Adaptive Neural Networks for Mitigating GPS Spoofing Attacks in Unmanned Aerial Vehicles
DOI:
https://doi.org/10.15837/ijccc.2025.3.7051Keywords:
Unmanned Aerial Vehicle, GPS Integrity, Spoofing Attacks, Cybersecurity, Neural Networks, Anomaly DetectionAbstract
Unmanned Aerial Vehicles (UAVs), or drones, have gained global attention over the past decades for their ability to perform diverse tasks without direct human intervention. With advances in artificial intelligence, UAV systems have not only improved, but also become more vulnerable to an increasing number of cyberattacks. This paper presents a study on detecting integrity failures in UAVs, focusing specifically on the GPS system. Theoretical background, methodology, and results are discussed, providing a comprehensive overview of adaptive neural networks developed to detect and mitigate the impact of these vulnerabilities in simulated scenarios.
References
S. A. H. Mohsan, N. Q. H. Othman, Y. Li, M. H. Alsharif, and M. A. Khan, "Unmanned aerial vehicles (uavs): practical aspects, applications, open challenges, security issues, and future trends," Intelligent Service Robotics, vol. 16, no. 1, pp. 109-137, 2023. https://doi.org/10.1007/s11370-022-00452-4
Y. Wencheng, W. Song, Y. Xuefei, W. Xu, and H. Jiankun, "A review on security issues and solutions of the internet of drones," IEEE Open Journal of the Computer Society, vol. 3, pp. 96-110, 2022. https://doi.org/10.1109/OJCS.2022.3183003
F. A. Colombiana. (2022, October 4) Fuerza aeroespacial colombiana asi se va a las estrellas. Último acceso: 10 Febrero 2024. [Online]. Available: https://www.fac.mil.co/es
S. Wasswa, M. S. Mojtaba, and S. Fawad, "Cybersecurity in unmanned aerial vehicles: a review," SCIENDO - INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, vol. 16, no. 1, 2023. https://doi.org/10.2478/ijssis-2023-0012
A. Abbaspour, K. K. Yen, and A. Sargolzaei, "Detection of fault data injection attack on uav using adaptive," Procedia Computer Science, vol. 95, pp. 193-200, 2016. https://doi.org/10.1016/j.procs.2016.09.312
P. Misra and P. Enge, Global Positioning System. Lincoln, Mass.: Ganga-Jamuna Press, 2006.
J. Nemus. (2014, March 7) Errores mediciones gps. Último acceso: 10 Marzo 2024. [Online]. Available: http://fjalejandre.blogspot.com/2014/03/erroresmedicionesGPS.html
R. Rifandi, S. F. Assagaf, and Y. D. Windy, "An insight about gps," Utrecht University, 2013.
B. D. Deebak and F. Al-Turjman, "A smart lightweight privacy preservation scheme for iot-based uav communication systems," Comput Commun, vol. 162, pp. 102-117, 2020. https://doi.org/10.1016/j.comcom.2020.08.016
K. Wen, S. Wang, Y. Wu, J. Wang, L. Han, and Q. Xie, "A secure authentication protocol supporting efficient handover," E mathematics, vol. 12, p. 716, 2024. https://doi.org/10.3390/math12050716
F. Jahan, W. Sun, and A. Y. Javaid, "Analysis of global positioning system-based attacks and a novel global positioning system spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation," SIMULATION: Transactions of The Society for Modeling and Simulation International, pp. 1-15, 2017.
C. W. Staff. (2011) Obama says u.s. has asked iran to return drone aircraft. [Online]. Available: https://www.cnn.com/2011/12/12/world/meast/iran-us-drone
K. Hartmann and C. Steup, "The vulnerability of uavs to cyber attacks - an approach to the risk assessment," in 2013 5th International Conference on Cyber Conflict, 2013.
S. Zhang, Y. Liu, Z. Han, and Z. Yang, "A lightweight authentication protocol for uavs based on ecc scheme," drones MDPI, 2023. https://doi.org/10.3390/drones7050315
X. Wei, C. Sun, M. Lyu, Q. Song, and Y. Li, "Constdet: Control semantics-based detection for gps spoofing attacks on uavs," remote sensing MDPI, vol. 14, no. 21, pp. 55-87, 2022. https://doi.org/10.3390/rs14215587
K. T. Seferoglu and A. S. Turk, "Review of spoofing and jamming attack on the global navigation systems band and countermeasure," in 9th International Conference on Recent Advances in Space Technologies (RAST), 2019.
