Cisar2020 PDF
Cisar2020 PDF
Abstract—The large increase in the number of drones, as well The primary role in the successful defense of drones is their
as the possibility of their use for malicious (illegal) purposes, has detection. Cognitive technologies have a significant place in
raised the importance of defense from them. This paper gives an this area. Cognitive infocommunications (Cog InfoCom) is an
overview of drones, the use of different modulation techniques, interdisciplinary research field that has appeared as a synergy
remote control systems and antennas since the knowledge and between infocommunications and the cognitive sciences [2,3].
proper understanding of their characteristics enables the optimal Оne of the main characteristics of CogInfoCom is that these
choice of adequate protection methods. The paper also analyzes areas intertwine at different levels and as a result, new forms
different aspects of modern and commonly used principles of of cognitive abilities are born [4-7]. These capabilities are
anti-drone defense. Proper consideration of technical
neither completely natural (i.e. human) nor completely
characteristics in the sphere of drone communication enables the
artificial, they are “blended combinations”, so it is suggested
focus on adequate solutions, depending on the specific protection
requirements. Cognitive technologies have a significant place in that they are treated in a way that combines both an
terms of improving drone detection. engineering and a human perspective [8-11]. CogInfoCom
connects research areas such as, for instance, digital
Keywords—anti-drone defense; radio modulation; remote transformation environment for education [10, 12-19], human-
control; antennas; spoofing; jamming; radar; hacking; cognitive computer interaction [20], brain-computer interfaces and
detection human and bio-interfaces [4-5, 21], IoT [22], VR based
education [6-9, 23-29], affective computing and cognitive
I. INTRODUCTION linguistics and multimodal interaction.
A drone, in a technical sense, is an unmanned aircraft. The main characteristic of the radar system is to constantly
Drones are more generally known as unmanned aerial vehicles observe the surrounding environment, on the basis of
(UAVs). Basically, a drone is flying equipment that can be observations to make conclusions about environment nature
remotely or autonomously controlled in accordance with and to modify observations of the environment by changing
software-controlled instructions in an embedded system, the waveforms and antenna pointing direction. When we talk
working synchronized with onboard sensors and GPS. about cognitive radar, the system preserves real-time
hypotheses about the environment in order to adaptively
There are several main components that make up a control the form and parameters of the actual sensing
conventional drone: different sensors, brushless motor, procedure. Namely, prior and current knowledge are quantified
propellers, electronic speed controller (ESC), micro servos, and updated in real time in order to optimize the sensing
flight controller, receiver, transmitter, antenna, Lipo battery procedure in a closed-loop manner, thus optimizing radar
and camera. The remote control system of a drone is typically performance and making efficient use of finite sensing
based on wireless communications, such as 2.4 GHz, 5.8 GHz, resources [30].
or Wi-Fi (IEEE 802.11 a/b/g/n).
In the following sections, this paper elaborates on the
Most of the commercial drones can be divided into one of technical characteristics of the components and principles used
the following categories [1]: Linux - based drones, Arduino- in drones, with particular emphasis on the possibility of their
based drones, smartphone-controlled drones, drones controlled application to anti-drone defense.
by a little known (nameless) radio transmitter and drones
controlled by a radio transmitter from a reputable
manufacturer.
Authorized licensed use limited to: Raytheon Technologies Corporation. Downloaded on December 19,2020 at 07:38:28 UTC from IEEE Xplore. Restrictions apply.
P. Cisar et al. • Principles of Anti-Drone Defense
II. RADIO MODULATION TECHNIQUES USED IN DRONES frequency hopping, whereas DSSS applies pseudo-noise to
PWM (Pulse Width Modulation) and PPM (Pulse Position change the signal’s phase. FHSS is accomplished by allocating
Modulation) are common protocols used to transfer data from smaller channels within the large bandwidth which fit the data.
radio receiver to the flight controller. PWM is a modulation The next step is to send the signal pseudo-randomly into
technique that transmits data in the form of variable pulse another channel. At any given time momentum, just a single
width. In PPM the sample values determine the position of a channel is used. On the other hand, DSSS spreads the
narrow pulse relative to the clock signal. PAM (Pulse information across the band by inserting the pseudo-random
Amplitude Modulation) is the primary structure of pulse noise into the signal to change its phase at any given time. This
modulation. In this case, the input signal is sampled at equal results in an output that looks like static noise. Within a
time intervals and each sample is proportional to the amplitude dispreading process, the original signal can be extracted from
of the modulating signal. The principle of generating these the composite signal as long as the pseudo-random sequence is
signals is shown in Fig. 1. known.
In addition to the analog radio protocols, the drone In view of the aforementioned communication protocols,
techniques also use the SBUS (Serial Bus) serial their graphical overview can be shown in Fig. 2.
communication protocol. While first implemented by Futaba,
this protocol is generally found in numerous FrSky products as IV. ANTENNAS
well. It is not only a digital signal, but the SBUS is also An antenna is essentially a converter - a device whose
convenient due to its ability to support up to 18 channels on a function is to convert electrical energy into electromagnetic
single signal cable and is faster than PPM and PWM. radiation (or radio waves). There is no specific difference
DSMx is also a widely used radio protocol for 2.4 GHz between a transmitting and a receiving antenna. Drones can
spectrum RC transmitters and receivers. This protocol makes it have two types of antennas (based on radiation directivity):
possible to have multiple receivers/transmitters in the 2.4 GHz directional and omnidirectional. Directional antennas are most
spectrum without much interference. DSMx is in general two effective for emitting a signal over long distances and in a very
layers of multi-access techniques. DSM2 is based on code narrow direction. With omnidirectional antennas, the signal
division multiple access (CDMA) technology. This involves propagates in all directions over a relatively shorter range, but
two implementation phases: 1) the signal is spread out over a because of propagation in 360°, the losses are large.
wider frequency band and 2) each transmitter/receiver pair uses The directional antenna’s radiation pattern is conical, which
its own coding scheme to encrypt the signal. The channel in the means the tip of the cone sets out at the antenna. This fictive
2.4 GHz band (2.400 - 2.483 GHz) is used to transmit or cone is steadily becoming larger, as the distance from the
receive data. antenna is also increasing. A given object, if located within the
cone’s range, can detect the emitted signal or conversely,
III. REMOTE CONTROL SYSTEMS transmit its own signal, in the direction of the receiving
Futaba Advanced Spread Spectrum Technology (FASST) antenna. The optimal use for directional antennas is on the
and Advanced Continuous Channel Shifting Technology receiver-side, so that their position will enable the best signal
(ACCST) remote control systems are widely implemented in reception as sent by the video transmitter. The radiation pattern
UAVs. The FASST as well as the ACCST use frequency-shift of the omnidirectional antennas is torus-shaped and of equal
keying (FSK) modulation with frequency-hopping spread distribution, with the antenna’s position surrounded by the
spectrum (FHSS) and operate with in the 2.4 GHz band. torus. Except for the locations exactly above and below the
Moreover, the FASST implements Gaussian pulse-shaping antenna, the omnidirectional antenna’s radiation pattern is
filtering and direct sequence spread spectrum (DSSS) to the excellently dispersed in all directions around the antenna. Most
transmitted data. Since it has a greater number of channels as often, the omnidirectional antenna is associated with the video
compare with the FASST, the ACCST channels are arranged in transmitter, due to the fact that it seamlessly adjusts to
a more compact manner using a channel distance of 1.5 MHz. situations when the drone abruptly modifies how high it flies or
The data rate in the case of this technology is 100 kbps. in what direction.
000020
Authorized licensed use limited to: Raytheon Technologies Corporation. Downloaded on December 19,2020 at 07:38:28 UTC from IEEE Xplore. Restrictions apply.
11th IEEE International Conference on Cognitive Infocommunications – CogInfoCom 2020 • September 23-25, 2020 • Online on MaxWhere 3D Web
There are two forms of electromagnetic wave polarization: designed for it. These radars have a high resolution and
linear and circular (general case of elliptical polarization). The 3D tracking function − range, azimuth, elevation, and
main difference between linear and circular polarization is how velocity measurements of up to 200 targets
the radiation pattern propagates. A linear antenna generates simultaneously. In practice, it has been shown that they
waves along a vertical or horizontal plane (one plane). Because were able to detect small drones up to 5 km away. There
the wave is moving in one direction, linear polarization allows are different versions in practical realization: 8 − 12
more energy to be transported. But the problem arises in case GHz X-band and 12 − 18 GHz Ku-band, with applied
of obstacles which has a greater influence because of difficulty high-resolution radar signal processing technology to
a linear wave has in moving around an object that is within its locate drones accurately by applying an AESA (Active
plane of propagation. The circularly polarized antenna is more Electronically Scanned Array) technology to increase
adequate for situations that require barrier penetration because the maximum detection distance. It is often used
it emits waves in a corkscrew form (twists through both the (Scanning Surveillance Radar System) system and
vertical and horizontal planes). FMCW principle (Frequency Modulated Continuous
Situations especially convenient for circular polarization Wave) with a medium frequency of 94 GHz and an
are: flying close to large objects or in an enclosed environment output power of 100 mW. It has been shown in practice
(indoor parking spaces, stadiums), acrobatic flying (orientation that a bandwidth of up to 1 GHz allows a range
and angle are constantly changing), low altitude flying resolution of 15 cm.
(proximity flying). Situations particularly suitable for linear • Radio receiver − The passive RF detection system
polarization are: long-distance flying without any barriers, analyzes and identifies the remote control signal and
stable flying without too much roll or pitch and when antenna returns the signal from drones, detects the target and
size is taken into consideration, weight and durability are the warning. Wi-Fi is a common detection method as some
most important. drones have easily identifiable service set identifier
Antenna gain is a very important characteristic and (SSID). Detection distance can be more than 10 km,
represents a measure of how efficiently an antenna can transmit while the detection band is 20 MHz - 40 GHz.
electromagnetic waves in a certain direction and is expressed in • Audio (acoustic) sensor (microphone) − Sound-based
“dBi” (decibel isotropic). A drone FPV (First-Person View) techniques use arrays of microphones to extract the
antenna with a high gain is efficient at transferring unique acoustic signature of (micro) UAVs. Typically,
electromagnetic radiation and has a concentrated and narrow drones produce sounds ranging from 400 Hz to 8 kHz (
beam. If an antenna has a lower gain, it will feature a rounder due to the brushless DC motor ) [34]. Using different
radiation pattern. Despite the fact that transmitting a signal over audio analysis techniques, the sound of a drone can be
a long distance is not their strong suit, such antennas excel in separated from the environmental noise. A device for
high-quality short-range transmission and reception. drone detection is usually equipped with a Raspberry Pi
A conventional omnidirectional antenna covers the full core and with a microphone capable to pick up
hemisphere enabling it to detect the whole sky and receive up frequencies that humans can’t hear. During the
to 12 satellites simultaneously for defining the optimal processing of the collected data, the signal would be
navigation solution. A ‘smart’ antenna has the ability to focus compared with data in a database to separate it from
numerous narrow beams directly toward the satellites and track everyday noises and to confirm that it was actually a
them while showing nulls (locations where the antenna fails to drone. If the result is positive, the device would send a
receive a signal) at any interference [33]. Such devices notification that a drone was nearby. The sample is
considerably increase GPS reception even if there is jamming, compared to a proprietary database of drone signatures.
however, the cost more and are bulkier compared to The device uses acoustic technology to detect incoming
conventional antennas. drones from up to 130 meters and then send emails or
text messages to a monitoring service if a drone
approaches a specified perimeter.
V. ANTI-DRONE TECHNOLOGIES CATEGORIZATION
Along with the expansion of the industry, the use of drones • Optical sensor (camera) − This method implements
for malicious purposes also began. Therefore, many companies high-resolution cameras in order to capture drones in
follow trends and try to get into the counter drone industry. various background situations. Certain characteristics,
They have introduced many sorts of anti-UAV solutions. The including the Haar-like, local binary patterns (LBP),
counter drone technology can be broken up into two broad and histogram of gradients (HOG) can be extracted
categories: detectors and defenders. from the captured images. The next step is to feed these
features into boosted classifier cascades which are
Detectors are devices oriented to detect the presence of responsible for detection at multi-stage sequences with
drones and warning: increasing complexity. It is only the sequences that have
been subjected to the previous stage of analysis, which
• Radar − Low altitude radar is mostly used to detect
can then move on to the following stage.
ground, sea, and low-altitude targets. This method can
be problematic as some of the drones can be quite small Defenders are devices that provide some form of proactive
and require specialized radar to detect them. Small-scale function (shooting down or departure of drones):
drones can be detected by radar if the radar is specially
000021
Authorized licensed use limited to: Raytheon Technologies Corporation. Downloaded on December 19,2020 at 07:38:28 UTC from IEEE Xplore. Restrictions apply.
P. Cisar et al. • Principles of Anti-Drone Defense
• Jammer − Its role is to eliminate the communication • High-energy microwave − The antenna generates
between the remote control and the drone, can microwaves and if a high-energy microwave hits a
selectively obstruct the communication channels, drone, it will be destroyed.
which covers the control (pilots) signal. It can also
disrupt navigation, the drone can lose the GPS signal, VI. JAMMERS
get lost from the planned route, or be forced to land.
More advanced drones use GPS receivers within the Jammers or commonly called signal blockers are devices
navigation and control loop which allows for some used to block and interfere with authorized radio
additional features: position hold, return to home, and communication signals. Jamming equipment interferes with the
autonomous flight. remote control circuits and navigation signals of drones and
forces them to land or return. The drone signal jammer blocks
• Anti-drone gun − It's a gun-like device that works by the communications between the enemy drone’s video,
jamming the signal between drone and pilot, in such a telemetry, command, control and navigation systems and the
way grounding unwanted UAVs. Also, it controls the operator [36]. Jammers are designed to disable a drone by
drone to land safely on the spot or returns to its point of blasting electromagnetic noise at active radio frequencies, and
origin. This device can disable drones operating on 5 at a power high enough to eliminate any communication
frequencies and has a range of up to 2500 meters. RF between the drone and its operator [37].
output power is up to 60 W.
The civilian drone jammers include two bands: Band 1 - 2.4
• Spoofer − The GPS spoofing attack is an act of fooling GHz and Band 2 - 433 MHz. The RF circuit in them consists of
the control system of the drone by sending it fake an electronic oscillator whose frequency is controlled by a
geographical coordinates. In this way, it is possible to voltage (VCO- voltage controlled oscillator) and of a linear
hijack the vehicle taking it away from the authentic power amplifier whose function is to amplify the output power
path. A similar attack is possible due to the leakage of of the VCO. The tuning circuit consists mainly of a triangular
GPS encryption rules, which is a common occurrence wave generator to generate the tuning signal along with a noise
for civilian equipment. generator to tune the VCO to the required RF jamming signal.
The power supply unit is designed to generate appropriate DC
• Hacking − Certain software exploit toolkits are focused voltages for the RF and the tuning circuits.
on hijacking drones targeting weak authentication and
encryption methods and allowing hackers to send Frequency jamming is a method that is even more subtle
commands to the victim’s drone. than the physical interception, and the anti-UAV defense
system (AUDS) is one such solution. This system scans the
• Snaggers (catchers) − a net placed under a drone, shot space on drones and jams their control signals using their own
from an air cannon or net-launching gun. high-powered radio signal.
• Drone catcher − There are situations on which An anti-drone rifle that uses targeted radio signals to disrupt
destroying drones might not be suitable. For example, drone controls (similarly to AUDS) ensures a more portable
when a drone is being used in restricted areas and the option. It currently has a range up to 1500 meters but may be
task is to land it without losing potentially accusing able to reach even farther in future versions. The standard
evidence. In this case, a special drone-catcher device output power of these devices with VCO technology is up to 75
becomes useful. This device is basically an anti-drone W and with high gain 12 dBi directional antenna.
drone, capable of catching an enemy UAV in a net from
up to 20 meters away. Characteristics of this device are:
controlled drone interception, equipped with gimbaled VII. DRONE HACKING
netgun, automatic drone detection, the target is selected Using certain communication weaknesses, various forms of
by the operator, automatic tracking without operator drone hacking are possible:
input, the unwanted drone is carried to a safe place and
1. A security researcher named Sasi infected his drone with
brought down by a parachute.
Maldrone malware. This malware creates a persistent
Destroyers are a special form of defenders which in the backdoor, enabling an attacker to remotely control the infected
physical sense eliminate drones: drone, cause it to drop from the sky, or hijack it to conduct
surveillance [38]. Main steps that have been taken: normal
• Laser − An optical device that emits a strong beam of flight controlled using API phone/computer, enabling autopilot,
light or radio energy at the drone. Relating to the power, sending code and waiting for a reverse TCP connection from
the laser can burn out or blind the hardware or camera. the drone, overriding the drone’s autopilot.
For example, ATHENA (Advanced Test High Energy
Asset) uses a specially developed tower with 30 kW 2. Some gadgets exploit DMSx, often used radio protocol
output power [35]. by most remote-controlled commercial drones, allowing the
hijacker to take control (for instance, the device called Icarus).
• Directed electromagnetic pulse − A generator emits a The exchanged public key (not encrypted) can be easily
pulse of energy that, if strong enough, can damage reconstructed after completing the binding process by
weakly shielded electronics. observing the protocol and using specific brute-force methods.
Furthermore, there is a timing attack vulnerability wherein the
000022
Authorized licensed use limited to: Raytheon Technologies Corporation. Downloaded on December 19,2020 at 07:38:28 UTC from IEEE Xplore. Restrictions apply.
11th IEEE International Conference on Cognitive Infocommunications – CogInfoCom 2020 • September 23-25, 2020 • Online on MaxWhere 3D Web
000023
Authorized licensed use limited to: Raytheon Technologies Corporation. Downloaded on December 19,2020 at 07:38:28 UTC from IEEE Xplore. Restrictions apply.
P. Cisar et al. • Principles of Anti-Drone Defense
000024
Authorized licensed use limited to: Raytheon Technologies Corporation. Downloaded on December 19,2020 at 07:38:28 UTC from IEEE Xplore. Restrictions apply.
11th IEEE International Conference on Cognitive Infocommunications – CogInfoCom 2020 • September 23-25, 2020 • Online on MaxWhere 3D Web
000025
Authorized licensed use limited to: Raytheon Technologies Corporation. Downloaded on December 19,2020 at 07:38:28 UTC from IEEE Xplore. Restrictions apply.
P. Cisar et al. • Principles of Anti-Drone Defense
[17] Zs. Namestovski, L. Major, Gy. Molnár, Z. Szűts, P. Esztelecki, G. [32] Learning RC (April 13, 2017). “Quadcopter Communication Protocols –
Kőrösi, “External Motivation, the Key to Success in the MOOCs Overview” Retrieved August 20, 2020 from: http://learningrc.com/rc-
Framework”, Acta Polytechnica Hungarica, vol. 15, no. 6 pp. 125-142, communication-protocols/
2018 [33] S. Cole (November 30, 2015). “Securing military GPS from spoofing
[18] B. Orosz, C. Kovács, D. Karuovic, Gy. Molnár, L. Major, V. Vass, Z. and jamming vulnerabilities”. Military Embedded Systems. Retrieved
Szűts, Zs. Námesztovszki, “Digital education in digital cooperative August 20, 2020 from: http://mil-embedded.com/articles/securing-
environments”, Journal of Applied Technical and Educational military-gps-spoofing-jamming-vulnerabilities/
Sciences/Alkalmazott műszaki és pedagógiai tudományos folyóirat, vol. [34] L. Hauzenberger, and E. Holmberg Ohlsson, “Drone detection using
9, no. 4. pp. 55-69, 2019 audio analysis,” M.S. thesis, Department of Electrical and Information
[19] Gy. Molnár, Z. Szűts, K. Biró, “Use of Augmented Reality in Learning”, Technology, Lund University, Sweden, June 2015. Retrieved August 20,
Acta Polytechnica Hungarica, vol. 15, no. 5 pp. 209-222, 2018 2020 from: http://lup.lub.lu.se/student-papers/record/7362609
[20] K. Hercegfi and M. Köles, “Temporal Resolution Capabilities of the [35] L. Dormehl (August 20, 2018). “7 amazing anti-drone technologies
Mid-Frequency Heart Rate Variability-based Human-Computer designed to swat UAVs out of the sky“. Digital Trends. Retrieved
Interaction Evaluation Method”, Acta Polytechnica Hungarica, vol. 16 August 20, 2020 from: https://www.digitaltrends.com/cool-tech/anti-
no. 6, pp. 95-114, 2019. drone-technologies/
[21] I. Poggi, F. D’Errico and L. Vincze, “Uncertain Words, Uncertain Texts. [36] G. Torbet (April 7, 2020). “7 Ways to Prevent Drones Infringing on
Perception and Effects of Uncertainty in Biomedical Communication”, Your Privacy“. MakeUseOf, Retrieved August 20, 2020 from:
Acta Polytechnica Hungarica, vol. 16, no.2, pp. 13-34, 2019. https://www.makeuseof.com/tag/8-ways-prevent-drones-infringing-
[22] Z. Balogh, M. Magdin, Gy. Molnár, “Motion Detection and Face privacy/
Recognition using Raspberry Pi, as a Part of, the Internet of Things”, [37] R. Joglekar (December 23, 2018). “4 strategies for stopping 'rogue'
Acta Polytechnica Hungarica, vol. 16, no.3 pp. 167-185, 2019 drones from flying in illegal airspace”. Retrieved August 20, 2020 from:
[23] I. Horváth, “MaxWhere 3D Capabilities Contributing to the Enhanced https://6abc.com/4-strategies-for-stopping-rogue-drones-from-flying-in-
Efficiency of the Trello 2D Management Software”, Acta Polytechnica illegal-airspace--/4949778/
Hungarica, vol. 16, no. 6, pp. 55-71, 2019. [38] R. Sasi (January 26, 2015). “Maldrone the First Backdoor for drones”.
[24] I. Horvath, A. Sudar, “Factors Contributing to the Enhanced Retrieved August 20, 2020 from:
Performance of the MaxWhere 3D VR Platform in the Distribution of http://garage4hackers.com/entry.php?b=3105
Digital Information”, Acta Polytechnica Hungarica, vol. 15, no. 3, pp. [39] N. Rodday, Hacking a Professional Drone, Black Hat, Asia 2016.
149-173, 2018. Retrieved August 20, 2020 from: https://www.blackhat.com/docs/asia-
[25] B. Berki, “Does Effective Use of MaxWhere VR Relate to the Individual 16/materials/asia-16-Rodday-Hacking-A-Professional-Drone.pdf
Spatial Memory and Mental Rotation Skills?”, Acta Polytechnica [40] P. Paganini (June 4, 2013). “Hacking Drones … Overview of the Main
Hungarica, vol. 16, no. 6, pp. 41-53, 2019. Threats”. Retrieved August 20, 2020 from:
[26] B. Berki, “2D advertising in 3D virtual spaces”, Acta Polytechnica https://resources.infosecinstitute.com/hacking-drones-overview-of-the-
Hungarica, vol. 15, no. 3, pp. 175-190, 2018. main-threats/#gref
[27] M. Kuczmann and T. Budai, “Linear State Space Modeling and Control [41] M.S. Greco, F. Gini, P. Stinco, and K. Bell, “Cognitive Radars: A
Teaching in MaxWhere Virtual Laboratory” Acta Polytechnica Reality?”, Cornel University, 2018, Retrieved August 20, 2020 from:
Hungarica, vol. 16, no. 6, pp. 27-39, 2019. https://arxiv.org/ftp/arxiv/papers/1803/1803.01000.pdf.
[28] K. Hercegfi, A. Komlódi, M. Köles, and S. Tóvölgyi, “Eye-Tracking- [42] S. Haykin, “Cognitive radar: A way of the future”, IEEE Signal
based Wizard-of-Oz Usability Evaluation of an Emotional Display Processing Magazine, vol. 23, no. 1, pp. 30-40, Jan. 2006.
Agent Integrated to a Virtual Environment”, Acta Polytechnica [43] A. F. Martone, “Cognitive radar demystified,” in URSI Radio Science
Hungarica, vol. 16, no. 2, pp. 145-162, 2019. Bulletin, vol. 2014, no. 350, pp. 10-22, Sept. 2014, doi:
[29] T. Budai, M. Kuczmann, “Towards a Modern, Integrated Virtual 10.23919/URSIRSB.2014.7910111.
Laboratory System” Acta Polytechnica Hungarica, vol. 15, no. 3, pp. [44] K. Krishnan, T. Schwering, and S. Sarraf, “Cognitive Dynamic Systems:
191-204, 2018. A Technical Review of Cognitive Radar”, Cornel University, arXiv:
[30] N. Goodman, Chapter 3 - Foundations of cognitive radar for next- 1605.08150, 2016, Retrieved August 20, 2020 from:
generation radar systems, Academic Press Library in Signal Processing, https://arxiv.org/pdf/1605.08150.pdf
Volume 7, Array, Radar and Communications Engineering, pp 153-195, [45] P. Labbé, “Cognitive Radars (CRs) Could Improve Target Engagement
2018, ISBN 978-0-12-811887-0, Retrieved August 20, 2020 from: Success Rate”, SPACOMM 2020: The Twelfth International Conference
https://doi.org/10.1016/C2016-0-00738-6 on Advances in Satellite and Space Communications, 2020.
[31] Electronics Coach, Pulse Position Modulation. Retrieved August 20, [46] S. Chin (July 22, 2019). „Radar system sensitive enough to detect drones
2020 from: https://electronicscoach.com/pulse-position-modulation.html 3 km away“.Fierce Electronics. Retrieved August 20, 2020 from:
https://www.fierceelectronics.com/sensors/radar-system-sensitive-
enough-to-detect-drones-3-km-away
000026
Authorized licensed use limited to: Raytheon Technologies Corporation. Downloaded on December 19,2020 at 07:38:28 UTC from IEEE Xplore. Restrictions apply.