CDRD: Your Premier Hub for Defence Research & Development
The Centre for Defence Research and Development (CDRD) is a Sri Lankan R&D institute, affiliated with the Ministry of Defence, focused on advancing technologies for the country’s Armed Forces. CDRD collaborates closely with different military branches and other stakeholders, driving innovations in both civilian and military technologies. Through its partnerships and R&D efforts, CDRD ensures Sri Lanka’s defences stay ahead of the curve.
- Past Tales?
- Project Queries?
- How Should an Organization Be Structured?
- Is GNSS Vulnerable to Frequent Jamming and Spoofing Attacks?
- GNSS: How to Jam and Spoof Signals?
- Is signal jamming now mainstream?
- What is the largest GNSS user community for timing solutions?
- How to Implement Effective Anti-Jamming and Anti-Spoofing Measures?
- How Can AI Be Used for Jamming and Spoofing Detection?
Past Tales?
In 2006, the CDRD was established at the Panagoda cantonment in Sri Lanka, in response to the civil war. This innovative initiative brought together army personnel and engineering experts from various universities, with the aim of countering the widespread use of wirelessly detonated Claymore mines and improvised explosive devices by the Liberation Tigers of Tamil Eelam. The CDRD’s efforts led to the development of the K3 Jammer, a groundbreaking device that could disrupt signals and detect and detonate mines planted by the LTTE. The initial manpack version of the K3 Jammer was effective up to 100 meters, while the later K3V vehicular version provided enhanced security for VIPs. Beyond its military applications, the CDRD also developed mobile phone jammers for prisons, as well as GPS and satellite phone jammers, highlighting the versatility and impact of its technology in multiple domains.
Project Queries?
CDRD has consistently pushed the boundaries of technology, evolving from modifying military equipment to developing cutting-edge civilian technologies. Initially, projects focused on enhancing existing military hardware, such as the rugged RA400 Cougar First Microphone tailored for Cougar Radios and later adapted for use with PRC1077 VHF Tactical Radios. However, CDRD’s scope has broadened significantly, embracing new projects and R&D initiatives in civilian-oriented technologies. Notable achievements include a helium balloon-based stationary surveillance platform equipped with pan-tilt-zoom and infrared cameras, demining machines, voice encryption devices for phones and radios, high nutrition/calorie ratio packs alongside packaging materials and containers, GPS-based vehicle tracking devices and fleet management systems, and the WS30 stabilized weapon system for naval vessels, developed in collaboration with EM Digital. CDRD’s journey from military modifications to civilian technology innovations showcases its versatility and commitment to technological advancement.
CDRD has established itself as a leading innovator in simulation technology, developing various simulators for training purposes such as realistic flight, flight control, field artillery, and jungle lane firing simulators. Beyond military applications, CDRD’s expertise extends to civilian technologies. They’ve created a Train Tracking and Operating Information System for Sri Lankan Railways, enhancing efficiency and safety. Other notable inventions include a Braille to Sinhala converter, bulletproof vests, and GPS-enabled quadcopters equipped with 3D modeling tools for drone mapping and disaster management. CDRD’s commitment to innovation doesn’t stop there; they’ve also developed a web-based Global Disaster Risk Analysis, Prevention, and Mitigation Application. Currently, CDRD is collaborating with the Sri Lanka Air Force on unmanned vehicle systems, including the successful Lihiniya MK II medium-range unmanned aerial vehicle and the Magura unmanned underwater vehicle for the Sri Lanka Navy.
CDRD has successfully developed a locally-produced 122mm MLRS system, featuring rockets, a launcher, hydraulic controls, and a digital fire control system. This impressive technology was showcased at the 71st Independence Day Parade. Additionally, CDRD is pioneering a naval adaptation of this MLRS, along with a guided missile project destined for naval vessels. Resources, however, remain a challenge. As of 2018, with limited funding, facilities, and researchers, only 8 of 15 wings are operational, causing delays in several projects.
How Should an Organization Be Structured?
The CDRD Headquarters serves as the command and control center of the entire CDRD organization. Led by a Director General, equivalent to a Major General, and supported by a team of Deputy Director General and Staff Officers, the CDRD is structured into four primary Divisions. Among these, the Technical & Material Division bears the responsibility for conducting research and development. Comprising of 15 Wings, each headed by a Chief Coordinator in the rank of Colonel or equivalent, the Technical & Material Division is a formidable force. However, as of 2018, only 8 Wings were fully operational. These fully operational Wings include Radio and Electronics Wing, Combat Engineering Wing, Missile Wing, Surveillance Wing, Explosive/Pyrotechnics Wing, IT & GIS Wing, Marine Wing, and Aeronautical Wing. Additionally, the CDRD Headquarters also oversees the Administrative & Logistic Division, Finance Division, and Training Division, ensuring efficient management and support across the organization.
Is GNSS Vulnerable to Frequent Jamming and Spoofing Attacks?
