High-Precision Detection of GPS Spoofing Attacks on UAVs Using MLP
Keywords:
GPS spoofing, Unmanned Aerial Vehicles (UAVs), Multilayer Perceptron (MLP), TEXBATAbstract
This work addresses the problem of detecting GPS spoofing attacks on Unmanned Aerial Vehicles (UAVs) using a multilayer perceptron (MLP). Such attacks allow adversaries to inject artificial signals of increased power that confuse the drone’s navigation system and cause deviations from its planned route. The open-source TEXBAT dataset was used for experimental research, with separate highlights of the DS3 and DS7 scenarios that simulate synchronous GPS spoofing. During the data preparation stage, the signal parameters (pseudorange, power, and Doppler shift) were leveraged, and their statistical analysis was performed using correlation matrices and mean-value distributions. The proposed MLP model, featuring an optimized architecture with three hidden layers and a sigmoid activation function at the output, demonstrated a detection accuracy of 93% on the validation data. The advantages of this approach include high performance and ease of integration into navigation systems. However, the relatively small amount of real data limits scalability and comprehensiveness of the evaluation.
References
M. Mozaffari, W. Saad, M. Bennis, M. Debbah, “Unmanned aerial vehicle with underlaid device-to-device communications: Performance and tradeoffs,” IEEE Transactions on Wireless Communications, vol. 15, no. 6, pp. 3949-3963, 2016. https://doi.org/10.1109/TWC.2016.2531652.
E. Shafiee, M. R. Mosavi, M. Moazedi, “Detection of spoofing attack using machine learning based on multi-layer neural network in single-frequency GPS receivers,” Journal of Navigation, vol. 71, no. 1, pp. 169-188, 2018. https://doi.org/10.1017/S0373463317000558.
A. R. Baziar, M. Moazedi, M. R. Mosavi, “Analysis of single frequency GPS receiver under delay and combining spoofing algorithm,” Wireless Personal Communications, vol. 83, no. 3, pp. 1955-1970, 2015. https://doi.org/10.1007/s11277-015-2497-9.
M. S. Almas, L. Vanfretti, R. S. Singh, G. M. Jonsdottir, “Vulnerability of synchrophasor-based WAMPAC applications' to time synchronization spoofing,” IEEE Transactions on Smart Grid, vol. 9, no. 5, pp. 4601-4612, 2018. https://doi.org/10.1109/TSG.2017.2665461.
S. Siamak, M. Dehghani, M. Mohammadi, “Counteracting GPS spoofing attack on PMUs by dynamic state estimation,” Proceedings of the 2019 Smart Grid Conference (SGC), 2019, pp. 1-5. https://doi.org/10.1109/SGC49328.2019.9056583.
S. Khan, M. Mohsin, W. Iqbal, “On GPS spoofing of aerial platforms: A review of threats, challenges, methodologies, and future research directions,” PeerJ Computer Science, vol. 7, e507, 2021. https://doi.org/10.7717/peerj-cs.507.
A. M. Arthur, “Detecting signal spoofing and jamming attacks in UAV networks using a lightweight IDS,” Proceedings of the 2019 International Conference on Computer, Information and Telecommunication Systems (CITS), pp. 1-5, 2019. https://doi.org/10.1109/CITS.2019.8862148.
R. Morales-Ferre, P. Richter, E. Falletti, A. de la Fuente, E. S. Lohan, “A survey on coping with intentional interference in satellite navigation for manned and unmanned aircraft,” IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 249-291, 2020. https://doi.org/10.1109/COMST.2019.2949178.
R. Magar and A. Barati Farimani, “Learning from mistakes: Sampling strategies to efficiently train machine learning models for material property prediction,” Computational Materials Science, vol. 224, p. 112167, 2023. https://doi.org/10.1016/j.commatsci.2023.112167.
S. Silvey and J. Liu, “Sample size requirements for popular classification algorithms in tabular clinical data: Empirical study,” Journal of Medical Internet Research, vol. 26, p. e60231, 2024. https://doi.org/10.2196/60231.
W. Huan et al., “Haar wavelet-based classification method for visual information processing systems,” Applied Sciences, vol. 13, no. 9, p. 5515, 2023. https://doi.org/10.3390/app13095515.
S. Semanjski, I. Semanjski, W. De Wilde, A. Muls, “Cyber-threats analytics for detection of GNSS spoofing,” Proceedings of the Seventh International Conference on Data Analytics DATA ANALYTICS 2018, IARIA 2018, pp. 136-140. https://personales.upv.es/thinkmind/dl/conferences/dataanalytics/data_analytics_2018/data_analytics_2018_9_20_68009.pdf.
O. Jullian, B. Otero, M. Stojilović, J. J. Costa, J. Verdú, M. A. Pajuelo, “Deep learning detection of GPS spoofing,” LOD 2021. Lecture Notes in Computer Science, vol 13163, 2022. Springer, Cham. https://doi.org/10.1007/978-3-030-95467-3_38.
K. H. Park, E. Park, H. K. Kim, “Unsupervised intrusion detection system for unmanned aerial vehicle with less labeling effort,” in: You, I. (eds) Information Security Applications, WISA 2020, Lecture Notes in Computer Science, vol 12583, 2020. Springer, Cham. https://doi.org/10.1007/978-3-030-65299-9_4.
