Deep-Ensemble-Learning-Based GPS Spoofing Detection for Cellular-Connected UAVs
نویسندگان
چکیده
Unmanned aerial vehicles (UAVs) are an emerging technology in the 5G-and-beyond systems with promise of assisting cellular communications and supporting IoT deployment remote density areas. Safe secure navigation is essential for UAV autonomous deployment. Indeed, opensource simulator can use commercial software-defined radio tools to generate fake global positioning system (GPS) signals spoof GPS receiver calculate wrong locations, deviating from planned trajectory. Fortunately, existing mobile provide additional cellular-connected UAVs verify locations spoofing detection, but it needs at least three base stations (BSs) same time. In this article, we propose a novel deep-ensemble-learning-based, mobile-network-assisted monitoring tracking detection. The proposed method uses path losses between BSs communication indicate trajectory deviation caused by spoofing. To increase detection accuracy, statistics methods adopted remove environmental impacts on losses. addition, deep ensemble learning deployed edge cloud servers multilayer perceptron (MLP) neural networks analyze statistical features making final decision, which has no requirements energy consumption UAVs. experimental results show effectiveness our detecting spoofing, achieving above 97% accuracy rate under two BSs, while still achieve 83% only one BS.
منابع مشابه
Cellular-Connected UAVs over 5G: Deep Reinforcement Learning for Interference Management
Cellular-Connected UAVs over 5G: Deep Reinforcement Learning for Interference Management Ursula Challita∗, Walid Saad†, and Christian Bettstetter‡ ∗School of Informatics, The University of Edinburgh, Edinburgh, UK. Email: [email protected]. †Wireless@VT, Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA, USA. Email: [email protected]. ‡Alpen-Adria-Unive...
متن کاملAn Optimized Firefly Algorithm based on Cellular Learning Automata for Community Detection in Social Networks
The structure of the community is one of the important features of social networks. A community is a sub graph which nodes have a lot of connections to nodes of inside the community and have very few connections to nodes of outside the community. The objective of community detection is to separate groups or communities that are linked more closely. In fact, community detection is the clustering...
متن کاملControlling UAVs with Sensor Input Spoofing Attacks
There has been a recent surge in interest in autonomous robots and vehicles. From the Google self-driving car, to autonomous delivery robots, to hobbyist UAVs, there is a staggering variety of proposed deployments for autonomous vehicles. Ensuring that such vehicles can plan and execute routes safely is crucial. The key insight of our paper is that the sensors that autonomous vehicles use to na...
متن کاملA Wavelet-based Spoofing Error Compensation Technique for Single Frequency GPS Stationary Receiver
Spoofing could pose a major threat to Global Positioning System (GPS) navigation, so the GPS users have to gain an in-depth understanding of GPS spoofing. Since spoofing attack can influence position results, spoof compensation is possible through reducing position deviations. In this paper, a novel processing technique is proposed and the wavelet transform is used to eliminate the impact of sp...
متن کاملUsing Deep Learning for Detecting Spoofing Attacks on Speech Signals
It is well known that speaker verification systems are subject to spoofing attacks. The Automatic Speaker Verification Spoofing and Countermeasures Challenge – ASVSpoof2015 – provides a standard spoofing database, containing attacks based on synthetic speech, along with a protocol for experiments. This paper describes CPqD’s systems submitted to the ASVSpoof2015 Challenge, based on deep neural ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2022
ISSN: ['2372-2541', '2327-4662']
DOI: https://doi.org/10.1109/jiot.2022.3195320