Volume 1, Issue 1, Journal of Reliable and Secure Computing
Volume 1, Issue 1, 2025
Submit Manuscript Edit a Special Issue
Article QR Code
Article QR Code
Scan the QR code for reading
Popular articles
Journal of Reliable and Secure Computing, Volume 1, Issue 1, 2025: 54-67

Open Access | Research Article | 28 December 2025
Enhancing UAV Security with GPS Spoofing and Jamming Anomaly Detection
1 Department of Information Management, National Dong Hwa University, Hualien 974301, Taiwan
2 Institute of Artificial Intelligence Innovation, National Yang Ming Chiao Tung University, Hsinchu 300093, Taiwan
* Corresponding Author: Kuo-Hui Yeh, [email protected]
ARK: ark:/57805/jrsc.2025.368867
Received: 21 October 2025, Accepted: 20 December 2025, Published: 28 December 2025  
Abstract
Unmanned aerial vehicles face GPS spoofing and jamming that can compromise navigation and safety. We present an anomaly detection method that achieves both high accuracy and interpretability, enabling UAV operators to understand why an alert is triggered, which enables timely responses and builds trust in autonomous detection systems operating in safety-critical environments. We use five classifiers, including XGBoost, Support Vector Machine, K-Nearest Neighbor, Random Forest, and Naive Bayes, trained on a UAV dataset containing 3622 samples for spoofing detection and 6445 for jamming detection made in PX4 and Gazebo with benign flight and attack cases. After feature scaling and reduction, XGBoost reaches F1 near 0.998 for both attacks and runs fast enough for small onboard computers. Our main goal is to explain what the models learn. We study feature importance in four ways using gain in XGBoost, impurity decrease in Random Forest, permutation tests for Support Vector Machine and K-Nearest Neighbor, and a closed form score for Naive Bayes. The results point to the same key signals across models. Spoofing shows up as position drift and a mismatch between speed and course. Jamming shows up as sharp growth in position and velocity errors and poor satellite geometry. These insights help operators watch the right signals and trust the alerts.

Graphical Abstract
Enhancing UAV Security with GPS Spoofing and Jamming Anomaly Detection

Keywords
anomaly detection
extreme gradient boosting (XGBoost)
network security
unmanned aerial vehicle (UAV)

Data Availability Statement
Data will be made available on request.

Funding
This work was supported in part by the National Science and Technology Council (NSTC), Taiwan, under Project NSTC 114-2622-E-A49-022, Project NSTC 114-2221-E-A49-210, Project NSTC 114-2634-F-011-002-MBK, and Project NSTC 114-2923-E-194-001-MY3; in part by the Hon Hai Research Institute, Taipei, Taiwan, under Project 114UA90042; in part by the Industry-Academia Innovation School, NYCU, Taiwan, under Project 113UC2N006.

Conflicts of Interest
The authors declare no conflicts of interest.

Ethical Approval and Consent to Participate
Not applicable.

