A Systematic Literature Review on Spoofing and Jamming Approaches in Unmanned Aerial Vehicles Navigation
Keywords:
UAV, GPS, Security, Spoofing, JammingAbstract
In the past decade, there has been a significant increase in the development and utilization of unmanned aerial vehicles (UAVs) across various industries. Factors such as remote control, payload capacity, versatility, precision, and confidentiality have fuelled interest in UAVs for multiple applications. However, UAVs’ navigation and communication systems are increasingly vulnerable to various security threats, with the most concerning being the risks associated with Global Navigation Satellite System (GNSS) technology, such as spoofing and jamming. This paper presents a comprehensive analysis of UAV navigation security, drawing on recent peer-reviewed journals to identify and address gaps in current research. Machine learning and blockchain show promise but face scalability challenges. This review identifies underexplored gaps in environmental resilience. It examines the root causes of GNSS-related challenges, potential solutions, and promising research directions in the field of UAV navigation security.
References
Acuna R, Zhang D, Willert V (2018) Vision-based UAV landing on a moving platform in GPS denied environments using motion prediction. Paper presented 2018 15th Latin American Robotics Symposium, 6th Brazilian Robotics Symposium. IEEE; João Pessoa, Brazil. https://doi.org/10.1109/LARS/SBR/WRE.2018.00096
Alrefaei F, Alzahrani A, Song H, Alrefaei S (2022) A survey on the jamming and spoofing attacks on the unmanned aerial vehicle networks. Paper presented 2022 IEEE International IOT, Electronics, and Mechatronics Conference. IEEE; Toronto, Canada. https://doi.org/10.1109/IEMTRONICS55184.2022.9795809
Altaweel A, Mukkath H, Kamel I (2023). GPS spoofing attacks in FANETs: a systematic literature review. IEEE Access 11:55233-55280. https://doi.org/10.1109/ACCESS.2023.3281731
Arteaga SP, Hernandez LAM, Perez GS, Orozco ALS, Villalba LJG (2019). Analysis of the GPS spoofing vulnerability in the drone 3DR Solo. IEEE Access 7:51782-51789. https://doi.org/10.1109/ACCESS.2019.2911526
Arthur MP (2019). Detecting signal spoofing and jamming attacks in UAV networks using a lightweight IDS. Paper presented 2019 International Conference on Computer, Information, and Telecommunication Systems. IEEE, Beijing, China. https://doi.org/10.1109/CITS.2019.8862148
Asif M, Rahman MA, Akkaya K, Shahriar H, Cuzzocrea A (2023) Adversarial data-augmented resilient intrusion detection system for unmanned aerial vehicles. Paper presented at the 2023 IEEE International Conference on Big Data. IEEE; Sorrento, Italy. https://doi.org/10.1109/BigData59044.2023.10386140
Basan E, Basan A, Nekrasov A, Fidge C, Sushkin N, Peskova O (2022). GPS-spoofing attack detection technology for UAVs based on Kullback-Leibler divergence. Drones 6(1):1-18. https://doi.org/10.3390/drones6010008
Basan E, Basan A, Nekrasov A, Fidge C, Gamec J, Gamcová M (2021) A self-diagnosis method for detecting UAV cyber attacks based on analysis of parameter changes. Sensors 21(2):1-17. https://doi.org/10.3390/s21020509
Bhamidipati S, Gao GX (2019). Locating multiple GPS jammers using networked UAVs. IEEE Internet Things J 6(2): 1816-1828. https://doi.org/10.1109/JIOT.2019.2896262