D. Goward. (2024, January 31) As baltics see spike in gps jamming, nato must respond. [Online]. Available: https://www.breakingdefense.com/2024/01/ as-baltics-see-spike-in-gps-jamming-nato-must-respond
E. Howell. (2022, April 14) How russia's gps satellite signal jamming works, and what we can do about it. [Online]. Available: https://www.space.com/ gps-signal-jamming-explainer-russia-ukraine-invasion
S.-J. Lee, Y.-R. Lee, S.-E. Jeon, and I.-G. Lee, "Machine learning-based jamming attack classification and effective defense technique," Computers & Security, vol. 128, pp. 103-169, 2023. https://doi.org/10.1016/j.cose.2023.103169
S. Z. Khan, M. Mohsin, and W. Iqbal, "On gps spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions," PeerJ Comput Sci, vol. 7, 2021. https://doi.org/10.7717/peerj-cs.507
A. Kumar and G. Petropolous, "Application of gps and gnss technology in geosciences," GPS and GNSS Technology in Geosciences, 2021. https://doi.org/10.1016/B978-0-12-818617-6.00018-4
M. Ahmad, S. Ahmed, and S. Shahid, "Impact and detection of gps jammers and countermeasures against jamming," International Journal of Scientific and Engineering Research, vol. 9, no. 12, 2018.
T. K. Mohd and E. M. Tesfa, "Exploring technical capabilities of unmanned aerial vehicles," in IEEE Annual Computing and Communication Workshop and Conference (CCWC), 2023. https://doi.org/10.1109/CCWC57344.2023.10099360
S. Khandelwal. (2016, April 1) Hacker hijacks a police drone from 2 km away with $40 kit. [Online]. Available: https://thehackernews.com/2016/04/hacking-drone.html
H. J. Hadi, Y. Cao, K. U. Nisa, A. M. Jamil, and Q. Ni, "A comprehensive survey on security, privacy issues and emerging defence technologies for uavs," Journal of Network and Computer Applications, vol. 213, 2023. https://doi.org/10.1016/j.jnca.2023.103607
R. Aissaoui, J.-C. Deneuville, C. Guerber, and A. Pirovano, "A survey on cryptographic methods to secure communications for uav traffic management," Vehicular Communications, vol. 44, 2023. https://doi.org/10.1016/j.vehcom.2023.100661
C. Rametta, F. Beritelli, R. Avanzato, and M. Russo, "A smart vpn bonding technique for drone communication applications," in 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), 2019. https://doi.org/10.1109/DCOSS.2019.00112
E. Ntizikira, W. Lei, F. Alblehai, K. Saleem, and M. A. Lodhi, "Secure and privacy-preserving intrusion detection and prevention in the internet of unmanned aerial vehicles," Security in IoT Environments, vol. 23, no. 19, 2023. https://doi.org/10.3390/s23198077
M. Taylor, J. Boubin, H. Chen, and C. Stewart, "A study on software bugs in unmanned aircraft systems," in International Conference on Unmanned Aircraft Systems, Athens, Greece, 2021. https://doi.org/10.1109/ICUAS51884.2021.9476844
U. Pravda. (2024, February 8) Cyber-attack by ukrainian defence intelligence: largescale failure of russian drone control program occurs. [Online]. Available: https: //www.pravda.com.ua/eng/news/2024/02/8/7440974/
J. W. Seo, A. Islam, M. Masuduzzaman, and S. Y. Shin, "Blockchain-based secure firmware update using an uav," in ICTC 2022, vol. 12, 2023. https://doi.org/10.3390/electronics12102189
A. I. Khan and Y. Al-Mulla, "Unmanned aerial vehicle in the machine learning environment," in The 10th International Conference on Emerging ubiquitous Systems and Pervasive Networks, 2019. https://doi.org/10.1016/j.procs.2019.09.442
Additional Files
Published
Issue
Section
License
Copyright (c) 2025 Alejandro Salgado, Yezid Donoso

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.