerability or security flaw while the UAS is being tested
and used for training as opposed to during an actual operation.
There is no security without physical security. It has been estimated that up to 95% of all secu-
Resistance to Deception
A closely related, yet separate attribute of Data Link design is avoidance of deception by an
adversary. Spoofing an apparently authentic command or GPS direction data can cause a UAV
to become uncontrollable or even crash. Deception resistance is currently a focal concern with
respect to the data uplink between the ground station and UAV. Just one deceptive command
can cause a UAV to crash, be captured, hijacked or even attack a friendly target.
Not only can deception cause these types of undesirable consequences, a successful effort can
also jeopardize a wide array of secrets and information. Although it remains unclear whether
jamming or deception was used, it is believed that Iran has re-engineered a US built RQ-170
Sentinel Drone which was captured by some form of deception or jamming in December,
2011(Opall-Rome, 2018). See Figure 13-7 Enemy Captured RQ-170.
Currently there are multiple methods to achieve an acceptable level of resistance to this form
of attack. Many methods that help protect the Data Link from other security threats will also
provide protection against deception attacks. Those include, Spread Spectrum Data Link trans-
missions using secure authentication codes. These codes can be a software embed in the
ground station transmission to the satellite relay or UAV. Both the UAV and ground station will
have encoding and decoding software to authenticate commands without direct modification
to the uplink. (Fahlstrom, 2012) If a satellite relay is implemented in the UAS it can also have
authentication software thereby establishing end-to-end data security. Anecdotally, AJ and LPI
can also be enhanced by encoding Data Link transmissions.
R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, W.D. Lonstein, C. Carter, and J.P. Hood | 289
Figure 13-7 Enemy Captured RQ-170
Source: Opall-Rome, B. (February 12, 2018). Israel Air Force says seized Iranian drone is a knockoff
of US Sentinel: https://www.defensenews.com/global/mideast-africa/2018/02/12/israel-air-
force-says-seized-iranian-drone-is-a-knockoff-of-us-sentinel/
One particularly promising GPS spoofing detection systems was hypothesized by a team at
Cornell University in Ithaca, New York. This spoofing detection system essentially “spoofs’ the
Spoofer. Below is a figure of the proposed system architecture for this yet potential anti-
deception system.
As depicted above, three Global Navigation Satellite System (GNSS) satellites whose signals
would be tracked in the non-spoofed case: satellites j-1, j, and j+1. It also shows the potential
location of a Spoofer that could send false versions of the signals from these same satellites.
The Spoofer has a single transmission antenna. Satellites j-1, j, and j+1 are visible to the receiver
antenna, but the Spoofer could “hijack” the receiver’s tracking loops for these signals so that
only the false spoofed versions of these signals would be tracked by the receiver” (Psiaki, 2013).
See Figure 13-8 Spoofing the Spoofer.
Source: Kakar, J. M. (2017). Waveform and Spectrum Management for Unmanned Ariel Systems
Beyond 2025. Ithaca, New York: arXIv.org, Cornell University.
This and other recent technologies which can aid in securing the UAS Data Links of civilian,
commercial and military UAS applications is an important reminder of the fluidity of the disci-
pline. As the ancient Chinese Philosopher Sun Tzu wrote of 2500 years ago in “The Art of War”,
“The whole secret lies in confusing the enemy, so that he cannot fathom our real intent.”
Words matter when it comes to avoiding detection, but perhaps more importantly
understand that the unexpected should always be expected when (Giles, 2013)
When it comes the securing a UAS Datalink designers would be wise to live by these it comes
to technological warfare and cyber -attacks against military technology.
Anti-ARM
Anti-Radar Missile (ARM’s) sense and target sources of RF signals radiation to provide an attack
vector to destroy the emission source. Since a UAS Data Link, especially the uplink, emits RF
radiation from the ground station transmission antenna, it is susceptible to being attacked by
ARM weaponry.
