Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (38)

Search Parameters:
Keywords = UAV spoofing

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
34 pages, 7507 KiB  
Article
Exploring Multi-Channel GPS Receivers for Detecting Spoofing Attacks on UAVs Using Machine Learning
by Mustapha Mouzai, Mohamed Amine Riahla, Amor Keziou and Hacène Fouchal
Sensors 2025, 25(13), 4045; https://doi.org/10.3390/s25134045 - 28 Jun 2025
Viewed by 602
Abstract
All current transportation systems (vehicles, trucks, planes, etc.) rely on the Global Positioning System (GPS) as their main navigation technology. GPS receivers collect signals from multiple satellites and are able to provide more or less accurate positioning. For civilian applications, GPS signals are [...] Read more.
All current transportation systems (vehicles, trucks, planes, etc.) rely on the Global Positioning System (GPS) as their main navigation technology. GPS receivers collect signals from multiple satellites and are able to provide more or less accurate positioning. For civilian applications, GPS signals are sent without any encryption system. For this reason, they are vulnerable to various attacks, and the most prevalent one is known as GPS spoofing. The main consequence is the loss of position monitoring, which may increase damage risks in terms of crashes or hijacking. In this study, we focus on UAV (unmanned aerial vehicle) positioning attacks. We first review numerous techniques for detecting and mitigating GPS spoofing attacks, finding that various types of attacks may occur. In the literature, many studies have focused on only one type of attack. We believe that targeting the study of many attacks is crucial for developing efficient mitigation mechanisms. Thus, we have explored a well-known datasetcontaining authentic UAV signals along with spoofed signals (with three types of attacked signals). As a main contribution, we propose a more interpretable approach to exploit the dataset by extracting individual mission sequences, handling non-stationary features, and converting the GPS raw data into a simplified structured format. Then, we design tree-based machine learning algorithms, namely decision tree (DT), random forest (RF), and extreme gradient boosting (XGBoost), for the purpose of classifying signal types and to recognize spoofing attacks. Our main findings are as follows: (a) random forest has significant capability in detecting and classifying GPS spoofing attacks, outperforming the other models. (b) We have been able to detect most types of attacks and distinguish them. Full article
(This article belongs to the Section Navigation and Positioning)
Show Figures

Figure 1

19 pages, 55351 KiB  
Article
Improving UAV Remote Sensing Photogrammetry Accuracy Under Navigation Interference Using Anomaly Detection and Data Fusion
by Chen Meng, Haoyang Yang, Cuicui Jiang, Qinglei Hu and Dongyu Li
Remote Sens. 2025, 17(13), 2176; https://doi.org/10.3390/rs17132176 - 25 Jun 2025
Viewed by 372
Abstract
Accurate and robust navigation is fundamental to Unmanned Aerial Vehicle (UAV) remote sensing operations. However, the susceptibility of UAV navigation sensors to diverse interference and malicious attacks can severely degrade positioning accuracy and compromise mission integrity. Addressing these vulnerabilities, this paper presents an [...] Read more.
Accurate and robust navigation is fundamental to Unmanned Aerial Vehicle (UAV) remote sensing operations. However, the susceptibility of UAV navigation sensors to diverse interference and malicious attacks can severely degrade positioning accuracy and compromise mission integrity. Addressing these vulnerabilities, this paper presents an integrated framework combining sensor anomaly detection with a Dynamic Adaptive Extended Kalman Filter (DAEKF) and federated filtering algorithms to bolster navigation resilience and accuracy for UAV remote sensing. Specifically, mathematical models for prevalent UAV sensor attacks were established. The proposed framework employs adaptive thresholding and residual consistency checks for the real-time identification and isolation of anomalous sensor measurements. Based on these detection outcomes, the DAEKF dynamically adjusts its sensor fusion strategies and noise covariance matrices. To further enhance the fault tolerance, a federated filtering architecture was implemented, utilizing adaptively weighted sub-filters based on assessed trustworthiness to effectively isolate faults. The efficacy of this framework was validated through rigorous experiments that involved real-world flight data and software-defined radio (SDR)-based Global Positioning System (GPS) spoofing, alongside simulated attacks. The results demonstrate exceptional performance, where the average anomaly detection accuracy exceeded 99% and the precision surpassed 98%. Notably, when benchmarked against traditional methods, the proposed system reduced navigation errors by a factor of approximately 2-3 under attack scenarios, which substantially enhanced the operational stability of the UAVs in challenging environments. Full article
Show Figures

Figure 1

19 pages, 11033 KiB  
Article
Deep Learning-Based Navigation System for Automatic Landing Approach of Fixed-Wing UAVs in GNSS-Denied Environments
by Ying-Xi Lin and Ying-Chih Lai
Aerospace 2025, 12(4), 324; https://doi.org/10.3390/aerospace12040324 - 10 Apr 2025
Cited by 1 | Viewed by 856
Abstract
The Global Navigation Satellite System (GNSS) is widely used in various applications of UAVs (unmanned aerial vehicles) that require precise positioning or navigation. However, GNSS signals can be blocked in specific environments and are susceptible to jamming and spoofing, which will degrade the [...] Read more.
The Global Navigation Satellite System (GNSS) is widely used in various applications of UAVs (unmanned aerial vehicles) that require precise positioning or navigation. However, GNSS signals can be blocked in specific environments and are susceptible to jamming and spoofing, which will degrade the performance of navigation systems. In this study, a deep learning-based navigation system for the automatic landing of fixed-wing UAVs in GNSS-denied environments is proposed to serve as an alternative navigation system. Most visual-based runway landing systems are typically focused on runway detection and localization while neglecting the issue of integrating the localization solution into flight control and guidance laws to become a complete real-time automatic landing system. This study addresses these problems by combining runway detection and localization methods, YOLOv8 and CNN (convolutional neural network) regression, to demonstrate the robustness of deep learning approaches. Moreover, a line detection method is employed to accurately align the UAV with the runway, effectively resolving issues related to runway contours. In the control phase, the guidance law and controller are designed to ensure the stable flight of the UAV. Based on a deep learning model framework, this study conducts experiments within the simulation environment, verifying system stability under various assumed conditions, thereby avoiding the risks associated with real-world testing. The simulation results demonstrate that the UAV can achieve automatic landing on 3-degree and 5-degree glide slopes, whether it is directly aligned with the runway or deviating from it, with trajectory tracking errors within 10 m. Full article
Show Figures

Figure 1

18 pages, 2629 KiB  
Article
Ensemble Machine Learning Models Utilizing a Hybrid Recursive Feature Elimination (RFE) Technique for Detecting GPS Spoofing Attacks Against Unmanned Aerial Vehicles
by Raghad Al-Syouf, Omar Y. Aljarrah, Raed Bani-Hani and Abdallah Alma’aitah
Sensors 2025, 25(8), 2388; https://doi.org/10.3390/s25082388 - 9 Apr 2025
Viewed by 659
Abstract
The dependency of Unmanned Aerial Vehicles (UAVs), also known as drones, on off-board data, such as control and position data, makes them highly susceptible to serious safety and security threats, including data interceptions, Global Positioning System (GPS) jamming, and spoofing attacks. This indeed [...] Read more.
The dependency of Unmanned Aerial Vehicles (UAVs), also known as drones, on off-board data, such as control and position data, makes them highly susceptible to serious safety and security threats, including data interceptions, Global Positioning System (GPS) jamming, and spoofing attacks. This indeed necessitates the existence of an Intrusion Detection System (IDS) in place to detect potential security threats/intrusions promptly. Recently, machine-learning-based IDSs have gained popularity due to their high performance in detecting known as well as novel cyber-attacks. However, the time and computation efficiencies of ML-based IDSs still present a challenge in the UAV domain. Therefore, this paper proposes a hybrid Recursive Feature Elimination (RFE) technique based on feature importance ranking along with a Spearman Correlation Analysis (SCA). This technique is built on ensemble learning approaches, namely, bagging, boosting, stacking, and voting classifiers, to efficiently detect GPS spoofing attacks. Two benchmark datasets are employed: the GPS spoofing dataset and the UAV location GPS spoofing dataset. The results show that our proposed ensemble models achieved a notable balance between efficacy and efficiency, showing that the bagging classifier achieved the highest accuracy rate of 99.50%. At the same time, the Decision Tree (DT) and the bagging classifiers achieved the lowest processing time of 0.003 s and 0.029 s, respectively, using the GPS spoofing dataset. For the UAV location GPS spoofing dataset, the bagging classifier emerged as the top performer, achieving 99.16% accuracy and 0.002 s processing time compared to other well-known ML models. In addition, the experimental results show that our proposed methodology (RFE) outperformed other well-known ML models built on conventional feature selection techniques for detecting GPS spoofing attacks, such as mutual information gain, correlation matrices, and the chi-square test. Full article
(This article belongs to the Section Navigation and Positioning)
Show Figures

Figure 1

29 pages, 6546 KiB  
Article
Improving Unmanned Aerial Vehicle Security as a Factor in Sustainable Development of Smart City Infrastructure: Automatic Dependent Surveillance–Broadcast (ADS-B) Data Protection
by Serhii Semenov, Magdalena Krupska-Klimczak, Patryk Mazurek, Minjian Zhang and Olena Chernikh
Sustainability 2025, 17(4), 1553; https://doi.org/10.3390/su17041553 - 13 Feb 2025
Cited by 2 | Viewed by 954
Abstract
The rapid integration of Unmanned Aerial Vehicles (UAVs) into smart city infrastructures necessitates advanced security measures to ensure their safe and sustainable operation. However, existing Automatic Dependent Surveillance–Broadcast (ADS-B) systems are highly vulnerable to spoofing, data falsification, and cyber threats, which compromises air [...] Read more.
The rapid integration of Unmanned Aerial Vehicles (UAVs) into smart city infrastructures necessitates advanced security measures to ensure their safe and sustainable operation. However, existing Automatic Dependent Surveillance–Broadcast (ADS-B) systems are highly vulnerable to spoofing, data falsification, and cyber threats, which compromises air traffic management and poses significant challenges to UAV security. This paper presents an innovative approach to improving UAV security by introducing a novel steganographic method for ADS-B data protection. The proposed method leverages Fourier transformation to embed UAV identifiers into ADS-B signals, ensuring a high level of concealment and robustness against signal distortions. A key feature of the approach is the dynamic parameter management system, which adapts to varying transmission conditions to minimize distortions and enhance resilience. Experimental validation demonstrates that the method achieves a tenfold reduction in Mean Squared Error (MSE) and Normalized Mean Squared Error (NMSE) compared to existing techniques such as mp3stego while also improving the Signal-to-Noise Ratio (SNR) and Peak Signal-to-Noise Ratio (PSNR) compared to s-tools. The proposed solution ensures compliance with existing ADS-B standards, maintaining seamless integration with air traffic management systems while enhancing cybersecurity measures. By safeguarding UAV communications, the method contributes to the sustainable development of smart cities and supports critical applications such as logistics, environmental monitoring, and emergency response operations. These findings confirm the practical feasibility of the proposed approach and its potential to strengthen UAV security and ADS-B data protection, ultimately contributing to the resilience and sustainability of urban airspace infrastructure. Full article
Show Figures

Figure 1

28 pages, 7894 KiB  
Article
Enhancing UAV Security Against GPS Spoofing Attacks Through a Genetic Algorithm-Driven Deep Learning Framework
by Abdallah Al-Sabbagh, Aya El-Bokhary, Sana El-Koussa, Abdulrahman Jaber and Mahmoud Elkhodr
Information 2025, 16(2), 115; https://doi.org/10.3390/info16020115 - 7 Feb 2025
Cited by 2 | Viewed by 2253
Abstract
Unmanned Aerial Vehicles (UAVs) are increasingly employed across various domains, including communication, military, and delivery operations. Their reliance on the Global Positioning System (GPS) renders them vulnerable to GPS spoofing attacks, in which adversaries transmit false signals to manipulate UAVs’ navigation, potentially leading [...] Read more.
Unmanned Aerial Vehicles (UAVs) are increasingly employed across various domains, including communication, military, and delivery operations. Their reliance on the Global Positioning System (GPS) renders them vulnerable to GPS spoofing attacks, in which adversaries transmit false signals to manipulate UAVs’ navigation, potentially leading to severe security risks. This paper presents an enhanced integration of Long Short-Term Memory (LSTM) networks with a Genetic Algorithm (GA) for GPS spoofing detection. Although GA–neural network combinations have existed for decades, our method expands the GA’s search space to optimize a wider range of hyperparameters, thereby improving adaptability in dynamic operational scenarios. The framework is evaluated using a real-world GPS spoofing dataset that includes authentic and malicious signals under multiple attack conditions. While we discuss strategies for mitigating CPU resource demands and computational overhead, we acknowledge that direct measurements of energy consumption or inference latency are not included in the present work. Experimental results show that the proposed LSTM–GA approach achieved a notable increase in classification accuracy (from 88.42% to 93.12%) and the F1 score (from 87.63% to 93.39%). These findings highlight the system’s potential to strengthen UAV security against GPS spoofing attacks, provided that hardware constraints and other limitations are carefully managed in real deployments. Full article
(This article belongs to the Special Issue Machine Learning and Artificial Intelligence with Applications)
Show Figures

