A Systematic Literature Review on Spoofing and Jamming Approaches in Unmanned Aerial Vehicles Navigation

Authors

Keywords:

UAV, GPS, Security, Spoofing, Jamming

Abstract

In the past decade, there has been a significant increase in the development and utilization of unmanned aerial vehicles (UAVs) across various industries. Factors such as remote control, payload capacity, versatility, precision, and confidentiality have fuelled interest in UAVs for multiple applications. However, UAVs’ navigation and communication systems are increasingly vulnerable to various security threats, with the most concerning being the risks associated with Global Navigation Satellite System (GNSS) technology, such as spoofing and jamming. This paper presents a comprehensive analysis of UAV navigation security, drawing on recent peer-reviewed journals to identify and address gaps in current research. Machine learning and blockchain show promise but face scalability challenges. This review identifies underexplored gaps in environmental resilience. It examines the root causes of GNSS-related challenges, potential solutions, and promising research directions in the field of UAV navigation security.


References

Acuna R, Zhang D, Willert V (2018) Vision-based UAV landing on a moving platform in GPS denied environments using motion prediction. Paper presented 2018 15th Latin American Robotics Symposium, 6th Brazilian Robotics Symposium. IEEE; João Pessoa, Brazil. https://doi.org/10.1109/LARS/SBR/WRE.2018.00096

Alrefaei F, Alzahrani A, Song H, Alrefaei S (2022) A survey on the jamming and spoofing attacks on the unmanned aerial vehicle networks. Paper presented 2022 IEEE International IOT, Electronics, and Mechatronics Conference. IEEE; Toronto, Canada. https://doi.org/10.1109/IEMTRONICS55184.2022.9795809

Altaweel A, Mukkath H, Kamel I (2023). GPS spoofing attacks in FANETs: a systematic literature review. IEEE Access 11:55233-55280. https://doi.org/10.1109/ACCESS.2023.3281731

Arteaga SP, Hernandez LAM, Perez GS, Orozco ALS, Villalba LJG (2019). Analysis of the GPS spoofing vulnerability in the drone 3DR Solo. IEEE Access 7:51782-51789. https://doi.org/10.1109/ACCESS.2019.2911526

Arthur MP (2019). Detecting signal spoofing and jamming attacks in UAV networks using a lightweight IDS. Paper presented 2019 International Conference on Computer, Information, and Telecommunication Systems. IEEE, Beijing, China. https://doi.org/10.1109/CITS.2019.8862148

Asif M, Rahman MA, Akkaya K, Shahriar H, Cuzzocrea A (2023) Adversarial data-augmented resilient intrusion detection system for unmanned aerial vehicles. Paper presented at the 2023 IEEE International Conference on Big Data. IEEE; Sorrento, Italy. https://doi.org/10.1109/BigData59044.2023.10386140

Basan E, Basan A, Nekrasov A, Fidge C, Sushkin N, Peskova O (2022). GPS-spoofing attack detection technology for UAVs based on Kullback-Leibler divergence. Drones 6(1):1-18. https://doi.org/10.3390/drones6010008

Basan E, Basan A, Nekrasov A, Fidge C, Gamec J, Gamcová M (2021) A self-diagnosis method for detecting UAV cyber attacks based on analysis of parameter changes. Sensors 21(2):1-17. https://doi.org/10.3390/s21020509

Bhamidipati S, Gao GX (2019). Locating multiple GPS jammers using networked UAVs. IEEE Internet Things J 6(2): 1816-1828. https://doi.org/10.1109/JIOT.2019.2896262

Cao L, Wang L, Liu Y, Yan S (2022) 3D trajectory planning based on the rapidly-exploring random tree Connect and artificial potential fields method for unmanned aerial vehicles. Int J Adv Robot Syst 19(5):1-17. https://doi.org/10.1177/17298806221118867

Challita U, Ferdowsi A, Chen M, Saad W (2019) Machine learning for wireless connectivity and security of cellular-connected UAVs. IEEE Wirel Commun 26(1):28-35. https://doi.org/10.1109/MWC.2018.1800155

Ch R, Srivastava G, Reddy Gadekallu T, Maddikunta PKR, Bhattacharya S (2020) Security and privacy of UAV data using blockchain technology. J Inf Secur Appl 55:102670. https://doi.org/10.1016/j.jisa.2020.102670

Cheng Q, Chen W, Sun R, Wang J, Weng D (2024) RANSAC-based instantaneous real-time kinematic positioning with GNSS triple-frequency signals in urban areas. J Geod 98(4):1-19. https://doi.org/10.1007/s00190-024-01833-6