References
  1. Khalil, J. (2024, October 1). GNSS spoofing threatens airline safety, alarming pilots and aviation officials. GPS World. Retrieved from https://www.gpsworld.com/gnss-spoofing-threatens-airline-safety-alarming-pilots-and-aviation-officials/ (accessed on 27 December, 2025).
    [Google Scholar]
  2. Iran 'building copy of captured US drone' RQ-170 Sentinel. (2012, April 22). BBC News. Retrieved from https://www.bbc.com/news/world-middle-east-17805201 (accessed on 27 December, 2025).
    [Google Scholar]
  3. Whipple, T. (2024, October 5). 1,000 flights a day have signals jammed over war zones. Latest news & breaking headlines | The Times and The Sunday Times. Retrieved from https://www.thetimes.com/uk/technology-uk/article/1000-planes-a-day-have-signals-jammed-as-they-fly-over-war-zones-swtdflkqc (accessed on 27 December, 2025).
    [Google Scholar]
  4. Tangel, A., & FitzGerald, D. (2024). Electronic warfare spooks airlines, pilots and air-safety officials. Wall Street Journal. Retrieved from https://www.wsj.com/business/airlines/electronic-warfare-spooks-airlines-pilots-and-air-safety-officials-60959bbd (accessed on 27 December, 2025).
    [Google Scholar]
  5. Javaid, A. Y., Sun, W., Devabhaktuni, V. K., & Alam, M. (2012, November). Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In 2012 IEEE conference on technologies for homeland security (HST) (pp. 585-590). IEEE.
    [CrossRef]   [Google Scholar]
  6. Samland, F., Fruth, J., Hildebrandt, M., Hoppe, T., & Dittmann, J. (2012). AR. Drone: security threat analysis and exemplary attack to track persons. Intelligent robots and computer vision XXIX: algorithms and techniques, 8301, 158-172.
    [CrossRef]   [Google Scholar]
  7. Mansfield, K., Eveleigh, T., Holzer, T. H., & Sarkani, S. (2013, November). Unmanned aerial vehicle smart device ground control station cyber security threat model. In 2013 IEEE International Conference on Technologies for Homeland Security (HST) (pp. 722-728). IEEE.
    [CrossRef]   [Google Scholar]
  8. Kerns, A. J., Shepard, D. P., Bhatti, J. A., & Humphreys, T. E. (2014). Unmanned aircraft capture and control via GPS spoofing. Journal of field robotics, 31(4), 617-636.
    [CrossRef]   [Google Scholar]
  9. Bonebrake, C., & O'Neil, L. R. (2014). Attacks on GPS time reliability. IEEE Security & Privacy, 12(3), 82-84.
    [CrossRef]   [Google Scholar]
  10. Vasconcelos, G., Carrijo, G., Miani, R., Souza, J., & Guizilini, V. (2016, October). The impact of DoS attacks on the AR. Drone 2.0. In 2016 XIII Latin American robotics symposium and IV Brazilian robotics symposium (LARS/SBR) (pp. 127-132). IEEE.
    [CrossRef]   [Google Scholar]
  11. de Carvalho Bertoli, G., Pereira, L. A., & Saotome, O. (2021, November). Classification of denial of service attacks on Wi-Fi-based unmanned aerial vehicle. In 2021 10th Latin-American Symposium on Dependable Computing (LADC) (pp. 1-6). IEEE.
    [CrossRef]   [Google Scholar]
  12. Yaacoub, J. P., Noura, H., Salman, O., & Chehab, A. (2020). Security analysis of drones systems: Attacks, limitations, and recommendations. Internet of Things, 11, 100218.
    [CrossRef]   [Google Scholar]
  13. Jansen, K., Tippenhauer, N. O., & Pöpper, C. (2016, December). Multi-receiver GPS spoofing detection: Error models and realization. In Proceedings of the 32nd Annual Conference on Computer Security Applications (pp. 237-250).
    [CrossRef]   [Google Scholar]
  14. Magiera, J., & Katulski, R. (2015). Detection and mitigation of GPS spoofing based on antenna array processing. Journal of applied research and technology, 13(1), 45-57.
    [CrossRef]   [Google Scholar]
  15. Liu, C., Zhang, Y., Niu, G., Jia, L., Xiao, L., & Luan, J. (2023). Towards reinforcement learning in UAV relay for anti-jamming maritime communications. Digital Communications and Networks, 9(6), 1477-1485.
    [CrossRef]   [Google Scholar]
  16. Jafarnia-Jahromi, A., Broumandan, A., Nielsen, J., & Lachapelle, G. (2012). GPS vulnerability to spoofing threats and a review of antispoofing techniques. International Journal of Navigation and Observation, 2012(1), 127072.