Figure 1

17 pages, 1429 KiB  
Article
Detection of UAV GPS Spoofing Attacks Using a Stacked Ensemble Method
by Ting Ma, Xiaofeng Zhang and Zhexin Miao
Drones 2025, 9(1), 2; https://doi.org/10.3390/drones9010002 - 24 Dec 2024
Cited by 3 | Viewed by 3008
Abstract
Unmanned aerial vehicles (UAVs) are vulnerable to global positioning system (GPS) spoofing attacks, which can mislead their navigation systems and result in unpredictable catastrophic consequences. To address this issue, we propose a detection method based on stacked ensemble learning that combines convolutional neural [...] Read more.
Unmanned aerial vehicles (UAVs) are vulnerable to global positioning system (GPS) spoofing attacks, which can mislead their navigation systems and result in unpredictable catastrophic consequences. To address this issue, we propose a detection method based on stacked ensemble learning that combines convolutional neural network (CNN) and extreme gradient boosting (XGBoost) to detect spoofing signals in the GPS data received by UAVs. First, we applied the synthetic minority oversampling (SMOTE) technique to the dataset to address the issue of class imbalance. Then, we used a CNN model to extract high-level features, combined with the original features as input for the stacked model. The stacked model employs XGBoost as the base learner, which is optimized through five-fold cross-validation, and utilizes logistic regression for the final prediction. Furthermore, we incorporated magnetic field data to enhance the system’s robustness, thereby further improving the accuracy and reliability of GPS spoofing attack detection. Experimental results indicate that the proposed model achieved a high accuracy of 99.79% in detecting GPS spoofing attacks, demonstrating its potential effectiveness in enhancing UAV security. Full article
Show Figures

Figure 1

18 pages, 7741 KiB  
Article
Jamming and Spoofing Techniques for Drone Neutralization: An Experimental Study
by Younes Zidane, José Silvestre Silva and Gonçalo Tavares
Drones 2024, 8(12), 743; https://doi.org/10.3390/drones8120743 - 10 Dec 2024
Cited by 4 | Viewed by 8985
Abstract
This study explores the use of electronic countermeasures to disrupt communications systems in Unmanned Aerial Vehicles (UAVs), focusing on the protection of airspaces and critical infrastructures such as airports and power stations. The research aims to develop a low-cost, adaptable jamming device using [...] Read more.
This study explores the use of electronic countermeasures to disrupt communications systems in Unmanned Aerial Vehicles (UAVs), focusing on the protection of airspaces and critical infrastructures such as airports and power stations. The research aims to develop a low-cost, adaptable jamming device using Software Defined Radio (SDR) technology, targeting key UAV communication links, including geolocation, radio control, and video transmission. It applies jamming techniques that successfully disrupt UAV communications. GPS spoofing techniques were also implemented, with both static and dynamic spoofing tested to mislead the drones’ navigation systems. Dynamic spoofing, combined with no-fly zone enforcement, proved to be particularly effective in forcing drones to land or exhibit erratic behavior. The conclusions of this study highlight the effectiveness of these techniques in neutralizing unauthorized UAVs, while also identifying the need for future research in countering drones that operate on alternative frequencies, such as 4G/5G, to enhance the system’s robustness in evolving drone environments. Full article
(This article belongs to the Collection Drones for Security and Defense Applications)
Show Figures

