2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS) 2020
DOI: 10.1109/icpads51040.2020.00058
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Detection Algorithm Against UAVs' GPS Spoofing Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(10 citation statements)
references
References 11 publications
0
9
0
1
Order By: Relevance
“…In [24], a GPS spoofing detection method was proposed that leverages the uplink received signal strength measurements collected from base stations to identify the adaptive trustable residence area, which represents the trust region within which the UAV GPS position should be located to be classified as authentic or non-spoofed. In [3], the authors proposed a method for GPS spoofing attack detection based on a machine learning algorithm, Long Short-Term Memory, and compared the results to a method based on specifically designed UAV flight paths. This method can detect attacks well when the flight trajectory is not complicated.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In [24], a GPS spoofing detection method was proposed that leverages the uplink received signal strength measurements collected from base stations to identify the adaptive trustable residence area, which represents the trust region within which the UAV GPS position should be located to be classified as authentic or non-spoofed. In [3], the authors proposed a method for GPS spoofing attack detection based on a machine learning algorithm, Long Short-Term Memory, and compared the results to a method based on specifically designed UAV flight paths. This method can detect attacks well when the flight trajectory is not complicated.…”
Section: Related Workmentioning
confidence: 99%
“…Long-Short Term Memory [3] • A comprehensive comparison with encryption-based detection techniques in terms of detection rate and time cost.…”
Section: Category Approach Advantages Limitationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Recent studies have focused on data-driven and software-based GPS spoofing detections. Various machine learning approaches were exploited in global navigation satellite system (GNSS) use cases, including DNN [ 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 ]. However, the performance of the previous approaches was tested in simulation environments.…”
Section: Related Workmentioning
confidence: 99%
“…Разумеется, на этом рисунке представлены не все наборы возможных последствий атак, а только их общая структура [3]. Тем не менее, эта схема ясно показывает, что практически любая атака, реализованная должным образом, может привести к катастрофическим последствиям не только для самого БПЛА, но и для человека и окружающей среды [4].…”
unclassified