1. Introduction
Unmanned Aerial Systems (UASs) are sensor-rich cyber-physical platforms that have rapidly transitioned from niche defense tools to mission-critical assets in civilian and industrial domains, including environmental monitoring, logistics, emergency response, and precision agriculture [
1,
2]. Their capabilities are enabled by advances in lightweight airframes, embedded processing, and wireless links, and they are anchored by Global Navigation Satellite System (GNSS) receivers-most notably GPS-which provide high positional accuracy at low power and with global availability [
3,
4]. In effect, UAS autonomy is a sensing problem: multi-modal measurements must be acquired, filtered, fused, and acted upon in real time, with tight constraints on energy, mass, and latency [
5].
This reliance on open, low-power GNSS signals creates a well-documented attack surface. Civilian GPS broadcasts are unencrypted and easily overpowered or emulated, exposing navigation to intentional interference and manipulation [
6]. Among the most consequential threats is GPS spoofing, where falsified satellite-like signals induce a forged navigation solution, silently degrading guidance and control without triggering alarms [
7,
8]. Compared with jamming, spoofing undermines
integrity rather than availability, risking airspace violations, mission corruption, or loss of the vehicle [
9,
10]. Recent field reports indicate a sharp rise in such incidents, growing from roughly 260,000 in 2023 to more than 430,000 in 2024 [
11,
12]. Traditional defenses (e.g., multi-antenna arrays, inertial redundancy) can be effective but are often impractical for small, cost- and power-constrained platforms [
13].
AI-enabled sensing offers a software-centric pathway that aligns with UAS resource budgets. Machine learning (ML) and deep learning (DL) models can learn telemetry signatures of spoofing in situ, enabling
onboard detection without hardware modifications [
14,
15]. However, practical deployment must overcome four persistent constraints: (i) stringent latency envelopes for flight-control loops; (ii) limited compute/energy at the edge; (iii) non-stationarity of spoofing tactics (concept drift); and (iv) noisy, heterogeneous navigation data that degrade separability [
16]. Addressing these constraints requires
sensor-system solutions that combine principled signal processing and data fusion with compact, search-optimized models and verifiable secure communications [
17].
We propose an AI-driven, multi-layer sensor architecture for real-time GPS spoofing detection and secure UAS navigation. The framework (i) enhances telemetry reliability through domain-aware preprocessing and feature shaping, (ii) uses differentiable architecture search (DARTS) to synthesize lightweight neural detectors tailored for embedded inference, and (iii) integrates a low-latency cryptographic layer to protect command and control.
Figure 1 illustrates recent GPS spoofing incidents in aviation.
Table 1 consolidates evidence from multiple sources, showing that GPS spoofing has escalated from sporadic events into a persistent operational threat for aviation systems. Across the cited reports, the impact is reflected both in sharp year-over-year growth (a reported 500% increase in spoofing-related flight disruptions) and in sustained high-frequency exposure, ranging from “a few dozen” affected flights per day in early 2024 to more than 1100 flights per day by August 2024. The conflict-zone statistics further emphasize the severity, with affected flights rising from 260,000 in 2023 to 430,000 in 2024, while long-horizon monitoring indicates over 580,000 spoofing/jamming events across 18.4 million tracked flights (August 2021–June 2024). Collectively, these figures justify the motivation for this paper and underscore the need for real-time, resource-efficient spoofing detection and secure command-and-control mechanisms for UAV operations in GPS-contested environments.
Research Contributions
The contributions of this study are as follows:
Multi-layer telemetry refinement for sensor separability.
We introduce the GPS Drift Index (GDI) and a domain-aware preprocessing pipeline-incorporating robust normalization, cluster-constrained oversampling, Kalman denoising, and quaternion smoothing-to improve the separability of spoofing signatures in noisy GNSS-centric sensor streams.
Search-optimized lightweight detection at the edge. We employ DARTS to automatically derive compact neural architectures optimized for onboard, real-time inference in UAS resource envelopes, achieving near-perfect detection performance (accuracy: 99.99%; ; AUC: 0.9999).
Secure command and control with minimal latency/energy. We design a lightweight cryptographic layer using PRESENT-128 with CMAC authentication that preserves confidentiality and integrity while adding only 1.79 ms latency and a 0.51 mJ energy cost, outperforming AES-128 and ChaCha20 in our benchmarks.
Together, these advances deliver a deployable, AI-enabled sensor system for resilient, real-time spoofing detection and secure autonomy in modern UAS operations.
2. Related Works
Unmanned aerial vehicles (UAVs) are becoming more and more dependent on Global Positioning System (GPS) signals, making them an appealing target for spoofing attacks. By providing fake signals that trick UAVs into making incorrect navigation decisions without warning their control systems, GPS spoofing presents a serious risk. In order to identify and reduce spoofing risks in UAVs and related cyber-physical systems, researchers have put forth a variety of machine learning (ML) and deep learning (DL) techniques.
When it comes to identifying spoofing signals based on telemetry anomalies, conventional machine learning models like Support Vector Machines (SVMs), Random Forests, and Logistic Regression have shown competitive performance. For example, ref. [
21] proposed a lightweight machine learning-based GPS spoofing detection framework that does not require any hardware changes. Using both static and dynamic spoofing datasets, the study demonstrated that Logistic Regression maintained a low latency of 0.024 µs per prediction while achieving a 96.67% detection rate. By utilizing complementary data from accelerometers, gyroscopes, and barometers, ref. [
18] presented a multi-sensor perception-based ML framework utilizing Random Forests and SVMs, achieving up to 99.69% accuracy. Despite these impressive outcomes, these methods frequently struggle to adapt to evolving spoofing techniques or to generalize across diverse environments.
DL-based approaches have gained traction as a means of addressing feature engineering and adaptability constraints. Convolutional Neural Networks (CNNs) and Support Vector Machines (SVMs) were applied to Connected and Autonomous Vehicles (CAVs) in [
22], achieving up to 99% accuracy in simulated environments. The authors highlighted limitations in resource-constrained environments. Similarly, a hybrid Transformer–BLSTM model for GPS spoofing detection in power grid systems was proposed by [
23], achieving 99.82% accuracy, but it has limited real-world adaptability. The authors of [
24] integrated statistical metrics with ensemble MLPs at edge servers in UAV-specific applications to enable detection without taxing the UAV. However, in regions with poor base station coverage, performance degradation was observed.
Enhancing detection through innovative architectures has been the focus of more recent efforts. A CNN–SVM ensemble for small UAVs was proposed by [
25], which achieved an F1-score of over 99.7% while remaining compatible with embedded systems. In a similar vein, ref. [
26] used 112 GPS features to create a compact, lightweight model (CTDNN-Spoof) that was optimized for TinyML deployment. These methods illustrate a shift toward low-power, high-accuracy solutions. In addition, ref. [
27] presented a self-supervised learning strategy utilizing LSTM-GRU and transfer learning, which increased performance to 99.9%. However, the authors acknowledged that class imbalance caused performance declines for infrequent spoofing classes.
Additionally, hybrid and adversarial models have emerged. In order to generate spoofing signals and train more robust CNN- and LSTM-based intrusion detection systems, ref. [
28] used Generative Adversarial Networks (GANs) and adversarial machine learning (AML). In complex spoofing scenarios, their framework achieved 98% detection accuracy, demonstrating improved resilience. Additionally, ref. [
15] increased F1-scores to 93.39% by combining LSTMs with Genetic Algorithms (GAs) for hyperparameter tuning. These models frequently lack evaluation under stringent real-time constraints despite their robust detection capabilities.
The authors of [
29,
30] investigated the effects of dataset quality, feature correlation, and dynamic model selection on spoofing detection accuracy in the context of optimization and adaptive model selection. According to their research, models like Random Forest and CART can achieve accuracy levels higher than 99.9%, particularly when combined with ensemble feature selection and Bayesian optimization. For embedded UAV applications, inference time and computational complexity remain challenging. By identifying common limitations across studies, survey-based works like [
31,
32] contextualized these findings. These limitations include the lack of real-time validation, dataset scarcity, high computational demands, and poor generalization to adversarial or unseen spoofing conditions. These surveys highlight the need for models that balance efficiency and performance in resource-constrained UAV environments.
3. Proposed Methodology
This section outlines our chosen approach for creating a reliable, intelligent, and real-time GPS spoofing detection framework for unmanned aerial vehicles. The proposed method uses a multi-phase experimental evaluation design, starting with a baseline machine learning pipeline and gradually incorporating neural architecture optimization, data augmentation, and advanced signal preprocessing. The methodology is divided into three main evaluation settings: the first uses standard preprocessing to establish foundational performance; the second introduces a novel domain-specific enhancement pipeline to improve class separability and data quality; and the third uses differentiable architecture search (DARTS) to automatically identify high-performing, lightweight artificial neural networks designed for real-time UAV deployment. Each stage builds on the previous one, resulting in a secure, simulation-ready system assessed across multiple classifiers and validated using accuracy, precision, recall, F1-score, and AUC-ROC metrics.
Figure 2 shows the entire methodological framework.
