Next Article in Journal
Alteration Information Extraction and Mineral Prospectivity Mapping in the Laozhaiwan Area Using Multisource Remote Sensing Data
Previous Article in Journal
Density-Aware Tree–Graph Cross-Message Passing for LiDAR Point Cloud 3D Object Detection
Previous Article in Special Issue
Indeterminacy of Camera Intrinsic Parameters in Structure from Motion Using Images from Constant-Pitch Flight Design
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improving UAV Remote Sensing Photogrammetry Accuracy Under Navigation Interference Using Anomaly Detection and Data Fusion

1
School of Cyber Science and Technology, Beihang University, Beijing 100191, China
2
School of Engineering, University of Warwick, Coventry CV4 7AL, UK
3
Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology, Hong Kong 999077, China
4
School of Automation Science and Electrical Engineering, Beihang University, Beijing 100191, China
*
Author to whom correspondence should be addressed.
Remote Sens. 2025, 17(13), 2176; https://doi.org/10.3390/rs17132176
Submission received: 24 April 2025 / Revised: 6 June 2025 / Accepted: 18 June 2025 / Published: 25 June 2025

Abstract

Accurate and robust navigation is fundamental to Unmanned Aerial Vehicle (UAV) remote sensing operations. However, the susceptibility of UAV navigation sensors to diverse interference and malicious attacks can severely degrade positioning accuracy and compromise mission integrity. Addressing these vulnerabilities, this paper presents an integrated framework combining sensor anomaly detection with a Dynamic Adaptive Extended Kalman Filter (DAEKF) and federated filtering algorithms to bolster navigation resilience and accuracy for UAV remote sensing. Specifically, mathematical models for prevalent UAV sensor attacks were established. The proposed framework employs adaptive thresholding and residual consistency checks for the real-time identification and isolation of anomalous sensor measurements. Based on these detection outcomes, the DAEKF dynamically adjusts its sensor fusion strategies and noise covariance matrices. To further enhance the fault tolerance, a federated filtering architecture was implemented, utilizing adaptively weighted sub-filters based on assessed trustworthiness to effectively isolate faults. The efficacy of this framework was validated through rigorous experiments that involved real-world flight data and software-defined radio (SDR)-based Global Positioning System (GPS) spoofing, alongside simulated attacks. The results demonstrate exceptional performance, where the average anomaly detection accuracy exceeded 99% and the precision surpassed 98%. Notably, when benchmarked against traditional methods, the proposed system reduced navigation errors by a factor of approximately 2-3 under attack scenarios, which substantially enhanced the operational stability of the UAVs in challenging environments.

1. Introduction

Leveraging their efficiency and flexibility, Unmanned Aerial Vehicles (UAVs) have achieved widespread deployment in the field of remote sensing, with applications spanning critical domains such as environmental monitoring, precision agriculture, and engineering surveying [1,2,3,4,5,6]. Particularly in applications utilizing UAV photogrammetry—the process of generating high-accuracy three-dimensional (3D) digital models and orthomosaics from aerial imagery—extremely stringent requirements are placed on the accuracy of the flight platform’s navigation and positioning system since navigation errors directly impact the geometric fidelity and georeferencing precision of the final remote sensing product [7,8]. Consequently, achieving high-precision navigation has emerged as a critical challenge that warrants further investigation in the field of UAV photogrammetry [9,10,11].
In the UAV navigation system, different sensors provide specific measurements. For example, the Global Positioning System (GPS) utilizes the time of arrival data from multiple satellites to calculate the distance between the satellites and the receivers, thereby estimating the UAV’s position. Moreover, the Inertial Navigation System (INS), based on the Inertial Measurement Unit (IMU), processes the sensor inputs from the gyroscopes and accelerometers to determine the current navigation attitude, speed, and position. It provides high short-term accuracy and strong resistance to external interference. Furthermore, the magnetometer utilizes the Earth’s magnetic field or the artificial magnetic fields to estimate the UAV’s yaw angle. However, a single sensor cannot consistently guarantee accurate and seamless navigation for the UAV [12,13]. For example, the accumulating INS navigation errors over time reduce the long-term accuracy [14]. Magnetometers are susceptible to interference from nearby magnetic fields, significantly affecting their attitude estimation, while the GPS is vulnerable to signal blockage and multipath distortions in constrained environments [15].
In addition to static environmental factors, the GPS is particularly vulnerable to human-induced malicious interference and attacks. With the rapid expansion of GPS and magnetometer use, combined with advances in software-defined radio (SDR) technology, UAV sensors are increasingly exposed to security threats [16,17]. For example, the availability of affordable radio hardware enables SDR devices capable of GPS signal spoofing, thereby potentially compromising UAV positioning [18,19]. Moreover, the reliance on wireless communication between UAVs, ground control stations, and satellites renders these systems susceptible to a variety of attacks, including GPS spoofing, replay attacks, and magnetic jamming [20,21,22]. Although recent real-time detectors—such as the isolation-forest-based approach in [23]—can identify GPS spoofing and correct positioning errors using secure infrastructure data, they necessitate extensive trusted coverage. Notably, inertial sensors (e.g., accelerometers and gyroscopes) can perform consistency checks with GPS data at the acceleration and angular velocity levels to detect spoofing attacks; these inertial sensors are inherently immune to radio frequency (RF)-based spoofing or jamming attacks [24].
Due to the limitations inherent in relying on a single sensor for attack detection, numerous multi-source fusion (MSF) methods have been proposed to enhance state estimation accuracy in UAV navigation [25]. Dynamic black-box analysis has shown that MSF schemes can significantly reinforce security against GPS spoofing [26]. For example, Tao et al. [27] improved the positioning accuracy and stability by integrating low-cost sensors. Wang Y et al. [28] categorized vehicular cybersecurity challenges into two main areas: information-oriented and control-oriented. The control-oriented approaches were further divided into data-driven methods [29,30] and model-based methods [31]. However, while data-driven methods are effective only for attacks represented in the training data, model-based techniques detect deviations in sensor measurements from the expected behavior, as predicted by the UAV’s mathematical model—and have been validated over long-term operations [32]. In addition, Michieletto et al. [33] applied information-theoretic tools for threshold testing by assessing the consistency of multimodal measurements, yet this approach requires collaboration between multiple UAVs, thus limiting its applicability to single-UAV operations.
Motivated by these findings, we introduce an integrated navigation framework fusing the GPS, an IMU, and magnetic sensor data. This framework leverages mathematical model-based techniques within an adaptive MSF architecture to detect and isolate abnormal measurements effectively. A key feature is the dynamic selection of reliable sensor combinations based on real-time reliability assessments, ensuring that robust, high-precision navigation can be achieved using cost-effective sensors. The proposed framework for anomaly detection and multi-source fusion is illustrated in Figure 1. Accordingly, this paper presents the following three key contributions:
1. Problem: How can we achieve precise UAV navigation in environments subject to complex interference and deliberate attacks to ensure the success of photogrammetry missions?
2. Solution: To address this challenge, we propose a trusted navigation framework integrating sensor anomaly detection with adaptive sensor fusion.
3. Platform experiments: We conducted spoofing experiments using the SDR and rigorously evaluated the proposed framework’s performance with UAV flight data. The evaluation included comprehensive assessments of navigation error metrics and anomaly detection accuracy.
The remainder of this paper is organized as follows: Section 2 details the kinematic and measurement models for the UAV. In Section 3, we introduce the sensor attack detection method and two adaptive fusion algorithms. Section 4 presents experimental validations based on real flight data. Finally, Section 5 concludes the paper.