Figure 1

17 pages, 2739 KiB  
Article
MPC-Based Dynamic Trajectory Spoofing for UAVs
by Bo Hou, Zhongjie Yin, Xiaolong Jin, Zhiliang Fan and Haiyang Wang
Drones 2024, 8(10), 602; https://doi.org/10.3390/drones8100602 - 19 Oct 2024
Cited by 2 | Viewed by 1642
Abstract
Navigation spoofing has been widely utilized in unmanned aircraft vehicle (UAV) countermeasures, due to its advantages of covertness, effectiveness, and dynamic trajectory control ability. However, existing research faces two primary challenges. Firstly, sudden changes in the target UAV’s trajectory can result in a [...] Read more.
Navigation spoofing has been widely utilized in unmanned aircraft vehicle (UAV) countermeasures, due to its advantages of covertness, effectiveness, and dynamic trajectory control ability. However, existing research faces two primary challenges. Firstly, sudden changes in the target UAV’s trajectory can result in a significant degradation in the spoofing performance, which may enable the onboard inertial components to detect and identify the ongoing spoofing attempts. Secondly, gradual accumulation of control errors over time degenerates the spoofing effect. To address these problems, we propose a dynamic trajectory spoofing approach for UAVs based on model predictive control (MPC), which progressively steers the UAVs towards the predetermined trajectory of the spoofer. Simulation results demonstrate a substantial enhancement in dynamic trajectory control performance and decrease in accumulation error compared to the existing methods. Full article
(This article belongs to the Special Issue Path Planning, Trajectory Tracking and Guidance for UAVs: 2nd Edition)
Show Figures

Figure 1

22 pages, 1367 KiB  
Article
Detection of GPS Spoofing Attacks in UAVs Based on Adversarial Machine Learning Model
by Lamia Alhoraibi, Daniyal Alghazzawi and Reemah Alhebshi
Sensors 2024, 24(18), 6156; https://doi.org/10.3390/s24186156 - 23 Sep 2024
Cited by 3 | Viewed by 4962
Abstract
Advancements in wireless communication and automation have revolutionized mobility systems, notably through autonomous vehicles and unmanned aerial vehicles (UAVs). UAV spatial coordinates, determined via Global Positioning System (GPS) signals, are susceptible to cyberattacks due to unencrypted and unauthenticated transmissions with GPS spoofing being [...] Read more.
Advancements in wireless communication and automation have revolutionized mobility systems, notably through autonomous vehicles and unmanned aerial vehicles (UAVs). UAV spatial coordinates, determined via Global Positioning System (GPS) signals, are susceptible to cyberattacks due to unencrypted and unauthenticated transmissions with GPS spoofing being a significant threat. To mitigate these vulnerabilities, intrusion detection systems (IDSs) for UAVs have been developed and enhanced using machine learning (ML) algorithms. However, Adversarial Machine Learning (AML) has introduced new risks by exploiting ML models. This study presents a UAV-IDS employing AML methodology to enhance the detection and classification of GPS spoofing attacks. The key contribution is the development of an AML detection model that significantly improves UAV system robustness and security. Our findings indicate that the model achieves a detection accuracy of 98%, demonstrating its effectiveness in managing large-scale datasets and complex tasks. This study emphasizes the importance of physical layer security for enhancing IDSs in UAVs by introducing a novel detection model centered on an adversarial training defense method and advanced deep learning techniques. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