3.1. Dataset Used
This study employs the publicly available UAV Attack Dataset provided via IEEE DataPort [
33], which contains labeled UAV telemetry under both benign and GPS spoofing conditions. Due to legal, safety, and regulatory constraints associated with conducting live GPS spoofing attacks in real outdoor environments, the dataset does not rely on physical over-the-air spoofing experiments. Instead, GPS spoofing attacks are generated using software-based simulation and controlled post-processing of authentic UAV telemetry, where realistic perturbations are injected into GPS receiver outputs. These perturbations emulate characteristic spoofing behaviors such as positional drift, abrupt trajectory deviation, timing inconsistencies, and degradation of GPS accuracy indicators, while preserving the underlying physical motion patterns of the UAV. The dataset includes multiple spoofing profiles of varying complexity, enabling systematic and reproducible evaluation of detection models under diverse adversarial conditions. This simulation-based attack generation strategy ensures ethical compliance, repeatability, and suitability for supervised learning while still reflecting real-world GPS spoofing dynamics.
3.2. Domain-Specific Preprocessing and Data Refinement Pipeline
In order to improve the quality, balance, and interpretability of UAV telemetry data before spoofing detection, an advanced data preprocessing pipeline is developed in this stage. This pipeline incorporates a multi-stage refinement process that, in contrast to the baseline model, systematically eliminates noise, enhances minority samples, and maintains structural signal information across temporal, positional [
34], and orientation domains. The pipeline consists of seven integrated modules: (1) GPS Drift Index (GDI) computation; (2) variance thresholding; (3) robust Z-score normalization; (4) cluster-constrained oversampling using C-SMOTE; (5) Kalman-based GPS denoising [
35]; (6) quaternion signal smoothing using Savitzky–Golay filtering; and (7) feature audit and selection. Together, these procedures form a hybrid preprocessing framework that ensures that the final dataset is statistically consistent, physically meaningful, and optimized for high-sensitivity spoofing detection [
36]. The entire process is formalized in Algorithm 1, which describes the sequential logic and mathematical operations used to transform raw telemetry data into a refined input for the classification models.
| Algorithm 1: Unified advanced preprocessing pipeline for identifying UAV spoofing |
![Sensors 26 00843 i001 Sensors 26 00843 i001]() |
3.2.1. Step 1: GPS Drift Index (GDI)
The GPS Drift Index is a recently developed feature that measures spatial inconsistency between two separate GPS sources [
37]. During spoofing, one GPS stream is maliciously altered, causing noticeable divergence. The drift is measured as follows:
A moving average filter is then applied:
Its anomaly sensitivity is illustrated by
Figure 3a,b, which show that spoofing incidents manifest as abrupt GDI spikes and right-skewed distributions.
3.2.2. Step 2: Variance Thresholding
In order to remove uninformative features, each attribute’s variance is computed as [
38]
Features with
are removed.
Figure 4 demonstrate the removal of low-variance attributes, reducing dimensionality from 84 to 49, thereby improving efficiency and generalization.
3.2.3. Step 3: Robust Z-Score Normalization
Robust normalization is used to maintain outliers pertinent to spoofing while guaranteeing consistent feature scales:
where
is the median and
.
Figure 5a,b show balanced scaling post-normalization, which improves model stability and convergence.
3.2.4. Step 4: Cluster-Constrained SMOTE (C-SMOTE)
Intra-cluster interpolation is used to oversample the minority (spoofed) class in order to reduce class imbalance:
As demonstrated in
Figure 6, where synthetic samples (green) align with the original spoofed cluster (red), this maintains class structure.
3.2.5. Step 5: Kalman Filtering for GPS Signal Denoising
The Kalman model is used to recursively filter each GPS component:
Figure 7a–c show how filtered signals preserve trajectory trends while reducing noise.
3.2.6. Step 6: Quaternion Filtering via Savitzky–Golay Smoothing
Quaternion components (
) are smoothed using a polynomial regression filter:
where
and
.
Figure 8a–d depict reduced high-frequency noise while retaining true rotational dynamics.
3.2.7. Step 7: Feature Audit and Selection
By calculating Pearson correlations, the final audit determines which variables are most pertinent:
where
denotes the
i-th candidate feature and
y is the spoofing label. A Pearson correlation magnitude threshold
is applied such that a feature is retained if
. In this study, we set
, which provides a practical trade-off between excluding weakly informative variables and preserving potentially relevant signals under noisy GNSS conditions.
The choice of was guided by two considerations: (i) the dataset exhibits non-negligible measurement noise (even after filtering), which can suppress linear correlation values for genuinely informative navigation features, and (ii) the downstream DARTS-optimized model benefits from retaining a compact yet diverse set of spoofing-sensitive indicators rather than only the strongest single correlates.
