938
UWB – ultra-wideband
ACKNOWLEDGEMENTS
This work was developed within the framework of the
research grant no. UGB/22-059/2025/WAT, sponsored by the
Military University of Technology (WAT), Poland.
REFERENCES
[1] S. A. H. Mohsan, N. Q. H. Othman, Y. Li, M. H. Alsharif,
and M. A. Khan, “Unmanned aerial vehicles (UAVs):
Practical aspects, applications, open challenges, security
issues, and future trends,” Intel Serv Robotics, vol. 16, no.
1, pp. 109–137, Mar. 2023, doi: 10.1007/s11370-022-00452-
4.
[2] K. Bednarz, J. Wojtuń, J. M. Kelner, and K. Różyc,
“Frequency instability impact of low-cost SDRs on
Doppler-based localization accuracy,” Sensors, vol. 24, no.
4, Art. no. 4, Jan. 2024, doi: 10.3390/s24041053.
[3] G. E. Jeler, “Military and civilian applications of UAV
systems,” in 2019 International Scientific Conference
Strategies XXI. The Complex and Dynamic Nature of the
Security Environment, Bucharest, Romania, Nov. 2019, pp.
379–386. Accessed: July 24, 2025. [Online]. Available:
https://www.ceeol.com/search/chapter-detail?id=824918
[4] D. Zmysłowski, P. Skokowski, and J. M. Kelner, “Anti-
drone sensors, effectors, and systems – A concise
overview,” TransNav Int. J. Mar. Navig. Saf. Sea Transp.,
vol. 17, no. 2, pp. 455–461, June 2023, doi:
10.12716/1001.17.02.23.
[5] M. Specht, S. Widźgowski, A. Stateczny, C. Specht, and O.
Lewicka, “Comparative analysis of unmanned aerial
vehicles used in photogrammetric surveys,” TransNav,
International Journal on Marine Navigation and Safety od Sea
Transportation, vol. 17, no. 2, pp. 433–443, June 2023, doi:
10.12716/1001.17.02.21.
[6] J. Skóra, “The use of unmanned aerial vehicles in the
context of ensuring security in the state,” Aviation and
Security Issues, vol. 1, no. 1, Art. no. 1, July 2022, doi:
10.55676/asi.v1i1.7.
[7] W. Shin and M. Vaezi, “UAV-enabled cellular networks,”
in 5G and beyond: Fundamentals and standards, X. Lin and
N. Lee, Eds., Cham, Switzerland: Springer International
Publishing, 2021, pp. 165–200. doi: 10.1007/978-3-030-
58197-8_6.
[8] H. Jinke, F. Guoqiang, and Z. Boxin, “Research on
autonomy of UAV system,” in 2021 IEEE 4th International
Conference on Automation, Electronics and Electrical
Engineering (AUTEEE), Shenyang, China, Nov. 2021, pp.
745–750. doi: 10.1109/AUTEEE52864.2021.9668730.
[9] I. Al-Darraji et al., “A technical framework for selection of
autonomous UAV navigation technologies and sensors,”
Computers, Materials & Continua, vol. 68, no. 2, pp. 2771–
2790, 2021, doi: 10.32604/cmc.2021.017236.
[10] P. R. Sriram, S. K. Ramani, R. V. Shrivatsav, M.
M.Mankiandan, and N. Ayyappaa, “Autonomous drone
for defence machinery maintenance and surveillance,” in
2019 3rd World Conference on Smart Trends in Systems
Security and Sustainablity (WorldS4), London, UK, July
2019, pp. 288–292. doi: 10.1109/WorldS4.2019.8904014.
[11] A. Cheranyov and E. Dukhan, “Methods of detecting
small unmanned aerial vehicles,” in 2021 Ural Symposium
on Biomedical Engineering, Radioelectronics and Information
Technology (USBEREIT), Yekaterinburg, Russia, May
2021, pp. 0218–0221. doi:
10.1109/USBEREIT51232.2021.9455043.
[12] S. Park, H. T. Kim, S. Lee, H. Joo, and H. Kim, “Survey
on anti-drone systems: Components, designs, and
challenges,” IEEE Access, vol. 9, pp. 42635–42659, 2021,
doi: 10.1109/ACCESS.2021.3065926.
[13] R. Di Pietro, G. Oligeri, and P. Tedeschi, “JAM-ME:
Exploiting jamming to accomplish drone mission,” in
2019 IEEE Conference on Communications and Network
Security (CNS), Washington, DC, USA, June 2019, pp. 1–
9. doi: 10.1109/CNS.2019.8802717.
[14] M. A. Jasim, H. Shakhatreh, N. Siasi, A. H. Sawalmeh, A.
Aldalbahi, and A. Al-Fuqaha, “A survey on spectrum
management for unmanned aerial vehicles (UAVs),”
IEEE Access, vol. 10, pp. 11443–11499, 2022, doi:
10.1109/ACCESS.2021.3138048.
[15] D. Zmysłowski, M. Kryk, and J. M. Kelner, “Testing
GNSS receiver robustness for jamming,” Aviation and
Security Issues, vol. 4, no. 2, Art. no. 2, Dec. 2023, doi:
10.55676/asi.v4i2.64.
[16] X. Liu, H. Wang, X. Yang, and J. Wang, “Quad-band
circular polarized antenna for GNSS, 5G and WIFI-6E
applications,” Electronics, vol. 11, no. 7, Art. no. 7, Jan.
2022, doi: 10.3390/electronics11071133.
[17] H. Lv, F. Liu, and N. Yuan, “Drone presence detection by
the drone’s RF communication,” J. Phys.: Conf. Ser., vol.
1738, no. 1, p. 012044, Jan. 2021, doi: 10.1088/1742-
6596/1738/1/012044.
[18] J.-C. Juang, C.-T. Tsai, and Y.-H. Chen, “Development of
a PC-based software receiver for the reception of Beidou
navigation satellite signals,” The Journal of Navigation, vol.
66, no. 5, pp. 701–718, Sept. 2013, doi:
10.1017/S0373463313000271.
[19] N. M. Stojanović, B. M. Todorović, and V. B. Ristić,
“Analysis of repeater jamming of a slow frequency
hopping radio,” Vojnotehnicki glasnik/Military Technical
Courier, vol. 70, no. 3, pp. 664–679, 2022, doi:
10.5937/vojtehg70-37535.
[20] O. Šimon and T. Götthans, “A survey on the use of deep
learning techniques for UAV jamming and deception,”
Electronics, vol. 11, no. 19, Art. no. 19, Jan. 2022, doi:
10.3390/electronics11193025.
[21] P. Skokowski et al., “Practical trial for low-energy
effective jamming on private networks with 5G-NR and
NB-IoT radio interfaces,” IEEE Access, vol. 12, pp. 51523–
51535, 2024, doi: 10.1109/ACCESS.2024.3385630.
[22] Y. Bai, “Research on GNSS spatial signal interference
evaluation and suppression method,” PhD thesis,
University of Chinese Academy of Sciences., Beijing,
China, 2014.
[23] Z. Chong et al., “Research on the mechanism and the
impact of jamming on Beidou software receiver,” in 2016
IEEE Chinese Guidance, Navigation and Control Conference
(CGNCC), Nanjing, China, Aug. 2016, pp. 198–202. doi:
10.1109/CGNCC.2016.7828783.
[24] V. Chamola, P. Kotesh, A. Agarwal, Naren, N. Gupta,
and M. Guizani, “A comprehensive review of unmanned
aerial vehicle attacks and neutralization techniques,” Ad
Hoc Networks, vol. 111, p. 102324, Feb. 2021, doi:
10.1016/j.adhoc.2020.102324.
[25] H. Paik, N. N. Sastry, and I. SantiPrabha, “Effectiveness
of noise jamming with white Gaussian noise and phase
noise in amplitude comparison monopulse radar
receivers,” in 2014 IEEE International Conference on
Electronics, Computing and Communication Technologies
(CONECCT), Bangalore, India, Jan. 2014, pp. 1–5. doi:
10.1109/CONECCT.2014.6740286.
[26] O. Šimon, T. Götthans, and M. Popela, “Commercial
UAV jamming possibilities,” in 2022 32nd International
Conference Radioelektronika (RADIOELEKTRONIKA),
Kosice, Slovakia, Apr. 2022, pp. 1–6. doi:
10.1109/RADIOELEKTRONIKA54537.2022.9764904.
[27] P. Skokowski and J. Dułowicz, “Autonomous mobile
system for detecting and jamming cellular network
signals using a software defined radio integrated into a
UAV platform,” in 2023 Signal Processing Symposium
(SPSympo), Karpacz, Poland, Sept. 2023, pp. 149–151. doi:
10.23919/SPSympo57300.2023.10302702.
[28] A. Brito, P. Sebastião, and N. Souto, “Jamming for
unauthorized UAV operations-communications link,” in
2019 International Young Engineers Forum (YEF-ECE),