ARM threat only exists when RF radiation is emitted. Limiting RF transmissions to instances
when commands are being sent is a simple yet effective Anti-ARM defense. In addition, various
R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, W.D. Lonstein, C. Carter, and J.P. Hood | 291
decoy technologies exist to reduce the ARM threat as well as placing the transmission antenna
farther away from the Ground Station to minimize ARM damage. Finally, various signal spec-
trum spreading techniques, not to mention physical armor for the Ground Station itself will all
increase the Anti- ARM characteristics of the UAS Datalink. (Fahlstrom, 2012)
Other proposed Anti – ARM capabilities involve hardening the Ground Station and particularly
the antenna array. On such proposal is to quickly identify and then react to the signature of an
incoming ARM and rapidly recoil a more heavily armored antenna before an ARM which suc-
cessfully penetrates other Anti-Arm defenses. This proposal is an important example of physi-
cal security, even the age of technology can still be an excellent defense. When one considers
the millions of dollars involved in design, development and deployment of UAS, it makes sense
to harden its battlefield armor. It most certainly better to be able to have a UAS survive an
ARM attack and be re-deployed to re-engage the enemy. (Czeszejko, 2013) See Figure 13-9 ARM
Processes.
If one considers ARM threats an attack vector based upon the source of the Data Link commu-
nications, then jamming can be considered UAS countermeasure designed to address signals
containing commands that are transmitted by the ground station. Jamming is a countermea-
sure used to inhibit the ability of a UAV to successfully communicate with its operator by
directing powerful electromagnetic radiation (“noise”) at the Data Link in order to “drown
out” communications and data transfer. Similarly, global navigation satellite system jamming
can impede the pilot’s ability to fly the UAV increasing risk of a catastrophic failure or crash
(Droneshield , 2017).
Jamming the GNSS data flow between the UAV and pilot takes away the eyes and ears of the
UAS. Without the ability to guide itself or be flown by a pilot using GNSS data, exponentially
increase the risk of crash, mission failure, loss of life and investment.
Source: Czeszejko, S. (2013). Anti – Radiation Missiles vs. Radars. In International Journal of Elec-
tronics and Telecommunications, 59(3), 285-291.
Jamming is an attack similar in nature to a brute force attack upon a network. Instead of using
technology to randomly generate massive amounts of passwords or passphrases, jamming is
intended to overwhelm the Data Link with RF noise or static (remember the AM radio example).
Recent history demonstrates the efficacy of successful jamming. During the Russian incursion
into Crimea and Ukraine separatist conflict in 2014 Russian jamming effectively kept the eyes
and ears of the world from observing their activities (Hudson, 2016).
Increasing the AJ of a UAS can be achieves in multiple ways. First necessary to determine the
R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, W.D. Lonstein, C. Carter, and J.P. Hood | 293
amount of jamming radiation (noise) the Data Link can withstand before its ability to function
falls below minimal acceptable levels. This is referred to as the AJ margin and is usually mea-
sured in decibels (dB) (Fahlstrom, 2012).
One technique for increasing the AJ margin U is implementing Spread Spectrum Communica-
tion.
One technique, Bilinear Signal Representations (“BSR”), also seems to hold great promise.
Essentially BSR identifies jamming signals, separates them and then re-synthesizes legitimate
Datalink signals (Kandangath, 2003) (Collins, 2013). See Figure 13-10 and Figure 13-11 for BSR
Representations.
It is also important to remember that jamming is solely a concern in relation to the uplink, in
fact preprogrammed flight instruction can still allow a successful mission when jamming suc-
cessfully drowns out signal from the Ground Station to the UAV. However, if the downlink is
jammed the ability for the operator to receive real time data can be diminished or disrupted
thereby eliminating the flexibility for the controller to make on-the-fly adjustments or changes
to the mission (Fahlstrom, 2012)
Source: Kandangath, A. (2003). Jamming Mitigation Techniques for Spread Spectrum Communica-
tion Systems. Tempe, AZ: University of Arizona, Tech. Rep., 2003.