R. Peleshchak, V. Lytvyn, O. Mediakov, I. Peleshchak, “Morphology of Convolutional Neural Network with Diagonalized Pooling,” In: Simian, D., Stoica, L.F. (eds) Modelling and Development of Intelligent Systems. MDIS 2022. Communications in Computer and Information Science, vol 1761, 2023. Springer, Cham. https://doi.org/10.1007/978-3-031-27034-5_11.
S. Bao, S. Tang, P. Sun, T. Wang, “LSTM-based energy management algorithm for a vehicle power-split hybrid powertrain,” Energy, vol. 284, 129267, 2023. https://doi.org/10.1016/j.energy.2023.129267.
H. Huang, C. Qian, “Modeling PM2.5 forecast using a self-weighted ensemble GRU network: Method optimization and evaluation,” Ecological Indicators, vol. 156, 111138, 2023. https://doi.org/10.1016/j.ecolind.2023.111138.
J. Nunez, V. Tran, A. Katangur, “Protecting the unmanned aerial vehicle from cyberattacks," Proceedings of the Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), Athens, 2019. https://www.proquest.com/openview/444cac98c1c13da04b8d796e175ed3b6/1?cbl=1976342&pq-origsite=gscholar.
R. Rukaiya, S. Ahmed Khan, M. U. Farooq, I. Matloob, “Communication architecture and operations for SDR-enabled UAVs network in disaster-stressed areas,” Ad Hoc Networks, vol. 160, 103506, 2024. https://doi.org/10.1016/j.adhoc.2024.103506.
M. Nayfeh, Y. Li, K. A. Shamaileh, V. Devabhaktuni, N. Kaabouch, “Machine learning modeling of GPS features with applications to UAV location spoofing detection and classification,” Computers & Security, vol. 126, 103085, 2023. https://doi.org/10.1016/j.cose.2022.103085.
W. Chen, Y. Dong, Z. Duan, “Accurately redirecting a malicious drone,” Proceedings of the 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), 2022, pp. 827-834. https://doi.org/10.1109/CCNC49033.2022.9700664.
J. Li, W. Li, Q. Fu, B. Liu, “Research progress of GNSS spoofing and spoofing detection technology,” Proceedings of the 2019 IEEE 19th International Conference on Communication Technology (ICCT), 2019, pp. 1360-1369. https://doi.org/10.1109/ICCT46805.2019.8947107.
L. Lemieszewski, “Transport safety: GNSS spoofing detection using the single-antenna receiver and the speedometer of a vehicle,” Procedia Computer Science, vol. 207, pp. 3181-3188, 2022. https://doi.org/10.1016/j.procs.2022.09.375.
M. S. Kumar, G. S. Kasbekar, A. Maity, “Identification of GPS spoofing as a drone cyber-vulnerability and evaluation of efficacy of asynchronous GPS spoofing,” IFAC-PapersOnLine, vol. 55, issue 22, pp. 394-399, 2022. https://doi.org/10.1016/j.ifacol.2023.03.066.
Y. Zhi, Z. Fu, X. Sun, J. Yu, “Security and privacy issues of UAV: A survey,” Mobile Networks and Applications, vol. 25, pp. 95-101, 2020. https://doi.org/10.1007/s11036-018-1193-x.
Z. Yanyan, G. Shcherbakova, B. Rusyn, A. Sachenko, N. Volkova, I. Kliushnikov, S. Antoshchuk, “Wavelet transform cluster analysis of UAV images for sustainable development of smart regions due to inspecting transport infrastructure,” Sustainability, vol. 17, issue 3, 927, 2025. https://doi.org/10.3390/su17030927.
T. E. Humphreys, J. A. Bhatti, D. Shepard, K. Wesson, “The Texas spoofing test battery: Toward a standard for evaluating GPS signal authentication techniques,” Proceedings of the Radionavigation Laboratory Conference, 2012, pp. 1-15. https://core.ac.uk/reader/211343150.
A. Joplin, E. G. Lightsey, T. E. Humphreys, “Development and testing of a miniaturized, dual-frequency GPS receiver for space applications,” in Institute of Navigation International Technical Meeting, Newport Beach, CA, 2012. [Online]. Available at:. https://radionavlab.ae.utexas.edu/images/stories/files/papers/joplin_itm_2012.pdf.
V. Lytvyn, I. Peleshchak, R. Peleshchak, I. Shakleina, N. Mozol, D. Svyshch, “Object image recognition using multilayer perceptron combined with singular value decomposition,” Proceedings of the Modern Machine Learning Technologies Workshop (MoMLeT 2024), Lviv, Ukraine, 2024, pp. 225-234. https://ceur-ws.org/Vol-3711/paper13.pdf.
B. Rusyn, O. Lutsyk, R. Kosarevych, O. Kapshii, O. Karpin, T. Maksymyuk, “Rethinking deep CNN training: A novel approach for quality-aware dataset optimization,” IEEE Access, vol. 12, pp. 137427-137438, 2024. https://doi.org/10.1109/ACCESS.2024.341465.
D. Naso, O. Pohudina, A. Pohudin, S. Yashin, & R. Bartolo, “Autonomous flight insurance method of unmanned aerial vehicles Parot Mambo using semantic segmentation data,” Radioelectronic and Computer Systems, no. 1, pp. 147-154, 2023. https://doi.org/10.32620/reks.2023.1.12
H. Fesenko, O. Illiashenko, V. Kharchenko, I. Kliushnikov, O. Morozova, A. Sachenko, S. Skorobohatko, “Flying sensor and edge network-based advanced air mobility systems: Reliability analysis and applications for urban monitoring,” Drones, vol. 7, 409, 2023. https://doi.org/10.3390/drones7070409.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.