Sensitivity analysis was conducted by sweeping and observing the stability of the final feature set and the downstream detection performance. We found that yielded a stable subset with consistently high performance, whereas larger thresholds () removed GPS-precision and altitude-related predictors that contributed to spoofing separability, and smaller thresholds () increased feature redundancy with marginal performance gains.
Keeping domain-specific characteristics (such as timestamp, quaternion, and GPS accuracy) and the top correlated features, domain-critical variables (
timestamp,
q_0–q_3) were retained regardless of correlation because they capture kinematic context and attitude dynamics that may not be strictly linear with the label but are operationally relevant to spoofing manifestations. The features most susceptible to spoofing-induced variations were included in the final selected set, which is displayed in
Table 2.
3.3. Differentiable Neural Architecture Search (DARTS)-Optimized Learning Stage
Because GPS spoofing attacks in UAV environments are becoming more sophisticated, intelligent models that are accurate, lightweight, and computationally efficient must be designed for real-time operation. For dynamically changing UAV systems, traditional artificial neural networks (ANNs) can be ineffective and poorly scalable because they frequently rely on manual architecture design or laborious hyperparameter tuning [
39]. In order to overcome these constraints, this stage employs a differentiable architecture search (DARTS) framework that leverages a continuous, gradient-driven optimization process to automate neural topology discovery. DARTS relaxes discrete design choices, activation functions, layer connections, and neuron counts into differentiable parameters that are optimized in tandem with model weights, in contrast to traditional search paradigms like reinforcement learning or evolutionary algorithms. As a result, architectures that achieve a balanced trade-off between accuracy, inference latency, and memory footprint can be produced through effective bilevel optimization that simultaneously adjusts architectural and weight parameters using training and validation feedback. Algorithm 2, which describes the joint optimization, pruning, and retraining stages of the architecture evolution process, summarizes the entire operational flow of the proposed adaptive DARTS framework.
| Algorithm 2: Adaptive DARTS framework for UAV spoofing detection |
![Sensors 26 00843 i002 Sensors 26 00843 i002]() |
3.3.1. Step 1: Bilevel Optimization Framework
At the heart of DARTS is a bilevel optimization problem that alternates between updating the network’s weights
w and architecture parameters
. The goal is to find the best weights and structural arrangements to reduce validation loss:
The architecture can change in tandem with weight learning thanks to this hierarchical structure, which guarantees that every architectural change improves generalization under unseen spoofing conditions.
3.3.2. Step 2: Continuous Architecture Parameterization
DARTS relaxes discrete design decisions (activation, layer size, skip connections) into a continuous parameter space to facilitate gradient descent optimization. Every edge connecting nodes
i and
j has a mixed operation as follows:
where the set of potential operations, such as ReLU, tanh, dropout, or dense layers, is represented by
. Differentiability is made possible by this softmax-weighted operation, which enables the search process to dynamically highlight more efficient operations through gradient updates.
3.3.3. Step 3: Discretization of Final Architecture
After convergence is reached, the most dominant operation for each connection is chosen to discretize the final architecture [
40]:
The continuous search graph is converted into an executable ANN topology that is prepared for deployment through this selection process. To guarantee reliable final performance, the model is then retrained from scratch using a combination of training and validation data.
3.3.4. Step 4: Implementation and Architecture Visualization
Figure 9 shows the proposed DARTS framework designed for the detection of UAV spoofing. Each computational cell’s pool of potential operations serves as the starting point for the search, which is then gradually improved through bilevel optimization [
41]. While architecture weights
adjust in response to validation loss, feedback weights
w are adjusted during training using training data. An architecture that autonomously balances accuracy, latency, and memory footprint is generated as a result of this process, making it well suited for UAV systems that require effective onboard inference.
3.3.5. Step 5: Search Configurations and Hyperparameters
To gradually improve the search depth, complexity, and hardware-awareness of the networks discovered, five DARTS configurations (DARTS-1 to DARTS-5) are implemented. In order to determine baseline feasibility, the earlier configurations (DARTS-1, DARTS-2) explore shallow networks with constrained operation sets. To encourage deployment-ready architectures, the later iterations (DARTS-3 through DARTS-5) include deeper layers, expanded search spaces (including dropout and Swish), and latency constraints.
Table 3 summarizes the complete parameterization settings, demonstrating the progressive expansion of the search scope and the stability of the optimization process across configurations.
The proposed framework is adaptive at the operational level through online monitoring of spoofing-sensitive telemetry indicators (GDI dynamics and model confidence) and scenario-driven model recalibration. When the monitored statistics exhibit a distribution shift (sustained GDI elevation, increased uncertainty, or drift in GPS-accuracy signals), the system supports updating lightweight components (normalization statistics and the decision threshold) immediately, while deeper adaptation is achieved by periodically re-running DARTS on newly collected mission telemetry to obtain an updated compact ANN for subsequent deployments. This design enables the detector to remain effective under evolving spoofing strategies without requiring heavy onboard retraining during flight.
