Exploring Multi-Channel GPS Receivers for Detecting Spoofing Attacks on UAVs Using Machine Learning

dc.contributor.authorMouzai, Mustapha
dc.contributor.authorRiahla, Mohamed Amine
dc.contributor.authorKeziou, Amor
dc.contributor.authorFouchal, Hacène
dc.date.accessioned2026-02-02T09:48:51Z
dc.date.issued2025
dc.description.abstractAll current transportation systems (vehicles, trucks, planes, etc.) rely on the Global Positioning System (GPS) as their main navigation technology. GPS receivers collect signals from multiple satellites and are able to provide more or less accurate positioning. For civilian applications, GPS signals are sent without any encryption system. For this reason, they are vulnerable to various attacks, and the most prevalent one is known as GPS spoofing. The main consequence is the loss of position monitoring, which may increase damage risks in terms of crashes or hijacking. In this study, we focus on UAV (unmanned aerial vehicle) positioning attacks. We first review numerous techniques for detecting and mitigating GPS spoofing attacks, finding that various types of attacks may occur. In the literature, many studies have focused on only one type of attack. We believe that targeting the study of many attacks is crucial for developing efficient mitigation mechanisms. Thus, we have explored a well-known datasetcontaining authentic UAV signals along with spoofed signals (with three types of attacked signals). As a main contribution, we propose a more interpretable approach to exploit the dataset by extracting individual mission sequences, handling non-stationary features, and converting the GPS raw data into a simplified structured format. Then, we design tree-based machine learning algorithms, namely decision tree (DT), random forest (RF), and extreme gradient boosting (XGBoost), for the purpose of classifying signal types and to recognize spoofing attacks. Our main findings are as follows: (a) random forest has significant capability in detecting and classifying GPS spoofing attacks, outperforming the other models. (b) We have been able to detect most types of attacks and distinguish them
dc.identifier.issn14248220
dc.identifier.urihttps://doi.org/10.3390/s25134045
dc.identifier.urihttps://dspace.univ-boumerdes.dz/handle/123456789/16038
dc.language.isoen
dc.publisherMultidisciplinary Digital Publishing Institute
dc.relation.ispartofseriesSensors/ VIL. 25, issue 13
dc.subjectGPS spoofing attack
dc.subjectMachine learning
dc.subjectUnmanned aerial vehicles
dc.titleExploring Multi-Channel GPS Receivers for Detecting Spoofing Attacks on UAVs Using Machine Learning
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
sensors-25-04045.pdf
Size:
7.33 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: