Global Navigation Satellite Systems Signal Vulnerabilities in Unmanned Aerial Vehicle Operations: Impact of Affordable Software-Defined Radio

: Spoofing, alongside jamming of the Global Navigation Satellite System signal, remains a significant hazard during general aviation or Unmanned Aerial Vehicle operations. As aircraft utilize various support systems for navigation, such as INS, an insufficient Global Navigation Satellite System signal renders Unmanned Aerial Vehicles nearly uncontrollable, thereby posing increased danger to operations within airspace and to individuals on the ground. This paper primarily focuses on assessing the impact of the budget friendly Software-Defined Radio, HackRF One 1.0, on the safety of Unmanned Aerial Vehicles operations. Considering the widespread use of Software-Defined Radio devices today, with some being reasonably inexpensive, understanding their influence on Unmanned Aerial Vehicles safety is crucial. The generation of artificial interference capable of posing a potential threat in expanding Unmanned Aerial Vehicles airspace is deemed unacceptable.


Introduction
By constant growth of Global Navigation Satellite Systems (GNSS), such as Galileo (European system) and Beidou (Chinese system), and further modernization of already existing navigation systems, such as GLONASS (Russian system) and American Global Position System (GPS), it is possible to use wider range of new signals which will guarantee better performance and precision [1,2].Besides well-known applications of positioning and navigation, it is expected that more applications in the future will rely on robust timing reference from GNSS [3].This is the case of Unmanned Aerial Vehicles (UAVs), whose popularity and use are growing very fast [4].The internal positioning systems of UAVs rely largely on GPS and GLONASS satellites [5].
A Software-Defined Radio (SDR) is a term defined in 1990s by its creator Joseph Mitola, as an identifier for a class of radios that could be reprogrammed and reconfigured through software instead of hardware [6][7][8].The concept of SDR has been evolving during recent decades but, in general, are those devices based on structure shown in Figure 1.SDR is built of three main parts: an RF/IF module, a digital front-end module and base band processing [9,10].
The RF/IF and digital front-end modules are implemented through hardware solutions based on various manufacturers' module concepts [11][12][13].These components have several variant solutions, with manufacturers altering them according to their specific purposes.The base band processing comprises a hardware-software solution that is usermodifiable, depending on the specific SDR application [14,15].This module is responsible for filtering, demodulating, and modulating the signal, encoding and decoding it, and performing post-processing and signal evaluation, outputting either to a computer or a specific application [16].
performing post-processing and signal evaluation, outputting either to a computer or a specific application [16].Based on many studies from the past, the issue of GNSS interference defines two partial problems [17][18][19][20].The first one is interference, which affects not only the air transport itself, but intelligent transport systems as well [21].The other problem is identification and location of mentioned GNSS signal interference [22].This interference is typically not a concern for military and specialized applications, as they are often encrypted and have higher resistance to interference, utilizing two or more carrier frequencies for transmission [23].Publicly available services, such as those transmitting signals on a single frequency, exhibit lower resistance to interference [24][25][26][27].
According to the definition published in "Doc 8071 -Manual on Testing of Radio Navigation Aids -Volume II", the spoofing of GNSS receivers can be made extremely difficult with proper design of the Receiver Autonomous Integrity Monitoring (RAIM) fault detection, and RAIM fault detection and exclusion algorithms resident in aviation receiver equipment [28].Intentional malicious interference (jamming) to GNSS is also a possibility, as it is to all radio navigation systems [29].It is important to mention that unauthorized interference is illegal and should be dealt with by the appropriate authorities [28].
Interference can be defined based on its characteristics, which may include the type, mean frequency, signal interference bandwidth, interference power, or the time domain of the interference [30,31].Types of interference include sine wave interference, carrier wave-single tone, interference by AM, FM, or PM modulated signals that disturb the signal in a larger spectrum, or noise interference-randomly generated signal (white or pink noise) [32].Interference relative to the mean frequency of the signal can be categorized as "out of band", "near the band", or "in band" interference [33][34][35].Signal interference bandwidth distinguishes between broadband or narrowband interference [36].Interference power refers to the ratio of the carrier signal to the interference signal, also known as the Jammer to Signal (J/S) ratio [36,37].Moreover, interference can exist in the time domain, transmitted continuously or discreetly at time intervals or pulses, characterized by pulse width or the number of pulses per second [36].Interference on the L1 GPS frequency can manifest in the transmitted spectrum in different ways since the signal is spread [38].
The problematics of spoofing and jamming have been widely studied in the past, but the new application of UAVs opens this topic again.As already mentioned, the constant growth and better and easier customer access leads to higher density of UAVs operations in the airspace, thus can lead to higher chance of collision, either with an aircraft, another UAV, or people.The seamless operation of UAVs faces a growing menace-deliberate interference in GNSS signals [39].This interference takes two predominant forms: jamming and spoofing.Jamming involves the intentional transmission of radio frequency signals with the aim of disrupting communication [40].In the context of UAVs, this translates to a direct threat to their navigation capabilities, potentially leading to hazardous consequences [41].Jamming, in the context of GNSS, involves broadcasting signals on the same Based on many studies from the past, the issue of GNSS interference defines two partial problems [17][18][19][20].The first one is interference, which affects not only the air transport itself, but intelligent transport systems as well [21].The other problem is identification and location of mentioned GNSS signal interference [22].This interference is typically not a concern for military and specialized applications, as they are often encrypted and have higher resistance to interference, utilizing two or more carrier frequencies for transmission [23].Publicly available services, such as those transmitting signals on a single frequency, exhibit lower resistance to interference [24][25][26][27].
According to the definition published in "Doc 8071-Manual on Testing of Radio Navigation Aids-Volume II", the spoofing of GNSS receivers can be made extremely difficult with proper design of the Receiver Autonomous Integrity Monitoring (RAIM) fault detection, and RAIM fault detection and exclusion algorithms resident in aviation receiver equipment [28].Intentional malicious interference (jamming) to GNSS is also a possibility, as it is to all radio navigation systems [29].It is important to mention that unauthorized interference is illegal and should be dealt with by the appropriate authorities [28].
Interference can be defined based on its characteristics, which may include the type, mean frequency, signal interference bandwidth, interference power, or the time domain of the interference [30,31].Types of interference include sine wave interference, carrier wave-single tone, interference by AM, FM, or PM modulated signals that disturb the signal in a larger spectrum, or noise interference-randomly generated signal (white or pink noise) [32].Interference relative to the mean frequency of the signal can be categorized as "out of band", "near the band", or "in band" interference [33][34][35].Signal interference bandwidth distinguishes between broadband or narrowband interference [36].Interference power refers to the ratio of the carrier signal to the interference signal, also known as the Jammer to Signal (J/S) ratio [36,37].Moreover, interference can exist in the time domain, transmitted continuously or discreetly at time intervals or pulses, characterized by pulse width or the number of pulses per second [36].Interference on the L1 GPS frequency can manifest in the transmitted spectrum in different ways since the signal is spread [38].
The problematics of spoofing and jamming have been widely studied in the past, but the new application of UAVs opens this topic again.As already mentioned, the constant growth and better and easier customer access leads to higher density of UAVs operations in the airspace, thus can lead to higher chance of collision, either with an aircraft, another UAV, or people.The seamless operation of UAVs faces a growing menace-deliberate interference in GNSS signals [39].This interference takes two predominant forms: jamming and spoofing.Jamming involves the intentional transmission of radio frequency signals with the aim of disrupting communication [40].In the context of UAVs, this translates to a direct threat to their navigation capabilities, potentially leading to hazardous consequences [41].Jamming, in the context of GNSS, involves broadcasting signals on the same frequency as GNSS signals.This interference can overpower or drown out authentic satellite signals, leading to a loss of satellite reception [40,41].The intentional nature of jamming distinguishes it from natural interference; it is a deliberate act, with the objective of disrupting communication or navigation systems relying on GNSS signals.UAVs heavily rely on GNSS signals for accurate navigation, and jamming poses a significant threat to UAV operations by causing navigation errors, loss of control, or even complete failure of the UAV's navigation system [42].Beyond the immediate operational impact, jamming raises security concerns, especially in scenarios where UAVs are deployed for surveillance, emergency response, or other critical applications.Intentional disruption through jamming can compromise the effectiveness and safety of these operations.Additionally, jamming can be challenging to detect, because the signals generated by jammers are often similar to legitimate GNSS signals, making it difficult for navigation systems to differentiate between authentic and jamming signals [43].Mitigating the risks associated with jamming requires a combination of technological solutions, regulatory measures, and awareness.Researchers and industry professionals work towards developing resilient navigation systems that can withstand jamming attempts, and regulatory bodies enforce measures to prevent and penalize jamming activities [39][40][41][42][43].
Spoofing, on the other hand, introduces a subtler, yet equally menacing, danger.It entails the creation of deceptive signals that mimic authentic GNSS signals [44].UAVs, relying on these signals for accurate positioning, become susceptible to misguidance, leading to potential security breaches and safety hazards.Spoofing attacks can be highly sophisticated, providing false location information with precision, posing serious consequences in applications where accurate positioning is critical [45].This technique poses a significant risk to navigation systems, including those in UAVs, as it can misguide the UAV's navigation system, causing errors, loss of control, or unauthorized redirection.Beyond immediate operational impact, spoofing has security implications, compromising the integrity and effectiveness of systems in scenarios such as military operations or critical infrastructure protection.Detection is challenging, as false signals closely resemble authentic satellite signals, and advanced spoofing techniques anticipate anti-spoofing measures, making identification and counteraction difficult [46].Mitigating spoofing risks requires robust anti-spoofing measures, including cryptographic techniques, signal authentication, and additional sensors for cross-verifying location data [44,45].Understanding the nuances of spoofing is crucial for developing effective countermeasures to safeguard navigation systems in applications where accurate and reliable positioning is essential [46,47].As the application of UAVs continues to diversify, encompassing fields such as surveillance, delivery services, and even autonomous transportation, the implications of GNSS interference become increasingly critical.
Throughout the research, particular emphasis was placed on considering relevant studies, particularly those that specifically addressed the spoofing of GPS signals in UAVs.In 2014, Kerns et al. conducted a study titled "Unmanned Aircraft Capture and Control via GPS Spoofing," focusing on the potential of spoofing GPS signals to gain control of unmanned aerial vehicles during flight.The results obtained during the field test have shown that a destructive GPS spoofing attack against a rotorcraft UAV is both technically and operationally feasible [48].
In 2014, Machado-Fernandéz conducted study titled "Software Defined Radio: Basic Principles and Applications," analyzing the risks associated with utilizing low-cost software-defined radio devices available in the market.This study proves that a combination of inexpensive SDR and suitable software (in most cases free software) can be used for any application, such as detection of interferences, assigning of frequency distributions in an efficient manner, identifying spectrum intruders, and characterization of noise by bands and regions of the world [49,50].
The last study, which serves as a stepping-stone for our research, was "Risk assessment of SDR-based attacks with UAVs" by Le Roy et al., in 2019, whose main concern was the complex analysis of commercially available SDR on market and their attack impact from two points of view, i.e., ground against UAVs (fixed SDR) and UAVs against ground or other UAVs (mobile SDR) [24,51].The conclusions of this study are entirely theoretical, since the real generating spoof signal in real environmental conditions is missing.None of the mentioned studies have focused on the current ease of spoofing and jamming any desired signal.