2. Preliminary Problem

This section presents the kinematic and measurement models for the UAV.

2.1. Kinematic Model of UAV

Kinematic and measurement models are critical for the accurate state estimation and control of UAVs. The UAV was assumed to satisfy the following conditions:
(1) The UAV was modeled as a bilaterally symmetrical rigid body;
(2) It was subject only to gravitational and aerodynamic forces;
(3) The effects of Earth’s rotation and curvature on the navigation system were neglected.
The kinematic model was established using two coordinate systems: an inertial (Earth-fixed) frame n and a body-fixed frame b attached to the UAV. Euler angles ( ϕ , θ , ψ ) were used to represent the orientation between b and n , with a rotation order of z y x . The rotation matrix R , which transforms coordinates from the inertial system to the body-fixed frame, is given as follows:
R = R x ( ϕ ) R y ( θ ) R z ( ψ )
Subsequently, the rates of change of the Euler angles are expressed as
ϕ ˙ θ ˙ ψ ˙ = 1 sin ϕ tan θ cos ϕ tan θ 0 cos θ sin ϕ 0 sin ϕ sec θ cos ϕ sec θ ω
where ω = ω x , ω y , ω z T denotes the UAV’s angular velocity, reflecting its attitude changes. The UAV’s position is represented as P = [ P n , P e , P d ] T , and its linear velocity as V = [ V n , V e , V d ] T . This framework links sensor measurements from onboard gyroscopes to the UAV’s rotational motion.

2.2. Measurement Model of UAV

In this study, three sensors were utilized: the GPS, magnetometer, and an IMU. First, the GPS provides the UAV’s position measurement, P ˜ , and linear velocity measurement, V ˜ , modeled as follows:
P ˜ = P + e P V ˜ = V + e V
where e P and e V are Gaussian white noise terms with covariances Q P and Q V , respectively.
The magnetometer provides the UAV’s yaw angle measurement, ψ ˜ , as follows:
ψ ˜ = ψ + e ψ
where e ψ represents Gaussian white noise with covariance Q ψ .
The IMU, comprising a gyroscope and an accelerometer, measures the UAV’s angular velocity and acceleration, respectively. The gyroscope measurement model is given by
ω ˜ = ω + b w + e η
where ω ˜ is the measured angular velocity, b w = [ b ω x , b ω y , b ω z ] T denotes the constant gyroscope bias, and e η = [ e η x , e η y , e η z ] T is Gaussian zero-mean noise. Similarly, the accelerometer measurement model is given by
a ˜ = R ( a + b a ) + e a
where a ˜ is the acceleration measurement, b a represents the constant accelerometer bias, and e a denotes Gaussian zero-mean noise.

2.3. State Estimation Based on EKF

Due to the nonlinear nature of the UAV’s kinematic model (state equations), this paper employs an adaptive EKF and federated filtering to implement an IMU/GPS/magnetometer loosely coupled integration model. The EKF addresses nonlinear problems via local linear approximations and has been widely applied [34,35].
First, we define the system state vector as
x = [ ϕ θ ψ P V b w b a ] T
The system motion model of the EKF is
x ˙ = f ( x ) + w ( t )
where f(x) is a nonlinear function of the state vector that represents the product of the state vector and the system matrix, and w ( t ) is the Gaussian white noise term.
Combining Equations (3) and (4), the observation model is expressed as
z = h ( x ) + v ( t ) = z GPS z Mag = P ˜ V ˜ ψ ˜ + v ( t )
where h(x) is a linear function that maps the state to the observation space that is updated using actual measurements.
Consequently, the measurement matrices for the GPS and magnetometer are defined accordingly:
H t = H GPS t T , H Mag t T T
where
H GPS ( t ) = [ 0 6 × 3 , I 6 × 6 , 0 6 × 6 ] , H Mag ( t ) = [ 0 , 0 , 1 , 0 1 × 12 ]
The EKF comprises two primary steps:
(1) Prediction step:
In this step, the current state is estimated from the previous state using the state transition equations, and the error covariance matrix is likewise propagated.
Discretizing Equations (8)–(10) using an improved Euler discretization method [36] introduces a subscript k to denote the discrete time index:
x ^ k / k 1 = F k / k 1 x ^ k 1 / k 1 P k / k 1 = F k / k 1 P k 1 / k 1 F k / k 1 T + Q k 1
where Q k denotes the discrete process noise covariance at step k 1 .
(2) Update step:
In the update step, the state estimate and error covariance are corrected based on the innovation—the difference between the observed and predicted values. The Kalman gain is calculated as follows:
K k = P k / k 1 H k T H k P k / k 1 H k T + R k 1
The state update process utilizes the innovation r k = [ ( r k GPS ) T , r k Mag ] T , comprising the GPS residual r k GPS and the magnetometer residual r k Mag . The residual r k can be estimated and calculated as the difference between the actual measurement and the predicted value:
r k GPS = z GPS H GPS x ^ k / k 1 r k Mag = z Mag H Mag x ^ k / k 1

3. Trusted Navigation Framework for UAV in Different Sensor Interference Environments

UAVs are vulnerable to various sensor interferences during flight, which can significantly compromise the navigation accuracy. This study mainly investigated the sensor attacks on the GPS and magnetometer, and modeled GPS denial as a jamming attack. To mitigate these threats, we first outline the primary types of UAV sensor attacks. Subsequently, two robust navigation algorithms were developed for abnormal detection and for fusing trusted sensor information.

3.1. Types and Modeling of Sensor Attacks on UAV

GPS communications are frequently targeted by attackers, while magnetometers are particularly susceptible to environmental magnetic interference. Navigation sensor attacks are broadly categorized into jamming and spoofing attacks [37]. The characteristics of these two threats to UAV communications are outlined below:
(1) Jamming attacks
Jamming attacks employ specialized equipment to inject noise into sensor signals, degrading data quality and hindering the accurate collection of environmental information. For example, electromagnetic or physical interference can disrupt GPS signals. Mathematically, a jamming attack on the signal is modeled by reducing the signal to N a N :
P ˜ GPS , k interrupted = N a N V ˜ GPS , k interrupted = N a N
where P ˜ GPS , k interrupted and V ˜ GPS , k interrupted represent the jammed GPS position and velocity data, respectively.
Similarly, magnetic jamming attacks are modeled by injecting a random bias:
ψ ˜ Mag = ψ ˜ + δ ψ interference
where ψ ˜ Mag denotes the jammed magnetic data and δ ψ interference is a random bias introduced as the attack parameter.
(2) Spoofing attacks
Spoofing attacks involve the injection of forged signals during data collection, which disrupts environmental perception, impairs decision-making, and compromises UAV flight safety. For instance, attackers may transmit counterfeit GPS signals to spoof a UAV. Mathematically, a spoofing attack is modeled by adding a fixed deviation:
P ˜ GPS , k spoofed = P ˜ + δ P spoofed V ˜ GPS , k spoofed = V ˜ + δ V spoofed
where δ P spoofed and δ V spoofed are the position and velocity offsets, respectively, used in the spoofing attack model.
Replay attacks involve recording previously transmitted signals and resending them later. The replay attack is modeled by introducing two distinct times t and t :
P ˜ GPS , k replayed = P ˜ GPS , k Δ V ˜ GPS , k replayed = V ˜ GPS , k Δ
where P ˜ GPS , k replayed and V ˜ GPS , k replayed represent the received GPS data corresponding to a previous time Δ = t t .

3.2. Anomaly Detection Mechanism for UAV in Sensor Attack Environment

Traditional methods for UAV sensor attack detection, such as model-driven mechanisms and statistical techniques (e.g., fixed-threshold and least-squares methods [38]), are widely applied. However, the complex operational environments and variable mission requirements of UAVs, coupled with their inherent strong nonlinearity and high dynamics, often limit the flexibility and adaptability of these methods when processing complex flight data, thereby hindering efficient and reliable detection in intricate scenarios.
To overcome the limitations of traditional methods, this paper proposes an anomaly detection mechanism for sensor attacks on UAVs. This mechanism employs a residual consistency check strategy that integrates continuous anomaly counting with dynamic adaptive thresholding. It is designed to monitor persistent inconsistencies between the UAV’s predicted state and actual sensor measurements, thereby enabling the more reliable detection of sensor attacks. Specifically, the detection logic initially identifies potential sensor attacks by evaluating the quadratic forms of the GPS residuals d k GPS and magnetometer residuals d k Mag , along with their dynamic variations.
( d k GPS ) 2 = ( r k GPS ) T Cov 1 ( r k GPS ) r k GPS ( d k Mag ) 2 = ( r k Mag ) T Cov 1 ( r k Mag ) r k Mag
where C o v ( r k ) represents the covariance matrix, and d k 2 is expected to follow a chi-square distribution with degrees of freedom equal to dim( z k ).
If d k 2 ( d GPS , k 2 , d Mag , k 2 ) exceeds the corresponding threshold τ GPS (set to 20) or τ Mag (set to 25), the respective sensor measurement is deemed abnormal:
d GPS , k 2 > τ GPS G P S a n o m a l y d Mag , k 2 > τ Mag M a g a n o m a l y

3.2.1. Adaptive Threshold and Heading Rate Compensation

In highly dynamic environments, using only a fixed threshold can result in numerous misjudgments. To address this, we propose an adaptive threshold mechanism that is particularly optimized for scenarios with rapid heading angle changes:
τ Mag ( k ) = τ Mag , base · f ( ψ ˙ k )
where τ Mag , base is the initial threshold of the magnetic sensor mentioned in Equation (19); f ( ψ ˙ k ) denotes the heading angle change rate function:
f ( ψ ˙ k ) = 1 , if | ψ ˙ k | ψ ˙ threshold 1 + λ ( | ψ ˙ k | ψ ˙ threshold ) , if | ψ ˙ k | > ψ ˙ threshold
where ψ ˙ k = ψ k ψ k 1 Δ t represents the rate of change of the heading angle; λ is the compensation coefficient (set to 3.0); and ψ ˙ threshold is the threshold that triggers the compensation (set to 0.15 rad/s).

3.2.2. Consecutive Anomaly Counting and Residual Consistency Detection

To mitigate misjudgments caused by instantaneous fluctuations, a continuous anomaly counting mechanism is introduced:
C sensor , k = min ( C sensor , k 1 + 1 , C max ) , if sensor abnormal at k max ( C sensor , k 1 1 , 0 ) , otherwise
where C sensor , k is a non-negative integer, and the upper limit of the count is C max (set to 6).
At this time, the conditions judged as abnormal are
A sensor , k = true , if C sensor , k C threshold false , otherwise
where C threshold (set to 6) is the threshold for the consistency of continuous residual signs. When the threshold is exceeded, it is considered that enough continuous anomalies are detected to reduce the interference of short-term peak noise.
Furthermore, to enhance the detection accuracy, a residual consistency check is also incorporated:
c o n s i s t e n t bias = i = 0 N 1 sign ( r k i ) η 1 N 1 N i = 0 N 1 r k i η 2
where r k represents the measurement residual, N is the history window length (set to 10), η 1 is the consistency threshold (set to 0.6), and η 2 is the deviation amplitude threshold (set to 0.05).
By combining d k 2 with the residual consistency measure, we define a comprehensive reliability criterion for each sensor:
R e l sensor , k = ¬ d sensor , k 2 > τ sensor , k consistent bias sensor , k
where R e l sensor , k ( R e l GPS , k , R e l Mag , k ) denotes the reliability of the sensor at time k, and a true value means that the sensor is reliable.
Based on this analysis, if the R e l sensor , k value is true, the corresponding sensor measurement is used in the EKF update step. Conversely, if a sensor abnormality is detected, the measurement from that sensor is isolated (not used directly in the update), and the system relies on the fusion of the remaining reliable sensors or prediction only:
x ^ k = x ^ k / k 1 + K k r k P k = I K k H k P k / k 1