Cao L, Wang L, Liu Y, Yan S (2022) 3D trajectory planning based on the rapidly-exploring random tree Connect and artificial potential fields method for unmanned aerial vehicles. Int J Adv Robot Syst 19(5):1-17. https://doi.org/10.1177/17298806221118867
Challita U, Ferdowsi A, Chen M, Saad W (2019) Machine learning for wireless connectivity and security of cellular-connected UAVs. IEEE Wirel Commun 26(1):28-35. https://doi.org/10.1109/MWC.2018.1800155
Ch R, Srivastava G, Reddy Gadekallu T, Maddikunta PKR, Bhattacharya S (2020) Security and privacy of UAV data using blockchain technology. J Inf Secur Appl 55:102670. https://doi.org/10.1016/j.jisa.2020.102670
Cheng Q, Chen W, Sun R, Wang J, Weng D (2024) RANSAC-based instantaneous real-time kinematic positioning with GNSS triple-frequency signals in urban areas. J Geod 98(4):1-19. https://doi.org/10.1007/s00190-024-01833-6
Cuntz M, Konovaltsev A, Dreher A, Meurer M (2012) Jamming and spoofing in GPS/GNSS-based applications and services –Threats and countermeasures. Commun Comput Inf Sci 318:196-199. https://doi.org/10.1007/978-3-642-33161-9_29
Demir MO, Kurt GK, Pusane AE (2020). On the limitations of GPS time-spoofing attacks. Paper presented 2020 43rd International Conference on Telecommunications and Signal Processing. IEEE, Munich, Germany. https://doi.org/10.1109/TSP49548.2020.9163444
Dobrev Y, Yavor D, Peter G, Melanie L, Tatiana P, Dieter Mn, Martin V (2018) Radar-based high-accuracy 3D localization of UAVs for landing in GNSS-denied environments. Paper presented at the 2018 IEEE International Conference on Microwaves for Intelligent Mobility. IEEE; Munich, Germany. https://doi.org/10.1109/ICMIM.2018.8443483
Feng C, Yu K, Bashir AK, Al-Otaibi YD, Lu Y, Chen S, Zhang D (2021) Efficient and secure data sharing for 5G flying drones: a blockchain-enabled approach. IEEE Netw 35(1):130-137. https://doi.org/10.1109/MNET.011.2000223
Feng C, Keping Yu, LS Chen, Di Z (2020). Verifiable decentralized access control for distributed databases. Paper presented 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. IEEE; Chengdu, China. https://doi.org/10.1109/CyberC49757.2020.00046
Ferrão IG, Da Silva SA, Pigatto DF, Branco KRLJC (2020). GPS spoofing: detecting GPS fraud in unmanned aerial vehicles. Paper presented 2020 Latin American Robotics Symposium. IEEE; San Francisco, USA. https://doi.org/10.1109/LARS/SBR/WRE51543.2020.9307036
Ferrão IG, De Oliveira AL, Espes D, Dezan C, Branco KC (2024) Smart self-diagnosis method for GPS attacks and safety faults in UAVs. Paper presented at the 2024 International Conference on Unmanned Aircraft Systems. IEEE; Natal, Brazil. https://doi.org/10.1109/ICUAS60882.2024.10556910
Gao X, Jia H, Chen Z, Yuan G, Yang S (2020). UAV security situation awareness method based on semantic analysis. Paper presented at the 2020 IEEE International Conference on Power, Intelligent Computing and Systems. IEEE; Sheng Yang, China. https://doi.org/10.1109/ICPICS50287.2020.9201954
Guo K, Li X, Xie L (2020) Ultra-wideband and odometry-based cooperative relative localization with application to multiUAV formation control. IEEE Trans Cybern 50(6):2590-2603. https://doi.org/10.1109/TCYB.2019.2905570
Gupta S, Satya KP, Warish W, Neha A, Nikhil T, PavanKumar BN, Balaji R (2023) GPS spoof and detection in ArduPilot simulating UAVs. Paper presented at the 2023 21st International Conference on Information Technology. IEEE; Raipur, India. https://doi.org/10.1109/OCIT59427.2023.10430778