Materials and Methods
This section provides a detailed description of the materials and methods used in this study.The focus of the research is to investigate disruptions and detect anomalies within the GNSS signal.The main research question is: "How does the HackRF One, equipped with an external Temperature Compensated Crystal Oscillator (TCXO), impact the safety and functionality of UAVs by generating artificial interference in the GNSS signal?"To address this question, we conducted a systematic evaluation of the HackRF One, enhanced with an external TCXO, to assess its capability in generating artificial interference within the GNSS signal and its potential effects on the safety and functionality of UAVs.
GNSS spoofing occurs when the interference waveform I(t) mirrors the structure of the authentic signal s(t), resulting in identical spectral shapes for G s (f ) and G I (f ), facilitating maximum overlap.Treating a spoofing signal as random is not viable, rendering the theory of C/N 0 reduction inapplicable.Instead, deterministic effects manifest in the target receiver.While intentional spoofing attacks lack documented evidence in aviation, various demonstrations suggest the feasibility of spoofing using contemporary SDRs and GNSS simulators [52][53][54][55].These demonstrations underscore spoofing as a significant threat to GNSS systems.Unlike spoofing, GNSS jamming is monitored by national aviation authorities, who track cases of GNSS signal interference.The spoofing waveform for a single satellite at the reception antenna may be expressed as: with the delay τ I (t) relating to the true delay τ M (t) for the considered satellite m via an offset ∆τ(t) [52]: Many variations of spoofing attacks may arise, contingent upon the configuration of the spoofing delay I(t) and the power of the spoofer C I (t).Assessing the effects of a spoofing attack can be enhanced through the correlation values of a GNSS receiver when exposed to both authentic and spoofed signals.Spoofing is designed to mislead the GNSS receiver's estimation of position and timing data.GNSS receivers rely on the modulated ranging code C(t) and the navigation data information d(t) contained within the Open Service GNSS signal, both of which are predictable to potential spoofers.This leads to two types of attacks: those targeting the navigation message and those aimed at the code level.When evaluating the threat of spoofing at various sophistication levels, it is essential to consider the development of SDR technology and the capabilities of potential adversaries as uncertainties.For instance, according to the fundamental theory of correlation values, a spoofing signal must closely match the delay and frequency of the authentic signal, while its power C I (t) should not significantly exceed that of the genuine signal C(t) to evade detection by a GNSS receiver operating in tracking mode.A sophisticated spoofing attack necessitates precise knowledge of the user's trajectory relative to GNSS satellites and the spoofer's location.This enables the creation of a fake signal with a matching relative delay, power, and Doppler shift from the receiver's UAV perspective, making detection challenging.Moreover, the spoofer must compensate for internal hardware delays, clock offsets, and differences in antenna gain patterns at both ends.
Numerous countermeasures deployed within receivers to combat spoofing attacks align closely with techniques used for interference detection and mitigation.However, the key distinction lies in the fact that anti-spoofing measures can also be integrated at the system level of GNSS through signal design.Using SDR for GNSS fake-signal generation and testing is advantageous due to its flexibility, enabling rapid parameter changes and simulation of various scenarios, and its cost-effectiveness compared to traditional testing tools.
The HackRF One, known for its affordability and widespread usage, was selected due to its capability to transmit and receive radio signals across a broad frequency range from 1 MHz to 6 GHz.The hardware specifications of the HackRF One, along with comparable options, which were considered but not chosen, based on specific parameters, are detailed in Table 1.Table 1 showcases the technical specifications of three fundamental SDR devices: the HackRF One, the bladeRF, and the ADALM-PLUTO.While these devices share the common objective of aligning with the research's goals, the HackRF One was ultimately selected for its cost-effectiveness and widespread utilization within the specified frequency range.Table 1 shows critical parameters, such as frequency range, RF bandwidth, sampling rate, transmit power, and price for each device, offering insights into their respective capabilities within the context of this research.The research methodology used in the paper is focused on a systematic approach designed to investigate the impact and feasibility of generating artificial interference with a Software-Defined Radio device, specifically the HackRF One version 1.0 with custom source code compilation.The methodology involved several key steps: 1.
Device configuration: the HackRF One was equipped with an external TCXO to enhance precision and performance.