3.3. Multi-Source Fusion Based on DAEKF

Following the sensor data anomaly detection, additional data processing and multi-source fusion are conducted. The abnormal data isolation and fusion scheme proposed in this paper is illustrated in Figure 2. Specifically, the primary innovation of the DAEKF is its ability to adaptively select reliable measurements for the update step based on the anomaly detection results. Based on the sensor reliability flags R e l GPS and R e l Mag , four update modes are defined:
Mode k = Both , if R e l GPS , k R e l Mag , k GPS only , if R e l GPS , k ¬ R e l Mag , k Mag only , if ¬ R e l GPS , k R e l Mag , k IMU only , if ¬ R e l GPS , k ¬ R e l Mag , k
The covariance is updated using the Joseph form to ensure numerical stability:
P k | k = ( I K k H k ) P k | k 1 ( I K k H k ) T + K k R k K k T
To further improve the system adaptability, both the process noise covariance matrix Q k and the measurement noise covariance matrix R k are dynamically adjusted based on the anomaly status:
Q k = γ Q · Q base , if in anomaly mode Q base , otherwise
R k = γ R · R base , if in effect period R base , otherwise
where γ Q and γ R are the augmentation factors, which are set to 2 and 3, respectively. This adjustment allows the system to increase the process uncertainty during anomalies and to augment the measurement uncertainty during the recovery phase, thereby achieving a smooth transition.
The proposed anomaly isolation and adaptive fusion mechanism was validated through four representative attack scenarios, as summarized in Table 1, that encompassed the following: (1) no attacks or anomalies; (2) GPS-only attacks; (3) only magnetic interference attack exists; (4) simultaneous GPS and magnetic jamming attacks.
Case 1: No warning was generated, indicating an attack-free environment. In this scenario, the GPS, magnetometer, and IMU data were fused for navigation.
Case 2: Only a GPS anomaly was detected, which triggered a GPS attack warning. Consequently, the navigation system relied primarily on the magnetometer and IMU data.
Case 3: Only a magnetometer anomaly was detected, which led to a magnetic sensor warning; the GPS and IMU data were then used for navigation.
Case 4: Both GPS and magnetometer anomalies were detected. These sensors were isolated, and the system used solely IMU data to maintain short-term precise navigation.
We simulated these attack scenarios using GPS and magnetometer data to represent potential threats during UAV flights. When the anomaly detection mechanism did not flag any anomaly (as in Case 1), the sensors were considered reliable and their data was fused using the EKF. Conversely, when a sensor attack was identified, the compromised data was isolated, and information from the unaffected sensors was fused to ensure reliable navigation in complex environments.
Detector 1 is dedicated to detecting GPS attacks. When GPS sensor data is flagged as abnormal, a GPS attack warning is issued and the state estimate along with the error covariance are updated accordingly:
K k = P k / k 1 H k T H k P k / k 1 H k T + R GPS , k 1 x ^ k = x ^ k / k 1 + K k r k GPS , P k = I K k H k P k / k 1
In scenarios where only a GPS attack is present, the compromised GPS data is isolated while the unaffected magnetometer and IMU data are fused to update the UAV’s attitude and position (corresponding to Case 2 in Table 1).
Detector 2 is responsible for detecting magnetic interference attacks. When an anomaly is detected in the magnetometer data, a magnetic interference warning is triggered, and the state estimate along with the error covariance is updated accordingly:
K k = P k / k 1 H k T H k P k / k 1 H k T + R Mag , k 1 x ^ k = x ^ k / k 1 + K k r k Mag , P k = I K k H k P k / k 1
In scenarios where only magnetic interference is present (Case 3 in Table 1), the system isolates the affected magnetometer data. If both the GPS and magnetic sensors are compromised, both data sources are isolated, and the UAV relies solely on the IMU for short-term precise navigation (Case 4 in Table 1).

3.4. Multi-Source Fusion Based on Federated Filtering

When facing severe sensor attacks, a local single-point failure can result in a global deviation in navigation. To address this, we further investigated federated filtering for information isolation and global fusion. The federated filter stands as an advanced decentralized filtering architecture, leveraging the information sharing principle for robust state estimation and fault tolerance. It achieves this through meticulously designed update steps, information fusion, and information distribution mechanisms.
During the filtering process, each sub-filter performs a time update and measurement update independently, and the main (global) filter fuses the results of each sub-filter to obtain the global optimal estimate or conservative suboptimal estimate [39,40]. In our adaptive federated filtering algorithm, three sub-filters are implemented: (1) GPS sub-filter: mainly processes position and velocity information; (2) magnetometer sub-filter: mainly processes yaw angle information; (3) IMU sub-filter: mainly processes acceleration and angular velocity information.
The information allocation in the federated filter is governed by the following principle [41]:
P 0 , i 1 = β i P 0 1 , i β i = 1
where β i denotes the proportion of information allocated to the i-th sub-filter. The initial weights are configured as 0.6 for the GPS sub-filter, 0.3 for the IMU sub-filter, and 0.1 for the magnetometer sub-filter, respectively.
The core innovation of the adaptive federated fusion framework lies in its dynamic adjustment of the trust levels of sensor subsystems based on real-time anomaly detection results. The trust assigned to each subsystem is updated continuously over time:
t r u s t i , k = t r u s t i , k 1 + Δ t r u s t i , k
When an anomaly is detected:
Δ t r u s t i , k = α decay , i · t r u s t i , k 1
When the sensor is normal:
Δ t r u s t i , k = α increase , i · ( t r u s t i , max t r u s t i , k 1 )
where α decay , i and α increase , i are the decay rate and growth rate, and t r u s t i , max is the maximum trust limit.
Based on the trustworthiness of the subsystems, normalized weights are calculated:
ω i , k = t r u s t i , k j t r u s t j , k
Subsequently, fusion is performed in the information filter framework by combining the individual sub-filter information matrices.
P global , k 1 = i ω i , k P i , k 1 P global , k 1 x ^ global , k = i ω i , k P i , k 1 x ^ i , k
Thus, the global optimal estimate x ^ global , k is obtained:
x ^ global , k = P global , k i ω i , k P i , k 1 x ^ i , k
To prevent individual sub-filters from diverging and to contain the impact of an attack locally—thus avoiding a global collapse due to a single-point failure—a feedback mechanism was implemented. For example, if an attacker spoofs or jams the data of a particular sensor, only that sub-filter’s local estimation x ^ i , k will be affected. The main filter then mitigates the impact on the overall estimation by appropriately adjusting the corresponding weights P i , k :
x ^ i , k α feedback , i · x ^ global , k + ( 1 α feedback , i ) · x ^ i , k P i , k α feedback , i · P global , k + ( 1 α feedback , i ) · P i , k
where α feedback , i is the feedback coefficient.