3.4. Real-Time Secure Response Stage: Encryption and Authenticated Communication Protocol
Unmanned aerial vehicle (UAV) GPS spoofing attacks are becoming more sophisticated, necessitating a defense system that can secure communication, detect attacks accurately, and react autonomously in real time. This stage presents a real-time secure response system that combines dynamic response mechanisms, cryptographic protection, detection intelligence, and authenticated communication to address this need. The detailed workflow of the proposed lightweight encryption and authentication layer using the PRESENT-128 cipher in Cipher Block Chaining (CBC) mode integrated with a Cipher-based Message Authentication Code (CMAC) for real-time UAV spoofing defense is depicted in
Figure 10. The
input payload, which contains the spoofing label, confidence score, timestamp, and UAV identifier, is where the architecture starts. Following
message preparation and padding, where PKCS7 padding guarantees alignment to 64-bit boundaries, this data is segmented and initialized using a 64-bit
initialization vector (IV) to guarantee semantic security throughout encryption sessions.
The basic cryptographic operations of the PRESENT-128 cipher are executed by the round function module. It uses repeated substitution to achieve strong diffusion and nonlinearity through S-box, permutation (P-layer), and transformation (T-layer) operations over 31 rounds after using the key schedule to generate 32 subkeys from the 128-bit master key. This design ensures robustness against common cryptanalytic attacks by striking a balance between lightweight computation and high cryptographic strength. After processing the output ciphertext blocks, the CMAC component generates an authentication tag T that confirms message authenticity and data integrity.
Key length (K = 128) bits, block size (64) bits, mode (CBC), and CMAC tag (64) bits are the key configuration parameters and security guarantees that are summarized in the right-hand panels. Three crucial characteristics are provided by the combination of symmetric encryption and message authentication: confidentiality, integrity, and authenticity. The diagram’s dual flow of data and control signals illustrates how encryption and validation procedures are concurrently coordinated. For resource-constrained UAV flight controllers operating in hostile environments, this lightweight, modular architecture guarantees effective, secure, and real-time protection. Algorithm 3 presents the specific encryption and authentication procedures.
3.4.1. Step 1: Telemetry Preprocessing and Spoofing Detection
A multi-stage preprocessing pipeline is used to first denoise and normalize telemetry data, which includes GPS, inertial, and quaternion parameters. To improve feature balance and signal quality, the pipeline incorporates C-SMOTE oversampling, Kalman filtering, quaternion smoothing, and the GPS Drift Index (GDI). The Kalman update equations for the GPS axes are as follows:
where
represents the updated state,
is the measured value, and
is the Kalman gain. The processed data is then passed to the machine learning classifier for spoofing prediction, generating a binary label
and a confidence score
.
| Algorithm 3: Using PRESENT-128 in CBC mode with CMAC integration for lightweight encryption and authentication |
![Sensors 26 00843 i003 Sensors 26 00843 i003]() |
3.4.2. Step 2: Encryption Layer Using PRESENT-128
Once a spoofing decision is generated, the system secures it using the lightweight PRESENT-128 block cipher. This cipher offers a balance between robustness and computational efficiency for onboard microcontrollers. The plaintext message, defined as
, aggregates the decision label, confidence score, timestamp, and UAV identifier. The CBC-mode encryption process is defined as [
42]
where
S and
P denote the substitution and permutation layers, respectively. Semantic security is improved by ensuring inter-block dependency in each ciphertext block
. The final encrypted payload is expressed as
.
3.4.3. Step 3: Message Authentication and Secure Channel Validation
The lightweight
MAC + Secure Channel method checks a ciphertext
C and an authentication tag Tag. To ensure that these data are secure, the system recalculates the CMAC as follows:
This step prevents replay and man-in-the-middle attacks while maintaining forward secrecy through session-based key rotation. Using symmetric encryption ensures that operations happen quickly and do not use too much bandwidth.
3.4.4. Step 4: Response Decision and Diagnostics
A decrypted payload is sent to the
Response Decision Unit (RDU), which maps the confidence level to an operational response:
The System Diagnostics module monitors latency, encryption overhead, CMAC verification delays, and telemetry stability while logging anomalous activity for later verification.
3.4.5. Step 5: Output and Logging Layer
While the Log to Workspace component logs all runtime data, encryption metrics, spoofing decisions, and communication integrity checks for post-simulation analysis, the System Response Output executes the RDU decision by sending the necessary control signals to a UAV controller. These logs are crucial for assessing real-time adaptability, security resilience, and system throughput.