In today’s world, our reliance on satellites is growing profoundly, as they power a vast array of applications from global communication to monitoring Earth’s health and predicting weather patterns. GNSS systems like GPS, Galileo, and BeiDou have become essential for journey planning, whether on the road or trekking through mountains. However, recent global conflicts have exposed the vulnerability of these weak GNSS satellite signals to jamming and spoofing attacks. This was unimaginable when the U.S. Department of Defense first rolled out GPS in the 1980s, as affordable GNSS jammers and deceit devices capable of misleading receivers into believing they’re in a different location are now widespread. Despite advancements, ensuring the security and integrity of GNSS signals remains a pressing challenge.
GNSS: How to Jam and Spoof Signals?
The interruption of GNSS-based PNT services can be broadly classified into jamming and spoofing. While jamming may occur briefly or persist for extended periods, and could be either intentional or unintentional, spoofing elevates the disruption by misleading GNSS receivers to report false positions. Unintentional jamming often arises from ‘splatter’ caused by adjacent frequency wireless users, amateur radios, or faulty radio equipment designs. On the other hand, intentional jamming encompasses a wide range, from truckers using inexpensive devices to block toll road signals to military-grade equipment deployed to disable drone missiles in conflict areas. As these incidents of jamming and spoofing become increasingly commonplace, EE Times Europe engaged in a discussion with Gustavo Lopez, the market access manager at Septentrio, a leading high-precision GNSS specialist from Leuven, Belgium, to explore the countermeasures integrated into their GNSS products.
Is signal jamming now mainstream?
The landscape of security threats is undergoing a significant transformation, with jamming and spoofing activities emerging from the shadows of niche discussions to become a pressing concern. According to Lopez, while technology to counter these threats has been available for a decade, the conversation around them has shifted dramatically. No longer relegated to specialized forums, the topic of jamming and spoofing now stands at the forefront of securing diverse systems. This shift is partly attributed to the widespread accessibility of affordable USB jammers, capable of disrupting communications over a broad area. The geopolitical tensions in certain regions have escalated the use of these devices, particularly in bringing down drones. Similarly, spoofing techniques, once the domain of complex technology, have been simplified by open-source software and software-defined radios. This ease of access has led to a surge in inquiries about jamming devices, with spoofing predominantly observed in conflict zones. However, the alarming trend is the lack of awareness among many users about the risks associated with employing such technology. Often, individuals engage in jamming activities without realizing the potentially serious consequences for those around them, sometimes even unknowingly violating legal boundaries.
What is the largest GNSS user community for timing solutions?
The timing community stands as the largest group of GNSS users globally, a revelation that may surprise many. Lopez emphasized this unexpected truth about the navigation system, explaining that it’s the timing community that harnesses GNSS’s precision time capabilities to synchronize networks. This synchronization is crucial for various sectors, including data transfer, communications, banking transactions in the finance sector, and power grids. Some governments have acknowledged GNSS as a critical infrastructure due to this heavy reliance and are taking measures to ensure its security. Lopez pointed out that in the U.S., a dedicated group focuses on PNT assurance and risk assessment to critical infrastructure. Furthermore, he noted the vulnerability of essential infrastructure like cellular base stations to jamming, given their fixed positions and exposed GNSS antennas.
How to Implement Effective Anti-Jamming and Anti-Spoofing Measures?
When it comes to detecting and countering jamming and spoofing attacks, a plethora of proven techniques are available. Lopez highlights that the methods they use are constantly evolving, often implementing multiple strategies simultaneously. Some of these are proprietary, involving their intellectual property, while others are more widely known. One of the most commonly used techniques is filtering, which can be done through bandpass, notch, or adaptive methods. However, Lopez emphasizes that not all GNSS receivers are protected equally from jamming and spoofing, even if they utilize filtering techniques. The effectiveness varies depending on the specific implementation and the type of jamming encountered. To enhance protection, multi-frequency and multi-constellation approaches are crucial. By increasing the number of signals, more error cancellation can be achieved, improving the overall resilience against jamming and spoofing attacks.
Lopez highlighted multiple techniques to identify fake GNSS signals, emphasizing authentication as a new approach. The European Galileo constellation currently offers the only encryption mechanism, but GPS is planning to incorporate encryption through Chimera. Other constellations are exploring similar techniques. Additionally, using alternative signals is a viable option. For example, our timing product utilizes an extra signal from the Inmarsat constellation to complement existing countermeasures. This frequency is close to GNSS bands, enabling tracking and authentication of all constellations and signals. Collecting data from external systems like inertial navigation systems further enhances these efforts.
Enhance system security with our alternative mechanism. It offers an extra layer of protection, ensuring your safety.
How Can AI Be Used for Jamming and Spoofing Detection?
The evolving technology of intentional jammers and spoofers underscores the significance of machine learning in detecting GNSS disruptions and enhancing PNT resilience. Lopez highlighted that they employ an early version of AI algorithms to identify specific patterns. With over 40,000 data files, including various jamming and spoofing scenarios, their database is robust. Although the application of real AI in this domain is relatively nascent, it’s a subject of intense research. Examining signal patterns, signal-to-noise ratios over time, and other signal traits enables the classification of different jammer types. This is where machine learning shines, facilitating data classification and informed decision-making. Furthermore, AI offers decision tree mechanisms, aiding in determining the most effective countermeasure for any given situation.