4. Experimental Analysis

This section presents the experimental validation of our proposed navigation framework, specifically assessing its robustness for high-precision applications, like UAV photogrammetry. The fidelity of 3D environmental reconstructions, such as those of a university campus, is critically dependent on accurate vehicle trajectory data. However, the navigation sensors that provide this data are vulnerable to both environmental interference and malicious attacks. Therefore, the experiments herein were designed to quantitatively evaluate the framework’s ability to mitigate these threats. The evaluation focused on the efficacy of the dynamic adaptation and federated filtering algorithms in maintaining a high navigation accuracy under anomalous conditions, which ensured the data integrity required for successful 3D reconstruction in complex or adversarial environments.
The experimental hardware platform, depicted in Figure 3, comprised a DJI M350 RTK UAV manufactured by DJI (Shenzhen, China) and a ground station. The ground station included a GPS spoofing attack device (USRP B210) from Ettus Research (Austin, TX, USA), a portable power bank, and a laptop terminal for operation. The USRP B210 features a broad RF coverage range from 70 MHz to 6 GHz. During the experiments, the UAV’s flight controller logged a comprehensive suite of telemetry data, including the geodetic position (longitude, latitude, height), attitude (roll, pitch, yaw), inertial measurements (linear acceleration, angular velocity), velocity vectors, and magnetometer readings. All flight experiments, including the GPS attack scenarios, were conducted in an open-field environment at the Beihang University Hangzhou International Innovation College in Hangzhou, Zhejiang Province, China (coordinates: 119°58′14′′E, 30°21′34′′N).
Initially, a GPS attack experiment was conducted. In this experiment, a USRP B210 was connected to a laptop and used to generate a forged ephemeris file that corresponded to the target location (Xining, coordinates: 101°48′25′′E, 36°38′50′′N). The generated spoofing signal, mimicking GPS satellite signals, was then transmitted via a connected antenna. As shown in Figure 4, the position information on both Google Maps and the test software “Satellite Companion” confirmed that the smartphone’s location was successfully spoofed to the preset target. Furthermore, Figure 5 shows the map interface on the UAV controller, which presents map data corresponding to the spoofed location—thus demonstrating the feasibility of launching GPS attacks on the UAV.
Figure 6 demonstrates the comparison of the UAV photogrammetry under two different conditions. Figure 6a shows the normal flight state: the UAV flew along the planned route (red trajectory line) to cover the target mapping area. During this process, the UAV flew from the starting point to the end point and systematically collected a series of aerial images. The overlap rate between these images (with black rectangular boxes indicating their ground coverage)—primarily encompassed the forward overlap rate (the overlap between two consecutive photos as the UAV advanced along a single flight line) and the sidelap overlap rate (the overlap between adjacent photos from two parallel flight lines)—was precisely controlled. This ensured the integrity and spatial continuity of the data, which laid the foundation for subsequent high-precision three-dimensional scene reconstruction through the principles of photogrammetry. In contrast, Figure 6b demonstrates a scenario where the UAV encountered external interference or GPS spoofing attacks during flight. As a result, the actual flight trajectory of the UAV deviated significantly from the planned route, which presented an irregular and chaotic pattern. This directly led to disordered aerial image acquisition positions and uneven ground coverage. The overlap rate between the images became uncontrollable, which potentially resulted in rates that were too low, missing, or even large areas of coverage gaps. This unstructured and defective data collection mode greatly increased the difficulty of the 3D reconstruction and was likely to result in reconstruction failure or data loss in the final model, which made it impossible to fully and accurately reproduce the target scene.
To validate the proposed adaptive dynamic fusion and federated filtering algorithms, real flight data were collected from a UAV over a 380 s period. In the post-processing, various attack scenarios were simulated using the collected data: from 32 to 36 s, a spoofing attack was applied with a positional offset of [15, 15, 20] m; from 113 to 118 s, a replay attack was performed wherein the GPS received data from 4 s earlier; from 240 to 243 s, an interference/interruption attack was implemented, during which the GPS data became NaN; and from 320 to 323 s, a magnetic interference attack imposed a yaw angle offset of 0.25 rad (approximately 14.32°).
The performance of the navigation algorithms was evaluated using the RMSE [42,43], while the anomaly detection performance was assessed using the accuracy and precision metrics, which evaluated both the localization robustness and detection capability.
The position accuracy was quantified using the RMSE:
RMSE pos = 1 N k = 1 N p ^ k p k true 2
where p ^ k is the position estimate, and p k true is the real position.
The attitude accuracy was evaluated by the Euler angle RMSE:
RMSE ϕ , θ , ψ = 1 N k = 1 N Φ ^ k Φ k true 2
where Φ ^ k is the pose angle estimate.
Figure 7 illustrates the UAV flight trajectories. It is evident that the Classic EKF suffered from significant position deviations during the GPS attack periods. In practice, GPS spoofing may cause the UAV to be redirected to unintended locations—posing collision risks—while outdated data and interference interruptions can lead to severe positioning inaccuracies. The isolation and fusion algorithms proposed in this paper can mitigate these risks. As illustrated in Figure 8 (middle and bottom panels), the anomaly detection algorithm proposed in this study accurately identified GPS spoofing and magnetic interference attacks. Simultaneously, the federated filter adjusted the weights of the sub-filters (Figure 8, top panel) based on the detected anomalies. Moreover, by dynamically selecting more reliable data for subsequent fusion, the approach significantly mitigated the risks and navigation errors induced by sensor attacks. Even under sensor attacks, these algorithms delivered robust navigation.
To evaluate the performance of the proposed MSF algorithm, a comparative analysis was conducted against a Classic EKF that utilized a fixed-threshold anomaly detection mechanism. The experimental protocol was designed to compare the RMSE in the navigation solutions and the computational latency associated with the anomaly detection and judgment across the entire operational duration. Ten distinct sets of comparative experiments were executed, incorporating specific attack benchmarks: signal interruption (3 s), replay attack (5 s), magnetic interference (3 s), spoofing attack (3 s), yaw offset (0.25 rad), position offset ([10, 10, 20] m), and replay time offset (4 s). In addition, a series of interference and spoofing attacks of progressively increasing intensity were implemented, with detailed outcomes presented in Table 2. The experimental results reveal that the DAEKF achieved the shortest latency for algorithmic anomaly detection and judgment, whereas the federated filtering algorithm exhibited marginally longer processing times. Regarding the navigation accuracy, the conventional EKF demonstrated comparatively elevated the RMSE values; its performance was most substantially degraded under replay attack scenarios. In contrast, both the proposed DAEKF and the federated filtering algorithm yielded lower average RMSE values, indicating superior robustness and enhanced navigation accuracy across diverse attack and interference conditions.
Figure 9 presents the performance evaluation metrics for the anomaly detection concerning sensor attacks. Each experiment covered four typical attack events, namely, GPS spoofing attacks, replay attacks, interference/interruption attacks, and magnetic interference attacks. The results clearly demonstrate that the proposed algorithm achieved an average accuracy that exceeded 99% and an average precision that surpassed 98% across these attack scenarios.