    [CrossRef]   [Google Scholar]
  17. Masadeh, A. E., Alhafnawi, M., Salameh, H. A. B., Musa, A., & Jararweh, Y. (2022). Reinforcement learning-based security/safety uav system for intrusion detection under dynamic and uncertain target movement. IEEE Transactions on Engineering Management, 71, 12498-12508.
    [CrossRef]   [Google Scholar]
  18. Alsumayt, A., Nagy, N., Alsharyofi, S., Al Ibrahim, N., Al-Rabie, R., Alahmadi, R., ... & Alahmadi, A. A. (2024). Detecting Denial of Service Attacks (DoS) over the Internet of Drones (IoD) Based on Machine Learning. Sci, 6(3), 56.
    [CrossRef]   [Google Scholar]
  19. Feng, Z., Guan, N., Lv, M., Liu, W., Deng, Q., Liu, X., & Yi, W. (2020). Efficient drone hijacking detection using two-step GA-XGBoost. Journal of Systems Architecture, 103, 101694.
    [CrossRef]   [Google Scholar]
  20. Wang, Z., Li, Y., Wu, S., Zhou, Y., Yang, L., Xu, Y., ... & Pan, Q. (2023). A survey on cybersecurity attacks and defenses for unmanned aerial systems. Journal of Systems Architecture, 138, 102870.
    [CrossRef]   [Google Scholar]
  21. Ahmad, W., Almaiah, M. A., Ali, A., & Al-Shareeda, M. A. (2024, April). Deep learning based network intrusion detection for unmanned aerial vehicle (uav). In 2024 7th World Conference on Computing and Communication Technologies (WCCCT) (pp. 31-36). IEEE.
    [CrossRef]   [Google Scholar]
  22. Ma, T., Zhang, X., & Miao, Z. (2024). Detection of UAV GPS spoofing attacks using a stacked ensemble method. Drones, 9(1), 2.
    [CrossRef]   [Google Scholar]
  23. Calvo-Palomino, R., Bhattacharya, A., Bovet, G., & Giustiniano, D. (2020, August). Short: LSTM-based GNSS spoofing detection using low-cost spectrum sensors. In 2020 IEEE 21st International Symposium on" A World of Wireless, Mobile and Multimedia Networks"(WoWMoM) (pp. 273-276). IEEE.
    [CrossRef]   [Google Scholar]
  24. Sung, Y. H., Park, S. J., Kim, D. Y., & Kim, S. (2022). GPS spoofing detection method for small UAVs using 1D convolution neural network. Sensors, 22(23), 9412.
    [CrossRef]   [Google Scholar]
  25. Park, K. H., Park, E., & Kim, H. K. (2020, August). Unsupervised intrusion detection system for unmanned aerial vehicle with less labeling effort. In International Conference on Information Security Applications (pp. 45-58). Cham: Springer International Publishing.
    [CrossRef]   [Google Scholar]
  26. Pham, H. X., La, H. M., Feil-Seifer, D., & Nguyen, L. V. (2018). Autonomous uav navigation using reinforcement learning. arXiv preprint arXiv:1801.05086.
    [Google Scholar]
  27. Cengiz, K., Lipsa, S., Dash, R. K., Ivković, N., & Konecki, M. (2024). A novel intrusion detection system based on artificial neural network and genetic algorithm with a new dimensionality reduction technique for UAV communication. IEEE access, 12, 4925-4937.
    [CrossRef]   [Google Scholar]
  28. Whelan, J., Sangarapillai, T., Minawi, O., Almehmadi, A., & El-Khatib, K. (2020, November). Novelty-based intrusion detection of sensor attacks on unmanned aerial vehicles. In Proceedings of the 16th ACM symposium on QoS and security for wireless and mobile networks (pp. 23-28).
    [CrossRef]   [Google Scholar]
  29. European Union Aviation Safety Agency (EASA). (2024). Safety Information Bulletin: Global Navigation Satellite System Outage and Alterations Leading to Communication / Navigation / Surveillance Degradation (SIB No. 2022-02R3). Retrieved from https://ad.easa.europa.eu/ad/2022-02R3 (accessed on 27 December, 2025).
    [Google Scholar]
  30. Daniel, S., Jahshan, B., & Todd, H. (2012). Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle. GPS World, The Business and Technology of GNSS. Retrieved from https://www.gpsworld.com/drone-hack/ (accessed on 27 December, 2025).
    [Google Scholar]
  31. Whelan, J., Sangarapillai, T., Minawi, O., Almehmadi, A., & El-Khatib, K. (2020). UAV Attack Dataset. IEEE Dataport. https://dx.doi.org/10.21227/00dg-0d12
    [Google Scholar]