Cuntz M, Konovaltsev A, Dreher A, Meurer M (2012) Jamming and spoofing in GPS/GNSS-based applications and services –Threats and countermeasures. Commun Comput Inf Sci 318:196-199. https://doi.org/10.1007/978-3-642-33161-9_29

Demir MO, Kurt GK, Pusane AE (2020). On the limitations of GPS time-spoofing attacks. Paper presented 2020 43rd International Conference on Telecommunications and Signal Processing. IEEE, Munich, Germany. https://doi.org/10.1109/TSP49548.2020.9163444

Dobrev Y, Yavor D, Peter G, Melanie L, Tatiana P, Dieter Mn, Martin V (2018) Radar-based high-accuracy 3D localization of UAVs for landing in GNSS-denied environments. Paper presented at the 2018 IEEE International Conference on Microwaves for Intelligent Mobility. IEEE; Munich, Germany. https://doi.org/10.1109/ICMIM.2018.8443483

Feng C, Yu K, Bashir AK, Al-Otaibi YD, Lu Y, Chen S, Zhang D (2021) Efficient and secure data sharing for 5G flying drones: a blockchain-enabled approach. IEEE Netw 35(1):130-137. https://doi.org/10.1109/MNET.011.2000223

Feng C, Keping Yu, LS Chen, Di Z (2020). Verifiable decentralized access control for distributed databases. Paper presented 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. IEEE; Chengdu, China. https://doi.org/10.1109/CyberC49757.2020.00046

Ferrão IG, Da Silva SA, Pigatto DF, Branco KRLJC (2020). GPS spoofing: detecting GPS fraud in unmanned aerial vehicles. Paper presented 2020 Latin American Robotics Symposium. IEEE; San Francisco, USA. https://doi.org/10.1109/LARS/SBR/WRE51543.2020.9307036

Ferrão IG, De Oliveira AL, Espes D, Dezan C, Branco KC (2024) Smart self-diagnosis method for GPS attacks and safety faults in UAVs. Paper presented at the 2024 International Conference on Unmanned Aircraft Systems. IEEE; Natal, Brazil. https://doi.org/10.1109/ICUAS60882.2024.10556910

Gao X, Jia H, Chen Z, Yuan G, Yang S (2020). UAV security situation awareness method based on semantic analysis. Paper presented at the 2020 IEEE International Conference on Power, Intelligent Computing and Systems. IEEE; Sheng Yang, China. https://doi.org/10.1109/ICPICS50287.2020.9201954

Guo K, Li X, Xie L (2020) Ultra-wideband and odometry-based cooperative relative localization with application to multiUAV formation control. IEEE Trans Cybern 50(6):2590-2603. https://doi.org/10.1109/TCYB.2019.2905570

Gupta S, Satya KP, Warish W, Neha A, Nikhil T, PavanKumar BN, Balaji R (2023) GPS spoof and detection in ArduPilot simulating UAVs. Paper presented at the 2023 21st International Conference on Information Technology. IEEE; Raipur, India. https://doi.org/10.1109/OCIT59427.2023.10430778

Habib N, Flores-Abad A, Martínez-Martínez J, Aponte-Roa DA, Espinoza AA (2020) Unmanned autonomous aerial navigation in GPS-denied environments. Paper presented 2020 LACCEI International Multi-Conference for Engineering, Education, and Technology. LACCEI: virtual congress. https://doi.org/10.18687/LACCEI2020.1.1.349

Hong PY, Li CY, Chang HR, Hsueh YH, Wang K (2020) WBF-PS: WiGig beam fingerprinting for UAV positioning system in GPS-denied environments. Paper presented 2020 IEEE Conference on Computer Communications. IEEE; Toronto, Canada. https://doi.org/10.1109/INFOCOM41043.2020.9155468

Huang KW, Wang HM (2018). Combating the control signal spoofing attack in UAV Systems. IEEE Trans Veh Technol 67(8):7769-7773. https://doi.org/10.1109/TVT.2018.2830345

Jansen K, Schafer M, Moser D, Lenders V, Popper C, Schmitt J (2018) Crowd-GPS-Sec: leveraging crowdsourcing to detect and localize GPS spoofing attacks. Paper presented 2018 EEE Symposium on Security and Privacy. IEEE; Chania, Greece. https://doi.org/10.1109/SP.2018.00012

Junzhi L, Wanqing L, Qixiang F, Beidian L (2019) Research progress of GNSS spoofing and spoofing detection technology. Paper presented at the 2019 International Conference on Communication Technologies. IEEE; Xi’an, China. https://doi.org/10.1109/ICCT46805.2019.8947107