2.
Signal generation: A GPS satellite constellation was specified through a GPS broadcast ephemeris file obtained from NASA.This file was processed to create a binary file for signal distribution using the "gps-sdr-sim" software Hack RF One.

3.
Signal transmission: The generated GPS signal was transmitted using the HackRF One at a specified frequency.The transmission process was observed and verified using a spectrum analyzer.4.
Signal reception and analysis: The transmitted signal was analyzed using an NV08C-CSM integrated satellite navigation receiver.Measurements of signal reception, including changes in course, accuracy measures (such as 2DRMS), and interference effects on the receiver, were documented and analyzed.5.
Assessment of interference power and distance: calculations and assessments were conducted to determine the interference power level, critical interference threshold, and maximum distance within which interference could disrupt the GNSS receiver.6.
Documentation and comparison: results obtained from the transmitted spoof signal were compared with reference measurements taken without the artificial signal to evaluate the impact on the receiver's performance and accuracy.
Overall, the methodology consisted of configuring the SDR device (see Figure 2), generating and transmitting artificial signals, receiving and analyzing these signals using specialized equipment, and assessing their effects on the GNSS receiver.The procedures were systematic, aiming to simulate and evaluate the potential threat of generated interference in GNSS signal reception and navigation systems.Since the concern was focused on simplicity of generating and transmitting arti spoof signal, the Windows operating system was chosen.Even though the chosen S HackRF One, is a very reliable device in the selected price category, it is not pr enough to sufficiently spoof the GPS signal, so it was necessary to install the exte TCXO, which improves the performance of SDR.After installing the TCXO into HackRF One, it is important to determine if those two components are cooperating Since the concern was focused on simplicity of generating and transmitting artificial spoof signal, the Windows operating system was chosen.Even though the chosen SDR, HackRF One, is a very reliable device in the selected price category, it is not precise enough to sufficiently spoof the GPS signal, so it was necessary to install the external TCXO, which improves the performance of SDR.After installing the TCXO into the HackRF One, it is important to determine if those two components are cooperating between each other.The verification can be performed by writing following command into Command Prompt: "hackrf_debug -i5351c -n 0 -r".An unsuccessful response would indicate a lack of cooperation, depicted in Figure 3, while successful cooperation would be demonstrated in Figure 4. Since the concern was focused on simplicity of generating and transmitting artificial spoof signal, the Windows operating system was chosen.Even though the chosen SDR, HackRF One, is a very reliable device in the selected price category, it is not precise enough to sufficiently spoof the GPS signal, so it was necessary to install the external TCXO, which improves the performance of SDR.After installing the TCXO into the HackRF One, it is important to determine if those two components are cooperating between each other.The verification can be performed by writing following command into Command Prompt: "hackrf_debug -i5351c -n 0 -r".An unsuccessful response would indicate a lack of cooperation, depicted in Figure 3, while successful cooperation would be demonstrated in Figure 4.In the second measurement, we performed without an active GLONASS receiver.This configuration allowed us to verify the ability to recover the receiver and determine the position after signal recovery.

Generation of GPS Signal
Once the setup is complete, it is possible to generate a GPS signal, specified by the GPS satellite constellation through a GPS broadcast ephemeris file.The daily GPS broadcast ephemeris file (brdc) is a merge of the individual site navigation files into one.All the necessary information were found on the NASA webpage [56].After downloading the most recent file, the binary file is used for distributing signal created through command: "gps-sdr-sim -e brdc3500.23n-l 50.080759,14.437993,100".The following list explains the individual commands: • "gps sdr-sim" is software, through which it is possible to connect the created binary file and distribute it through RTL-SDR HackRF One; • "-e <gps_nav>" is RINEX navigation file for GPS ephemerides; • "brdc3500.23n" is the most recent daily GPS broadcast ephemeris file published by NASA on the daily basis; • "-l <location>" are latitudinal, longitudinal and height coordinates (static mode), e.g., 50.080759,14.437993,100.
In Figure 5, it is possible to see the process of creating the binary file after entering the desired value of GPS location.For the needs of this paper, the authors have entered the GPS location of Prague.Since the concern was focused on simplicity of generating and transmitting artificial spoof signal, the Windows operating system was chosen.Even though the chosen SDR, HackRF One, is a very reliable device in the selected price category, it is not precise enough to sufficiently spoof the GPS signal, so it was necessary to install the external TCXO, which improves the performance of SDR.After installing the TCXO into the HackRF One, it is important to determine if those two components are cooperating between each other.The verification can be performed by writing following command into Command Prompt: "hackrf_debug -i5351c -n 0 -r".An unsuccessful response would indicate a lack of cooperation, depicted in Figure 3, while successful cooperation would be demonstrated in Figure 4.In the second measurement, we performed without an active GLONASS receiver.This configuration allowed us to verify the ability to recover the receiver and determine the position after signal recovery.

Generation of GPS Signal
Once the setup is complete, it is possible to generate a GPS signal, specified by the GPS satellite constellation through a GPS broadcast ephemeris file.The daily GPS broadcast ephemeris file (brdc) is a merge of the individual site navigation files into one.All the necessary information were found on the NASA webpage [56].After downloading the most recent file, the binary file is used for distributing signal created through command: "gps-sdr-sim -e brdc3500.23n-l 50.080759,14.437993,100".The following list explains the individual commands: • "gps sdr-sim" is software, through which it is possible to connect the created binary file and distribute it through RTL-SDR HackRF One; • "-e <gps_nav>" is RINEX navigation file for GPS ephemerides; • "brdc3500.23n" is the most recent daily GPS broadcast ephemeris file published by NASA on the daily basis; • "-l <location>" are latitudinal, longitudinal and height coordinates (static mode), e.g., 50.080759,14.437993,100.
In Figure 5, it is possible to see the process of creating the binary file after entering the desired value of GPS location.For the needs of this paper, the authors have entered the GPS location of Prague.In the second measurement, we performed without an active GLONASS receiver.This configuration allowed us to verify the ability to recover the receiver and determine the position after signal recovery.

Generation of GPS Signal
Once the setup is complete, it is possible to generate a GPS signal, specified by the GPS satellite constellation through a GPS broadcast ephemeris file.The daily GPS broadcast ephemeris file (brdc) is a merge of the individual site navigation files into one.All the necessary information were found on the NASA webpage [56].After downloading the most recent file, the binary file is used for distributing signal created through command: "gps-sdr-sim -e brdc3500.23n-l 50.080759,14.437993,100".The following list explains the individual commands: • "gps sdr-sim" is software, through which it is possible to connect the created binary file and distribute it through RTL-SDR HackRF One; • "-e <gps_nav>" is RINEX navigation file for GPS ephemerides; • "brdc3500.23n" is the most recent daily GPS broadcast ephemeris file published by NASA on the daily basis; • "-l <location>" are latitudinal, longitudinal and height coordinates (static mode), e.g., 50.080759,14.437993,100.
In Figure 5, it is possible to see the process of creating the binary file after entering the desired value of GPS location.For the needs of this paper, the authors have entered the GPS location of Prague.
After the creation of the complete binary file, the transmission of the spoof signal becomes feasible (see Figure 6).Initiating the transmission involves executing the following command: "hackrf_transfer -t gpssim.bin-f 1575420000 -s 2600000 -a 1 -x 0." The transmitting signal of 1575.42MHz is possible to check with a spectrum analyzer from RF Explorer.In Figure 7, it is possible to see spectrum around 1575 MHz when no signal is distributed.
In Figure 8, the selected signal is being transmitted via the SDR HackRF One equipped with an external TCXO.The spectrum analyzer reveals that this signal is indeed propagating at a strength of −66.0 dB.After the creation of the complete binary file, the transmission of the spoof signal becomes feasible (see Figure 6).Initiating the transmission involves executing the following command: "hackrf_transfer -t gpssim.bin-f 1575420000 -s 2600000 -a 1 -x 0." The transmitting signal of 1575.42MHz is possible to check with a spectrum analyzer from RF Explorer.In Figure 7, it is possible to see spectrum around 1575 MHz when no signal is distributed.In Figure 8, the selected signal is being transmitted via the SDR HackRF One equipped with an external TCXO.The spectrum analyzer reveals that this signal is indeed propagating at a strength of −66.0 dB.After the creation of the complete binary file, the transmission of the spoof signal becomes feasible (see Figure 6).Initiating the transmission involves executing the following command: "hackrf_transfer -t gpssim.bin-f 1575420000 -s 2600000 -a 1 -x 0." The transmitting signal of 1575.42MHz is possible to check with a spectrum analyzer from RF Explorer.In Figure 7, it is possible to see spectrum around 1575 MHz when no signal is distributed.In Figure 8, the selected signal is being transmitted via the SDR HackRF One equipped with an external TCXO.The spectrum analyzer reveals that this signal is indeed propagating at a strength of −66.0 dB.After the creation of the complete binary file, the transmission of the spoof signal becomes feasible (see Figure 6).Initiating the transmission involves executing the following command: "hackrf_transfer -t gpssim.bin-f 1575420000 -s 2600000 -a 1 -x 0." The transmitting signal of 1575.42MHz is possible to check with a spectrum analyzer from RF Explorer.In Figure 7, it is possible to see spectrum around 1575 MHz when no signal is distributed.In Figure 8, the selected signal is being transmitted via the SDR HackRF One equipped with an external TCXO.The spectrum analyzer reveals that this signal is indeed propagating at a strength of −66.0 dB.After the creation of the complete binary file, the transmission of the spoof signal becomes feasible (see Figure 6).Initiating the transmission involves executing the following command: "hackrf_transfer -t gpssim.bin-f 1575420000 -s 2600000 -a 1 -x 0." The transmitting signal of 1575.42MHz is possible to check with a spectrum analyzer from RF Explorer.In Figure 7, it is possible to see spectrum around 1575 MHz when no signal is distributed.In Figure 8, the selected signal is being transmitted via the SDR HackRF One equipped with an external TCXO.The spectrum analyzer reveals that this signal is indeed propagating at a strength of −66.0 dB.Even though the spectrum analyzer catches the spoof signal, it is unknown how the devices will respond on this signal.For checking the spoof signal, the NV08C-CSM integrated satellite navigation GPS, GLONASS, Galileo and SBAS receiver was used.In Figure 9, it is possible to see the actual visible satellites from all mentioned systems whose signals can reach in normal conditions.Reference measurement was performed in normal conditions (Figure 9) without any artificially generated signal.
After reference measurement and checking the visibility of the satellites, it is possible to run the generated binary file with desired frequency and location.After few seconds of running, the NV08C-CSM receiver is not able to catch any of the GPS satellites, as shown in Figure 10.Even though the position has not been changed from the desired and pre-programmed one, in other words spoofed, the power of transmitter was high enough to jam the GPS receiver.Since we have been transmitting the GPS L1 band of frequency 1575.42MHz, it is still possible for receiver to catch the signal from GLONASS system, since it runs on a different frequency.Another change that has happened during the propagation of spoofed signal is change in the course.During the reference measurement, the course has fixed value of 355.0 • , but during the transmitting of spoofed signal, the course changed to value of 191.3 • .After quitting the transmitting of spoofed signal, the value returned to original value.
nes 2024, 8, 109 8 of Even though the spectrum analyzer catches the spoof signal, it is unknown how th devices will respond on this signal.For checking the spoof signal, the NV08C-CSM int grated satellite navigation GPS, GLONASS, Galileo and SBAS receiver was used.In Figu 9, it is possible to see the actual visible satellites from all mentioned systems whose signa can reach in normal conditions.Reference measurement was performed in normal cond tions (Figure 9) without any artificially generated signal.After reference measurement and checking the visibility of the satellites, it is possib to run the generated binary file with desired frequency and location.After few seconds running, the NV08C-CSM receiver is not able to catch any of the GPS satellites, as show in Figure 10.Even though the position has not been changed from the desired and pr programmed one, in other words spoofed, the power of transmitter was high enough jam the GPS receiver.Since we have been transmitting the GPS L1 band of frequenc 1575.42MHz, it is still possible for receiver to catch the signal from GLONASS system since it runs on a different frequency.Another change that has happened during the prop agation of spoofed signal is change in the course.During the reference measurement, th course has fixed value of 355.0°, but during the transmitting of spoofed signal, the cours changed to value of 191.3°.After quitting the transmitting of spoofed signal, the valu returned to original value.
In Figure 10, the scatter plot visualizes the course of measurements during the tran mission of a spoof signal.It includes a scatter plot visualization that demonstrates th impact of transmitting a spoof signal on the accuracy of the GPS receiver.The plot show the deviation in course and the RMS2D values, which indicate the error in position dete mination caused by the transmitted spoof signal.The highest RMS2D value in Figure 9 approximately four times higher than in the reference measurement, highlighting the im pact of the interference on GPS signal reception.In the second measurement we performed, GLONASS signal reception and SBAS satellite extension were turned off.With this configuration, we verified the ability to recover the receiver and determine the position after signal recovery.In Figure 11 9 is approximately four times higher than in the reference measurement, highlighting the impact of the interference on GPS signal reception.
In the second measurement we performed, GLONASS signal reception and SBAS satellite extension were turned off.With this configuration, we verified the ability to recover the receiver and determine the position after signal recovery.In Figure 11, the scatter plot visualizes the course of measurements during the transmission of a spoof signal without an active GLONASS receiver.The plot shows the deviation in course and the RMS2D values, which indicate the error in position determination caused by the transmitted spoof signal under these specific conditions.The highest RMS2D value in Figure 11 is notably higher compared to the reference measurement, indicating a significant increase in error due to the absence of an active GLONASS receiver during the transmission of the spoof signal.In the second measurement we performed, GLONASS signal reception and SBAS satellite extension were turned off.With this configuration, we verified the ability to recover the receiver and determine the position after signal recovery.In Figure 11, the scatter plot visualizes the course of measurements during the transmission of a spoof signal without an active GLONASS receiver.The plot shows the deviation in course and the RMS2D values, which indicate the error in position determination caused by the transmitted spoof signal under these specific conditions.The highest RMS2D value in Figure 11 is notably higher compared to the reference measurement, indicating a significant increase in error due to the absence of an active GLONASS receiver during the transmission of the spoof signal.The RMS2D value is notably intriguing.As depicted in Figure 10, the highest RMS2D value is 17.0, which means that it is approximately four times higher than in the reference The RMS2D value is notably intriguing.As depicted in Figure 10, the highest RMS2D value is 17.0, which means that it is approximately four times higher than in the reference measurement.In the second case of measurement (Figure 11), the highest RMS2D value is 249.0, which means that it is approximately 57 times higher than in the reference measurement.However, this error is primarily caused by the complete loss of the GPS L1C signal, without the reference of another satellite navigation systems.This measure unit can be defined as 2DRMS as well, and means "Twice Distance Root Mean Square Error".Even though the 2DRMS is measurement in 2D space, to be concrete in horizontal space, the "2D" in this abbreviation stands for "Twice Distance".The key factor is the accuracy of receiving signal.There are many accuracy measures, and each of them are used for specific systems, since the errors of position coordinates determined using a GPS or GLONASS unit are not constant, they vary statistically.When observing the reported position of a stationary receiving system over time, it becomes evident that it fluctuates or deviates.Converting these moving points into a visual representation would result in a scatter plot.The position is essentially three-dimensional; however, it can be analyzed either in horizontal or vertical accuracy individually.In Table 2 the most used types of measure methods are listed, including its dimensions, precision probability and typical usage.The most used types of measure methods include the root mean square, twice distance rms, circular error probable, horizontal 95 percent accuracy and spherical error probable.The root mean square is defined as the square root of the average of the squared errors.The twice distance rms is defined as twice the root mean square of the horizontal errors.The circular error probable is a circle's radius, centered at the true antenna position, containing 50 percent of the points in the horizontal scatter plot.The horizontal 95 percent accuracy is defined as a circle's radius, centered at the true antenna position, containing 95 percent of the points in the horizontal scatter plot.The spherical error probable is a sphere's radius, centered at the true antenna position, containing 50 percent of the points in the threedimensional scatter plot.Each of those measurement methods has its own advantages and disadvantages, and precision probability [49].
Table 3 provides a comparison of the practical test results on UAV GNSS receivers with various configurations, along with whether they include jamming/spoofing detection capabilities.Each column represents a different UAV model, and the row detail the GNSS receiver configuration and the presence of jamming/spoofing detection features, denoted as "Yes" or "No".
This measurement fulfills the objective outlined in the research above by providing specific data and insights into how different types of GNSS receivers respond to signal interference and manipulation.These insights could be used to assess the level of security and reliability of UAVs when exposed to artificial interferences, as well as to develop measures to enhance resilience against them.Overall, this measurement contributes to a better understanding of the potential risks and challenges associated with using drones in environments where GNSS signals may be affected by interference.
The new generation of GNSS receivers is already resilient and capable of detecting interference under certain limiting conditions, with the latest firmware upgrades also addressing spoofing.However, the question remains whether we can ensure GNSS signal resilience against interference in all circumstances in the future.This goal is challenging, as the technological landscape of signal interference continues to evolve.It is crucial to continue innovating and researching to create and implement effective methods for protecting GNSS signals.This includes not only improving the receivers themselves, but also developing better algorithms and protocols for detecting and mitigating interference, as well as collaborating with other technological sectors to create more complex and robust systems.
Securing GNSS signals against interference will require not only technical innovations, but also international cooperation and appropriate legal and regulatory measures.It is a challenge that we must collectively address to ensure reliable and secure navigation using GNSS in all possible scenarios.This measurement fulfills the objective outlined in the research above by providing specific data and insights into how different types of GNSS receivers respond to signal interference and manipulation.These insights could be used to assess the level of security and reliability of UAVs when exposed to artificial interferences, as well as to develop measures to enhance resilience against them.Overall, this measurement contributes to a

Power and Distance of Interfering Signal Assessment
The ratio of Jamming to Signal can be calculated by following formula: where J R is the value of the received power of the interfering signal (dBm or dBW) and S R is the value of the received power of the satellite signal (dBm or dBW) [49].
The critical value (J/S) C , which represents a certain interference threshold at which the GNSS receiver is unable to perform its function, ranges from about 37 to 60 dB, as found by countless experimental measurements, the results of which have been published in multiple studies [49].The value of (J/S) C varies depending on the type of GNSS receiver and the type of interfering signal used.Interference from white noise or narrowband signals must be transmitted with much higher power in order to achieve complete interference, thus higher values (J/S) C correspond to this.A broadband interference signal (such as a chirp signal) requires lower power, and thus a value (J/S) C corresponds to lower values.The calculation of the critical range assuming propagation in free space is based on the equation: where P r is the received signal power at a distance d from the transmitter, P t is the power of the transmitted signal, G t and G r are the gain of the transmitting or receiving antenna, λ is the wavelength of the transmitted signal and L represents losses in the receiver that do not affect propagation [49].
GNSS signals are usually available on Earth with a power of approximately −125 dBm.The specification for GPS signals at frequencies L1 and L2 states that the minimum received level for users on Earth is −158.5 dBW (−128.5 dBm) for the C/A-code on L1, and −160 dBW (−130 dBm) for the P r code on L2 [36,51,57,58].The signal strength is further affected by the elevation of the satellite and the influence of the troposphere and ionosphere.It follows from the above that the order level of the interfering signal, which would cause the interference of the already captured GNSS signal, is at a value of −80 dBm and higher [59].The specific value will fluctuate by about 25 dB, depending on the polarization of the antenna, the bandwidth with which the receiver works, and the sensitivity setting of the receiver [60,61].Losses in the propagation of an electromagnetic wave through space L FSPL is represented by the following equation: where L FSPL are losses in the propagation of an electromagnetic wave through free space, d is the distance between the antenna of the interfering signal transmitter and the antenna of the GNSS signal receiver, f is the interference frequency, c is the speed of light and λ is the wavelength of the transmitted signal [61].If we consider the basic model of electromagnetic wave propagation through free space (3), the attenuation of the environment is as follows (Table 4).Rewriting Equation (2) into a form for substituting variables in dB, we obtain [62]: If we consider negligible losses in the receiver, if we consider the receiving antenna as use the of effective radiated EIRP, then we can rewrite Formula (4) as follows: Once we know the power level of the GNSS signal on the Earth's surface (see Table 5) and assume knowledge of the critical value (J/S) C , then we can calculate from Equation (2) what will be the limit power J C of the interfering signal at the GNSS receiver, which disables the correct function of the receiver [62].Substituting into Equation ( 5) and expressing the distance d from the formula, we obtain the maximum distance of the jammer d max , in which the jammer can disturb the GNSS receiver:

Detection and Mitigation of Spoofing
Many countermeasures based on receivers against spoofing attacks share common principles with interference detection and mitigation techniques.The primary distinction is that anti-spoofing measures can also be integrated at the system level of GNSS through signal design.
User-level techniques can be categorized based on their capabilities.The following segments distinguish various stages of anti-spoofing techniques, ranging from detection to mitigation.
Pre-correlation techniques are notably less effective in cases of spoofing, as spoofing signals inherently match the power levels of authentic satellite signals, and user conditions (such as channel model) may obscure a spoofer's detection capabilities.However, proposed methods like pre-correlation detection techniques based on the generalized likelihood ratio test (GLRT) from [63] can be valuable when facing unsophisticated spoofing attacks that mask the impact of user channel conditions and receiver processing on the null hypothesis formulation.
Another intriguing spoofing detection concept is presented in [64], introducing a clock monitoring-based detection scheme that exploits the common projection of relative delays from all spoofed satellites onto the user receiver's clock solution.Such techniques require well-characterized, calibrated receiver clocks and are more suitable for unsophisticated spoofers.
Multipath detection techniques serve as a defensive measure potentially applicable for spoofing detection.Signal quality monitoring (SQM) algorithms utilize a test statistic derived from correlation values at different spacings and the autocorrelation function.While they assume that signal and noise are solely present in the channel, their effectiveness is conditionally limited, particularly in the presence of multipath.
Additional DSP-based spoofing detection techniques have explored the spectral structure of GNSS signals, focusing on concentrating signal spectral lines through Doppler removal and utilizing the estimated variance of noise-only parts of the spectrum as a detection metric compared to spoof-free conditions [65].Time-frequency analysis employing multiresolution algorithms has also been employed to discern the relative Doppler of additional (spoofing) signals from line-of-sight signals via eigen-decomposition of the autocorrelation matrix.This approach also offers mitigation capabilities, where a notch filter can be applied to eliminate spoofed signals post-classification through Doppler estimation.
A method for authenticating and distinguishing between authentic and spoofed signals is introduced in [66], leveraging the capabilities of a kinematic user to identify and classify spoofing signals based on correlations in channel gain and Doppler among the spoofed satellites.Subsequently, Ref. [67] proposes a technique for mitigating spoofing signals by systematically eliminating them from the received signal.This approach assumes independent tracking of authentic and spoofed signals and that the spoofer does not adjust for the user's motion relative to the spoofer's position.
Another approach utilizes correlation of carrier phase measurements among authentic and spoofed satellites, employing either an articulating [68] or a dual antenna [69,70] architecture.As depicted in Figure 9, the carrier phases of spoofed satellites exhibit high correlation due to identical direction of arrival (DOA) for all satellites.While this method is robust, it entails higher cost and complexity and is limited to detection alone.
In general, the effectiveness of any spoofing detection, characterization, and discrimination algorithm may be hindered in complex multipath environments and when confronted with highly sophisticated spoofers who adjust for relative user-spoofer dynamics or introduce some level of independence among spoofing signals.
In conclusion, it is crucial to evaluate the capabilities of the discussed techniques across various environments and use cases, as most validation has occurred in open spaces or airfields.Additionally, receiver-based methods should be examined for different spoofing scenarios, considering their performance relative to spoofing sophistication and for diverse receiver architectures.For instance, open-loop architectures may lack the ability to utilize carrier phase measurements.
Furthermore, the performance analysis of these techniques, either individually or in combination, should be aligned with key metrics and user-level requirements for each specific case and application.For example, a technique with high detection probability might also entail a longer detection latency, allowing a spoofer to potentially disrupt the receiver's tracking.Given the multitude of factors to consider with user-level techniques, the GNSS community has turned to system-level approaches as a more comprehensive solution against spoofing.
In summary, Table 6 outlines the varying capabilities of spoofing detection and mitigation techniques and their suitability levels at the receiver level.

Discussion
As can be seen, the used device, HackRF One, along with the necessary equipment, can be used for generating any desired signal thus, through this device, any frequency can be jammed or spoofed, including, for instance, the GLONASS frequency.From the measurements, artificial spoof signal created by authors have been strong enough to jam the GPS receiver in a way that it was not possible for receiver to catch any of GPS satellites.Also, the 2DRMS accuracy was significantly decreased during the measurement with spoof signal.During the reference measurement when no artificial signal was transmitted, the value of 2 drms was 2.4 which is according to the table value of accuracy more than 97%.However, when the generated spoof signal was transmitted, two major events happened.The 2drms was significantly decreased (by more 76.6%),since the measured value of 2 drms reached 20.8.The other thing was the change in the course.The course had a stable value of 355.0 • during the reference measurement; however, during spoof signal measurement, the value radically changed to 191.3 • , meaning, the course turned almost precisely other way around.
Table 7 presents the probabilities associated with drms (root mean square) and 2 drms (twice distance root means square error) for various standard deviations (σ y /σ x ).Table 5 showcases the relationship between the standard deviations and the probabilities associated with both drms and 2 drms and provides insights into the statistical likelihoods associated with the drms and 2 drms values, based on the standard deviations in the positioning system.It shows how different standard deviation ratios impact the probabilities of both drms and 2 drms, which are essential accuracy measures used in evaluating the precision of positioning systems.The research into the impact of the HackRF One, equipped with an external TCXO, on the safety and functionality of UAVs through the generation of artificial interference in the GNSS signal has yielded valuable insights.The results highlight the susceptibility of UAVs to the artificial interference generated by the HackRF One, leading to potential safety and operational risks.The observed failure of GPS receivers and the significant decrease in accuracy measures during spoofed signal transmission emphasize the need for robust countermeasures to mitigate the identified threats.
Furthermore, the study demonstrates the practical implications of such interference in real-world scenarios, where UAVs rely heavily on GNSS signals for navigation and positioning.The discussion delves into the implications of these findings for the wider UAV industry, emphasizing the importance of developing advanced detection mechanisms and resilient technologies to protect against unauthorized interference.
More than 12 years ago already, researchers at the University of Texas at Austin demonstrated the vulnerability of civilian UAVs to GPS spoofing attacks, followed by a similar demonstration for FAA and DHS officials [71].Subsequently, in the summer of 2013, the University of Texas at Austin team successfully spoofed a position private yacht using their technology [72].At DefCon 2015, Qihoo 360 researchers presented a low-cost GPS spoofer capable of falsifying smartphone and in-car navigation system locations [73].The researchers at university and experts from FAA and DHS highlighted the broader risks of insecure civil GPS technology to critical infrastructure and recommended measures to enhance spoof resistance, including requiring spoof-resistant navigation systems for UAVs and critical GNSS-based systems.
While the HackRF One showcased its adaptability and functionality for various applications, including the generation of artificial interference, our study serves as a starting point for further research.Future investigations should explore additional experiments with diverse signals, considering the evolving landscape of jamming and spoofing technologies.Additionally, integrating machine learning algorithms and artificial intelligence with SDR technologies could enhance the ability to distinguish between legitimate and malicious signals, contributing to a more secure UAV environment.