Habib N, Flores-Abad A, Martínez-Martínez J, Aponte-Roa DA, Espinoza AA (2020) Unmanned autonomous aerial navigation in GPS-denied environments. Paper presented 2020 LACCEI International Multi-Conference for Engineering, Education, and Technology. LACCEI: virtual congress. https://doi.org/10.18687/LACCEI2020.1.1.349
Hong PY, Li CY, Chang HR, Hsueh YH, Wang K (2020) WBF-PS: WiGig beam fingerprinting for UAV positioning system in GPS-denied environments. Paper presented 2020 IEEE Conference on Computer Communications. IEEE; Toronto, Canada. https://doi.org/10.1109/INFOCOM41043.2020.9155468
Huang KW, Wang HM (2018). Combating the control signal spoofing attack in UAV Systems. IEEE Trans Veh Technol 67(8):7769-7773. https://doi.org/10.1109/TVT.2018.2830345
Jansen K, Schafer M, Moser D, Lenders V, Popper C, Schmitt J (2018) Crowd-GPS-Sec: leveraging crowdsourcing to detect and localize GPS spoofing attacks. Paper presented 2018 EEE Symposium on Security and Privacy. IEEE; Chania, Greece. https://doi.org/10.1109/SP.2018.00012
Junzhi L, Wanqing L, Qixiang F, Beidian L (2019) Research progress of GNSS spoofing and spoofing detection technology. Paper presented at the 2019 International Conference on Communication Technologies. IEEE; Xi’an, China. https://doi.org/10.1109/ICCT46805.2019.8947107
Kanwal A, Anjum Z, Muhammad W (2021). Visual simultaneous localization and mapping (vSLAM) of a driverless car in GPS-denied areas. Eng Proc 12(1): 49. https://doi.org/10.3390/engproc2021012049
Keshavarz M, Shamsoshoara A, Afghah F, Ashdown J (2020) A real-time framework for trust monitoring in a network of unmanned aerial vehicles. Paper presented 2020 IEEE Conference on Computer Communications. IEEE; New York, USA. https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162761
Khan AA, Khan MM, Khan KM, Arshad J, Ahmad F (2021) A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs. Comput Networks 196:108217. https://doi.org/10.1016/j.comnet.2021.108217
Kitchenham B, Charters SM (2021) Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE-2007-01. Staffordshire: School of Computer Science and Mathematics. https://docs.opendeved.net/lib/7UU7DENA
Liu J, Yang W, Tao L, Liu J, Zhang Q (2021) Secure UAV communication under cooperative adaptive eavesdroppers with incomplete information. Paper presented 2021 International Conference on Signal Processing and Machine Learning. Springer Nature; New York, USA. https://doi.org/10.1145/3483207.3483221
Li M, Weng S, Song G, Wang N, Zhang Y (2020) A relative navigation method based on wireless ranging for UAV in GPS denied environment. Paper presented 2020 2nd International Conference on Electrical, Communication, and Computer Engineering. IEEE; Istanbul, Turkey. https://doi.org/10.1109/ICECCE49384.2020.9179243
Li M, Weng S, Song G, Wang N, Zhang Y (2019) Autonomous exploration and mapping system using heterogeneous UAVs and UGVs in GPS-denied environments. IEEE Trans Veh Technol 68(2):1339-1350. https://doi.org/10.1109/TVT.2018.2890416
Li Y, Luo Y, Wu X, Shi Z, Ma S, Yang G (2024) Variational Bayesian learning based localization and channel reconstruction in RIS-aided systems. IEEE Trans Wireless Commun 23(9):1-15. https://doi.org/10.1109/TWC.2024.3380903
Li Y, Zhang R, Zhang J, Gao S, Yang L (2019) Cooperative jamming for secure UAV communications with partial eavesdropper information. IEEE Access 7:94593-94603. https://doi.org/10.1109/ACCESS.2019.2926741