Kanwal A, Anjum Z, Muhammad W (2021). Visual simultaneous localization and mapping (vSLAM) of a driverless car in GPS-denied areas. Eng Proc 12(1): 49. https://doi.org/10.3390/engproc2021012049

Keshavarz M, Shamsoshoara A, Afghah F, Ashdown J (2020) A real-time framework for trust monitoring in a network of unmanned aerial vehicles. Paper presented 2020 IEEE Conference on Computer Communications. IEEE; New York, USA. https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162761

Khan AA, Khan MM, Khan KM, Arshad J, Ahmad F (2021) A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs. Comput Networks 196:108217. https://doi.org/10.1016/j.comnet.2021.108217

Kitchenham B, Charters SM (2021) Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE-2007-01. Staffordshire: School of Computer Science and Mathematics. https://docs.opendeved.net/lib/7UU7DENA

Liu J, Yang W, Tao L, Liu J, Zhang Q (2021) Secure UAV communication under cooperative adaptive eavesdroppers with incomplete information. Paper presented 2021 International Conference on Signal Processing and Machine Learning. Springer Nature; New York, USA. https://doi.org/10.1145/3483207.3483221

Li M, Weng S, Song G, Wang N, Zhang Y (2020) A relative navigation method based on wireless ranging for UAV in GPS denied environment. Paper presented 2020 2nd International Conference on Electrical, Communication, and Computer Engineering. IEEE; Istanbul, Turkey. https://doi.org/10.1109/ICECCE49384.2020.9179243

Li M, Weng S, Song G, Wang N, Zhang Y (2019) Autonomous exploration and mapping system using heterogeneous UAVs and UGVs in GPS-denied environments. IEEE Trans Veh Technol 68(2):1339-1350. https://doi.org/10.1109/TVT.2018.2890416

Li Y, Luo Y, Wu X, Shi Z, Ma S, Yang G (2024) Variational Bayesian learning based localization and channel reconstruction in RIS-aided systems. IEEE Trans Wireless Commun 23(9):1-15. https://doi.org/10.1109/TWC.2024.3380903

Li Y, Zhang R, Zhang J, Gao S, Yang L (2019) Cooperative jamming for secure UAV communications with partial eavesdropper information. IEEE Access 7:94593-94603. https://doi.org/10.1109/ACCESS.2019.2926741

Mah MC, Lim HS, Tan AWC (2019). UAV relay flight path planning in the presence of a jamming signal. IEEE Access 7:40913-40924. https://doi.org/10.1109/ACCESS.2019.2907962

Majeed R, Abdullah NA, Mushtaq MF, Kazmi R (2021) Drone security: issues and challenges. Int J Adv Comput Sci Appl 12(5):720-729. https://doi.org/10.14569/IJACSA.2021.0120584

Manesh MR, Kenney J, Hu WC, Devabhaktuni VK, Kaabouch N (2019) Detection of GPS spoofing attacks on unmanned aerial systems. Paper presented 2019 16th IEEE Annual Consumer Communications & Networking Conference. IEEE; Las Vegas, USA. https://doi.org/10.1109/CCNC.2019.8651804

Motlagh HDK, Lotfi F, Taghirad HD, Germi SB (2019) Position estimation for drones based on visual SLAM and IMU in GPS-denied environment. Paper presented 2019 7th International Conference on Robot Mechatronics. IEEE; Tehran, Iran. https://doi.org/10.1109/ICRoM48714.2019.9071826

Mukkath H, Altaweel A, Kamel I, Al Aghbari Z (2023) On detecting GPS spoofing attack in flying ad-hoc networks: a comparative study. Paper presented 2023 Advances in Science, Engineering and Technology International Conference. IEEE; Dubai, United Arab. https://doi.org/10.1109/ASET56582.2023.10180508

Nguyen TM, Nguyen TH, Cao M, Qiu Z, Xie L (2019) Integrated UWB-vision approach for autonomous docking of UAVS in GPS-denied environments. Paper presented at the 2019 IEEE International Conference on Robotics and Automation. IEEE; Montreal, Canada. https://doi.org/10.1109/ICRA.2019.8793851

Ni H, Qiuming Z, Boyu H, Kai M, Yinglan P, Farman A, Weizhi Z, Xiaomin C (2024). Path loss and shadowing for UAV-toground UWB channels incorporating the effects of built-up areas and airframe. IEEE Trans Intell Transp Syst 25(11):1-12. https://doi.org/10.1109/tits.2024.3418952

Ouyang X, Zeng F, Hou P, Guo R (2015). Analysis and evaluation of the spoofing effect on the GNSS receiver. Paper presented 2015 12th IEEE International Conference on Ubiquitous Intelligence and Computing. IEEE; Beijing, China. https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.250