24 pages, 2984 KiB  
Article
SSRL-UAVs: A Self-Supervised Deep Representation Learning Approach for GPS Spoofing Attack Detection in Small Unmanned Aerial Vehicles
by Abed Alanazi
Drones 2024, 8(9), 515; https://doi.org/10.3390/drones8090515 - 23 Sep 2024
Cited by 5 | Viewed by 2110
Abstract
Self-Supervised Representation Learning (SSRL) has become a potent strategy for addressing the growing threat of Global Positioning System (GPS) spoofing to small Unmanned Aerial Vehicles (UAVs) by capturing more abstract and high-level contributing features. This study focuses on enhancing attack detection capabilities by [...] Read more.
Self-Supervised Representation Learning (SSRL) has become a potent strategy for addressing the growing threat of Global Positioning System (GPS) spoofing to small Unmanned Aerial Vehicles (UAVs) by capturing more abstract and high-level contributing features. This study focuses on enhancing attack detection capabilities by incorporating SSRL techniques. An innovative hybrid architecture integrates Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) models to detect attacks on small UAVs alongside two additional architectures, LSTM-Recurrent Neural Network (RNN) and Deep Neural Network (DNN), for detecting GPS spoofing attacks. The proposed model leverages SSRL, autonomously extracting meaningful features without the need for many labelled instances. Key configurations include LSTM-GRU, with 64 neurons in the input and concatenate layers and 32 neurons in the second layer. Ablation analysis explores various parameter settings, with the model achieving an impressive 99.9% accuracy after 10 epoch iterations, effectively countering GPS spoofing attacks. To further enhance this approach, transfer learning techniques are also incorporated, which help to improve the adaptability and generalisation of the SSRL model. By saving and applying pre-trained weights to a new dataset, we leverage prior knowledge to improve performance. This integration of SSRL and transfer learning yields a validation accuracy of 79.0%, demonstrating enhanced generalisation to new data and reduced training time. The combined approach underscores the robustness and efficiency of GPS spoofing detection in UAVs. Full article
(This article belongs to the Special Issue Advances in Detection, Security, and Communication for UAV)
Show Figures

Figure 1

19 pages, 1160 KiB  
Review
Detecting Denial of Service Attacks (DoS) over the Internet of Drones (IoD) Based on Machine Learning
by Albandari Alsumayt, Naya Nagy, Shatha Alsharyofi, Noor Al Ibrahim, Renad Al-Rabie, Resal Alahmadi, Roaa Ali Alesse and Amal A. Alahmadi
Sci 2024, 6(3), 56; https://doi.org/10.3390/sci6030056 - 20 Sep 2024
Cited by 1 | Viewed by 3000
Abstract
The use of Unmanned Aerial Vehicles (UAVs) or drones has increased lately. This phenomenon is due to UAVs’ wide range of applications in fields such as agriculture, delivery, security and surveillance, and construction. In this context, the security and the continuity of UAV [...] Read more.
The use of Unmanned Aerial Vehicles (UAVs) or drones has increased lately. This phenomenon is due to UAVs’ wide range of applications in fields such as agriculture, delivery, security and surveillance, and construction. In this context, the security and the continuity of UAV operations becomes a crucial issue. Spoofing, jamming, hijacking, and Denial of Service (DoS) attacks are just a few categories of attacks that threaten drones. The present paper is focused on the security of UAVs against DoS attacks. It illustrates the pros and cons of existing methods and resulting challenges. From here, we develop a novel method to detect DoS attacks in UAV environments. DoS attacks themselves have many sub-categories and can be executed using many techniques. Consequently, there is a need for robust protection and mitigation systems to shield UAVs from DoS attacks. One promising security solution is intrusion detection systems (IDSs). IDs paired with machine learning (ML) techniques provide the ability to greatly reduce the risk, as attacks can be detected before they happen. ML plays an important part in improving the performance of IDSs. The many existing ML models that detect DoS attacks on UAVs each carry their own strengths and limitations. Full article
(This article belongs to the Topic Trends and Prospects in Security, Encryption and Encoding)
Show Figures

Figure 1

20 pages, 5589 KiB  
Article
Advanced Control Strategies for Securing UAV Systems: A Cyber-Physical Approach
by Mohammad Sadeq Ale Isaac, Pablo Flores Peña, Daniela Gîfu and Ahmed Refaat Ragab
Appl. Syst. Innov. 2024, 7(5), 83; https://doi.org/10.3390/asi7050083 - 6 Sep 2024
Cited by 1 | Viewed by 2193
Abstract
This paper explores the application of sliding mode control (SMC) as a robust security enhancement strategy for unmanned aerial vehicle (UAV) systems. The study proposes integrating advanced SMC techniques with security protocols to develop a dual-purpose system that improves UAV control and fortifies [...] Read more.
This paper explores the application of sliding mode control (SMC) as a robust security enhancement strategy for unmanned aerial vehicle (UAV) systems. The study proposes integrating advanced SMC techniques with security protocols to develop a dual-purpose system that improves UAV control and fortifies against adversarial actions. The strategy includes dynamic reconfiguration capabilities within the SMC framework, allowing adaptive responses to threats by adjusting control laws and operational parameters. This is complemented by anomaly detection algorithms that monitor deviations in control signals and system states, providing early warnings of potential cyber-intrusions or physical tampering. Additionally, fault-tolerant SMC mechanisms are designed to maintain control and system stability even when parts of the UAV are compromised. The methodology involves simulation and real-world testing to validate the effectiveness of the SMC-based security enhancements. Simulations assess how the UAV handles attack scenarios, such as GPS spoofing and control signal jamming, with SMC adapting in real-time to mitigate these threats. Field tests further confirm the system’s capability to operate under varied conditions, proving the feasibility of SMC for enhancing UAV security. This integration of sliding mode control into UAV security protocols leverages control theory for security purposes, offering a significant advancement in the robust, adaptive control of UAVs in hostile environments. Full article
Show Figures