3.5. Sensor Measurement Traceability Across Preprocessing, Learning, and Encryption
To improve reproducibility and interpretability,
Table 4 explicitly summarizes the raw sensor measurements consumed at each stage of the proposed pipeline, the derived signals computed from them, and the outputs forwarded to subsequent modules. In particular, the preprocessing layer operates on dual-GPS positional streams and orientation quaternions to mitigate noise and reveal spoofing-sensitive inconsistencies (drift and abnormal kinematics). The learning layer then consumes the refined multi-sensor feature vector to perform real-time spoofing classification, while the encryption/authentication layer protects the command-and-control (C2) payload exchanged between the ground station and the UAV without altering the sensor measurements themselves, thereby preserving sensing fidelity while ensuring communication confidentiality and integrity.
4. Results
The Experiment 1 performance results show how the proposed preprocessing and data refinement pipeline significantly improves classification accuracy and robustness across all models. The Linear SVM consistently performed better, achieving 99.55% accuracy during training and 99.6% accuracy during testing, with precision, recall, and F1-scores all approaching unity, as shown in
Table 5. The model’s ability to take advantage of the refined, noise-reduced feature space created by the GDI, Kalman filtering, and quaternion smoothing stages is demonstrated by this strong generalization. Comparatively, the QDA also produced high stability (99.53% test accuracy), suggesting that the improved feature separability attained by the preprocessing pipeline greatly benefited both linear and quadratic decision boundary formulations.
However, even after normalization and resampling, instance-based and probabilistic classifiers like Gaussian Naive Bayes and Coarse KNN showed comparatively lower accuracy (roughly 94 to 96%), indicating their sensitivity to data distribution variance. Due to local partitioning of high-dimensional GPS features, the Fine Decision Tree’s performance declined slightly during testing, indicating a marginal tendency toward overfitting. This superiority is further supported by the ROC curves of the Linear SVM, as shown in
Figure 11a,b. Both the training and testing AUC values exceeded 0.999, forming nearly perfect convex trajectories along the top-left axis. These findings confirm that the Linear SVM is the best baseline model for further research since the robust Z-score scaling, C-SMOTE balancing, and denoising techniques successfully maximized class separability and reduced false alarms.
The ROC curves further illustrate the Linear SVM model’s classification performance during the training and testing stages of Experiment 1. With AUC values of 0.998 (training) and 0.9971 (testing), both curves in
Figure 11 show a nearly perfect rise toward the top-left corner, indicating excellent separability between genuine and spoofed GPS signals. The small difference between the training and testing AUCs indicates a well-generalized model with minimal overfitting. A crucial requirement for real-time UAV spoofing detection is that the classifier achieves a high true positive rate with nearly zero false alarms, as shown by the steep initial ascent of the curves. The nearly identical behaviour of the spoofing and benign operating points demonstrates robust discrimination capability, stable threshold calibration, and consistent sensitivity across unseen data.
4.1. Results of Second Experiment: DARTS-Optimized ANN
The experimental outcomes reported in
Table 6 demonstrate a continuous and quantifiable improvement in performance across the five DARTS-optimized ANN configurations. Beginning with an initial training accuracy of
and a testing accuracy of
in DARTS-1, the network progressively refined its architecture through each differentiable search iteration, culminating in near-perfect results of
(train) and
(test) in DARTS-5. Precision improved from
to
, recall from
to
, and F1-score from
to
, indicating that each successive run increased raw accuracy and tightened the balance between sensitivity and specificity.
Importantly, the generalization gap between training and testing remained consistently negligible across all runs. Specifically, the absolute train–test accuracy differences were (DARTS-1), (DARTS-2), (DARTS-3), (DARTS-4), and (DARTS-5). This uniformly small gap, always below , indicates that performance gains are not driven by memorization of training samples but instead reflect stable generalization to unseen telemetry. Therefore, the near-perfect accuracy achieved in DARTS-5 is consistent with strong model generalization rather than overfitting.
Compared with the baseline results of Experiment 1, it is clear that the DARTS-driven neural models were better. The Linear SVM previously achieved a testing accuracy of and an F1-score of , representing a high-performance static model. However, DARTS-4 surpassed this threshold by achieving a testing accuracy of and an F1-score of , while DARTS-5 pushed the boundary further to a testing accuracy of , establishing a percentage-point improvement in absolute accuracy and a measurable gain in resilience against false negatives. This advancement, although numerically modest, is operationally critical for UAV spoofing detection, where even a reduction in misclassification may prevent dozens of false alarms during continuous flight telemetry. DARTS achieved this enhancement without handcrafted hyperparameter tuning; instead, its gradient-based bilevel optimization autonomously adjusted activation functions, skip connections, and layer depths to achieve an optimal balance between precision (), recall (), and inference latency.
Closer examination of the learning dynamics shows that DARTS gradually evolved from compact, shallow networks to more expressive and latency-aware topologies. In the early runs (DARTS-1 and DARTS-2), limited search depth restricted feature abstraction, capping accuracy near . The introduction of extended operation sets and deeper cell connectivity in DARTS-3 elevated accuracy to , suggesting that the model had begun to capture the nonlinear spatiotemporal dependencies among GPS drift, quaternion orientation, and variance-based features. Subsequent architectures (DARTS-4 and DARTS-5) incorporated residual and normalization layers that stabilized gradients during backpropagation, resulting in consistently high AUC values (>0.9995) and convergence within fewer than 40 epochs. These improvements decreased loss oscillation by about relative to DARTS-1 and improved validation precision by points, underscoring the differentiable optimization’s capacity to self-regularize complex architectures without manual intervention.
The DARTS-optimized ANN successfully learned hierarchical feature representations end to end, in contrast with the conventional machine learning models of Experiment 1, which mainly relied on external preprocessing for feature alignment and noise suppression. While the Linear SVM and QDA demonstrated strong separability after normalization and C-SMOTE augmentation, their discriminative capability plateaued near accuracy. In comparison, the DARTS-optimized networks leveraged compact yet expressive latent representations that encoded nonlinear cross-dependencies between navigation and inertial parameters, enabling precision and recall to exceed while preserving strong generalization (as evidenced by the small train–test gaps). This behavior is particularly beneficial under changing flight conditions or evolving spoofing strategies, where fixed decision boundaries of deterministic classifiers can be more sensitive to distribution shifts. The consistently low false positive rate (<0.002 in DARTS-4 and DARTS-5) further confirms that these architectures remain reliable over long test windows and can better accommodate diverse spoofing behaviors.
4.2. Discussion on the Performance of the Encryption and Secure Communication Layer
For UAV and IoT settings, testing the proposed encryption and secure communication layer showed a significant improvement in message transmission speed, security, and energy efficiency. The framework keeps data private and secure without the additional processing overhead associated with most traditional encryption standards. It does this by combining a CMAC authentication mechanism with a lightweight PRESENT-128 cipher. The experimental setup, which included five independent trials for each algorithm, made it possible to conduct a statistically valid assessment of repeatability and robustness under identical hardware and software conditions. A critical requirement for real-time cyber-physical systems is that the proposed implementation exhibits highly stable cryptographic behavior with minimal temporal variation, as evidenced by the results observed across all runs.
The statistical results in
Table 7 show that the proposed PRESENT-128 encryption layer consistently outperformed AES-128 and ChaCha20 across all of the examined metrics. Its mean encryption and decryption times of approximately 0.83 ms each were nearly half those recorded for AES-128 and significantly lower than those of ChaCha20. The standard deviations remained below 0.02 ms, signifying deterministic runtime execution and high temporal predictability. This stability is especially important for secure control communications in UAV networks because encryption latency has a direct effect on command–response loops. The CMAC verification processes, which often cause problems in authenticated encryption schemes, required only 0.12 ms on average—an improvement exceeding
relative to both benchmark algorithms. These results show that authentication integrity can be achieved concurrently with real-time responsiveness, making the design particularly well suited for lightweight embedded architectures.
A closer look at these combined latency metrics shows how the proposed system could benefit an architecture. A total latency overhead of 1.79 ms achieved by PRESENT-128 represents an overall reduction of approximately 41% when compared to AES-128 and 33% relative to ChaCha20. This decrease was due in part to simplifying the cipher and eliminating unnecessary data dependencies during the encryption process. Correspondingly, the throughput of 382.4 kb/s represents a significant enhancement over AES-128 (261.8 kb/s) and ChaCha20 (299.3 kb/s), indicating more efficient utilization of available communication bandwidth. These ciphers are well suited to high-frequency data exchange scenarios like UAV telemetry streaming or coordination of distributed sensors because they can handle higher data rates while incurring lower computational latency. An energy footprint analysis further strengthens this conclusion: PRESENT-128 consumed only 0.51 mJ per transaction, approximately 41% less than AES-128 and one-third lower than ChaCha20, thereby offering a tangible advantage for energy-constrained devices.
Figure 12 shows consistent distributional patterns that support these numbers. The box plots for PRESENT-128 show that all metrics have tightly centered medians and small interquartile ranges, which means that they are stable and consistent. AES-128, on the other hand, has a wider spread and higher medians, which indicates higher computational cost, while ChaCha20 has an intermediate profile between the two. For embedded systems, where consistent timing behavior ensures reliable synchronization and predictable security overhead, PRESENT-128’s narrow dispersion across multiple runs indicates both low algorithmic complexity and high stability under different execution conditions.
Together, the statistical and visual data make a clear point: the proposed PRESENT-128 with CMAC layer strikes a strong balance between cryptographic security, processing speed, and energy efficiency. The consistently low mean values, small standard deviations, and compact distribution profiles show that it is both computationally lightweight and operationally deterministic. In practical terms, these features mean that UAVs or IoT nodes using this encryption method can share data securely without sacrificing performance or battery life.
The proposed PRESENT-128 with CMAC layer offers an excellent balance between cryptographic security, processing efficiency, and energy conservation, as evidenced by both the statistical and visual outcomes. It is both operationally deterministic and computationally lightweight, as reflected by consistently low mean values, small standard deviations, and compact distribution profiles. In practical terms, these features enable UAVs or IoT nodes that use this encryption method to transmit and receive data securely without compromising responsiveness or operational longevity. The results confirm that the proposed framework not only meets but exceeds the performance standards expected for modern real-time secure communication systems, offering a deployable and scalable foundation for future intelligent cyber-defense architectures.
5. Comparative Deployment and Practicality Analysis
Table 8 provides a deployment-oriented comparison between representative GPS spoofing detection studies and the proposed framework, with particular emphasis on latency, hardware feasibility, and operational evaluation conditions. Existing works demonstrate promising detection capabilities, yet their practical deployability on real UAV platforms remains inconsistent. For instance, studies validated on real UAV flights using Pixhawk-based platforms and PX4 controllers report inference latencies in the range of 1.81–1.94 ms, confirming that machine learning-based spoofing detection can meet real-time constraints at the flight-controller level. However, these studies do not report energy consumption or memory footprint, leaving uncertainty regarding sustained operation under strict onboard power budgets and prolonged mission durations.
TinyML-oriented approaches, such as CTDNN-Spoof, further reduce architectural complexity by employing compact neural structures (64–32-4 DNNs) and achieve competitive latency figures. Nevertheless, their evaluation is primarily offline and does not include continuous in-flight telemetry or long-term stability assessment, which limits conclusions about robustness under persistent GPS manipulation and sensor noise. Similarly, simulation-based studies using controlled UAV environments or CARLA autonomous vehicle simulators report comparable inference times but inherently abstract away hardware constraints, power consumption, and real-world signal dynamics, thereby restricting their applicability to operational UAV deployments.
The proposed framework distinguishes itself by combining numerically validated real-time performance with explicit hardware-efficiency characterization. With an average inference latency of 1.79 ms, the proposed system is competitive with or faster than prior real-UAV and simulation-based approaches, while reporting a measured energy cost of only 0.51 mJ per inference. This explicit energy profiling addresses a critical gap in prior studies and directly supports feasibility for long-duration UAV missions where computational and power resources are tightly constrained. Moreover, unlike approaches evaluated on isolated flight logs or offline datasets, the proposed system operates on continuous real-time multi-sensor telemetry, reinforcing its suitability for sustained deployment in GPS-contested environments. The comparison highlights that while existing methods establish the viability of machine learning-based spoofing detection, they often lack quantitative evidence of energy efficiency and long-term operational stability. By integrating domain-aware preprocessing, a DARTS-optimized lightweight architecture, and measured runtime and energy metrics, the proposed framework advances the state of the art from focusing solely on detection accuracy to deployment-ready, resource-efficient UAV security, directly addressing real-world operational constraints in autonomous UAVs.
6. Conclusions
This research introduced a cohesive framework for secure communication and UAV spoofing detection, incorporating lightweight encryption, differentiable architecture search (DARTS), and advanced preprocessing techniques. The findings showed that the proposed DARTS-based ANN performed almost flawlessly, with an accuracy of more than 99.9%, an F1-score of 0.999, and , outperforming traditional machine learning approaches. The low latency (1.79 ms) and low energy consumption (0.51 mJ) guaranteed by the PRESENT-128 encryption and CMAC authentication layer validated the feasibility of real-time deployment in resource-constrained UAV systems. The thorough multi-experiment approach demonstrated how adaptive neural architecture optimization and cryptographic protection work together to achieve both secure response and accurate detection. Future research will focus on expanding the framework to large-scale, cross-domain validation in IoT environments enabled by 6G, where federated DARTS training and adaptive feature generalization may further improve resilience against evolving spoofing vectors. Furthermore, to guarantee end-to-end data integrity and autonomous security decision-making across cooperative UAV swarms operating in contested or GPS-degraded environments, hardware-level implementation on UAV microcontrollers and the integration of blockchain-based trust management are envisioned.