2019
DOI: 10.1007/978-3-030-30619-9_10
|View full text |Cite
|
Sign up to set email alerts
|

Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(10 citation statements)
references
References 22 publications
0
10
0
Order By: Relevance
“…Compared with our previous work, 30 we have made a detailed analysis and demonstration of the proposed scheme. In the case of UAVs formation, we also have made a further in-depth study on the positioning of the GCS, and proposed a positioning method based on the adaptive step iterative algorithm, and proved its effectiveness through the analysis of experimental data.…”
Section: Discussionmentioning
confidence: 99%
“…Compared with our previous work, 30 we have made a detailed analysis and demonstration of the proposed scheme. In the case of UAVs formation, we also have made a further in-depth study on the positioning of the GCS, and proposed a positioning method based on the adaptive step iterative algorithm, and proved its effectiveness through the analysis of experimental data.…”
Section: Discussionmentioning
confidence: 99%
“…In [17], the authors proposed a GPS spoofing-detection framework that needs minimal prior configuration and applies information fusion. The real-time detection scheme derives the current UAV location from IMU and compares it to the location information received by the GPS receiver to determine if the UAV system was experiencing a GPS spoofing attack.…”
Section: Related Workmentioning
confidence: 99%
“…The ML algorithms learn from the training data and improve themselves for achieving better results and high accuracy without any human intervention, which is a huge advantage. The ML algorithms can be deployed for detecting the presence of malicious drones in the network and can help in preventing the attacks such as man-in-the-middle attack [60] and spoofing attacks [61]. Such algorithms keep on improving with increasing experience, and provide better and more accurate results.…”
Section: Motivation For Using ML For Drone Communication Securitymentioning
confidence: 99%