Mah MC, Lim HS, Tan AWC (2019). UAV relay flight path planning in the presence of a jamming signal. IEEE Access 7:40913-40924. https://doi.org/10.1109/ACCESS.2019.2907962
Majeed R, Abdullah NA, Mushtaq MF, Kazmi R (2021) Drone security: issues and challenges. Int J Adv Comput Sci Appl 12(5):720-729. https://doi.org/10.14569/IJACSA.2021.0120584
Manesh MR, Kenney J, Hu WC, Devabhaktuni VK, Kaabouch N (2019) Detection of GPS spoofing attacks on unmanned aerial systems. Paper presented 2019 16th IEEE Annual Consumer Communications & Networking Conference. IEEE; Las Vegas, USA. https://doi.org/10.1109/CCNC.2019.8651804
Motlagh HDK, Lotfi F, Taghirad HD, Germi SB (2019) Position estimation for drones based on visual SLAM and IMU in GPS-denied environment. Paper presented 2019 7th International Conference on Robot Mechatronics. IEEE; Tehran, Iran. https://doi.org/10.1109/ICRoM48714.2019.9071826
Mukkath H, Altaweel A, Kamel I, Al Aghbari Z (2023) On detecting GPS spoofing attack in flying ad-hoc networks: a comparative study. Paper presented 2023 Advances in Science, Engineering and Technology International Conference. IEEE; Dubai, United Arab. https://doi.org/10.1109/ASET56582.2023.10180508
Nguyen TM, Nguyen TH, Cao M, Qiu Z, Xie L (2019) Integrated UWB-vision approach for autonomous docking of UAVS in GPS-denied environments. Paper presented at the 2019 IEEE International Conference on Robotics and Automation. IEEE; Montreal, Canada. https://doi.org/10.1109/ICRA.2019.8793851
Ni H, Qiuming Z, Boyu H, Kai M, Yinglan P, Farman A, Weizhi Z, Xiaomin C (2024). Path loss and shadowing for UAV-toground UWB channels incorporating the effects of built-up areas and airframe. IEEE Trans Intell Transp Syst 25(11):1-12. https://doi.org/10.1109/tits.2024.3418952
Ouyang X, Zeng F, Hou P, Guo R (2015). Analysis and evaluation of the spoofing effect on the GNSS receiver. Paper presented 2015 12th IEEE International Conference on Ubiquitous Intelligence and Computing. IEEE; Beijing, China. https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.250
Pawlak J, Yuchen L, Joshua P, Matthew W, Khair AS, Quamar N, Vijay D (2021) A machine learning approach for detecting and classifying jamming attacks against OFDM-based UAVs. Paper presented 2021 3rd ACM Workshop on Wireless Security and Machine. Learning. ACM; Abu Dhabi, United Arab Emirates. https://doi.org/10.1145/3468218.3469049
Radoglou-Grammatikis P, Sarigiannidis P, Lagkas T, Moscholios I (2020) A compilation of UAV applications for precision agriculture. Comput Networks 172:107148. https://doi.org/10.1016/j.comnet.2020.107148
Radoš K, Brkić M, Begušić D (2024). Recent advances in jamming and spoofing detection in GNSS. Sensors 24(13):1-28. https://doi.org/10.3390/s24134210
RahardiR, Rizqi M, Lukito WD, Wibowo R, Oktafiani F, Munir A (2020) Reduced size meander line-based 433MHz printed dipole antenna for UAV telemetry application. Paper presented 2020 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications. IEEE; Tangerang, Indonesia. https://doi.org/10.1109/ICRAMET51080.2020.9298675
Rezgui G, Belmega EV, Chorti A (2019) Mitigating jamming attacks using energy harvesting. IEEE Wirel Commun 8(1): 297-300. https://doi.org/10.1109/LWC.2018.2871152
Rugo A, Finanza G (2022) A security review of the UAV. Net era : threats, countermeasures, and gap analysis. ACM Comput Surv 55(1). https://doi.org/10.1145/3485272