Figure 1

20 pages, 18987 KiB  
Article
Convolutional Neural Network and Ensemble Learning-Based Unmanned Aerial Vehicles Radio Frequency Fingerprinting Identification
by Yunfei Zheng, Xuejun Zhang, Shenghan Wang and Weidong Zhang
Drones 2024, 8(8), 391; https://doi.org/10.3390/drones8080391 - 13 Aug 2024
Cited by 1 | Viewed by 1723
Abstract
With the rapid development of the unmanned aerial vehicles (UAVs) industry, there is increasing demand for UAV surveillance technology. Automatic Dependent Surveillance-Broadcast (ADS-B) provides accurate monitoring of UAVs. However, the system cannot encrypt messages or verify identity. To address the issue of identity [...] Read more.
With the rapid development of the unmanned aerial vehicles (UAVs) industry, there is increasing demand for UAV surveillance technology. Automatic Dependent Surveillance-Broadcast (ADS-B) provides accurate monitoring of UAVs. However, the system cannot encrypt messages or verify identity. To address the issue of identity spoofing, radio frequency fingerprinting identification (RFFI) is applied for ADS-B transmitters to determine the true identities of UAVs through physical layer security technology. This paper develops an ensemble learning ADS-B radio signal recognition framework. Firstly, the research analyzes the data content characteristics of the ADS-B signal and conducts segment processing to eliminate the possible effects of the signal content. To extract features from different signal segments, a method merging end-to-end and non-end-to-end data processing is approached in a convolutional neural network. Subsequently, these features are fused through EL to enhance the robustness and generalizability of the identification system. Finally, the proposed framework’s effectiveness is evaluated using collected ADS-B data. The experimental results indicate that the recognition accuracy of the proposed ELWAM-CNN method can reach up to 97.43% and have better performance at different signal-to-noise ratios compared to existing methods using machine learning. Full article
(This article belongs to the Special Issue Physical-Layer Security in Drone Communications)
Show Figures

Figure 1

21 pages, 1397 KiB  
Article
Deep Learning-Based Location Spoofing Attack Detection and Time-of-Arrival Estimation through Power Received in IoT Networks
by Waleed Aldosari
Sensors 2023, 23(23), 9606; https://doi.org/10.3390/s23239606 - 4 Dec 2023
Cited by 5 | Viewed by 3291
Abstract
In the context of the Internet of Things (IoT), location-based applications have introduced new challenges in terms of location spoofing. With an open and shared wireless medium, a malicious spoofer can impersonate active devices, gain access to the wireless channel, as well as [...] Read more.
In the context of the Internet of Things (IoT), location-based applications have introduced new challenges in terms of location spoofing. With an open and shared wireless medium, a malicious spoofer can impersonate active devices, gain access to the wireless channel, as well as emit or inject signals to mislead IoT nodes and compromise the detection of their location. To address the threat posed by malicious location spoofing attacks, we develop a neural network-based model with single access point (AP) detection capability. In this study, we propose a method for spoofing signal detection and localization by leveraging a feature extraction technique based on a single AP. A neural network model is used to detect the presence of a spoofed unmanned aerial vehicle (UAV) and estimate its time of arrival (ToA). We also introduce a centralized approach to data collection and localization. To evaluate the effectiveness of detection and ToA prediction, multi-layer perceptron (MLP) and long short-term memory (LSTM) neural network models are compared. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

Back to TopTop