Military operations in the present day consider satellite navigation systems as essential cyber-physical infrastructure which supports their autonomous systems that include unmanned aerial vehicles (UAVs). The BeiDou-3 (BDS-3) system, which became completely operational in 2020, provides enhanced system resilience through its implementation of multi-frequency signals and cryptographic navigation message authentication and bidirectional short-message communication. The system uses these features, which create additional security weaknesses because advanced spoofing and command interception and malware distribution through messaging and ground-segment security breaches canoccur.
The research investigates BDS-3 cybersecurity threats for drone warfare in Iran, which will switch to BeiDou for UAV and missile guidance during the 12 day war with Israel due to GPS jamming threats. A refined threat model based on STRIDE incorporates security risks through quantitative measurement, while defensive measures get assessed using technological advancements in machine learning (ML) spoofing detection and multi-sensor fusion for GNSS-denied navigation and anti-jamming methods. The results demonstrate that space, cyber and autonomous domains require multiple AI-powered security measures to achieve operational dominance.
Table of Contents
- I. INTRODUCTION
- II. EVOLUTION OF GLOBAL NAVIGATION SATELLITE SYSTEMS IN MILITARY OPERATIONS
- III. GNSS AS CRITICAL CYBER INFRASTRUCTURE
- A. GNSS Spoofing
- B. Jamming
- C. Cyber Attacks on Ground Infrastructure
- IV. TECHNOLOGICAL CHARACTERISTICS OF THE BEIDOU-3 SYSTEM
- A. Navigation Message Authentication
- B. Multi-Frequency Navigation
- C. Two-Way Communication Risks
- V. SATELLITE MESSAGING AND COMMAND SECURITY
- VI. THREAT MODEL FOR SATELLITE-ENABLED DRONE SYSTEMS
- VII. CYBER-ELECTROMAGNETIC WARFARE
- VIII. CYBER-RESILIENT NAVIGATION ARCHITECTURE
- A. Advanced Spoofing Detection
- B. Multi-Sensor Fusion for GNSS-Denied
- C. Anti-Jamming and Authentication
- IX. RECENT ADVANCES IN MACHINE LEARNING-BASED SPOOFING DETECTION
- A. CTDNN-Spoof Model
- B. Robust Iterative Refinement Method
- C. Other ML Advances
- X. INTEGRATION WITH DRONE AND MISSILE SYSTEMS
- XI. OPERATIONAL CONCEPTS IN DRONE WARFARE
- XII. IMPLICATIONS FOR REGIONAL AIR-DEFENSE SYSTEMS
- XIII. LIMITATIONS AND COUNTERMEASURES
- XIV. DISCUSSION
- XV. CONCLUSION
Research Objectives and Core Themes
The research investigates the cybersecurity threats associated with the BeiDou-3 (BDS-3) satellite navigation system in the context of drone warfare, specifically analyzing how nations like Iran utilize such systems to overcome GPS jamming. It explores the shift toward multi-constellation GNSS reliance and the subsequent vulnerabilities this transition introduces in cyber-physical military infrastructure.
- Technological security vulnerabilities of the BeiDou-3 satellite constellation.
- The role of GNSS-denied navigation and spoofing mitigation in electronic warfare.
- Assessment of machine learning (ML) models for detecting signal interference in UAVs.
- STRIDE-based threat modeling for autonomous drone systems.
- Integration of multi-sensor fusion to ensure operational dominance under signal degradation.
Excerpt from the Publication
III. GNSS AS CRITICAL CYBER INFRASTRUCTURE
Global Navigation Satellite System (GNSS) consisting of a three-tiered architecture!: • Space segment: The satellite constellation provides navigation signals through its broadcasting system. • Control segment: The system requires ground-based facilities to monitor its operations together with uplink stations which enable satellite time synchronization and orbital control. • User segment: The receivers use incoming signals to determine PNT information through their processing capabilities.
Each layer harbors cybersecurity vulnerabilities exploitable by adversaries, potentially leading to cascading failures in dependent systems [4].
A. GNSS Spoofing Spoofing involves the transmission of fake navigation signals which leads to incorrect position-velocity-time PVT calculations by receivers. A spoofing attack can be represented mathematically through the false signal injection model which states that sf (t) equals A · sg(t − τ )ej2πfdt + n(t) where the system parameters τ and fd and A establish code delay and Doppler shift and amplitude advantage [3]. The phenomenon of UAV attacks enables drones to operate outside their planned flight paths, which was shown through the 2011 Iranian GPS spoofing operation that successfully captured a U.S. RQ-170 drone. [17].
Summary of Chapters
I. INTRODUCTION: Provides an overview of the dependency of modern military operations on GNSS and introduces the BeiDou-3 system as a key technological alternative for precision strike missions.
II. EVOLUTION OF GLOBAL NAVIGATION SATELLITE SYSTEMS IN MILITARY OPERATIONS: Discusses the historical transition of GNSS from basic navigation support to a critical backbone for autonomous and semi-autonomous military platforms.
III. GNSS AS CRITICAL CYBER INFRASTRUCTURE: Analyzes the three-tiered architecture of satellite systems and explains the mechanisms of spoofing, jamming, and ground-segment cyber attacks.
IV. TECHNOLOGICAL CHARACTERISTICS OF THE BEIDOU-3 SYSTEM: Details the technical advantages of BDS-3, including multi-frequency signal usage and short-message communication capabilities.
V. SATELLITE MESSAGING AND COMMAND SECURITY: Evaluates the risks and benefits of the two-way short-message service integrated into the BeiDou system for military command and control.
VI. THREAT MODEL FOR SATELLITE-ENABLED DRONE SYSTEMS: Applies the STRIDE model to identify attack vectors for drone platforms and emphasizes the importance of quantitative risk assessment.
VII. CYBER-ELECTROMAGNETIC WARFARE: Explains how modern warfare integrates cyber attacks with electronic warfare to exploit GNSS dependencies.
VIII. CYBER-RESILIENT NAVIGATION ARCHITECTURE: Outlines emerging defense strategies, such as AI-based anomaly detection and sensor fusion, to mitigate risks from single-source navigation reliance.
IX. RECENT ADVANCES IN MACHINE LEARNING-BASED SPOOFING DETECTION: Reviews state-of-the-art deep learning architectures and methods like CTDNN-Spoof used to detect and classify spoofing attempts.
X. INTEGRATION WITH DRONE AND MISSILE SYSTEMS: Discusses the strategic integration of BeiDou-3 into unmanned aerial systems to enhance long-range strike capabilities.
XI. OPERATIONAL CONCEPTS IN DRONE WARFARE: Examines how saturation tactics and large-scale drone swarms challenge conventional air-defense systems.
XII. IMPLICATIONS FOR REGIONAL AIR-DEFENSE SYSTEMS: Assesses the challenges posed by durable navigation systems for conventional radar-based defense infrastructures.
XIII. LIMITATIONS AND COUNTERMEASURES: Reviews the remaining vulnerabilities of BDS-3 to anti-satellite technologies and electronic warfare, despite its inherent resilience features.
XIV. DISCUSSION: Synthesizes the transition toward cyber-physical warfare and identifies future research paths like quantum cryptography and hybrid PNT.
XV. CONCLUSION: Summarizes how BeiDou-3 serves as a crucial achievement in navigation, while stressing the need for continued innovation in AI-driven defensive security.
Keywords
GNSS security, BeiDou-3, cyber-physical warfare, drone cybersecurity, satellite navigation resilience, spoofing mitigation, multi-sensor fusion, GNSS-denied navigation, machine learning detection, STRIDE model, electronic warfare, UAV guidance, command-link hijacking, signal authentication, autonomous systems.
Frequently Asked Questions
What is the primary focus of this research paper?
The paper examines the cybersecurity implications of integrating the Chinese BeiDou-3 satellite navigation system into modern military drone operations, specifically in the context of contested electronic warfare environments.
Which specific system is the main subject of this study?
The study focuses on the BeiDou-3 (BDS-3) global navigation satellite system as a technological alternative to the U.S. Global Positioning System (GPS).
What is the core research question addressed by the author?
The author investigates how BDS-3 dual-use technology influences drone warfare and what specific cyber threats are introduced when military forces pivot to this system during conflict.
Which scientific methods are employed in this study?
The research utilizes formal threat modeling (STRIDE), quantitative risk assessment, and an evaluation of machine learning-based defensive mechanisms to identify and mitigate cyber vulnerabilities.
What does the main body cover in terms of defense?
The main body explores defensive architectures, including multi-sensor fusion, AI-driven spoofing detection, and the use of inertial navigation as a backup for GNSS-denied environments.
Which keywords best characterize this work?
Key terms include GNSS security, BeiDou-3, drone cybersecurity, spoofing mitigation, cyber-physical warfare, and multi-sensor fusion.
How did the 2025 Twelve-Day War highlight the importance of BeiDou-3?
The conflict demonstrated that Iranian forces successfully shifted to BeiDou-3 when GPS jamming disrupted operations, allowing them to maintain 98% positioning accuracy for their drone swarms.
What are the identified risks of the BeiDou-3 short-message service?
While the service enables two-way communication for mid-mission updates, U.S. security assessments warn that it introduces risks of command injection and potential tracking vulnerabilities.
- Quote paper
- Alexios Kotsis (Author), 2026, Cyber Threat Modeling of GNSS-Based Drone Warfare. Security Implications of BeiDou-3 Integration in Precision Strike Systems, Munich, GRIN Verlag, https://www.hausarbeiten.de/document/1706720