Cite This Article
APA Style
Liu, Y. C., Lee, L. F., & Yeh, K. H. (2025). Enhancing UAV Security with GPS Spoofing and Jamming Anomaly Detection. Journal of Reliable and Secure Computing, 1(1), 54–67. https://doi.org/10.62762/JRSC.2025.368867
Export Citation
RIS Format
Compatible with EndNote, Zotero, Mendeley, and other reference managers
RIS format data for reference managers
TY  - JOUR
AU  - Liu, Ying-Chen
AU  - Lee, Lin-Fa
AU  - Yeh, Kuo-Hui
PY  - 2025
DA  - 2025/12/28
TI  - Enhancing UAV Security with GPS Spoofing and Jamming Anomaly Detection
JO  - Journal of Reliable and Secure Computing
T2  - Journal of Reliable and Secure Computing
JF  - Journal of Reliable and Secure Computing
VL  - 1
IS  - 1
SP  - 54
EP  - 67
DO  - 10.62762/JRSC.2025.368867
UR  - https://www.icck.org/article/abs/JRSC.2025.368867
KW  - anomaly detection
KW  - extreme gradient boosting (XGBoost)
KW  - network security
KW  - unmanned aerial vehicle (UAV)
AB  - Unmanned aerial vehicles face GPS spoofing and jamming that can compromise navigation and safety. We present an anomaly detection method that achieves both high accuracy and interpretability, enabling UAV operators to understand why an alert is triggered, which enables timely responses and builds trust in autonomous detection systems operating in safety-critical environments. We use five classifiers, including XGBoost, Support Vector Machine, K-Nearest Neighbor, Random Forest, and Naive Bayes, trained on a UAV dataset containing 3622 samples for spoofing detection and 6445 for jamming detection made in PX4 and Gazebo with benign flight and attack cases. After feature scaling and reduction, XGBoost reaches F1 near 0.998 for both attacks and runs fast enough for small onboard computers. Our main goal is to explain what the models learn. We study feature importance in four ways using gain in XGBoost, impurity decrease in Random Forest, permutation tests for Support Vector Machine and K-Nearest Neighbor, and a closed form score for Naive Bayes. The results point to the same key signals across models. Spoofing shows up as position drift and a mismatch between speed and course. Jamming shows up as sharp growth in position and velocity errors and poor satellite geometry. These insights help operators watch the right signals and trust the alerts.
SN  - 3070-6424
PB  - Institute of Central Computation and Knowledge
LA  - English
ER  - 
BibTeX Format
Compatible with LaTeX, BibTeX, and other reference managers
BibTeX format data for LaTeX and reference managers
@article{Liu2025Enhancing,
  author = {Ying-Chen Liu and Lin-Fa Lee and Kuo-Hui Yeh},
  title = {Enhancing UAV Security with GPS Spoofing and Jamming Anomaly Detection},
  journal = {Journal of Reliable and Secure Computing},
  year = {2025},
  volume = {1},
  number = {1},
  pages = {54-67},
  doi = {10.62762/JRSC.2025.368867},
  url = {https://www.icck.org/article/abs/JRSC.2025.368867},
  abstract = {Unmanned aerial vehicles face GPS spoofing and jamming that can compromise navigation and safety. We present an anomaly detection method that achieves both high accuracy and interpretability, enabling UAV operators to understand why an alert is triggered, which enables timely responses and builds trust in autonomous detection systems operating in safety-critical environments. We use five classifiers, including XGBoost, Support Vector Machine, K-Nearest Neighbor, Random Forest, and Naive Bayes, trained on a UAV dataset containing 3622 samples for spoofing detection and 6445 for jamming detection made in PX4 and Gazebo with benign flight and attack cases. After feature scaling and reduction, XGBoost reaches F1 near 0.998 for both attacks and runs fast enough for small onboard computers. Our main goal is to explain what the models learn. We study feature importance in four ways using gain in XGBoost, impurity decrease in Random Forest, permutation tests for Support Vector Machine and K-Nearest Neighbor, and a closed form score for Naive Bayes. The results point to the same key signals across models. Spoofing shows up as position drift and a mismatch between speed and course. Jamming shows up as sharp growth in position and velocity errors and poor satellite geometry. These insights help operators watch the right signals and trust the alerts.},
  keywords = {anomaly detection, extreme gradient boosting (XGBoost), network security, unmanned aerial vehicle (UAV)},
  issn = {3070-6424},
  publisher = {Institute of Central Computation and Knowledge}
}

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 753
PDF Downloads: 336

Publisher's Note
ICCK stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and Permissions
CC BY Copyright © 2025 by the Author(s). Published by Institute of Central Computation and Knowledge. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
Journal of Reliable and Secure Computing

Journal of Reliable and Secure Computing

ISSN: 3070-6424 (Online)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/icck/