{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T10:59:58Z","timestamp":1774781998073,"version":"3.50.1"},"reference-count":41,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2022,11,5]],"date-time":"2022-11-05T00:00:00Z","timestamp":1667606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Natural Science Basic Research Program of Shaanxi","award":["2021JQ-207"],"award-info":[{"award-number":["2021JQ-207"]}]},{"name":"Natural Science Basic Research Program of Shaanxi","award":["62272366"],"award-info":[{"award-number":["62272366"]}]},{"name":"Natural Science Basic Research Program of Shaanxi","award":["XJS211506"],"award-info":[{"award-number":["XJS211506"]}]},{"name":"Natural Science Basic Research Program of Shaanxi","award":["2022JQ-621"],"award-info":[{"award-number":["2022JQ-621"]}]},{"name":"Natural Science Basic Research Program of Shaanxi","award":["2022JQ-658"],"award-info":[{"award-number":["2022JQ-658"]}]},{"name":"National Natural Science Foundation of China","award":["2021JQ-207"],"award-info":[{"award-number":["2021JQ-207"]}]},{"name":"National Natural Science Foundation of China","award":["62272366"],"award-info":[{"award-number":["62272366"]}]},{"name":"National Natural Science Foundation of China","award":["XJS211506"],"award-info":[{"award-number":["XJS211506"]}]},{"name":"National Natural Science Foundation of China","award":["2022JQ-621"],"award-info":[{"award-number":["2022JQ-621"]}]},{"name":"National Natural Science Foundation of China","award":["2022JQ-658"],"award-info":[{"award-number":["2022JQ-658"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2021JQ-207"],"award-info":[{"award-number":["2021JQ-207"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["62272366"],"award-info":[{"award-number":["62272366"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["XJS211506"],"award-info":[{"award-number":["XJS211506"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2022JQ-621"],"award-info":[{"award-number":["2022JQ-621"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2022JQ-658"],"award-info":[{"award-number":["2022JQ-658"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Basic Research Program of Shaanxi","award":["2021JQ-207"],"award-info":[{"award-number":["2021JQ-207"]}]},{"name":"Natural Science Basic Research Program of Shaanxi","award":["62272366"],"award-info":[{"award-number":["62272366"]}]},{"name":"Natural Science Basic Research Program of Shaanxi","award":["XJS211506"],"award-info":[{"award-number":["XJS211506"]}]},{"name":"Natural Science Basic Research Program of Shaanxi","award":["2022JQ-621"],"award-info":[{"award-number":["2022JQ-621"]}]},{"name":"Natural Science Basic Research Program of Shaanxi","award":["2022JQ-658"],"award-info":[{"award-number":["2022JQ-658"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Remote Sensing"],"abstract":"<jats:p>UAVs are widely used in agriculture, the military, and industry. However, it is easy to perform GPS spoofing attacks on UAVs, which can lead to catastrophic consequences. In this paper, we propose ConstDet, a control semantics-based detection approach for GPS spoofing attacks of UAVs using machine learning algorithms. Various real experiments are conducted to collect real flight data, on the basis of which ConstDet is designed as a practical detection framework. To train models for the detection of GPS spoofing attacks, specified flight data types are selected as features based on the control semantics, including the altitude control process and the horizontal position control process, since these data are able to represent the dynamic flight and control processes. Multiple machine learning algorithms are used to train and generate the best classifier for GPS spoofing attacks. ConstDet is further implemented and deployed on a real UAV to support onboard detection. Experiments and evaluations validate that ConstDet can effectively detect GPS spoofing attacks and the detection rate can reach 97.70%. The experimental comparison demonstrates that ConstDet has better performance than existing detection approaches.<\/jats:p>","DOI":"10.3390\/rs14215587","type":"journal-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T03:02:22Z","timestamp":1667790142000},"page":"5587","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["ConstDet: Control Semantics-Based Detection for GPS Spoofing Attacks on UAVs"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2658-1694","authenticated-orcid":false,"given":"Xiaomin","family":"Wei","sequence":"first","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710071, China"},{"name":"ISN State Key Laboratory, Xidian University, Xi\u2019an 710071, China"},{"name":"Shaanxi Key Laboratory of Network and System Security, Xi\u2019an 710071, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9116-2694","authenticated-orcid":false,"given":"Cong","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710071, China"},{"name":"ISN State Key Laboratory, Xidian University, Xi\u2019an 710071, China"},{"name":"Shaanxi Key Laboratory of Network and System Security, Xi\u2019an 710071, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0093-2794","authenticated-orcid":false,"given":"Minjie","family":"Lyu","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Qipeng","family":"Song","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Yue","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710071, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,11,5]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s41445-018-0018-3","article-title":"Development of a GPS spoofing apparatus to attack a DJI Matrice 100 Quadcopter","volume":"16","author":"Horton","year":"2018","journal-title":"J. Glob. Position. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"57","DOI":"10.11003\/JPNT.2015.4.2.057","article-title":"Effect of spoofing on unmanned aerial vehicle using counterfeited GPS signal","volume":"4","author":"Seo","year":"2015","journal-title":"J. Position. Navig. Timing"},{"key":"ref_3","unstructured":"Shepard, D.P., Bhatti, J.A., Humphreys, T.E., and Fansler, A.A. (2012, January 17\u201321). Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. Proceedings of the 25th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS 2012), Nashville, TN, USA."},{"key":"ref_4","unstructured":"Humphreys, T. (2012). Statement on the Vulnerability of Civil Unmanned Aerial Vehicles and Other Systems to Civil GPS Spoofing, The University of Texas at Austin."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2729","DOI":"10.1007\/s11277-020-07211-7","article-title":"Capture of UAVs through GPS spoofing using low-cost SDR platforms","volume":"115","author":"Gaspar","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"ref_6","first-page":"1","article-title":"Time and position spoofing with open source projects","volume":"148","author":"Wang","year":"2015","journal-title":"Black Hat Eur."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Mendes, D., Ivaki, N., and Madeira, H. (2018, January 4\u20137). Effects of GPS Spoofing on Unmanned Aerial Vehicles. Proceedings of the 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), Taipei, Taiwan.","DOI":"10.1109\/PRDC.2018.00026"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"51782","DOI":"10.1109\/ACCESS.2019.2911526","article-title":"Analysis of the GPS spoofing vulnerability in the drone 3DR solo","volume":"7","author":"Arteaga","year":"2019","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1002\/rob.21513","article-title":"Unmanned aircraft capture and control via GPS spoofing","volume":"31","author":"Kerns","year":"2014","journal-title":"J. Field Robot."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Gaspar, J., Ferreira, R., Sebasti\u00e3o, P., and Souto, N. (2018, January 25\u201328). Capture of UAVs Through GPS Spoofing. Proceedings of the 2018 Global Wireless Summit (GWS), Chiang Rai, Thailand.","DOI":"10.1109\/GWS.2018.8686727"},{"key":"ref_11","first-page":"69","article-title":"Multi-UAV Cooperative GPS Spoofing Based on YOLO Nano","volume":"3","author":"Ding","year":"2021","journal-title":"J. Cybersecur."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"6557","DOI":"10.1109\/TVT.2019.2914477","article-title":"Covert spoofing algorithm of UAV based on GPS\/INS-integrated navigation","volume":"68","author":"Guo","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Xue, N., Niu, L., Hong, X., Li, Z., Hoffaeller, L., and P\u00f6pper, C. (2020). DeepSIM: GPS Spoofing Detection on UAVs Using Satellite Imagery Matching. Annual Computer Security Applications Conference, Association for Computing Machinery.","DOI":"10.1145\/3427228.3427254"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"101694","DOI":"10.1016\/j.sysarc.2019.101694","article-title":"Efficient drone hijacking detection using two-step GA-XGBoost","volume":"103","author":"Feng","year":"2020","journal-title":"J. Syst. Archit."},{"key":"ref_15","unstructured":"Kim, K.H., Nalluri, S., Kashinath, A., Wang, Y., Mohan, S., Pajic, M., and Li, B. (2012, January 24\u201328). Security Analysis against Spoofing Attacks for Distributed UAVs. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201916), Vienna, Austria."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Calvo-Palomino, R., Bhattacharya, A., Bovet, G., and Giustiniano, D. (September, January 31). Short: LSTM-based GNSS Spoofing Detection Using Low-cost Spectrum Sensors. Proceedings of the 2020 IEEE 21st International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM), Cork, Ireland.","DOI":"10.1109\/WoWMoM49955.2020.00055"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Wang, S., Wang, J., Su, C., and Ma, X. (2020, January 2\u20134). Intelligent Detection Algorithm Against UAVs\u2019 GPS Spoofing Attack. Proceedings of the 2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS), Hong Kong, China.","DOI":"10.1109\/ICPADS51040.2020.00058"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Panice, G., Luongo, S., Gigante, G., Pascarella, D., Di Benedetto, C., Vozella, A., and Pescap\u00e8, A. (2017, January 7\u20138). A SVM-based detection approach for GPS spoofing attacks to UAV. Proceedings of the 2017 23rd International Conference on Automation and Computing (ICAC), Huddersfield, UK.","DOI":"10.23919\/IConAC.2017.8081999"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Talaei Khoei, T., Ismail, S., and Kaabouch, N. (2022). Dynamic selection techniques for detecting GPS spoofing attacks on UAVs. Sensors, 22.","DOI":"10.3390\/s22020662"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Feng, Z., Guan, N., Lv, M., Liu, W., Deng, Q., Liu, X., and Yi, W. (2017, January 27\u201331). Efficient drone hijacking detection using onboard motion sensors. Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, Lausanne, Switzerland.","DOI":"10.23919\/DATE.2017.7927214"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3289390","article-title":"An efficient UAV hijacking detection method using onboard inertial measurement unit","volume":"17","author":"Feng","year":"2018","journal-title":"ACM Trans. Embed. Comput. Syst. (TECS)"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Liang, C., Miao, M., Ma, J., Yan, H., Zhang, Q., Li, X., and Li, T. (2019). Detection of GPS spoofing attack on unmanned aerial vehicle system. International Conference on Machine Learning for Cyber Security, Springer.","DOI":"10.1007\/978-3-030-30619-9_10"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"5517500","DOI":"10.1155\/2021\/5517500","article-title":"An Approach of Linear Regression-Based UAV GPS Spoofing Detection","volume":"2021","author":"Meng","year":"2021","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2840","DOI":"10.1109\/JIOT.2019.2963337","article-title":"Drones in distress: A game-theoretic countermeasure for protecting UAVs against GPS spoofing","volume":"7","author":"Eldosouky","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Jansen, K., Sch\u00e4fer, M., Moser, D., Lenders, V., P\u00f6pper, C., and Schmitt, J. (2018, January 20\u201324). Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks. Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP), Francisco, CA, USA.","DOI":"10.1109\/SP.2018.00012"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1016\/j.tra.2021.04.022","article-title":"A policy-based solution for the detection of colluding GPS-Spoofing attacks in FANETs","volume":"149","author":"Bada","year":"2021","journal-title":"Transp. Res. Part A Policy Pract."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Basan, E., Basan, A., Nekrasov, A., Fidge, C., Sushkin, N., and Peskova, O. (2021). GPS-spoofing attack detection technology for UAVs based on Kullback\u2013Leibler divergence. Drones, 6.","DOI":"10.3390\/drones6010008"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Davidovich, B., Nassi, B., and Elovici, Y. (2022). Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera\u2019s Video Stream. Sensors, 22.","DOI":"10.14722\/autosec.2022.23008"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Quan, Q. (2017). Introduction to Multicopter Design and Control, Springer.","DOI":"10.1007\/978-981-10-3382-7"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Mendoza-Mendoza, J.A., Gonzalez-Villela, V., Sepulveda-Cervantes, G., Mendez-Martinez, M., and Sossa-Azuela, H. (2020). Advanced Robotic Vehicles Programming: An Ardupilot and Pixhawk Approach, Apress.","DOI":"10.1007\/978-1-4842-5531-5"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"211","DOI":"10.6029\/smartcr.2014.03.007","article-title":"Feature selection: A literature review","volume":"4","author":"Kumar","year":"2014","journal-title":"SmartCR"},{"key":"ref_32","unstructured":"(2022, August 08). Log Messages. Available online: https:\/\/ardupilot.org\/copter\/docs\/logmessages.html."},{"key":"ref_33","unstructured":"(2022, August 08). MAVLINK: Micro Air Vehicle Communication Protocol. Available online: https:\/\/mavlink.io\/."},{"key":"ref_34","unstructured":"(2022, August 08). Pixhawk Overview. Available online: https:\/\/ardupilot.org\/copter\/docs\/common-pixhawk-overview.html."},{"key":"ref_35","unstructured":"(2022, August 08). Ardupilot. Available online: https:\/\/ardupilot.org\/."},{"key":"ref_36","unstructured":"(2022, August 08). DroneKit-Python. Available online: https:\/\/dronekit-python.readthedocs.io\/en\/latest\/."},{"key":"ref_37","unstructured":"(2022, August 08). PX4 Open Source Autopilot-for Drone Developers. Available online: https:\/\/px4.io."},{"key":"ref_38","unstructured":"(2022, August 08). Paparazzi\u2014The Free Autopilot. Available online: https:\/\/wiki.paparazziuav.org\/wiki\/Main_Page."},{"key":"ref_39","unstructured":"(2022, August 08). DJI Phantom 4 Pro V2.0. Available online: https:\/\/www.dji.com\/uk\/phantom-4-pro-v2?site=brandsite&from=nav."},{"key":"ref_40","unstructured":"(2022, August 08). MAVLINK Common Message Set. Available online: https:\/\/mavlink.io\/en\/messages\/common.html."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Khalid, S., Khalil, T., and Nasreen, S. (2014, January 27\u201329). A survey of feature selection and feature extraction techniques in machine learning. Proceedings of the 2014 Science and Information Conference, London, UK.","DOI":"10.1109\/SAI.2014.6918213"}],"container-title":["Remote Sensing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2072-4292\/14\/21\/5587\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:11:14Z","timestamp":1760145074000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2072-4292\/14\/21\/5587"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,5]]},"references-count":41,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2022,11]]}},"alternative-id":["rs14215587"],"URL":"https:\/\/doi.org\/10.3390\/rs14215587","relation":{},"ISSN":["2072-4292"],"issn-type":[{"value":"2072-4292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,5]]}}}