Conclusions
In conclusion, the escalating use of UAVs in airspace presents a significant safety concern due to the ease of jamming or spoofing signals.This vulnerability, particularly in the GNSS, poses a substantial threat to general aviation operations.Given the increasing reliance on UAVs for a multitude of applications, including surveillance, logistics, and beyond, the need for robust countermeasures to protect against potential disruptions caused by spoofing or jamming signals becomes paramount.
This research primarily focused on evaluating the impact of the SDR HackRF One on UAV safety.By demonstrating the device's ability to generate artificial interference capable of disrupting the GPS receiver's functionality, our research underscores the potential risks associated with such interference in real-world scenarios.The findings revealed that transmitting an artificial spoof GPS signal led to the failure of the GPS receiver in capturing any visible satellites.This failure was substantial and hazardous, indicating a potential risk if encountered in actual operational conditions.The methodology systematically involved configuring the SDR device, generating and transmitting signals, analyzing their effects on the GNSS receiver, and assessing interference systematically.Notably, deviations in course and accuracy measures were evident when encountering interference, with significant changes observed in course values and accuracy measures like RMS2D.In a second measurement without an active GLONASS receiver, significant deviations were noted in course values, and a notably higher RMS2D value compared to the reference measurement.The RMS2D value was approximately 57 times higher due to the complete loss of GPS L1C signal without reference to another satellite navigation system.These results underscore the critical importance of considering different scenarios and configurations when assessing interference effects on GNSS receivers.
The implications of this research are critical in comprehending the vulnerabilities present in GNSS signals and the potential threats posed by unauthorized interference.Moreover, it emphasizes the necessity for robust countermeasures to safeguard UAV operations in airspace against potential disruptions caused by spoofing or jamming signals.
While the HackRF One device showcased its adaptability and functionality for various applications related to UAV operations, its use in detecting spoofed GNSS signals signifies an added value in augmenting UAV safety measures within airspace.Future research should delve deeper into developing advanced detection mechanisms and resilient technologies to safeguard UAVs from emerging threats in the jamming and spoofing landscape.
Furthermore, the implementation of machine learning algorithms and artificial intelligence in conjunction with SDR technologies could enhance the ability to distinguish between legitimate and malicious signals, contributing to a more secure UAV environment.Research efforts should also focus on collaborative initiatives between industry stakeholders, regulatory bodies, and academia to formulate comprehensive guidelines and standards for UAV communication security.Addressing the challenges posed by potential interference requires a multidisciplinary approach that combines expertise in telecommunications, cybersecurity, and aeronautics.This collaborative effort is essential to stay ahead of adversaries seeking to exploit vulnerabilities in UAV communication systems.As technology continues to advance, it is important for the research community to remain proactive in devising innovative solutions to mitigate the risks associated with GNSS interference.

Figure 2 .
Figure 2. Scheme of SDR configuration for GNSS signal transmitting.

Figure 2 .
Figure 2. Scheme of SDR configuration for GNSS signal transmitting.

Figure 2 .
Figure 2. Scheme of SDR configuration for GNSS signal transmitting.

Figure 5 .
Figure 5. Process of generating binary file.

Figure 6 .
Figure 6.Process of transmitting the spoof signal.

Figure 7 .
Figure 7. Spectral analysis of the spectrum interest.

Figure 8 .
Figure 8. Spectrum of interest while transmitting the spoof signal.

Figure 6 .
Figure 6.Process of transmitting the spoof signal.

Figure 7 .
Figure 7. Spectral analysis of the spectrum interest.

Figure 8 .
Figure 8. Spectrum of interest while transmitting the spoof signal.

Figure 6 .
Figure 6.Process of transmitting the spoof signal.

Figure 5 .
Figure 5. Process of generating binary file.

Figure 6 .
Figure 6.Process of transmitting the spoof signal.

Figure 7 .
Figure 7. Spectral analysis of the spectrum interest.

Figure 8 .
Figure 8. Spectrum of interest while transmitting the spoof signal.

Figure 7 .
Figure 7. Spectral analysis of the spectrum interest.

Figure 5 .
Figure 5. Process of generating binary file.

Figure 6 .
Figure 6.Process of transmitting the spoof signal.

Figure 7 .
Figure 7. Spectral analysis of the spectrum interest.

Figure 8 .
Figure 8. Spectrum of interest while transmitting the spoof signal.Figure 8. Spectrum of interest while transmitting the spoof signal.

Figure 8 .
Figure 8. Spectrum of interest while transmitting the spoof signal.Figure 8. Spectrum of interest while transmitting the spoof signal.

Figure 9 .
Figure 9. Course of a reference measurements.

Figure 10 .
Figure 10.Course of a measurements during transmitting of a spoof signal and scatter plot visualization.In Figure10, the scatter plot visualizes the course of measurements during the transmission of a spoof signal.It includes a scatter plot visualization that demonstrates the

Figure 10 .
Figure 10.Course of a measurements during transmitting of a spoof signal and scatter plot visualization.

Figure 11 .
Figure 11.Course of a measurements during transmitting of a spoof signal without an active GLONASS receiver and scatter plot visualization.