R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, W.D. Lonstein, C. Carter, and J.P. Hood | 295
Figure 13-11 BSR Representation (alt)
Source: Kandangath, A. (2003). Jamming Mitigation Techniques for Spread Spectrum Communica-
tion Systems. Tempe, AZ: University of Arizona, Tech. Rep., 2003
Additional Considerations
Digital vs Analog
Analog signals are a method of data transmission data which vary with time, they are inherently
low-latency because they travel at the speed of light (Reid, 2017). The evolution of wireless
Data Links favors digital modulation. This makes sense since most data processing activity
throughout the UAS requires digital data or analog data converted to digital. Higher interfer-
ence margin, ease of interfacing between components and systems support conclusion that to
the extent practical, Data Link communication should favor digital data transmission(United
States Marine Corps, 2015) (Fahlstrom, 2012).
One caveat to the favored use of digital data transmission. Digital transmission handles far
more data much faster than analog. If successfully intercepted and decrypted an adversary can
extract massive amounts of data, intelligence, intellectual property and even top-secret infor-
Maximizing the efficacy of the Data Link requires that transmission be secure and resilient
while capable of swiftly delivering accurate data. The Data Link payload must be capable of
interfacing and supporting four types of critical UAS functions:
R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, W.D. Lonstein, C. Carter, and J.P. Hood | 297
Figure 13-12 US Army Warning Letter
Source: Scott, A. (2017, August 4). U.S. Army halts use of Chinese-made drones over cyber con-
cerns. Reuters. AND Mortimer, S. (2017, August 4). US Army calls for units to discontinue use of DJI
equipment. sUAS News.
Data Link delivery of secure, high-speed data allows electronic systems to interface seamlessly
with mechanical system must also be capable of concurrent self-monitoring and agile reaction
to attacks. This attribute allows accurate communication between the ADT, ground station and
entire UAS network (Fahlstrom, 2012).
Data-Rate
Data rate is a vital since the pilot sends commands through the uplink to the UAV the result
of the command execution are confirmed by onboard sensors, video or other indicators to
confirm execution. If the data rate of the downlink is not sufficiently robust latency comes
into play. In NLOS configurations, the execution data is sent by the ADT to a satellite and
then relayed via downlink to reach the operators eyes. Inadequate data rate can cause many
unwanted consequences from duplicate commands, expired intelligence, total failure of the
mission or loss of the UAV.
The data lifecycle of a UAS underscores the imperative of data rates capable of handling vast
amounts of data during a UAV mission. As the figure below depicts just a UAS functions demon-
strate the importance of rapid data transmission, as well as high speed onboard and ground-
based data processing. See Figure 13-12 Data Lifecycle of UAS.
R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, W.D. Lonstein, C. Carter, and J.P. Hood | 299
Figure 13-13 Data Lifecycle of UAS
It is important to note the figure above only depicts the en route portion of a mission. In actu-
ality the bi-directional data flow commences with pre-flight communication and instruction,
continues through departure, en route, arrival and post-flight. Coupled with payload, han-
dover, contingency, time stamping and emergency contingency planning to the data flow to
these phases it becomes readily apparent that data rate is a seminal issue in the UAS design
process. (International Telecommunication Union, 2009)
Finally the exponential growth of UAV’s in service globally, consideration of the finite supply
of bandwidth and how to best account for the available bandwidth will most certainly involve
attribute trade-offs. Difficult choices will need to be made regarding bandwidth availability
as it relates to specific missions, geography and available wireless technology. Accordingly,
instead of designing regional as opposed to globally adaptable UAS, best practice as well sound
budgetary policy dictates that interchangeability and interoperability be prioritized.
Certain aspects of UAS design can benefit from employ using loop control between a UAV and
the same or another location. While it is possible to pre-program the UAV recovery process,
Given the highly variable conditions in the landing and retrieval zone, it is often the case that a
separate closed loop Data Link, between the UAV and pilot can enhance safely and effectively
retrieving the UAV. Closed loop Data Links require a additional reception and processing capa-
bility onboard both the UAV and ground station.
The threats to closed loop control systems are no different than in the main Data Link. Latency,
restricted bandwidth, AJ, deception, and line of sight are important considerations. Although
discussed latency later in the chapter when it comes to closed loop control, especially video
transmission of approach and recovery, the margin of error becomes smaller with declining
altitude, limited runway length, environmental and physical conditions in the landing zone.
(Fahlstrom, 2012)
Imagine operating a video game or flight simulator on a desktop or gaming console and the
visual representation presented on the screen was actually delayed by 2 seconds (ie. Aircraft
appears to be 1 mile away from target when it is actually .6 miles away from the target). A
command to reduce power and altitude on a one mile glidepath subject to a 2 second delay
becomes far more challenging. Suffice it to say the game would not last very long, nor would it
be very successful. See Figure 13-14 Flight Simulation Game.
Source: Neuroscape. (Summer, 2018). Technology: Bridging the gap between neuroscience and
technology. https://neuroscape.ucsf.edu/technology/
R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, W.D. Lonstein, C. Carter, and J.P. Hood | 301
At first glance it appears Interchangeability and Interoperability ( I & I) are the same thing. In
reality they are distinct concepts which require separate analysis and consideration of the UAS
design process (Yu, 2016).
Some, such as Fahlstrom consider I & I separate and distinct attributes, writing “interoperabil-
ity would mean that an ADT from one data link could communicate with a Ground Data Ter-
minal (“GDT”) of another and vice versa.” (Fahlstrom, 2012) p. 201-202. While others such as Yu,
seem to blend I & I into one concept citing the 1999 Joint Chiefs of Staff definition is, “The
ability of systems, units or forces to provide services from other systems, units or forces and
use the services so exchanged to enable them to operate effectively together.” (United States
Department of Defense, Joint Chiefs of Staff, 2016) (Yu, 2016).
Finally, standardization must be considered from the moment of initial design of the UAS. If
the system is to have a sufficient service life thereby justifying the expense of its development,
standardization with the myrad of other systems is essential.
STANAG 4856 – Standard Interfaces of UAV Control System (UCS) for NATO UAV interoper-
ability was created in order to maximize communication between, “different UAV’s and their
payloads, as well as different Command, Control, Communication, Computers and Intelligence
systems. The integration of components from different sources as well as the interoperability
of legacy systems.” (Marques, 2017) Designers must not just consider the reality that interop-
erability between allied UAV’s, they must also consider the challenge of maximizing interoper-
ability with other assets. Figure 13-15 JTIDS view below demonstrates just some of the myriad
of systems which must to be able to operate and communicate, in real time, as seamlessly as
possible.
The challenge to designing Interoperability and Standardization (I&S) in UAS design is multifold
with the battlefield attributes of central command, communication and coordination taking
center stage. The ability of allies to communicate is vital for cohesive, coordinated and effective
operations.
Recognizing the importance of I&S, the Department of Defense is developing a Joint Architec-
ture for Unmanned Systems, (“JAUS”), National Information Exchange Model (“NIEM”) and most
recently Future Airborne Capability Environment (FACE). The objective of FACE is to develop a
“Technical Standard for a software capability designed to promote portability, and create soft-
ware product lines across the military aviation community.” (Blais, 2016).
Datalink Latency
Latency is defined as the interval between the time when data is processed and a signal is
transmitted and when the signal is received and then processed in order to be displayed and
R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, W.D. Lonstein, C. Carter, and J.P. Hood | 303
interpreted by the operator. To help understand latency ask yourself why do we see lightning
before we hear thunder? See Figure 13-16 Lightning Strike and Latency.
Returning to the UAS datalink, line of sight visual transmission and reception is ordinarily
nearly instantaneous because of the speed of light. Unfortunately line of sight, environment
and distance significantly limit UAV operational radius. Even LOS operation of a UAV can be
hindered by weather, vegetation, time of day and topography. Air and ground traffic density
• Low Endurance
• Medium Endurance; and
• High Endurance (Valavanis, 2013).
