Machine Learning-Based GPS Spoofing Detection in UAV Networks: A Comparative Analysis of Anomaly Detection Models
Abstract
The increasing reliance on Global Positioning System (GPS) technology in Unmanned Aerial Vehicles (UAVs) has exposed them to cybersecurity threats, particularly GPS spoofing attacks that manipulate location data. This study explores the effectiveness of various machine learning-based approaches in detecting GPS spoofing in UAV communication networks. Supervised classification models, unsupervised anomaly detection techniques, and deep learning-based autoencoders are evaluated to determine their capability in identifying spoofed signals. The dataset used for training and testing contains multi-dimensional UAV network parameters with labeled GPS spoofing instances. Experimental results indicate that traditional anomaly detection models, such as Isolation Forest, One-Class SVM, and Local Outlier Factor, struggle with detection accuracy and exhibit high false-positive rates. The autoencoder-based approach achieves the highest accuracy (91.20%) but has poor precision (3.97%) and recall (4.73%), highlighting limitations in threshold selection and anomaly classification. Computational complexity analysis reveals that deep learning models, despite their accuracy advantages, require significant computational resources, making them less feasible for real-time UAV applications. This study identifies critical challenges in GPS spoofing detection, including dataset bias, environmental variability, and model hyperparameter sensitivity.
Downloads
References
O. M. Bushnaq, D. Mishra, E. Natalizio, and I. F. Akyildiz, “Unmanned aerial vehicles (UAVs) for disaster management,” in Nanotechnology-Based Smart Remote Sensing Networks for Disaster Prevention, Elsevier, 2022, pp. 159–188.
A. Rejeb, K. Rejeb, S. J. Simske, and H. Treiblmaier, “Drones for supply chain management and logistics: a review and research agenda,” Int. J. Logist. Res. Appl., vol. 26, no. 6, pp. 708–731, 2023.
A. Khan, S. Gupta, and S. K. Gupta, “Multi-hazard disaster studies: Monitoring, detection, recovery, and management, based on emerging technologies and optimal techniques,” Int. J. disaster risk Reduct., vol. 47, p. 101642, 2020.
A. Biswas and H.-C. Wang, “Autonomous vehicles enabled by the integration of IoT, edge intelligence, 5G, and blockchain,” Sensors, vol. 23, no. 4, p. 1963, 2023.
I. Ullah, I. U. Khan, M. Ouaissa, M. Ouaissa, and S. El Hajjami, Future Communication Systems Using Artificial Intelligence, Internet of Things and Data Science. CRC Press, 2024.
B. Chander, S. Pal, D. De, and R. Buyya, “Artificial intelligence-based internet of things for industry 5.0,” Artif. Intell. internet things Syst., pp. 3–45, 2022.
A. AlAbidy, A. Zaben, O. M. F. Abu-Sharkh, and H. A. Noman, “A Survey on AI-Based Detection Methods of GPS Spoofing Attacks on UAVs,” in 2024 IEEE 12th International Conference on Intelligent Systems (IS), 2024, pp. 1–13.
M. Kang, S. Park, and Y. Lee, “A Survey on Satellite Communication System Security,” Sensors, vol. 24, no. 9, p. 2897, 2024.
S. Salim, N. Moustafa, and M. Reisslein, “Cybersecurity of Satellite Communications Systems: A Comprehensive Survey of the Space, Ground, and Links Segments,” IEEE Commun. Surv. & Tutorials, 2024.
T. M. Dorn, US critical infrastructure: Its Importance and Vulnerabilities to Cyber and Unmanned Systems. Page Publishing Inc, 2023.
J. Greer IV, “MITRE Attack framework adaptation in UAV usage during surveillance and reconnaissance missions,” 2024.
I. Anagnostis, P. Kotzanikolaou, and C. Douligeris, “Understanding and Securing Unmanned Aerial Vehicle (UAV) Services: A Comprehensive Tutorial,” Authorea Prepr., 2024.
P. Lin, K. Abney, B. DeBruhl, K. Abercromby, H. Danielson, and R. Jenkins, “Outer Space Cyberattacks: Generating Novel Scenarios to Avoid Surprise,” arXiv Prepr. arXiv2406.12041, 2024.
A. Giannaros et al., “Autonomous vehicles: Sophisticated attacks, safety issues, challenges, open topics, blockchain, and future directions,” J. Cybersecurity Priv., vol. 3, no. 3, pp. 493–543, 2023.
V. Varadharajan and N. Suri, “Security challenges when space merges with cyberspace,” Space Policy, vol. 67, p. 101600, 2024.
N. Jeffrey, Q. Tan, and J. R. Villar, “A review of anomaly detection strategies to detect threats to cyber-physical systems,” Electronics, vol. 12, no. 15, p. 3283, 2023.
M. M. Abrar, “Anomaly-Based Intrusion Detection System for Autonomous Vehicles,” The University of Arizona, 2023.
J. Nagarajan et al., “Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey,” Peer-to-Peer Netw. Appl., vol. 16, no. 5, pp. 2153–2185, 2023.
C. V. S. Babu and A. Pal, “Enhancing Security for Unmanned Aircraft Systems in IoT Environments: Defense Mechanisms and Mitigation Strategies,” Unmanned Aircr. Syst., pp. 429–476, 2024.
E. Balestrieri, P. Daponte, L. De Vito, F. Picariello, and I. Tudosa, “Sensors and measurements for UAV safety: An overview,” Sensors, vol. 21, no. 24, p. 8253, 2021.
A. K. Al Hwaitat et al., “Overview of Mobile Attack Detection and Prevention Techniques Using Machine Learning.,” Int. J. Interact. Mob. Technol., vol. 18, no. 10, 2024.
X. Wei, Y. Wang, and C. Sun, “PerDet: machine-learning-based UAV GPS spoofing detection using perception data,” Remote Sens., vol. 14, no. 19, p. 4925, 2022.
M. M. H. Shuvo, S. K. Islam, J. Cheng, and B. I. Morshed, “Efficient acceleration of deep learning inference on resource-constrained edge devices: A review,” Proc. IEEE, vol. 111, no. 1, pp. 42–91, 2022.
J. Pavur, “Securing new space: on satellite cyber-security,” University of Oxford, 2021.
D. Engineer, “Drone Communication Dataset.” 2024.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Machine Learning-Based GPS Spoofing Detection in UAV Networks: A Comparative Analysis of Anomaly Detection Models
Pages: 475-483
Copyright (c) 2025 Gregorius Airlangga

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).