Pawlak J, Yuchen L, Joshua P, Matthew W, Khair AS, Quamar N, Vijay D (2021) A machine learning approach for detecting and classifying jamming attacks against OFDM-based UAVs. Paper presented 2021 3rd ACM Workshop on Wireless Security and Machine. Learning. ACM; Abu Dhabi, United Arab Emirates. https://doi.org/10.1145/3468218.3469049

Radoglou-Grammatikis P, Sarigiannidis P, Lagkas T, Moscholios I (2020) A compilation of UAV applications for precision agriculture. Comput Networks 172:107148. https://doi.org/10.1016/j.comnet.2020.107148

Radoš K, Brkić M, Begušić D (2024). Recent advances in jamming and spoofing detection in GNSS. Sensors 24(13):1-28. https://doi.org/10.3390/s24134210

RahardiR, Rizqi M, Lukito WD, Wibowo R, Oktafiani F, Munir A (2020) Reduced size meander line-based 433MHz printed dipole antenna for UAV telemetry application. Paper presented 2020 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications. IEEE; Tangerang, Indonesia. https://doi.org/10.1109/ICRAMET51080.2020.9298675

Rezgui G, Belmega EV, Chorti A (2019) Mitigating jamming attacks using energy harvesting. IEEE Wirel Commun 8(1): 297-300. https://doi.org/10.1109/LWC.2018.2871152

Rugo A, Finanza G (2022) A security review of the UAV. Net era : threats, countermeasures, and gap analysis. ACM Comput Surv 55(1). https://doi.org/10.1145/3485272

Satheesh Kumar M, Vimal S, Jhanjhi NZ, Dhanabalan SS, Alhumyani HA (2021) Blockchain-based peer-to peer communication in autonomous drone operation. Energy Rep 7:7925-7939. https://doi.org/10.1016/j.egyr.2021.08.073

Sedjelmaci H, Senouci SM, Ansari NA (2018) Hierarchical detection and response system to enhance security against lethal cyber-attacks in UAV networks. IEEE Trans Syst Man Cyber Syst 48(9):1594-1606. https://doi.org/10.1109/TSMC.2017.2681698

Shafique A, Mehmood A, Elhadef M (2021). Detecting signal spoofing attacks in UAVs using machine learning models. IEEE Access 9:93803-93815. https://doi.org/10.1109/ACCESS.2021.3089847

Shafique A, Mehmood A, Elhadef M (2016). Detecting signal spoofing attacks in UAVs using machine learning models. IEEE Access 9:1-16. https://doi.org/10.1109/ACCESS.2021.3089847

She F, Zhang Y, Shi D, Zhou H, Ren X, Xu T (2020). Enhanced relative localization based on persistent excitation for multiUAVs in GPS-denied environments. IEEE Access 8:148136-148148. https://doi.org/10.1109/ACCESS.2020.3015593

Singh J, Venkatesan S (2021) Blockchain mechanism with Byzantine fault tolerance consensus for Internet of Drones Services. Trans Emerg Telecommun Technol 32(4):1-17. https://doi.org/10.1002/ett.4235

Talaei Khoei T, Ismail S, Kaabouch N (2022). Dynamic selection techniques for detecting GPS spoofing attacks on UAVs. Sensors 22(2). https://doi.org/10.3390/s22020662

Tang Y, Yuchao H, Jinqiang C, Fang L, Mingjie L, Feng L, Rodney SHT (2019) Vision-aided multi-UAV autonomous flocking in GPS-denied environment. IEEE Trans Ind Electron 66 (1):616-626. https://doi.org/10.1109/TIE.2018.2824766

Tedeschi P, Oligeri G, Di Pietro R (2020) Leveraging jamming to help drones complete their mission. IEEE Access 8: 5049-5064. https://doi.org/10.1109/ACCESS.2019.2963105

Valenti F, Giaquinto D, Musto L, Zinelli A, Bertozzi M, Broggi A (2018) Enabling computer vision-based autonomous navigation for unmanned aerial vehicles in cluttered GPS-denied environments. Paper presented at the 2018 EEE International Conference on Intelligent Transportation Systems. IEEE; Maui, USA. https://doi.org/10.1109/ITSC.2018.8569695

Vanegas F, Roberts J, Gonzalez F (2018) UAV tracking of mobile target in occluded, cluttered, and GPS denied environments. Paper presented 2018 IEEE Aerospace Conference. IEEE; Big Sky, USA. https://doi.org/10.1109/AERO.2018.8396449