Low Endurance:
Operate almost exclusively in line of sight with a minimum of automated onboard flight control
technology. Usually LOS UAS employ C Band frequency with low frequency of between 3.7-4.2
GHz for the downlink and 5.9-6.4 for the uplink. One of the main reasons for C Band datalinks
in Low Endurance UAS is that low frequency signals are less susceptible to weather related
degradation.
Medium Endurance
Operate in primarily in LOS applications however some do have Beyond Line of Sight (“BLOS”)
capability. To the extent they are operating in LOS missions lower frequency C Band is used,
if the Medium Endurance UAS is deployed BLOS then they usually will usually be operating on
Ultra High Frequency (“UHF”) (300 MHz) to Ku Band (15 GHz). The downlink is between 11.7 –
12.7 GHz and the uplink between 14-14.5 GHz.
High Endurance
High Endurance UAS deployed BLOS operate on Ultra High Frequency (“UHF”) (300 MHz) to
Ku Band (15 GHz). Downlink frequency is between 11.7 – 12.7 GHz and uplink between 14-14.5
GHz. High Endurance UAS may also employ Common Data Link (“CDL”) technology on either
I-band satellite communication (“SATCOM”) or KU band between 14.5 and 15.38 GHz. To mini-
mize SATCOM latency autopilot is often favored in LOS RF operations (Valavanis, 2013).
The trade-off between security and latency is a difficult balance to achieve. US Air Force Major
General James Poss. (Ret.) put it best.
R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, W.D. Lonstein, C. Carter, and J.P. Hood | 305
“Even the Air Force struggles with this problem because the more secure they make their links,
the more control latency and potential for link loss they introduce. At least with today’s tech-
nology. Air Force Predator pilots routinely deal with a five to eight second delay on their con-
trols when flying BLOS due to encryption overhead and the time it takes to relay commands
via satellites” (Poss, 2017). Consult Figure 13-17 Security – Latency Trade-off.
While there are options to minimize latency while balancing the attributes needed for a robust
and effective UAS Data Link, latency is a constant in any transmission travelling any distance.
The greater the distance, the more time to travel. The greater the data payload the more time
to transmit.
Innovative technologies designed to address latency in UAS Data Links are presently being
studied. One that may hold much promise is the introduction and continued development Arti-
ficial Intelligence in UAS design. To be sure the less data that needs to be sent to the UAV on
the uplink or back to the ground station on the downlink, the less latency in executing com-
mands and near-real time UAV control. (Bennis, 2018) AI holds much promise but must also be
considered a risk. Just as a UAV pilot could become incapacitated or go rogue, the same risks
exist with AI implementation in UAS.
Source: UAV Research Lab at the University of Sydney. (2018). Adapting UAV Control for Latency.
UAV – Lab.
Discussion Questions
1. Since so many attributes of a UAS have distinct levels of importance depending on envi-
References
Atkinson, N. (2015, September 7). Designing a way to keep increasingly crowded airspace safe.
phys.org.
Bennis, M. D. (2018). Ultra- Reliable and Low-Latency Wireless Communication: Tail, Risk, Scale.
arXil.org.
Blais, C. L. (2016). Unmanned systems interoperability standards. Monterey CA: The Naval Post-
graduate School.
Cannon Corporation. (2017). Shielding against electromagnetic and RF interference for safety
and mission success. Military and Aerospace Electronics, 1.
Chen, J. (2014). MIMO Enhancements for Air-to-Ground Wireless Communications. Los Angeles:
UCLA Electronic Theses and Dissertations.
Collins, T. F. (2013). Implementation and Analysis of Spectral Subtraction and Signal. Worcester,
MA: Worcester Polytechnic Institute.
Czeszejko, S. (2013). Anti – Radiation Missiles vs. Radars. International Journal of Electronics and
Telecommunications, 285-291.
Giles. (2013). Sun Tzu On The Art of War. Abingdon, Oxon: Routledge.
R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, W.D. Lonstein, C. Carter, and J.P. Hood | 307
Hartman, K. &. (2013). The Vulnerability of UAV’s to Cyber Attacks – An Approach to the Risk
Assessment. 5th International Conference on Cyber Conflict. Tallin: NATO CCD COE Publica-
tions.
Howarth, F. (2014). The Role of Human Error in Successful Security Attacks. Armonk, NY: IBM –
Security Intelligence.
Hudson, J. (2016, October 28). International Monitor Quietly Drops Drone Surveillance of
Ukraine War. Foreign Policy.
Jain, R. T. (2017). Wireless Datalink for Unmanned Aircraft Systems: Requirements, Challenges
and Design Ideas. American Institute of Aeronautics and Astronautics, 2.
Jang, C. e. (2017). Taking Drones To The Next Level – Cooperative Distributed Unmanned – Aer-
ial- Vehicular Networks for Small Drones and Mini Drones. IEEE Vehicular Technology Maga-
zine, Volume 12, Issue 3, pp. 73-82.
Kakar, J. M. (2017). Wavefrom and Spectrum Management for Unmanned Ariel Systems Beyond
2025. Ithaca, New York: arXIv.org, Cornell University.
Keller, J. (2016, August 1). Cybersecurity and encryption for the masses. Military and Aerospace
Electronics.
Marques, M. M. (2017). STANAG 4586 – Standard Interfaces of UAV Control System (UCS) for
NATO UAV Interoperability. Brussels, Belgium: North Atlantic Treaty Organization .
Mortimer, G. (2017, August 4). US Army calls for units to discontinue use of DJI equipment. sUAS
News.
Opall-Rome, B. (2018, February 12). Israel Air Force says seized Iranian drone is a knockoff of US
Sentinel. Defense News.
Park, C. C. (1997). The Environment: Principles and Applications. London, UK: Routledge.
Poss, M. G. (2017, February 22). It’s the Data Link Stupid. inside Unmanned Systems.
Psiaki, M. L. (2013, June 1). Innovation: GNSS Spoofing Detection. GPS World.
Reid, J. (2017, November 30). The Difference Between Analog and HD (Digital) Transmission.
Rotor Drone Magazine.
Saeedipour, H. R. (2005). Data Link Functions and Attributes of an Unmanned Aerial Vehicle
IUAV) System Using Both Ground Station And Small Satellite. 5th IAA Symposium on Samm
Satellites for Earth Observation. Berlin, Germany: International Association of Astronautics.
Schneier, B. (2000). Secrets and Lies, Digital Security in a Networked World. Hoboken, NJ: John
Wiley and Sos, Ltd.
Scott, A. (2017, August 4). U.S. Army halts use of Chinese-made drones over cyber concerns.
Reuters.
Sunil, K. S. (2008). Newton’s third law of motion. Houston, TX: Rice University.
UAV Research Lab at the University of Sydney. (2018). Adapting UAV Control for Latency. UAV –
Lab.
United States Department of Defense. (2005). Unmanned Aircraft Systems Roadmap 2005-2030.
Washington, DC: Office of The Secretary of Defense.
United States Department of Defense, Joint Chiefs of Staff. (2016). Department of Defense Dic-
tionary of Military and Associated Terms – Joint Publication 1-02. Washington, DC: United States
Department of Defense.
R. K. Nichols, J.J.C.H. Ryan, H.C. Mumm, W.D. Lonstein, C. Carter, and J.P. Hood | 309
United States Marine Corps. (2015). Unmanned Aircraft Systems Operations. Washington, DC:
Department Of The Navy.
Valavanis, K. P. (2013). Unmanned Aircraft Systems: the Current State-of-the-Art. New York:
Springer.
Yajnanarayana, V. W.-P. (2018). Interference Mitigation Methods for Unmanned Aerial Vehicles
Served by Cellular Networks. https://arxiv.org/pdf/1802.00223.pdf
Yu, A. M. (2016). Unmanned Aircraft Systems. Hoboken, New Jersey: John Wiley and Sons.