Anti-Spoofing Methods for UAV Communications
Unmanned aerial vehicles (UAVs) operate in contested electromagnetic environments where adversaries can manipulate communications and navigation signals with increasing sophistication. Field measurements indicate that GPS spoofing attacks can induce position errors exceeding 500 meters within seconds, while communication link hijacking attempts occur at rates of 12-15 per operational hour in certain conflict zones. These threats compromise not only mission effectiveness but also system safety when aircraft control is affected.
The fundamental challenge lies in detecting and authenticating signals rapidly enough to maintain operational capability while minimizing the computational and power burden that robust security measures impose on payload-limited UAVs.
This page brings together solutions from recent research—including neural network-based attack detection systems, integrated 3-axis magnetometer validation for GPS integrity, time-differenced carrier phase analysis, and beamforming authentication techniques. These and other approaches provide practical implementation paths for UAV operators requiring resilient communications in contested environments without significant payload or power penalties.
1. UAVs with Onboard Neural Networks for Real-Time Sensor Data Analysis and Autonomous Electronic Attack Mitigation
DROBOTICS LLC, 2025
UAVs equipped with neural networks to resist electronic attacks that try to hijack or interfere with their flight. The UAVs have onboard neural networks that analyze real-time sensor data to detect cyber attacks and respond appropriately. The networks analyze images, GPS, and communications to identify attacks like spoofing, jamming, or disorientation. They can then autonomously mitigate the attacks, like continuing the flight path or seeking better connectivity, without being compromised.
2. AI-Assisted UAV Detection and Control System with Adaptive Signal Conditioning, Jamming, and Spoofing
AVGARDE SYSTEMS PRIVATE LTD, 2025
Detecting and taking countermeasures against unmanned aerial vehicles (UAVs) using AI-assisted object classification and adaptive jamming/spoofing. The system receives signals reflected by objects, conditions them to improve resolution and SNR, then uses AI to classify if the object is a UAV. If so, it takes over control using jamming and spoofing. Jamming disorients the UAV for a time, then spoofing establishes communication to remotely maneuver it. The jamming and spoofing parameters adapt based on range and velocity.
3. UAV with Integrated GPS Spoofing Detection Using 3-Axis Magnetometer for Signal Integrity Monitoring
SNAP INC, 2025
A UAV with a GPS spoofing detection system that enables autonomous flight control by monitoring GPS signal integrity. The system employs a 3-axis magnetometer to measure aircraft orientation and compare it with GPS heading data. When the two measurements do not match, the system detects potential GPS spoofing and triggers corrective actions, such as returning to a safe location. This integrated GPS and magnetometer system provides a comprehensive solution to GPS spoofing protection in UAVs.
4. Networked IoT System for GNSS Signal Spoofing Detection Using Comparative Averaging
QUALCOMM INC, 2025
A system for detecting GNSS signal spoofing using static IoT devices. The system comprises a network of static IoT devices that continuously monitor GNSS signals and compare short-term and long-term averages of GNSS fixes. When a device detects a discrepancy between the two averages, it sends a warning message to a server, which analyzes the data to determine if a spoofing condition is present. If confirmed, the server sends a spoofing alert message to affected user equipment, providing location information of the spoofer and a spoofed zone.
5. System for GPS Spoofing Detection Using Time-Differenced Carrier Phase and Inertial Navigation System Acceleration Comparison
HONEYWELL INTERNATIONAL INC, 2024
A system and method for detecting spoofing or jamming of GNSS signals using time-differenced carrier phase (TDCP) computed GNSS acceleration compared with acceleration estimates derived from inertial navigation systems (INS). The system computes GNSS-derived acceleration estimates and INS-derived acceleration estimates at multiple time epochs, and generates a time-varying threshold signal based on user-specified probability of false alarm or probability of missed detection. A spoofing or jamming alert is generated when the magnitude of the difference signal between the GNSS-derived acceleration estimates and INS-derived acceleration estimates exceeds the threshold signal.
