Research on GNSS Spoofing Detection and Autonomous Positioning Technology for Drones
Abstract
1. Introduction
- Propose a GNSS spoofing detection method based on deep visual features. By matching features between real-time aerial images and satellite images of the GNSS positioning area, we identify position anomalies. Considering the differences in lighting, season, and resolution between aerial images and satellite images, traditional image matching methods struggle to meet robustness requirements [23]. This paper introduces a deep network that combines ResNet50 (Squeeze and Excitation) and SE attention mechanisms for feature extraction: the former stabilizes the training process [24], while the latter focuses on key features [25].
- Propose an efficient visual autonomous localization method for drones. After detecting the spoofing behavior, the system switches to the autonomous localization phase and corrects the absolute positioning of the drone by matching the aerial image with the satellite image. Combined with the region constraint strategy, the a priori geographic information is utilized to effectively narrow the matching search range and improve the computational efficiency. And the SuperGlue graph neural network is introduced to realize end-to-end key point matching and to simplify the matching process [26].
2. System Design
3. GNSS Spoofing Detection
3.1. Image Registration
3.2. Feature Extraction
3.2.1. Data Pre-Processing
3.2.2. ResNet50-SE Network
3.2.3. Image Matching
- 1.
- Network Infrastructure
- 2.
- Loss Function
4. Autonomous Positioning of Drones
4.1. Maximum Flight Area Determination
4.2. Absolute Positioning
4.2.1. SuperGlue-Based Feature Matching
4.2.2. Post-Processing of Matching Results
5. Experiment Result and Analysis
5.1. GNSS Spoofing Detection
5.1.1. Dataset
5.1.2. Assessment of Indicators
- True Positive (TP): The number of positive samples with similarity higher than ;
- False Positive (FP): The number of negative samples with similarity higher than ;
- True Negative (TN): The number of negative samples with similarity lower than ;
- False Negative (FN): The number of positive samples with similarity lower than .
5.1.3. Ablation Experiment
5.2. Autonomous Positioning of Drones
5.2.1. Dataset
- Satellite images: satellite images of the mission area were acquired from LocaSpace Viewer (LSV) 4.5.3, a domestic open-source GIS software.
- Aerial images: acquired by DJI drones flying in the mission area.
5.2.2. Assessment of Indicators
5.2.3. Matching Results
6. Conclusions
- Deception Detection: using real-time aerial images of the drone and satellite images corresponding to GNSS positioning for feature matching to detect deception. Experimental results show that the accuracy of deception detection of the method reaches 89.5%.
- Autonomous Positioning: after detecting a spoofing attack, the system switches to autonomous positioning mode. Absolute positioning is achieved by matching aerial images with satellite images of a specific region. Experimental results show that 89.7% of the positioning error can be controlled within 13.9 m.
- Lightweight models and online incremental learning: Develop computationally efficient lightweight feature extraction and matching networks suitable for embedded platforms; introduce an online incremental learning mechanism to enable the system to continuously learn new scene features encountered during flight (e.g., temporary structures, seasonal changes), dynamically update the local feature database or matching model, reduce absolute reliance on static reference images, and enhance scene adaptability.
- Scene Adaptation and Robust Matching Strategies: Design scene-aware adaptive feature selection and matching strategies. For example, use high-dimensional features in texture-rich areas to ensure accuracy and switch to texture-insensitive features (such as edges or contours) or combine region segmentation information for matching in low-texture areas.
- Hardware acceleration and system optimization: Explore hardware-level optimizations based on FPGAs or dedicated AI acceleration chips for core visual computation modules (feature extraction, matching) to achieve a balance between performance and power consumption; optimize system architecture, such as adopting key frame selection strategies to reduce redundant computations.
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Chan, K.W.; Nirmal, U.; Cheaw, W.G. Progress on Drone Technology and Their Applications: A Comprehensive Review. AIP Conf. Proc. 2018, 2030, 020308. [Google Scholar] [CrossRef]
- Maddikunta, P.K.R.; Hakak, S.; Alazab, M.; Bhattacharya, S.; Gadekallu, T.R.; Khan, W.Z.; Pham, Q.-V. Unmanned Aerial Vehicles in Smart Agriculture: Applications, Requirements, and Challenges. IEEE Sens. J. 2021, 21, 17608–17619. [Google Scholar] [CrossRef]
- Toroi, G.-I. The Persistent Effectiveness of Decoys in Land Forces’ Operations—Lessons from The Russian-Ukrainian Conflict–. Rom. Mil. Think. 2024, 2024, 26–49. [Google Scholar] [CrossRef]
- Khan, S.Z.; Mohsin, M.; Iqbal, W. On GPS Spoofing of Aerial Platforms: A Review of Threats, Challenges, Methodologies, and Future Research Directions. Peerj Comput. Sci. 2021, 7, e507. [Google Scholar] [CrossRef] [PubMed]
- Volpe, J.A. Vulnerability Assessment of the Transportation Infrastructure Relying on The Global Positioning System; National Transportation Systems Center: Cambridge, MA, USA, 2021. [Google Scholar]
- Humphreys, T.E.; Ledvina, B.M.; Psiaki, M.L.; O’Hanlon, B.W.; Kintner, P.M., Jr. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer. In Proceedings of the 2008 ION GNSS Conference, Savanna, GA, USA, 16–19 September 2008; pp. 2314–2325. [Google Scholar]
- He, L.; Li, W.; Guo, C.; Niu, R. Civilian Unmanned Aerial Vehicle Vulnerability to GPS Spoofing Attacks. In Proceedings of the 2014 Seventh International Symposium on Computational Intelligence and Design, Washington, DC, USA, 13–14 December 2014; Volume 2, pp. 212–215. [Google Scholar]
- Hartmann, K.; Steup, C. The Vulnerability of UAVs to Cyber Attacks—An Approach to the Risk Assessment. In Proceedings of the 2013 5th International Conference on Cyber Conflict (CYCON 2013), Tallinn, Estonia, 4–7 June 2013; pp. 1–23. [Google Scholar]
- Ma, C.; Qu, Z.; Li, X.; Liu, Z.; Zhou, C. Machine Learning and UAV Path Following Identification Algorithm Based on Navigation Spoofing. Meas. Sci. Technol. 2023, 34, 125034. [Google Scholar] [CrossRef]
- Guo, Y.; Wu, M.; Tang, K.; Tie, J.; Li, X. Covert Spoofing Algorithm of UAV Based on GPS/INS-Integrated Navigation. IEEE Trans. Veh. Technol. 2019, 68, 6557–6564. [Google Scholar] [CrossRef]
- Ma, C.; Yang, J.; Chen, J.; Zhou, C. Path Following Identification of Unmanned Aerial Vehicles for Navigation Spoofing and Its Application. ISA Trans. 2021, 108, 393–405. [Google Scholar] [CrossRef] [PubMed]
- Jafarnia-Jahromi, A.; Broumandan, A.; Nielsen, J.; Lachapelle, G. GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques. Int. J. Navig. Obs. 2012, 2012, 127072. [Google Scholar] [CrossRef]
- Akos, D.M. Who’s Afraid of the Spoofer? GPS/GNSS Spoofing Detection via Automatic Gain Control (AGC). Navigation 2012, 59, 281–290. [Google Scholar] [CrossRef]
- Maier, D.; Frankl, K.; Blum, R.; Eissfeller, B.; Pany, T. Preliminary Assessment on the Vulnerability of NMA-Based Galileo Signals for a Special Class of Record & Replay Spoofing Attacks. In Proceedings of the 2018 IEEE/ION Position, Location and Navigation Symposium (PLANS), Monterey, CA, USA, 23–26 April 2018; pp. 63–71. [Google Scholar]