Wan W, Kim H, Hovakimyan N, Sha L, Voulgaris PG (2020) Safety-constrained control framework for UAVs in GPSdenied environments. Paper presented 2020 IEEE Conference on Decision and Control. IEEE; New York, USA. https://doi.org/10.1109/CDC42340.2020.9304304

Wang J, Bai L, Fang Z, Han R, Wang J, Choi J (2024) Age of information-based URLLC transmission for UAVs on pylon turn. IEEE Trans Veh Technol 73(6):8797-8809. https://doi.org/10.1109/TVT.2024.3358844

Wang Q, Nguyen T, Pham K, Kwon H (2018). Mitigating jamming attack: a game-theoretic perspective. IEEE Trans Veh Technol 67(7):6063-6074. https://doi.org/10.1109/TVT.2018.2810865

Wang S, Wang J, Su C, Ma X (2020). Intelligent detection algorithm against UAVs’ GPS spoofing attack. Paper presented 2020 International Conference on Parallel and Distributed Systems. IEEE; Hong Kong, China. https://doi.org/10.1109/ICPADS51040.2020.00058

Wang X, Feng W, Chen Y, Ge N (2019) UAV swarm-enabled aerial CoMP: a physical layer security perspective. IEEE Access 7:120901-120916. https://doi.org/10.1109/ACCESS.2019.2936680

White T, Jesse W, Colton L, Randall C, Kevin RM (2021). GPS-denied navigation using SAR images and neural networks. Paper presented at 2021 IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE; Toronto, Canada. https://doi.org/10.1109/ICASSP39728.2021.9414421

Wohlin C (2014) Guidelines for snowballing in systematic literature studies and a replication in software engineering. Paper presented at the 2014 ACM International Conference. ACM; Karlskrona, Sweden. https://doi.org/10.1145/2601248.2601268

Xenya MC, Quist-Aphetsi K (2019) Decentralized distributed blockchain ledger for financial transaction backup data. Paper presented at the 2019 International Conference on Cyber Security and Internet of Things. IEEE; Accra, Ghana. https://doi.org/10.1109/ICSIoT47925.2019.00013

Xie N, Li X, Yu Y (2018) A position estimation and control system for the quadrotor in GPS-denied situations based on FAST detection and optical flow. Paper presented 2018 33rd Youth Academic Annual Conference of the Chinese Association of Automation. IEEE; Nanjing, China. https://doi.org/10.1109/YAC.2018.8406523

Xu W, Yuan C, Xu S, Ngo HQ, Xiang W (2021) On pilot spoofing attack in massive MIMO systems: detection and countermeasure. Paper presented 2021 IEEE Transactions on Information Forensics and Security. IEEE; Belfast, Australia. https://doi.org/10.1109/TIFS.2020.3036805

Xue N, Niu L, Hong X, Li Z, Hoffaeller L, Pöpper C (2020) DeepSIM: GPS spoofing detection on UAVs using satellite imagery matching. Paper presented at the 2020 ACM International Conference. New York University; Virtual congress. https://doi.org/10.1145/3427228.3427254

Yang L, Xiao B, Zhou Y, He Y, Zhang H, Han J (2016) A robust real-time vision-based GPS-denied navigation system of UAV. Paper presented at the 2016 6th Annual IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems. IEEE; Chengdu, China. https://doi.org/10.1109/CYBER.2016.7574843

Yin Y, Wang Z, Zheng L, Su Q, Guo Y (2024). Autonomous UAV navigation with adaptive control based on deep reinforcement learning. Electron 13(13). https://doi.org/10.3390/electronics13132432

Yoon HJ, Wan W, Kim H, Hovakimyan N, Sha L, Voulgaris PG (2019) Towards resilient UAV: escape time in GPS denied environment with sensor drift. IFAC-Pap 52(12):423-428. https://doi.org/10.1016/j.ifacol.2019.11.280

Zhi Y, Fu Z, Sun X, Yu J (2020) Security and privacy issues of UAV: a survey. Mob Networks Appl 25 (1):95-101. https://doi.org/10.1007/s11036-018-1193-x

Zhou Y, Qin G, Lin F (2018). Development of a nano UAV platform for navigation in a GPS-denied environment using Snapdragon. Paper presented 2018 44th Annual Conference of the IEEE Industrial Electronics Society. IEEE; Xian, China. https://doi.org/10.1109/IECON.2018.8592913

Zhu H, Cummings ML, Elfar M, Wang Z, Pajic M (2019) Operator strategy model development in UAV hacking detection. IEEE Trans Human-Machine Syst 49(6):540-549. https://doi.org/10.1109/THMS.2018.2888578

Downloads

Published

2025-09-26

Issue

Section

Review Articles