Satheesh Kumar M, Vimal S, Jhanjhi NZ, Dhanabalan SS, Alhumyani HA (2021) Blockchain-based peer-to peer communication in autonomous drone operation. Energy Rep 7:7925-7939. https://doi.org/10.1016/j.egyr.2021.08.073
Sedjelmaci H, Senouci SM, Ansari NA (2018) Hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks. IEEE Trans Syst Man Cyber Syst 48(9):1594-1606. https://doi.org/10.1109/TSMC.2017.2681698
Shafique A, Mehmood A, Elhadef M (2021). Detecting signal spoofing attacks in UAVs using machine learning models. IEEE Access 9:93803-93815. https://doi.org/10.1109/ACCESS.2021.3089847
Shafique A, Mehmood A, Elhadef M (2016). Detecting signal spoofing attacks in UAVs using machine learning models. IEEE Access 9:1-16. https://doi.org/10.1109/ACCESS.2021.3089847
She F, Zhang Y, Shi D, Zhou H, Ren X, Xu T (2020). Enhanced relative localization based on persistent excitation for multiUAVs in GPS-denied environments. IEEE Access 8:148136-148148. https://doi.org/10.1109/ACCESS.2020.3015593
Singh J, Venkatesan S (2021) Blockchain mechanism with Byzantine fault tolerance consensus for Internet of Drones Services. Trans Emerg Telecommun Technol 32(4):1-17. https://doi.org/10.1002/ett.4235
Talaei Khoei T, Ismail S, Kaabouch N (2022). Dynamic selection techniques for detecting GPS spoofing attacks on UAVs. Sensors 22(2). https://doi.org/10.3390/s22020662
Tang Y, Yuchao H, Jinqiang C, Fang L, Mingjie L, Feng L, Rodney SHT (2019) Vision-aided multi-UAV autonomous flocking in GPS-denied environment. IEEE Trans Ind Electron 66 (1):616-626. https://doi.org/10.1109/TIE.2018.2824766
Tedeschi P, Oligeri G, Di Pietro R (2020) Leveraging jamming to help drones complete their mission. IEEE Access 8: 5049-5064. https://doi.org/10.1109/ACCESS.2019.2963105
Valenti F, Giaquinto D, Musto L, Zinelli A, Bertozzi M, Broggi A (2018) Enabling computer vision-based autonomous navigation for unmanned aerial vehicles in cluttered GPS-denied environments. Paper presented at the 2018 EEE International Conference on Intelligent Transportation Systems. IEEE; Maui, USA. https://doi.org/10.1109/ITSC.2018.8569695
Vanegas F, Roberts J, Gonzalez F (2018) UAV tracking of mobile target in occluded, cluttered, and GPS denied environments. Paper presented 2018 IEEE Aerospace Conference. IEEE; Big Sky, USA. https://doi.org/10.1109/AERO.2018.8396449
Wan W, Kim H, Hovakimyan N, Sha L, Voulgaris PG (2020) Safety-constrained control framework for UAVs in GPSdenied environments. Paper presented 2020 IEEE Conference on Decision and Control. IEEE; New York, USA. https://doi.org/10.1109/CDC42340.2020.9304304
Wang J, Bai L, Fang Z, Han R, Wang J, Choi J (2024) Age of information-based URLLC transmission for UAVs on pylon turn. IEEE Trans Veh Technol 73(6):8797-8809. https://doi.org/10.1109/TVT.2024.3358844
Wang Q, Nguyen T, Pham K, Kwon H (2018). Mitigating jamming attack: a game-theoretic perspective. IEEE Trans Veh Technol 67(7):6063-6074. https://doi.org/10.1109/TVT.2018.2810865
Wang S, Wang J, Su C, Ma X (2020). Intelligent detection algorithm against UAVs’ GPS spoofing attack. Paper presented 2020 International Conference on Parallel and Distributed Systems. IEEE; Hong Kong, China. https://doi.org/10.1109/ICPADS51040.2020.00058
Wang X, Feng W, Chen Y, Ge N (2019) UAV swarm-enabled aerial CoMP: a physical layer security perspective. IEEE Access 7:120901-120916. https://doi.org/10.1109/ACCESS.2019.2936680
