This product is listed in: Jamming Systems

Infrastructure Drone Protection

Product number: PKI 6315

Multilayer counter-drone defence
PKI’s platform provides a multi-layered, anti-drone solution to detect, locate and migrate enemy drones attempting to enter critical airspace. The fixed PKI 6315 Infrastructure Drone Protection model is designed to provide end users with real-time situational awareness to protect critical infrastructure.

The PKI 6315 Infrastructure Drone Protection system is based on a modular architecture. With each module being a self-contained element that allows for rapid on-site repair and maintenance and facilitates frequency updates in the event of future threats. The modules are installed in outdoor cabinets designed to operate 24 hours a day in harsh weather conditions and meet the most stringent environmental standards.

Detection and Identification by the PKI 6315 Infrastructure Drone Protection:

Scanning segment

The detection segment is based on a network of broadband sensors arranged around the secured facility. The deployment architecture is determined based on a site survey around the facility to determine the optimal installation locations.

The detection techniques of the PKI 6315 Infrastructure Drone Protection are based on the continuous analysis of time and frequency domains by RF sensors. Preloaded spectral signatures from commercially available drones are used as the system’s database. The PKI system searches for activity patterns that match the communication signatures of the stored drones. As soon as a match is found, the centre receives an alert informing it that a drone has been detected and its type. The low false alarm rate of the PKI 6315 Infrastructure Drone Protection is achieved by using an SDR-SIGINT receiver. Which is able to detect drones based on their spectral signature and is completely agnostic to the drone’s (possibly encrypted) protocol data. Resulting in a rapidly evolving signature database.


Determination of direction (DF) Segment
The exact position of the drone is determined by using a network of overlapping and complementary direction finders. Taking into account the likely threat axes.
Drones are immediately detected and located when they attempt to enter airspace. When they attempt to enter airspace that is at a safe distance (a few kilometres radius) from the target. Connected to a central control centre, which enables the control centre to wait and react appropriately. The accuracy of the estimated position is determined by the number of sensors used and the deployment topology.


Disturbing segment
Once the mitigation phase begins, the system blocks communication between the drone and its operator on ISM bands and the GPS signal used by the drone. The the PKI 6315 Infrastructure Drone Protection jammer consists of 5 bands covering all potential drone frequencies. Each band addresses a different communication channel that is used by the drone for a different purpose;

  • Disabling the drone’s control and telemetry channel, resulting in loss of control of the drone.
  • Blocking video downlink transmission
  • Interference with the GPS signal, deactivation of the drone’s navigation and stabilization capabilities

The modular design of the system allows for future upgrades and the inclusion of additional frequencies and threats.

Mission Control by th PKI 6315 Infrastructure Drone Protection:

C&C segment
Collecting real-time tracking data from a multi-sensor network usually requires feedback of the collected data over a high bandwidth fiber optic communications infrastructure.
The PKI system can also be used in scenarios where a high bandwidth fiber optic infrastructure is not available. In such cases, the PKI 6315 Infrastructure Drone Protection model of PKI can be operated over cellular networks (assuming sufficient coverage is available), using data reduction techniques that focus on reducing the volume of data transmitted within the network. The data collected by each DF sensor is transferred to the central one via the cellular network.

PKI 6315 can be integrated into any third-party system, leveraging its core capabilities while maintaining the end-user interface, facilitating the integration of PKI 6315 into a broader C&C application.