- Fernández-Hernández, I.; Rijmen, V.; Seco-Granados, G.; Simon, J.; Rodríguez, I.; Calle, J.D. A Navigation Message Authentication Proposal for the Galileo Open Service. Navigation 2016, 63, 85–102. [Google Scholar] [CrossRef]
- Fernández-Hernández, I.; Seco-Granados, G. Galileo NMA Signal Unpredictability and Anti-Replay Protection. In Proceedings of the 2016 International Conference on Localization and GNSS (ICL-GNSS), Barcelona, Spain, 28–30 June 2016; pp. 1–5. [Google Scholar]
- Hu, Y.; Bian, S.; Ji, B.; Li, J. GNSS Spoofing Detection Technique Using Fraction Parts of Double-Difference Carrier Phases. J. Navig. 2018, 71, 1111–1129. [Google Scholar] [CrossRef]
- Ye, X.; Song, F.; Zhang, Z.; Zeng, Q. A Review of Small UAV Navigation System Based on Multisource Sensor Fusion. IEEE Sens. J. 2023, 23, 18926–18948. [Google Scholar] [CrossRef]
- Tanıl, Ç.; Khanafseh, S.; Joerger, M.; Pervan, B. Kalman Filter-Based INS Monitor to Detect GNSS Spoofers Capable of Tracking Aircraft Position. In Proceedings of the 2016 IEEE/ION Position, Location and Navigation Symposium (PLANS), Savannah, Georgia, 11–14 April 2016; pp. 1027–1034. [Google Scholar]
- Varshosaz, M.; Afary, A.; Mojaradi, B.; Saadatseresht, M.; Parmehr, E.D. Spoofing Detection of Civilian UAVs Using Visual Odometry. ISPRS Int. J. Geo-Inf. 2020, 9, 6. [Google Scholar] [CrossRef]
- Xue, N.; Niu, L.; Hong, X.; Li, Z.; Hoffaeller, L.; Pöpper, C. DeepSIM: GPS Spoofing Detection on UAVs Using Satellite Imagery Matching. In Proceedings of the 36th Annual Computer Security Applications Conference; Association for Computing Machinery, New York, NY, USA, 7–11 December 2020; pp. 304–319. [Google Scholar]
- Davidovich, B.; Nassi, B.; Elovici, Y. Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera’s Video Stream. Sensors 2022, 22, 2608. [Google Scholar] [CrossRef] [PubMed]
- Ma, J.; Jiang, X.; Fan, A.; Jiang, J.; Yan, J. Image Matching from Handcrafted to Deep Features: A Survey. Int. J. Comput. Vis. 2021, 129, 23–79. [Google Scholar] [CrossRef]
- He, K.; Zhang, X.; Ren, S.; Sun, J. Deep Residual Learning for Image Recognition. In Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, 27–30 June 2016; IEEE: New York, NY, USA, 2016; pp. 770–778. [Google Scholar]
- Hu, J.; Shen, L.; Albanie, S.; Sun, G.; Wu, E. Squeeze-and-Excitation Networks. IEEE Trans. Pattern Anal. Mach. Intell. 2020, 42, 2011–2023. [Google Scholar] [CrossRef] [PubMed]
- Sarlin, P.-E.; DeTone, D.; Malisiewicz, T.; Rabinovich, A. SuperGlue: Learning Feature Matching with Graph Neural Networks. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, 13–19 June 2020; pp. 4938–4947. [Google Scholar]
- Paine, D.P.; Kiser, J.D. Aerial Photography and Image Interpretation; John Wiley & Sons: Hoboken, NJ, USA, 2012; ISBN 978-0-470-87938-2. [Google Scholar]
- Tian, D. A Review on Image Feature Extraction and Representation Techniques. Int. J. Multimed. Ubiquitous Eng. 2013, 8, 385–396. [Google Scholar]
- Hadsell, R.; Chopra, S.; LeCun, Y. Dimensionality Reduction by Learning an Invariant Mapping. In Proceedings of the 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’06), New York, NY, USA, 17–22 June 2006; Volume 2, pp. 1735–1742. [Google Scholar]
- Liu, R.; Liu, H.; Meng, X.; Li, T.; Hancock, C.M. Detecting GNSS Spoofing and Re-Localization on UAV Based on Imagery Matching. Meas. Sci. Technol. 2024, 36, 016320. [Google Scholar] [CrossRef]
Category | Advantages | Limitations |
---|---|---|
Signal processing | Easy to deploy, low latency | Effective only in the transition phase, easy to be avoided by adaptive spoofing |
Encrypted signal | High theoretical reliability | Requires modification of signaling system, difficult to promote in civilian use |
Signal spatial geometric relationships | Strong resistance to synchronization spoofing | High hardware cost, strict motion constraints |
Layer Name | ResNet50-SE | Output Size |
---|---|---|
input | — | 720 × 960 |
conv1 | 7 × 7, 64, stride 2 | 360 × 480 |
conv2_x | 3 × 3 max pool, stride 2 | 180 × 240 |
conv3_x | 90 × 120 | |
conv4_x | 45 × 60 | |
conv5_x | 23 × 30 |
Model | Accuracy | Precision | Recall | F1 Score | Model Size |
---|---|---|---|---|---|
ResNet50 | 0.8488 | 0.8526 | 0.8709 | 0.8617 | 110.1 M |
ResNet50- SE-stage2 | 0.7965 | 0.7431 | 0.9204 | 0.8223 | 94.7 M |
ResNet50- SE-stage3 | 0.8488 | 0.8750 | 0.8750 | 0.8750 | 95.7 M |
ResNet50- SE-stage4 (ours) | 0.8953 | 0.9473 | 0.8372 | 0.8888 | 98.3 M |
Model | Accuracy | Precision | Recall | F1 Score | Model Size |
---|---|---|---|---|---|
ResNet50- CBAM-stage4 | 0.8546 | 0.9814 | 0.6883 | 0.8091 | 96.0 M |
ResNet50- ECA-stage4 | 0.8197 | 1.0000 | 0.6352 | 0.7769 | 96.3 M |
ResNet50- SE-stage4 (ours) | 0.8953 | 0.9473 | 0.8372 | 0.8888 | 98.3 M |
Model | Accuracy | Precision | Recall | F1 Score | Model Size |
---|---|---|---|---|---|
ConvNeXt | 0.4941 | 0.5000 | 0.3103 | 0.3829 | 337.0 M |
DenseNet | 0.8720 | 0.9814 | 0.7162 | 0.8281 | 54.5 M |
EfficientNet | 0.8139 | 0.9629 | 0.6341 | 0.7647 | 19.0 M |
MobileNet | 0.7790 | 0.9629 | 0.5909 | 0.7323 | 14.4 M |
Swin Transformer | 0.6162 | 0.6481 | 0.4268 | 0.5147 | 334.0 M |
ResNet50- SE-stage4 (ours) | 0.8953 | 0.9473 | 0.8372 | 0.8888 | 98.3 M |
Category | Parameter | Value |
---|---|---|
Aerial Image | Image Resolution (px) | 5472 × 3078 |
Bands | RGB | |
Flight Heading Angle (°) 1 | −0.600 | |
Flight Altitude (m) | 114.178 | |
Camera FOV (°) | 84.000 | |
Camera Pitch Angle (°) 2 | −90.000 | |
Preprocessing | Grayscale Normalization | |
Satellite Image | Spatial Resolution (m/px) | 0.474 |
Bands | RGB | |
Acquisition Date | 2022-03 | |
Preprocessing | Grayscale Normalization |
Threshold (m) | ≤8 | ≤10 | ≤12 | ≤15 |
Localization Accuracy | 48.72% | 64.10% | 84.62% | 89.74% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhou, J.; Hu, M.; Zhou, C.; Liu, Z.; Ma, C. Research on GNSS Spoofing Detection and Autonomous Positioning Technology for Drones. Electronics 2025, 14, 3147. https://doi.org/10.3390/electronics14153147
Zhou J, Hu M, Zhou C, Liu Z, Ma C. Research on GNSS Spoofing Detection and Autonomous Positioning Technology for Drones. Electronics. 2025; 14(15):3147. https://doi.org/10.3390/electronics14153147
Chicago/Turabian StyleZhou, Jiawen, Mei Hu, Chao Zhou, Zongmin Liu, and Chao Ma. 2025. "Research on GNSS Spoofing Detection and Autonomous Positioning Technology for Drones" Electronics 14, no. 15: 3147. https://doi.org/10.3390/electronics14153147
APA StyleZhou, J., Hu, M., Zhou, C., Liu, Z., & Ma, C. (2025). Research on GNSS Spoofing Detection and Autonomous Positioning Technology for Drones. Electronics, 14(15), 3147. https://doi.org/10.3390/electronics14153147