6. System and Method for Anomaly Detection in GNSS Satellite Signal Monitoring
HONEYWELL INT INC, 2024
A method and system for detecting and mitigating GNSS spoofing threats in aircraft navigation systems. The system monitors satellite signals and compares predicted orbital information with actual values to detect anomalies indicative of spoofing. Spoofing alerts are generated and displayed to pilots, enabling corrective action to prevent navigation system failures and ensure safe flight operations.
7. GNSS Receiver with Beamformer-Based Signal Authentication and Replication System
L3HARRIS INTERSTATE ELECTRONICS CORP, 2024
A GNSS receiver with anti-spoofing capability that uses a beamformer to generate multiple downconverted signals, a processor to identify authentic signals, and GNSS signal replicators to generate replicas of authentic signals based on timing settings used to track them. The processor determines which signals are authentic by analyzing the signal strength variation when the beam pattern is dithered.
8. GNSS Spoofing Detection System with Receiver Stations and Master Control for Aircraft Alerting
ROCKWELL COLLINS INC, 2024
A system and method for detecting and alerting aircraft to potential GNSS spoofing threats in a protected airspace surrounding an airport. The system comprises multiple receiver stations with GNSS receivers and antennas at surveyed locations, which continuously monitor GNSS signals and compare their determined positions to their true locations. If a receiver station detects a nonzero probability of spoofing, it reports to a master control station, which transmits regular updates to aircraft within range, enabling them to adjust their protection levels accordingly. The system can also detect spoofing sources and provide directional information to aircraft.
9. GNSS Receiver with Reduced Operational Mode for Spoofing Detection and Mitigation
QUALCOMM INC, 2023
Reducing GNSS signal processing power to prevent positioning errors caused by satellite spoofing. The technique operates the receiver in reduced operational mode when spoofing is detected, specifically disabling critical processing functions like data demodulation, time setting, and error recovery. This enables the receiver to operate in a reduced state with respect to the GNSS bands most likely to be spoofed, thereby mitigating the adverse effects of spoofing on positioning and timing applications.
10. GNSS Receiver with CRPA-Based Digital Beamforming for Spoofing Signal Isolation
L3HARRIS INTERSTATE ELECTRONICS CORP, 2023
A GNSS receiver that detects and mitigates spoofing attacks using a controlled reception pattern antenna (CRPA) with digital beamforming. The CRPA generates multiple survey beams that simultaneously steer a null towards the spoofing source and a beam towards the true GNSS signals. The receiver determines the presence of a spoofer by analyzing the carrier-to-noise ratio (C/No) signatures of multiple GNSS signals, and uses the CRPA's beamforming capabilities to isolate and reject the spoofing signals.
11. GNSS Receiver with Digital Beamforming and Null Steering for Spoofing Detection and Mitigation
L3HARRIS INTERSTATE ELECTRONICS CORP, 2023
A GNSS receiver that detects and mitigates spoofing attacks using digital beamforming and null steering. The receiver generates multiple antenna patterns to survey the environment and identifies spoofing signals by detecting signal power anomalies. It then steers a null to cancel out the spoofing signals, preventing them from affecting the receiver's position and velocity estimates. The receiver also determines its attitude by associating signal strength patterns with the locations of GNSS satellites.
12. GNSS Spoofing Detection via Carrier-to-Noise Ratio Anomaly Monitoring
HONEYWELL INTERNATIONAL INC, 2023
System and method for detecting GNSS spoofing using carrier-to-noise ratio (C/No) monitoring. The system calculates C/No comparison values based on received GNSS signal measurements and compares them against previous values to detect anomalies indicative of spoofing. The system also monitors for sudden C/No increases, common C/No decreases across multiple satellites, and expected C/No values based on satellite geometry to identify spoofing attempts.
13. Method for Identifying Falsified GNSS Signals Using Temporal Dither Characteristic Analysis
NATIONAL TECHNOLOGY & ENGINEERING SOLUTIONS OF SANDIA LLC, 2022
Method for identifying true and falsified GNSS signals that permits continued navigation based upon the true signals. The method detects a plurality of GNSS carrier signals, temporally tracks characteristics of the plurality of GNSS carrier signals for dither, compares the dither data, identifies at least one falsified GNSS carrier signal based upon a degree of correlation of the dither data, and determines navigation information based on the plurality of GNSS carrier signals not identified as falsified GNSS carrier signals.