White T, Jesse W, Colton L, Randall C, Kevin RM (2021). GPS-denied navigation using SAR images and neural networks. Paper presented at 2021 IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE; Toronto, Canada. https://doi.org/10.1109/ICASSP39728.2021.9414421
Wohlin C (2014) Guidelines for snowballing in systematic literature studies and a replication in software engineering. Paper presented at the 2014 ACM International Conference. ACM; Karlskrona, Sweden. https://doi.org/10.1145/2601248.2601268
Xenya MC, Quist-Aphetsi K (2019) Decentralized distributed blockchain ledger for financial transaction backup data. Paper presented at the 2019 International Conference on Cyber Security and Internet of Things. IEEE; Accra, Ghana. https://doi.org/10.1109/ICSIoT47925.2019.00013
Xie N, Li X, Yu Y (2018) A position estimation and control system for the quadrotor in GPS-denied situations based on FAST detection and optical flow. Paper presented 2018 33rd Youth Academic Annual Conference of the Chinese Association of Automation. IEEE; Nanjing, China. https://doi.org/10.1109/YAC.2018.8406523
Xu W, Yuan C, Xu S, Ngo HQ, Xiang W (2021) On pilot spoofing attack in massive MIMO systems: detection and countermeasure. Paper presented 2021 IEEE Transactions on Information Forensics and Security. IEEE; Belfast, Australia. https://doi.org/10.1109/TIFS.2020.3036805
Xue N, Niu L, Hong X, Li Z, Hoffaeller L, Pöpper C (2020) DeepSIM: GPS spoofing detection on UAVs using satellite imagery matching. Paper presented at the 2020 ACM International Conference. New York University; Virtual congress. https://doi.org/10.1145/3427228.3427254
Yang L, Xiao B, Zhou Y, He Y, Zhang H, Han J (2016) A robust real-time vision-based GPS-denied navigation system of UAV. Paper presented at the 2016 6th Annual IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems. IEEE; Chengdu, China. https://doi.org/10.1109/CYBER.2016.7574843
Yin Y, Wang Z, Zheng L, Su Q, Guo Y (2024). Autonomous UAV navigation with adaptive control based on deep reinforcement learning. Electron 13(13). https://doi.org/10.3390/electronics13132432
Yoon HJ, Wan W, Kim H, Hovakimyan N, Sha L, Voulgaris PG (2019) Towards resilient UAV: escape time in GPS denied environment with sensor drift. IFAC-Pap 52(12):423-428. https://doi.org/10.1016/j.ifacol.2019.11.280
Zhi Y, Fu Z, Sun X, Yu J (2020) Security and privacy issues of UAV: a survey. Mob Networks Appl 25 (1):95-101. https://doi.org/10.1007/s11036-018-1193-x
Zhou Y, Qin G, Lin F (2018). Development of a nano UAV platform for navigation in a GPS-denied environment using Snapdragon. Paper presented 2018 44th Annual Conference of the IEEE Industrial Electronics Society. IEEE; Xian, China. https://doi.org/10.1109/IECON.2018.8592913
Zhu H, Cummings ML, Elfar M, Wang Z, Pajic M (2019) Operator strategy model development in UAV hacking detection. IEEE Trans Human-Machine Syst 49(6):540-549. https://doi.org/10.1109/THMS.2018.2888578
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Simegnew Eshetu Meheret, Ethiopia Nigussie , Gebeyehu Belay Gebremeskel, Serkalem Yikeber Hailesilassie

This work is licensed under a Creative Commons Attribution 4.0 International License.
This work is licensed under a Creative Commons — Attribution 4.0 International — CC BY 4.0. Authors are free to Share (copy and redistribute the material in any medium or format) and Adapt (remix, transform, and build upon the material for any purpose, even commercially). JATM allow the authors to retain publishing rights without restrictions.