Figure 11 .
Figure 11.Course of a measurements during transmitting of a spoof signal without an active GLONASS receiver and scatter plot visualization.
Concurrent reception of up to single GNSS up to 5 Hznavigation rate To combat against jamming, NEO-M6 modules include monitor for continuous wave (narrowband) jammers/interference only.This monitor reports whether jamming has been detected or suspected by the receiver.The receiver monitors the background noise and looks for signifi-Ublox NEO-M8N module, IST8310 compass Concurrent reception of up to 3 GNSS single GNSS up to 10 Hz-navigation rate To combat against spoofing, NEO-M8N modules include spoofing detection measures to alert the host when signals appear to be suspicious.The receiver combines several checks on the received signals looking for inconsistencies across several parameters.HackRF One Jamming/spoofing detection Yes/Yes DJI INSPIRE 2 Ublox M8 module, M8030 TK Concurrent reception of up to 2 GNSS up to 10 Hznavigation rate To combat against spoofing, NEO-M8 modules include spoofing detection measures to alert the host when signals appear to be suspicious.The receiver combines several checks on the received signals, looking for inconsistencies across several parameters.HackRF One Jamming/spoofing detection Yes/Yes SKY HUNTER MATEKSYS M8Q-5883 Concurrent reception of up to 2 GNSS up to 10 Hz, single GNSS up to 18 Hz-navigation rate To combat against spoofing, NEO-M8Q modules include spoofing detection measures to alert the host when signals appear to be suspicious.The receiver combines several checks on the received signals looking for inconsistencies across several parameters HackRF One Jamming/spoofing detection Yes/Yes This measurement fulfills the objective outlined in the research above by providing specific data and insights into how different types of GNSS receivers respond to signal interference and manipulation.These insights could be used to assess the level of security and reliability of UAVs when exposed to artificial interferences, as well as to develop measures to enhance resilience against them.Overall, this measurement contributes to a Ublox NEO-6M-0 module, HMC5883L compass Concurrent reception of up to single GNSS up to 5 Hz-navigation rate To combat against jamming, NEO-M6 modules include monitor for continuous wave (narrowband) jammers/interference only.This monitor reports whether jamming has been detected or suspected by the receiver.The receiver monitors the background noise and looks for significant changes.
Concurrent reception of up to single GNSS up to 5 Hznavigation rate To combat against jamming, NEO-M6 modules include monitor for continuous wave (narrowband) jammers/interference only.This monitor reports whether jamming has been detected or suspected by the receiver.The receiver monitors the background noise and looks for signifi-Ublox NEO-M8N module, IST8310 compass Concurrent reception of up to 3 GNSS single GNSS up to 10 Hz-navigation rate To combat against spoofing, NEO-M8N modules include spoofing detection measures to alert the host when signals appear to be suspicious.The receiver combines several checks on the received signals looking for inconsistencies across several parameters.HackRF One Jamming/spoofing detection Yes/Yes DJI INSPIRE 2 Ublox M8 module, M8030 TK Concurrent reception of up to 2 GNSS up to 10 Hznavigation rate To combat against spoofing, NEO-M8 modules include spoofing detection measures to alert the host when signals appear to be suspicious.The receiver combines several checks on the received signals, looking for inconsistencies across several parameters.HackRF One Jamming/spoofing detection Yes/Yes SKY HUNTER MATEKSYS M8Q-5883 Concurrent reception of up to 2 GNSS up to 10 Hz, single GNSS up to 18 Hz-navigation rate To combat against spoofing, NEO-M8Q modules include spoofing detection measures to alert the host when signals appear to be suspicious.The receiver combines several checks on the received signals looking for Ublox NEO-M8N module, IST8310 compass Concurrent reception of up to 3 GNSS single GNSS up to 10 Hz-navigation rate To combat against spoofing, NEO-M8N modules include spoofing detection measures to alert the host when signals appear to be suspicious.The receiver combines several checks on the received signals looking for inconsistencies across several parameters.

Table 3 .
Concurrent reception of up to single GNSS up to 5 Hznavigation rate To combat against jamming, NEO-M6 modules include monitor for continuous wave (narrowband) jammers/interference only.This monitor reports whether jamming has been detected or suspected by the receiver.The receiver monitors the background noise and looks for signifi-Ublox NEO-M8N module, IST8310 compass Concurrent reception of up to 3 GNSS single GNSS up to 10 Hz-navigation rate To combat against spoofing, NEO-M8N modules include spoofing detection measures to alert the host when signals appear to be suspicious.The receiver combines several checks on the received signals looking for inconsistencies across several parameters.HackRF One Jamming/spoofing detection Yes/Yes DJI INSPIRE 2 Ublox M8 module, M8030 TK Concurrent reception of up to 2 GNSS up to 10 Hznavigation rate To combat against spoofing, NEO-M8 modules include spoofing detection measures to alert the host when signals appear to be suspicious.The receiver combines several checks on the received signals, looking for inconsistencies across several parameters.HackRF One Jamming/spoofing detection Yes/Yes SKY HUNTER MATEKSYS M8Q-5883 Concurrent reception of up to 2 GNSS up to 10 Hz, single GNSS up to 18 Hz-navigation rate To combat against spoofing, NEO-M8Q modules include spoofing detection measures to alert the host when signals appear to be suspicious.The receiver combines several checks on the received signals looking for inconsistencies across several parameters HackRF One Jamming/spoofing detection Yes/Yes This measurement fulfills the objective outlined in the research above by providing specific data and insights into how different types of GNSS receivers respond to signal interference and manipulation.These insights could be used to assess the level of security and reliability of UAVs when exposed to artificial interferences, as well as to develop measures to enhance resilience against them.Overall, this measurement contributes to a Ublox M8 module, M8030 TK Concurrent reception of up to 2 GNSS up to 10 Hz -navigation rate To combat against spoofing, NEO-M8 modules include spoofing detection measures to alert the host when signals appear to be suspicious.The receiver combines several checks on the received signals, looking for inconsistencies across several parameters.The practical test on UAV GNSS receiver with various configuration of GNSS receiver.3DR IRIS+ Ublox NEO-6M-0 module, HMC5883L compass Concurrent reception of up to single GNSS up to 5 Hznavigation rate To combat against jamming, NEO-M6 modules include monitor for continuous wave (narrowband) jammers/interference only.This monitor reports whether jamming has been detected or suspected by the receiver.The receiver monitors the background noise and looks for signifi-Ublox NEO-M8N module, IST8310 compass Concurrent reception of up to 3 GNSS single GNSS up to 10 Hz-navigation rate To combat against spoofing, NEO-M8N modules include spoofing detection measures to alert the host when signals appear to be suspicious.The receiver combines several checks on the received signals looking for inconsistencies across several parameters.HackRF One Jamming/spoofing detection Yes/Yes DJI INSPIRE 2 Ublox M8 module, M8030 TK Concurrent reception of up to 2 GNSS up to 10 Hznavigation rate To combat against spoofing, NEO-M8 modules include spoofing detection measures to alert the host when signals appear to be suspicious.The receiver combines several checks on the received signals, looking for inconsistencies across several parameters.HackRF One Jamming/spoofing detection Yes/Yes SKY HUNTER MATEKSYS M8Q-5883 Concurrent reception of up to 2 GNSS up to 10 Hz, single GNSS up to 18 Hz-navigation rate To combat against spoofing, NEO-M8Q modules include spoofing detection measures to alert the host when signals appear to be suspicious.The receiver combines several checks on the received signals looking for inconsistencies across several parameters HackRF One Jamming/spoofing detection Yes/Yes This measurement fulfills the objective outlined in the research above by providing specific data and insights into how different types of GNSS receivers respond to signal interference and manipulation.These insights could be used to assess the level of security and reliability of UAVs when exposed to artificial interferences, as well as to develop measures to enhance resilience against them.Overall, this measurement contributes to a MATEKSYS M8Q-5883 Concurrent reception of up to 2 GNSS up to 10 Hz, single GNSS up to 18 Hz-navigation rate To combat against spoofing, NEO-M8Q modules include spoofing detection measures to alert the host when signals appear to be suspicious.The receiver combines several checks on the received signals looking for inconsistencies across

Table 2 .
Accuracy measures and typical usage.

Table 3 .
The practical test on UAV GNSS receiver with various configuration of GNSS receiver.

Table 3 .
The practical test on UAV GNSS receiver with various configuration of GNSS receiver.

Table 3 .
The practical test on UAV GNSS receiver with various configuration of GNSS receiver.

Table 3 .
The practical test on UAV GNSS receiver with various configuration of GNSS receiver.

Table 5 .
Frequencies and wavelengths of chosen GNSS signals.