14. Datalink Communication System with Dual-Transmitter and Dual-Receiver Architecture for Frequency Diverse Signal Duplication
CALECTIVE LLC, 2022
Tamper-resistant datalink communications system for drones that detects and prevents unauthorized interference and hacking through a dual-transmitter, dual-receiver architecture with frequency diversity and signal duplication. The system converts and duplicates control signals transmitted from a ground controller to a drone, with verification signals sent back to the ground station to confirm successful receipt. This architecture provides enhanced security and reliability for drone operations.
15. Triangle-Based Signal Processing for Spoofing Detection in GPS Receivers Using Sparse Optimization and Pre-Computed Waveform Functions
UNIV TEXAS, 2022
Detecting spoofing attacks on GPS receivers through a novel triangle-based signal processing approach. The method employs a sparse optimization algorithm to identify the unique components of a received signal's correlator output, distinguishing between genuine GPS signals and spoofing attacks. The approach leverages pre-computed discrete-time waveform functions stored in a memory device, which are used to model the signal's correlator output. By analyzing the sparse vector of these pre-computed functions, the algorithm can selectively identify the spoofing signal's components, enabling accurate detection of spoofing attacks.
16. Networked IoT System for GNSS Signal Discrepancy Detection via Averaged Fix Analysis
QUALCOMM INC, 2022
A system for detecting GNSS signal spoofing using static IoT devices. The system comprises a network of static IoT devices that continuously monitor GNSS signals and compare short-term and long-term averages of GNSS fixes. When a device detects a discrepancy between the two averages, it sends a warning message to a server, which analyzes the data to determine if a spoofing condition is present. If confirmed, the server sends a spoofing alert message to affected user equipment, providing location information of the spoofer and a spoofed zone.
17. Satellite Signal Spoofing Detection Method Using Signature Comparison in Aircraft Navigation Systems
GE AVIATION SYSTEMS LTD, 2022
Method for detecting spoofing of satellite signals in aircraft navigation systems, comprising receiving an apparent satellite signal, determining characteristic signatures such as power level and secondary characteristics, comparing these signatures to current transmission data values, and indicating spoofing when the difference exceeds a predetermined tolerance.
18. Decentralized Trust Assessment System for Aircraft Avionics with Integrated Neural Network Data Verification
TEXTRON INNOVATIONS INC, 2022
A decentralized trust assessment system (DTAS) for aircraft avionics that combines a trust assessment module with a neural network to verify the integrity of input and output data streams, detect anomalies, and prevent spoofing attacks. The system integrates a trust module's specific programming with the neural network's pattern recognition capabilities to provide comprehensive data validation and ensure reliable aircraft operation.
19. System with GNSS Receiver for Detecting and Mitigating Spoofed Satellite Signals Using Pre- and Post-Spoofing Location Analysis
QUALCOMM INC, 2022
A system and method for detecting and mitigating spoofed satellite navigation signals. The system includes a GNSS receiver, a memory, and one or more processors that determine a first location associated with a location determined based on GNSS signals prior to the likely spoofing of the at least one GNSS signal, and determine a second location based on one or more locations determined after determining the spoofing has ceased. The method includes determining a first location associated with a location determined based on GNSS signals prior to the likely spoofing of the at least one GNSS signal, determining a second location based on one or more locations determined after determining the spoofing has ceased, and determining a spoofing region based on the first and second locations.
20. Method for Mitigating GNSS Signal Spoofing via Receiver Reduced Operational State
QUALCOMM INC, 2022
A method for mitigating GNSS signal spoofing in a receiver, comprising operating the receiver in a reduced operational state when spoofing is detected, wherein the reduced operational state includes disabling data demodulation and decoding, disabling time setting, disabling acquisition of unknown satellites, disabling satellite differencing, disabling error recovery, reducing non-coherent integration time, and duty cycling the power for receiver blocks associated with the spoofed band.
Get Full Report
Access our comprehensive collection of 33 documents related to this technology