5. Conclusions

This study addressed the critical challenge of maintaining navigation integrity for a UAV under sensor attacks or severe interference, particularly for precision-dependent applications, such as UAV-based remote sensing. We propose a robust navigation fusion framework that integrates an anomaly detection mechanism based on adaptive thresholding and residual consistency checks, with an adaptive sensor fusion strategy. By mathematically modeling sensor attacks, the system efficiently identifies and isolates anomalous data, thereby preventing error propagation. The proposed DAEKF adaptively reconfigures the fusion strategy upon attack detection, prioritizing trusted data sources, such as the IMU. To further bolster the resilience, a federated filtering architecture was implemented, which isolates sensor faults at the sub-filter level and dynamically adjusts information fusion weights based on assessed reliability, effectively mitigating fault propagation. Rigorous experimental evaluations that utilized real-world UAV flight data alongside simulated GPS spoofing, replay, interference, and magnetic interference attacks, empirically validated the framework’s performance. The anomaly detection mechanism achieved a high accuracy (>99%) and precision (>98%). Critically, compared with conventional methods, the proposed DAEKF and federated filtering algorithms significantly enhanced the navigation accuracy under attack conditions, where the DAEKF also substantially reduced the anomaly detection latency. These findings underscore the efficacy of the proposed framework in sustaining precise and reliable UAV navigation in complex or adversarial environments, thereby holding significant promise for improving UAV operational safety and mission success rates. Future research will focus on integrating reinforcement learning techniques to enhance system autonomy and robustness in unknown complex environments, and on optimizing the federated filter structure to further reduce the anomaly detection time.

Author Contributions

Conceptualization, C.M. and D.L.; methodology, C.M., Q.H., and H.Y.; validation, C.M. and H.Y.; formal analysis, C.M. and D.L.; investigation, C.M. and C.J.; writing—original draft preparation, C.M.; writing—review and editing, C.M. and C.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant 62473023, the International Innovation Institute of Beihang University under Grant 2024KQ018, and the Foundation of Science and Technology on Space Intelligent Control Laboratory under Grant HTKJ2024KL502030.

Data Availability Statement

This article presents the original contributions of the study, along with equations for the primary algorithms. Additional information or specific data inquiries can be directed to the author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Yang, B.; Zhu, W.; Rezaei, E.E.; Li, J.; Sun, Z.; Zhang, J. The optimal phenological phase of maize for yield prediction with high-frequency UAV remote sensing. Remote Sens. 2022, 14, 1559. [Google Scholar] [CrossRef]
  2. Yin, Q.; Zhang, Y.; Li, W.; Wang, J.; Wang, W.; Ahmad, I.; Zhou, G.; Huo, Z. Estimation of winter wheat SPAD values based on UAV multispectral remote sensing. Remote Sens. 2023, 15, 3595. [Google Scholar] [CrossRef]
  3. Řeřicha, J.; Kohútek, M.; Vandírková, V.; Krofta, K.; Kumhála, F.; Kumhálová, J. Assessment of UAV Imageries for Estimating Growth Vitality, Yield and Quality of Hop (Humulus lupulus L.) Crops. Remote Sens. 2025, 17, 970. [Google Scholar] [CrossRef]
  4. Lyu, X.; Li, X.; Dang, D.; Dou, H.; Wang, K.; Lou, A. Unmanned aerial vehicle (UAV) remote sensing in grassland ecosystem monitoring: A systematic review. Remote Sens. 2022, 14, 1096. [Google Scholar] [CrossRef]
  5. Jiang, S.; Jiang, W.; Wang, L. Unmanned Aerial Vehicle-Based Photogrammetric 3D Mapping: A survey of techniques, applications, and challenges. IEEE Geosci. Remote Sens. Mag. 2021, 10, 135–171. [Google Scholar] [CrossRef]
  6. Feroz, S.; Abu Dabous, S. Uav-based remote sensing applications for bridge condition assessment. Remote Sens. 2021, 13, 1809. [Google Scholar] [CrossRef]
  7. Ahmed, S.; El-Shazly, A.; Abed, F.; Ahmed, W. The influence of flight direction and camera orientation on the quality products of UAV-based SfM-photogrammetry. Appl. Sci. 2022, 12, 10492. [Google Scholar] [CrossRef]
  8. Lu, W.; Okayama, T.; Komatsuzaki, M. Rice height monitoring between different estimation models using UAV photogrammetry and multispectral technology. Remote Sens. 2021, 14, 78. [Google Scholar] [CrossRef]
  9. Lu, H.; Shen, H.; Tian, B.; Zhang, X.; Yang, Z.; Zong, Q. Flight in GPS-denied environment: Autonomous navigation system for micro-aerial vehicle. Aerosp. Sci. Technol. 2022, 124, 107521. [Google Scholar] [CrossRef]
  10. Yang, Z.; Ying, J.; Shen, J.; Feng, Y.; Chen, Q.A.; Mao, Z.M.; Liu, H.X. Anomaly detection against GPS spoofing attacks on connected and autonomous vehicles using learning from demonstration. IEEE Trans. Intell. Transp. Syst. 2023, 24, 9462–9475. [Google Scholar] [CrossRef]
  11. Huang, X.; Yang, C.; Wen, M. A sliding window filter with GNSS-state constraint for RTK-visual-inertial navigation. IEEE Trans. Robot. 2024, 40, 1920–1937. [Google Scholar] [CrossRef]
  12. Zhuang, Y.; Sun, X.; Li, Y.; Huai, J.; Hua, L.; Yang, X.; Cao, X.; Zhang, P.; Cao, Y.; Qi, L. Multi-sensor integrated navigation/positioning systems using data fusion: From analytics-based to learning-based approaches. Inf. Fusion 2023, 95, 62–90. [Google Scholar] [CrossRef]
  13. Ji, T.; Sivakumar, A.N.; Chowdhary, G.; Driggs-Campbell, K. Proactive anomaly detection for robot navigation with multi-sensor fusion. IEEE Robot. Autom. Lett. 2022, 7, 4975–4982. [Google Scholar] [CrossRef]
  14. Li, X.; Chen, W.; Chan, C.; Li, B.; Song, X. Multi-sensor fusion methodology for enhanced land vehicle positioning. Inf. Fusion 2019, 46, 51–62. [Google Scholar] [CrossRef]
  15. Li, S.; Li, X.; Wang, H.; Zhou, Y.; Shen, Z. Multi-GNSS PPP/INS/Vision/LiDAR tightly integrated system for precise navigation in urban environments. Inf. Fusion 2023, 90, 218–232. [Google Scholar] [CrossRef]
  16. Lee, J.; Taha, A.F.; Gatsis, N.; Akopian, D. Tuning-free, low memory robust estimator to mitigate GPS spoofing attacks. IEEE Control Syst. Lett. 2019, 4, 145–150. [Google Scholar] [CrossRef]
  17. Narain, S.; Ranganathan, A.; Noubir, G. Security of GPS/INS based on-road location tracking systems. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2019; pp. 587–601. [Google Scholar]
  18. Zeng, K.C.; Liu, S.; Shu, Y.; Wang, D.; Li, H.; Dou, Y.; Wang, G.; Yang, Y. All your {GPS} are belong to us: Towards stealthy manipulation of road navigation systems. In Proceedings of the 27th USENIX Security Symposium (USENIX Security 18), Baltimore, MD, USA, 15–17 August 2018; pp. 1527–1544. [Google Scholar]
  19. Liu, S.; Cheng, X.; Yang, H.; Shu, Y.; Weng, X.; Guo, P.; Zeng, K.C.; Wang, G.; Yang, Y. Stars can tell: A robust method to defend against {GPS} spoofing attacks using off-the-shelf chipset. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), Virtual, 11–13 August 2021; pp. 3935–3952. [Google Scholar]
  20. He, D.; Chan, S.; Guizani, M. Communication security of unmanned aerial vehicles. IEEE Wirel. Commun. 2016, 24, 134–139. [Google Scholar] [CrossRef]
  21. Bianchin, G.; Liu, Y.C.; Pasqualetti, F. Secure navigation of robots in adversarial environments. IEEE Control Syst. Lett. 2019, 4, 1–6. [Google Scholar] [CrossRef]
  22. Darvish, K.; Penco, L.; Cisneros, R.; Pratt, J.; Yoshida, E.; Ivaldi, S.; Pucci, D. Teleoperation of humanoid robots: A survey. IEEE Trans. Robot. 2023, 39, 1706–1727. [Google Scholar] [CrossRef]
  23. Wang, F.; Hong, Y.; Ban, X. Infrastructure-enabled GPS spoofing detection and correction. IEEE Trans. Intell. Transp. Syst. 2023, 24, 13878–13892. [Google Scholar] [CrossRef]
  24. Tan, H.; Li, Z.; Xie, N.; Lu, J.; Niyato, D. Detection of jamming attacks for the physical-layer authentication. IEEE Trans. Wirel. Commun. 2023, 22, 9579–9594. [Google Scholar] [CrossRef]
  25. Xu, H.; Luo, H.; Wu, Z.; Wu, F.; Bao, L.; Zhao, F. Towards predicting the measurement noise covariance with a transformer and residual denoising autoencoder for GNSS/INS tightly-coupled integrated navigation. Remote Sens. 2022, 14, 1691. [Google Scholar] [CrossRef]
  26. Shen, J.; Won, J.Y.; Chen, Z.; Chen, Q.A. Drift with devil: Security of {Multi-Sensor} fusion based localization in {High-Level} autonomous driving under {GPS} spoofing. In Proceedings of the 29th USENIX security symposium (USENIX Security 20), Boston, MA, USA, 12–14 August 2020; pp. 931–948. [Google Scholar]
  27. Tao, X.; Zhu, B.; Xuan, S. A multi-sensor fusion positioning strategy for intelligent vehicles using global pose graph optimization. IEEE Trans. Veh. Technol. 2021, 71, 2614–2627. [Google Scholar] [CrossRef]
  28. Wang, Y.; Liu, Q.; Mihankhah, E.; Lv, C.; Wang, D. Detection and isolation of sensor attacks for autonomous vehicles: Framework, algorithms, and validation. IEEE Trans. Intell. Transp. Syst. 2021, 23, 8247–8259. [Google Scholar] [CrossRef]
  29. Wang, Y.; Masoud, N.; Khojandi, A. Real-time sensor anomaly detection and recovery in connected automated vehicle sensors. IEEE Trans. Intell. Transp. Syst. 2020, 22, 1411–1421. [Google Scholar] [CrossRef]
  30. Van Wyk, F.; Wang, Y.; Khojandi, A.; Masoud, N. Real-time sensor anomaly detection and identification in automated vehicles. IEEE Trans. Intell. Transp. Syst. 2019, 21, 1264–1276. [Google Scholar] [CrossRef]
  31. Mousavinejad, E.; Yang, F.; Han, Q.L.; Ge, X.; Vlacic, L. Distributed cyber attacks detection and recovery mechanism for vehicle platooning. IEEE Trans. Intell. Transp. Syst. 2019, 21, 3821–3834. [Google Scholar] [CrossRef]
  32. Biron, Z.A.; Dey, S.; Pisu, P. Real-time detection and estimation of denial of service attack in connected vehicle systems. IEEE Trans. Intell. Transp. Syst. 2018, 19, 3893–3902. [Google Scholar] [CrossRef]
  33. Michieletto, G.; Formaggio, F.; Cenedese, A.; Tomasin, S. Robust localization for secure navigation of UAV formations under GNSS spoofing attack. IEEE Trans. Autom. Sci. Eng. 2022, 20, 2383–2396. [Google Scholar] [CrossRef]
  34. Wang, M.; Cui, J.; Huang, Y.; Wu, W.; Du, X. Schmidt ST-EKF for autonomous land vehicle SINS/ODO/LDV integrated navigation. IEEE Trans. Instrum. Meas. 2021, 70, 8504909. [Google Scholar] [CrossRef]
  35. Chen, W.; Jing, Y.; Zhao, S.; Yan, L.; Liu, Q.; He, Z. A Distributed Collaborative Navigation Strategy Based on Adaptive Extended Kalman Filter Integrated Positioning and Model Predictive Control for Global Navigation Satellite System/Inertial Navigation System Dual-Robot. Remote Sens. 2025, 17, 721. [Google Scholar] [CrossRef]
  36. Park, T.H.; D’Amico, S. Adaptive neural-network-based unscented kalman filter for robust pose tracking of noncooperative spacecraft. J. Guid. Control Dyn. 2023, 46, 1671–1688. [Google Scholar] [CrossRef]
  37. Deng, Y.; Zhang, T.; Lou, G.; Zheng, X.; Jin, J.; Han, Q.L. Deep learning-based autonomous driving systems: A survey of attacks and defenses. IEEE Trans. Ind. Inform. 2021, 17, 7897–7912. [Google Scholar] [CrossRef]
  38. Keipour, A.; Mousaei, M.; Scherer, S. Automatic real-time anomaly detection for autonomous aerial vehicles. In Proceedings of the 2019 International Conference on Robotics and Automation (ICRA), Montreal, QC, Canada, 20–24 May 2019; pp. 5679–5685. [Google Scholar]
  39. Xu, X.; Pang, F.; Ran, Y.; Bai, Y.; Zhang, L.; Tan, Z.; Wei, C.; Luo, M. An indoor mobile robot positioning algorithm based on adaptive federated Kalman filter. IEEE Sens. J. 2021, 21, 23098–23107. [Google Scholar] [CrossRef]
  40. Li, H.; Ao, L.; Guo, H.; Yan, X. Indoor multi-sensor fusion positioning based on federated filtering. Measurement 2020, 154, 107506. [Google Scholar] [CrossRef]
  41. Wang, Y.; Zhao, B.; Zhang, W.; Li, K. Simulation experiment and analysis of GNSS/INS/LEO/5G integrated navigation based on federated filtering algorithm. Sensors 2022, 22, 550. [Google Scholar] [CrossRef]
  42. Hodson, T.O. Root mean square error (RMSE) or mean absolute error (MAE): When to use them or not. Geosci. Model Dev. Discuss. 2022, 15, 5481–5487. [Google Scholar] [CrossRef]
  43. Chivasa, W.; Mutanga, O.; Burgueño, J. UAV-based high-throughput phenotyping to increase prediction and selection accuracy in maize varieties under artificial MSV inoculation. Comput. Electron. Agric. 2021, 184, 106128. [Google Scholar] [CrossRef]
Figure 1. An illustration of the proposed anomaly detection and multi-source fusion algorithm framework.
Figure 1. An illustration of the proposed anomaly detection and multi-source fusion algorithm framework.
Remotesensing 17 02176 g001
Figure 2. Diagram of the proposed anomaly detection and adaptive fusion framework.
Figure 2. Diagram of the proposed anomaly detection and adaptive fusion framework.
Remotesensing 17 02176 g002
Figure 3. UAV flight and GPS attack experimental setup.
Figure 3. UAV flight and GPS attack experimental setup.
Remotesensing 17 02176 g003
Figure 4. Illustrative results of GPS spoofing attack on a map-based testing tool: (a) Google Maps; (b) satellite companion application.
Figure 4. Illustrative results of GPS spoofing attack on a map-based testing tool: (a) Google Maps; (b) satellite companion application.
Remotesensing 17 02176 g004
Figure 5. Map interface of a UAV remote controller displaying the effects of a GPS spoofing attack.
Figure 5. Map interface of a UAV remote controller displaying the effects of a GPS spoofing attack.
Remotesensing 17 02176 g005
Figure 6. Comparison of UAV photogrammetry under different flight conditions: (a) normal flight; (b) flight under simulated navigation interference or spoofing attack.
Figure 6. Comparison of UAV photogrammetry under different flight conditions: (a) normal flight; (b) flight under simulated navigation interference or spoofing attack.
Remotesensing 17 02176 g006
Figure 7. Comparative Three-dimensional trajectory analysis of three algorithms.
Figure 7. Comparative Three-dimensional trajectory analysis of three algorithms.
Remotesensing 17 02176 g007
Figure 8. Federated filtering-based anomaly detection and global fusion process diagram: (top) real-time sub-filter weight adjustments; (middle) sensor attack anomaly detection statistics; (bottom) consecutive anomaly counts and attack status flags.
Figure 8. Federated filtering-based anomaly detection and global fusion process diagram: (top) real-time sub-filter weight adjustments; (middle) sensor attack anomaly detection statistics; (bottom) consecutive anomaly counts and attack status flags.
Remotesensing 17 02176 g008
Figure 9. Anomaly detection performance of DAEKF and federated filtering.
Figure 9. Anomaly detection performance of DAEKF and federated filtering.
Remotesensing 17 02176 g009
Table 1. Proposed fusion scheme.
Table 1. Proposed fusion scheme.
CaseGPS StatusMagnetic StatusResultFusion Strategy
1No AlarmNo AlarmNo AttackGPS + Magnetic + IMU
2AlarmNo AlarmGPS AttackMagnetic + IMU
3No AlarmAlarmMagnetic AttackGPS + IMU
4AlarmAlarmGPS and Magnetic AttackIMU
Table 2. Comparison of RMSE and anomaly detection times for three algorithms.
Table 2. Comparison of RMSE and anomaly detection times for three algorithms.
Attack EventsClassic EKF (m|s)DAEKF (m|s)FF (m|s)
1Attack benchmarks3.00|0.2641.54|0.0791.01|0.481
2Signal interruption 5 s3.04|0.1911.69|0.0481.17|0.324
3Replay attack 7 s17.21|0.1973.51|0.0502.55|0.335
4Mag interference 8 s2.98|0.1861.59|0.0471.09|0.317
5Spoofing attack 6 s3.67|0.1921.72|0.0481.18|0.323
6Spoofing offset [20, 20, 30] m1.65|0.1891.64|0.0481.08|0.324
7Spoofing offset [40, 40, 60] m1.70|0.2061.69|0.0521.08|0.347
8Spoofing yaw offset 0.35 rad2.88|0.1931.60|0.0481.10|0.325
9Spoofing yaw offset 0.50 rad3.07|0.1971.73|0.0491.15|0.333
10Replay time offset 8 s2.95|0.1971.63|0.0491.03|0.329
FF: federated filtering.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Meng, C.; Yang, H.; Jiang, C.; Hu, Q.; Li, D. Improving UAV Remote Sensing Photogrammetry Accuracy Under Navigation Interference Using Anomaly Detection and Data Fusion. Remote Sens. 2025, 17, 2176. https://doi.org/10.3390/rs17132176

AMA Style

Meng C, Yang H, Jiang C, Hu Q, Li D. Improving UAV Remote Sensing Photogrammetry Accuracy Under Navigation Interference Using Anomaly Detection and Data Fusion. Remote Sensing. 2025; 17(13):2176. https://doi.org/10.3390/rs17132176

Chicago/Turabian Style

Meng, Chen, Haoyang Yang, Cuicui Jiang, Qinglei Hu, and Dongyu Li. 2025. "Improving UAV Remote Sensing Photogrammetry Accuracy Under Navigation Interference Using Anomaly Detection and Data Fusion" Remote Sensing 17, no. 13: 2176. https://doi.org/10.3390/rs17132176

APA Style

Meng, C., Yang, H., Jiang, C., Hu, Q., & Li, D. (2025). Improving UAV Remote Sensing Photogrammetry Accuracy Under Navigation Interference Using Anomaly Detection and Data Fusion. Remote Sensing, 17(13), 2176. https://doi.org/10.3390/rs17132176

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop