Robinhoods Revolutionizes Finance With Tokenized Shares
The world of finance has seen a significant shift with the rise of tokenized shares, allowing …
03. July 2025
The Rise of RTK Modules: Understanding the Cybersecurity Risks and Resilience of Small Unmanned Aerial Systems (sUAS)
Small unmanned aerial systems (sUAS) continue to proliferate in various industries, including land development mapping, surveying, and inspection. The use of real-time kinematic (RTK) modules has become increasingly popular due to their ability to achieve higher accuracy and reliability in positioning, navigation, and timing (PNT). However, the potential cybersecurity risks associated with these modules have not received adequate attention.
The Global Positioning System (GPS) is a multi-domain, multi-sectoral, and multi-asset system that consists of three segments: the space segment, the ground segment, and the user segment. This framework is critical to understanding the landscape of GPS and its impact on the space economy. The use of RTK modules in sUAS operations has become prevalent, particularly for land development mapping missions, as they enable the sUAS to track multisystem satellite L1 and L2 civilian bands over code and carrier phase signals.
RTK modules offer several technical advantages, including enhanced reception capability and efficiency, but they also introduce potential cybersecurity risks. The use of RTCM 10403.3, or version 3.3, as an open format presents a vulnerability to spoofing and jamming attacks. GNSS receivers are typically built into both the ground element (handheld controller) and the air element (air vehicle), making them susceptible to hacking.
Spoofing involves injecting false data into the PNT solution, causing the sUAS to give false location reports. This can have catastrophic consequences in industries such as land development mapping and surveying, where accuracy is paramount. Jamming attacks involve disrupting the communication signals between the sUAS and its controller, rendering the aircraft unable to operate.
While there are currently no confirmed cases of cyber attacks specifically targeting RTK modules, it is essential to consider the potential risks. Companies like GPSPATRON produce devices and software to measure, defend, and protect against jamming and spoofing attacks through counter-spoofing tactics. Another front of attacks can come from RTK hardware embedded during the manufacturing process.
Regulatory gaps and a lack of standardized interoperability protocols pose significant challenges to ensuring the security of RTK modules. The OEM can be held responsible for these faults, but regulations and standards are largely non-existent or have only recently begun to emerge.
To mitigate the risks associated with RTK modules, it is essential to strike a balance between benefits and cybersecurity needs. Encryption, at the very least, safeguards data from unauthorized access and ensures the integrity and improved reception rates of the intended data packets for the intended user. By understanding the risks associated with RTK modules and taking proactive steps to mitigate them, we can ensure the continued growth and development of this critical technology.
The future of sUAS operations depends on our ability to balance technological advancements with cybersecurity needs. As the use of RTK modules continues to grow, it is crucial that manufacturers, regulators, and end-users prioritize cybersecurity and take concrete steps to protect against potential threats. By doing so, we can harness the full potential of RTK modules while ensuring the safety and integrity of sUAS operations.
As the space economy continues to evolve, it is essential to consider the broader implications of RTK module vulnerabilities on industries that rely on these systems. By proactively addressing cybersecurity concerns and investing in research and development, we can create a more secure and reliable future for sUAS operations.