TFSIK02 – Secure High‑Power Telemetry Modem

Purchasing Information

The device can be purchased from ThunderFly s.r.o. For commercial quotations or special configurations (frequency bands, output power, cryptographic handling), contact us at sale@thunderfly.cz. TFSIK02 is developed and manufactured in‑house and localised in the EU, which allows hardware configuration and traceable customization required by defense and security‑sensitive users.

Overview

TFSIK02 is a defense‑oriented variant of the TFSIK telemetry modem, designed for secure and long-range command, control, and telemetry links in environments where interference resistance, controlled frequency allocation, and link confidentiality are primary requirements.

While TFSIK02 is technically derived from the TFSIK01 design, it is not intended for hobby or civil UAV telemetry. Instead, it targets:

  • Defense and security UAVs
  • Government and institutional unmanned systems
  • Applications where key management and link isolation are required

For general SiK firmware operation, radio principles (FHSS, TDM, LBT), and AT‑command configuration, refer to the corresponding sections in the TFSIK01 documentation.

Designed for Defense Use

Compared to TFSIK01, TFSIK02 emphasizes:

  • High RF output power - up to 35 dBm, using robust hardware Power Amplifier
  • Controlled frequency planning - outside standard hobby ISM usage
  • Dual‑antenna diversity - for spatial robustness
  • FHSS + TDM architecture - resilient against narrowband jamming
  • Multiple encryption and key‑handling concepts - Explicit cryptographic workflows detailed in description below
  • Point‑to‑point operational model - solves encrypted transmission between the two UART ports (UAV <-> GCS)
  • Deterministic link pairing - removes accidental association with third‑party radios

Generic SiK firmware features are described in the TFSIK01 documentation and are not repeated here. The modem remains based on open and inspectable hardware and firmware principles, which allows security audits and controlled deployment, while avoiding black‑box radio behavior.

Hardware Parameters

ParameterValueNotes
Frequency range142 MHz – 1050 MHzFactory configured, band‑specific RF front‑end
RF output power20 dBm – 35 dBmFixed per configuration, regulatory dependent
Receiver sensitivity≤ −117 dBm64 kbps air data rate
RF bandwidth< 4 MHzHardware‑filtered
Antenna connectorsMCX (dual)Supports diversity
Interface3.3 V UART (JST‑GH)Pixhawk‑compatible
Supply voltage5 VPower consumption depends on RF power (Up to 2A)
Operating temperature−20 °C to +40 °CCooling‑limited

Frequency Bands of Interest for Defense Users

Nominal BandTypical Use Case
225–400 MHzMilitary UHF / long‑range LOS
400–450 MHzTactical UAV telemetry
433 MHzShared / experimental environments
460–500 MHzGovernment‑allocated channels
800–900 MHzHigh‑throughput short‑range links
915 MHzExport‑friendly configurations

⚠️ Regulatory compliance is entirely deployment‑dependent. TFSIK02 hardware is configured per project and not user‑retunable across bands.

Secure Communication and Encryption Concepts

TFSIK02 supports multiple encryption and key‑management models, depending on how the modem pair is deployed and integrated. Its general principle is drop-in replacement of an unencrypted Mavlink modem connected on UART, by an encrypted wireless datalink between two UART ports.

Fixed Paired Modems (Pre‑Shared Key)

In the simplest and most robust model, TFSIK02 is delivered as a fixed modem pair:

  • One modem for the UAV (UAS)
  • One modem for the Control / Ground Station (CGS)

Both modems share a pre‑programmed cryptographic key set during manufacturing. The pair is intended to operate exclusively with each other.

Advantages: Maximum simplicity, no field configuration required, Minimal attack surface. Typical use: single‑mission platforms, expendable UAVs, classified environments.

QR‑Code / Label‑Based Key Provisioning

In this model, each UAV modem carries a unique cryptographic key, represented as a machine‑readable code (QR / DataMatrix) on a physical label attached to the device.

  • The UAV modem is installed on the airframe
  • The operator reads the code from the label
  • The CGS modem is configured with the corresponding key before the mission

Advantages: Field pairing without digital interfaces. No wireless key exchange. Suitable for logistics‑heavy operations. Typical use: small series UAVs, mixed fleets, forward deployment.

Dynamic Key Management (Per‑Flight Keys)

For reusable UAV platforms, TFSIK02 can be integrated into a higher‑level key‑management system, where:

  • A new cryptographic key is generated for each mission
  • Keys are injected via secure ground infrastructure
  • Lost or captured UAVs do not compromise future links

This model assumes the existence of a trusted pre‑deployment infrastructure, procedural control over the entire cryptographic key lifecycle, and integration at the system level rather than relying on modem‑only configuration.

Advantages: Highest security level, Compartmentalization of missions Typical use: reusable defense UAVs, long‑term platforms.

Threat Model

Unauthorized pairing of third‑party radios is prevented at the cryptographic level. A TFSIK02 modem will only establish a functional link if the peer modem possesses the correct cryptographic key. Without the valid key, received frames are discarded, and no valid telemetry or command stream is produced.

As a consequence, passive eavesdropping using SDR receivers yields encrypted data only, while active attempts to inject or replay packets fail without knowledge of the cryptographic key. Accidental pairing with foreign or third‑party SiK‑based radios is therefore effectively impossible. This makes common SDR‑based penetration techniques (traffic replay, packet injection, blind fuzzing) ineffective unless the cryptographic material is compromised.

Loss or Capture of UAV

Loss of the UAV platform does not automatically compromise the communication system. When using per‑flight or short‑lived keys:

  • Keys used during a mission are not reused
  • Compromise of one UAV does not affect other vehicles
  • Future missions remain secure

For higher security requirements, TFSIK02 can be configured such that cryptographic keys are stored only in volatile memory. In this mode, keys are erased immediately upon power loss, and physical capture of an unpowered UAV does not reveal past or future keys.

Key Lifecycle Assumptions

The overall security of the system depends on correct operational key handling, including:

  • Secure generation of keys
  • Controlled key injection into UAV and CGS
  • Proper destruction of expired keys

TFSIK02 provides the technical mechanisms to support these workflows, while procedural enforcement remains the responsibility of the operator.

Installation and Integration Notes

Mechanical installation, antenna placement, and UART wiring follow the same principles as described in the TFSIK01 Hardware Setup and Installation sections. Only band‑specific antenna systems and RF power considerations differ.

Export and Use Disclaimer

TFSIK02 is not a consumer or hobby telemetry device. It is supplied exclusively for professional, institutional, or governmental users who are responsible for frequency allocation, regulatory compliance, and cryptographic policy. Because it is designed for professional, governmental, and defense‑related applications. For civil and research UAV applications, refer to TFSIK01. Depending on the selected frequency band, output power, and cryptographic configuration, the device may be subject to export control.

The responsibility for the following activities rests solely with the user or purchasing organization.

  • Compliance with national and international regulations
  • Frequency allocation and licensing
  • Cryptographic policy and approval

ThunderFly s.r.o. supplies TFSIK02 as a configurable hardware platform. Final system classification, certification, and lawful use depend on how the device is integrated and deployed.