Presentation 1
Presentation 1
Naan Mudhalvan
Training Partner : Jet aerospace –Aviation Research Centre
Presentation by
S. Dhivyashri
III- B.Sc. Physics
Anti Drone System works on drone detection, Classification and
tracking on surveillance, camera sensors and neutralization of the
threat through jamming the Drone communication for security
against drone attacks
Modules of Multi sensor setup include:
• RF Based Drone detector (RFDD)
• Video based Drone Identification & Tracking (VDIT)
• RADAR
• Data fusion and Command Center (DFCC)
• Drone RF Jammer (DRFJ)
• Hard kill
RF Based Drone detector (RFDD)
RFDD detects the drone using Radio Frequency (RF)
communication between drone and Ground control center (GCC).
This System is on continuous search mode on wide band of
frequencies that are typically used by Drone and its GCC.
Whenever a frequency of interest is identified, the system locks
and monitors the signal. Based on the identified signal, system
estimates the direction of Drone and its GCC. An array of receive
antenna is used for estimation of direction of signal.
Video based Drone Identification & Tracking (VDIT)
The day and night camera sensors are mounted on an
automatic servo-based positioning system. This system
receives commands for position from RFDD. Once positioned
in the direction of interest, captures video and images of
drone. VDIT is capable of capturing and tracking video up to a
range of 3 Km. Video feeds are given to software module and
video processing algorithms in the software automatically
confirm the presence of drone and imitate tracking.
RADAR
Detection of autonomous drones (flying without a
link between drone and operator) using RFDD is not
possible. RADAR forms the best choice to detect
such threats. An X band 3D RADAR detects the
drones as per the max range chosen and provides
precise data about the target coordinates. RADAR
provides both Azimuth and elevation data of the
drone. The feed from the RADAR is integrated to
the data fusion center for effective remote
monitoring of the threats.
Data fusion and Command Center (DFCC)
User interface presents the comprehensive picture of threat situation. Data
from RFDD, VDIT and RADAR is integrated at the command center. Detection
and classification algorithms based on RF data as well as visual data are built
into this system. An integrated display system enables the display of the threat
situation. This display system integrates the Map with zones of threat.
Provision to define the area of monitor, zone of threat, zone of identification of
threat etc are given in the console. Spectrum and waterfall screens are also
part of the software, which provide the complete picture of the detected
emissions. A list of detected signals and Parameters such as Frequency and
type of drone etc are displayed.
Drone RF Jammer (DRFJ)
Drone RF Jammer (DRFJ) is capable to disable the
link between GCC and Drone, by jamming
simultaneously ISM bands, GNSS signals, mobile
signal and any other intercepted frequencies. The
frequencies detected by RFDD are automatically
taken and jamming waveforms are generated and
radiated using the directional antennas. The
system also supports user configured frequency
to carry out the jamming action. A provision to
manually feed the jammer frequencies is also
given.
Hard kill
ZADS is offered with hard kill options. Kinetics based kill and a Net
based drone catcher are the two options available in hard kill. Kinetic
based neutralization is supplied with a gun which can auto align to
the target and fire bullets against the target to destroy the same
physically. In order to capture the drone and land it at a safe place,
net-based drone capture option can be employed. For this option, a
dedicated drone with a hanging net will be launched to capture the
rogue drone. This option is suitable for small rogue drones carrying
potentially damaging explosives.
1. Signal Detection
a. Radar Signal Emission:
• System Activation: The anti-drone system’s radar emits electromagnetic signals
(radio waves) into the air.
• Propagation: These signals travel through the air and bounce off objects, including
drones.
b. RF Signal Monitoring:
• RF Scanners: The system continuously monitors the radio frequency spectrum for
signals emitted by drones and their controllers.
• Signal Detection: Any anomalous or unknown RF signals are flagged for further
analysis.
c. Acoustic and Optical Detection:
• Acoustic Sensors: These sensors detect sounds produced by drone motors and
propellers.
• Optical Sensors: Cameras capture visual data and infrared sensors detect heat
signatures of drones.
2. Signal Processing
a. Radar Signal Reception:
• Echo Reception: The radar system receives the reflected signals (echoes) from objects in the
air.
• Signal Analysis: The system processes these echoes to identify the size, shape, and
movement of objects.
b. RF Signal Analysis:
• Frequency Analysis: The system analyzes the frequency, modulation, and strength of
detected RF signals to identify drone communication patterns.
• Signal Classification: The system classifies the detected signals to distinguish between
legitimate and potentially threatening drones.
c. Data Fusion:
• Integration: Information from radar, RF scanners, acoustic sensors, and cameras is
integrated into a unified picture of the airspace.
• Tracking: The system continuously tracks the position, speed, and trajectory of the
identified drones.
3. Signal Identification
a. Drone Identification:
• Signature Matching: The system matches the detected signals to
known drone signatures and types.
• Behavior Analysis: The behavior and movement patterns of the
drone are analyzed to assess its intent and potential threat level.
b. Threat Assessment:
• Risk Evaluation: The system evaluates whether the detected
drone poses a security threat based on its location, behavior, and
other factors.
4. Signal Intervention
a. Jamming Signals:
• Frequency Jamming: The anti-drone system emits jamming signals on
the same frequencies used by the drone for communication.
• Signal Disruption: This disrupts the communication between the drone
and its operator, potentially causing the drone to lose control or return
to its home base.
b. Hacking and Control:
• Signal Interception: The system may attempt to intercept and take
control of the drone’s communication signals.
• Command Override: If successful, the system can send commands to
the drone to land or return to its point of origin.
5. Signal Neutralization
a. Physical Neutralization:
• Net Deployment: Nets can be deployed to physically capture the
drone in mid-air.
• Laser Systems: High-powered lasers can be used to disable or
destroy the drone’s electronics.
b. Signal Termination:
• Power Disruption: Some systems use electromagnetic pulses
(EMPs) to disrupt the drone’s electronics and power systems,
causing it to malfunction or crash safely.
6. Post-Action Analysis
a. Data Collection:
• Record Keeping: The system logs all relevant data related to the
detection, tracking, and neutralization of the drone.
• Forensic Analysis: Any captured drone or debris is analyzed to
understand its origin, technology, and intended purpose.
b. System Feedback:
• Performance Review: The effectiveness of the anti-drone system
is reviewed to improve future responses and update detection
algorithms.
c. Reporting:
• Incident Reporting: Detailed reports are prepared on the incident,
including the nature of the threat, the system’s response, and any
follow-up actions required.
THANK YOU