{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T21:55:47Z","timestamp":1774734947302,"version":"3.50.1"},"reference-count":35,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T00:00:00Z","timestamp":1620345600000},"content-version":"vor","delay-in-days":126,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971154"],"award-info":[{"award-number":["61971154"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61831007"],"award-info":[{"award-number":["61831007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771153"],"award-info":[{"award-number":["61771153"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>A prominent security threat to unmanned aerial vehicle (UAV) is to capture it by GPS spoofing, in which the attacker manipulates the GPS signal of the UAV to capture it. This paper introduces an anti\u2010spoofing model to mitigate the impact of GPS spoofing attack on UAV mission security. In this model, linear regression (LR) is used to predict and model the optimal route of UAV to its destination. On this basis, a countermeasure mechanism is proposed to reduce the impact of GPS spoofing attack. Confrontation is based on the progressive detection mechanism of the model. In order to better ensure the flight security of UAV, the model provides more than one detection scheme for spoofing signal to improve the sensitivity of UAV to deception signal detection. For better proving the proposed LR anti\u2010spoofing model, a dynamic Stackelberg game is formulated to simulate the interaction between GPS spoofer and UAV. In particular, for GPS spoofer, it is worth mentioning that for the scenario that the UAV is cheated by GPS spoofing signal in the mission environment of the designated route is simulated in the experiment. In particular, UAV with the LR anti\u2010spoofing model, as the leader in this game, dynamically adjusts its response strategy according to the deception\u2019s attack strategy when upon detection of GPS spoofer\u2019s attack. The simulation results show that the method can effectively enhance the ability of UAV to resist GPS spoofing without increasing the hardware cost of the UAV and is easy to implement. Furthermore, we also try to use long short\u2010term memory (LSTM) network in the trajectory prediction module of the model. The experimental results show that the LR anti\u2010spoofing model proposed is far better than that of LSTM in terms of prediction accuracy.<\/jats:p>","DOI":"10.1155\/2021\/5517500","type":"journal-article","created":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T21:23:49Z","timestamp":1620422629000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":35,"title":["An Approach of Linear Regression\u2010Based UAV GPS Spoofing Detection"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9471-0614","authenticated-orcid":false,"given":"Lianxiao","family":"Meng","sequence":"first","affiliation":[]},{"given":"Lin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Shuangyin","family":"Ren","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1798-5718","authenticated-orcid":false,"given":"Gaigai","family":"Tang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1633-4051","authenticated-orcid":false,"given":"Long","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5985-7648","authenticated-orcid":false,"given":"Wu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-010-9497-5"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2531652"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2751045"},{"key":"e_1_2_10_4_2","unstructured":"KaiL. AhmedN. KanhereS. S. andJhaS. Reliable communications in aerial sensor networks by using a hybrid antenna IEEE Conference on Local Computer Networks 2012 Clearwater Beach FL USA."},{"key":"e_1_2_10_5_2","unstructured":"ShepardD. P. BhattiJ. HumphreysT. E. andFanslerA. Evaluation of smart grid and civilian uav vulnerability to gps spoofing attacks Proceedings of the 25th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS 2012) 2012 Nashville Tennessee USA."},{"key":"e_1_2_10_6_2","doi-asserted-by":"crossref","unstructured":"PaniceG. LuongoS. GiganteG. PascarellaD. Di BenedettoC. VozellaA. andPescap\u00e8A. A svmbased detection approach for GPS spoofing attacks to UAV 23rd International Conference on Automation and Computing ICAC 2017 September 2017 Huddersfield United Kingdom 1\u201311.","DOI":"10.23919\/IConAC.2017.8081999"},{"key":"e_1_2_10_7_2","doi-asserted-by":"crossref","unstructured":"QiaoY. ZhangY. andDuX. A vision-based gpsspoofing detection method for small uavs 13th International Conference on Computational Intelligence and Security CIS 2017 December 2017 Hong Kong China 312\u2013316.","DOI":"10.1109\/CIS.2017.00074"},{"key":"e_1_2_10_8_2","unstructured":"BinW. U.andHanwenL. I. U. A behavior-based covert channel based on GPS deception for smart mobile devices 2019 IEEE International Conference on Communications ICC 2019 May 2019 Shanghai China 1\u20136."},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2882769"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3309735"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2814983"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/5731678"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.3390\/s16122051"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2963337"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1193-x"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36546-1_41"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-017-0275-x"},{"key":"e_1_2_10_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2529600"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2013.6621814"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2526658"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700728"},{"key":"e_1_2_10_22_2","unstructured":"RanganathanA. \u00d3lafsd\u00f3ttirH. andCapkunS. ChenY. GruteserM. HuY. C. andSundaresanK. SPREE: a spoofing resistant GPS receiver Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking MobiCom 2016 October 2016 New York City NY USA 348\u2013360."},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2016.0646"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1002\/navi.14"},{"key":"e_1_2_10_25_2","doi-asserted-by":"crossref","unstructured":"RaoH. WangS. HuX. TanM. DaH. ChengJ. andBinH. BessiereC. Self-supervised gait encoding with locality-aware attention for person re-identification Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence IJCAI 2020 2020 Yokohama Japan 898\u2013905 http:\/\/ijcai.org.","DOI":"10.24963\/ijcai.2020\/125"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/S1665-6423(15)30004-3"},{"key":"e_1_2_10_27_2","doi-asserted-by":"crossref","unstructured":"JansenK. SchaferM. MoserD. LendersV. PopperC. andSchmittJ. Crowd-gps-sec: leveraging crowdsourcing to detect and localize gps spoofing attacks 2018 IEEE Symposium on Security and Privacy (SP) 2018 San Francisco CA USA 1018\u20131031.","DOI":"10.1109\/SP.2018.00012"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20040954"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3037467"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2013.07.010"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10957-014-0694-4"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3193974"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1511-4"},{"key":"e_1_2_10_35_2","article-title":"Attention based multi-level co-occurrence graph convolutional lstm for 3d action recognition","volume":"99","author":"Xu S.","year":"2020","journal-title":"IEEE Internet of Things Journal"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/5517500.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/5517500.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/5517500","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T09:50:52Z","timestamp":1723024252000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/5517500"}},"subtitle":[],"editor":[{"given":"Xiaojie","family":"Wang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/5517500"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5517500","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"value":"1530-8669","type":"print"},{"value":"1530-8677","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-01-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-04-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5517500"}}