System Architecture

This section documents the system-level architecture, data pathways, and design principles for the Low-Cost Smart Sensor Spoofer on UAV platform. The design emphasizes modularity, deterministic timing, and hardware abstraction to support both simulation-based validation and edge deployment.


High-Level Architecture Overview

The system is composed of three tightly-coupled subsystems that form a closed-loop digital thread:

Virtual sensing → Middleware → Edge inference → Telemetry feedback Architecture Overview


1. Ground Station — UE5 Virtual Environment

Role: Virtual sensor generator and operator control interface

Ground Station Architecture

Functions

  • Generates synthetic LiDAR point clouds using raycasting and scene geometry
  • Injects configurable spoofing profiles (range shift, ghost targets, dropout)
  • Streams time-tagged frames to Simulink over TCP
  • Provides operator control for attack parameters and scenario selection

Role: System synchronization and protocol translation layer

Simulink Bridge Architecture

Functions

  • Validates incoming frames using CRC and sequence counters
  • Enforces deterministic timing and buffering
  • Converts virtual frames into sensor-accurate message formats
  • Routes telemetry and inference results back to the GCS

3. UAV Edge Device — Neural Inference & Sensor Emulation

Role: Real-time spoof detection and hardware abstraction

Edge Device Architecture

Hardware Stack

  • Jetson Nano / Orin Nano — Edge AI inference
  • Raspberry Pi / MCU HAL — Sensor bus emulation
  • Livox LiDAR — Real-world signal validation

Functions

  • Runs quantized neural network for spoof classification
  • Emulates sensor buses (UART, I²C, SPI)
  • Publishes telemetry, health, and confidence metrics
  • Engages fallback logic under real-time constraint violations

System Data Flow

UE5 Virtual LiDAR + Spoof Profiles → TCP (Frame + CRC + Timestamp) → Simulink Middleware → Sensor-Accurate Packets → Edge Device (Jetson + HAL) → Inference + Health Metrics → Telemetry Feedback → Ground Station

Hardware Data Flow

Data Characteristics

  • Data Characteristics
  • Frame-based point cloud transport
  • Time-tagged packets with integrity verification
  • Bounded queues for real-time determinism

Control Flow

Operator-in-the-Loop Execution Model

  1. Operator configures spoof parameters in the Ground Station
  2. Simulink synchronizes global timing and validates frames
  3. Edge device executes inference and decision logic
  4. Status, confidence, and system health are returned to the operator

Power Flow

Subsystem Power Source Regulation
Ground Station AC Mains System PSU
Edge Device (Jetson) 10,000mAh Battery 12V / 5V DC Rails
Livox LiDAR Edge Device DC Rail 12V Regulated
HAL + MCU Edge Device DC Rail 5V / 3.3V

Design Principles

Deterministic Timing

Fixed-latency pipelines and bounded buffering to maintain real-time inference

Modular Validation

Each subsystem testable independently (UE5, Simulink, Edge)

Hardware Abstraction

Sensor protocols emulated via HAL to support rapid platform changes

Safety-First Spoof Isolation

Spoofing remains confined to simulation and HIL paths — no RF emissions


Traceability to Design Documents

This architecture aligns directly with:

Each subsystem maps to a formal Interface Control Document (ICD) defining message formats, timing constraints, and fault-handling behavior.


Architecture Summary

This design establishes a closed-loop digital twin framework that enables high-fidelity spoof simulation, real-time edge inference, and safe system validation without physical RF emission — supporting scalable UAV security research under academic and regulatory constraints.


UAV Sensor Spoofing Detection Project | Virginia Tech | Sponsored Research

This site uses Just the Docs, a documentation theme for Jekyll.