Drone Anti Spoofing Solutions
This page brings patents & research papers for protecting drones from GPS spoofing, jamming, and cyber attacks, using:
- Multi-Modal Spoofing Detection Systems – Fog computing networks with machine learning, 3-axis magnetometer signal integrity monitoring, and signal fingerprint comparison against known databases for GPS spoofing identification.
- Active Electronic Countermeasures – Adaptive jamming and counter spoofing transmission systems for drone interception, neutralization, and controlled landing without physical destruction.
- Tamper Resistant Communication Protocols – Dual-transmitter/receiver architectures with frequency diversity, encryption using dynamic feature parameters, and payload integrity verification for secure command transmission.
- Distributed Trust and Verification Frameworks – State machine replication protocols for peer to peer trustworthiness assessment and position verification using signal fingerprinting in GPS denied environments.
1. Fog Computing Network for Analyzing Drone GPS Signals with Machine Learning-Based Spoofing Detection
INTELLIGENT FUSION TECH INC, 2025
Detecting GPS spoofing attacks on drones using a fog computing network. The method involves sending drone signals to a fog node for analysis. The fog node uses machine learning models to detect slow shifting patterns indicative of spoofing attacks. This allows fog nodes to detect spoofing attacks on drones in a decentralized network.
2. Drone Interception System Utilizing Spoofing and Jamming Signal Transmission for Controlled Landing
SWATTER COMPANY LDA, 2025
Intercepting and controlling drones without damaging them by redirecting them to land using spoofing signals. The method involves detecting unauthorized drones near restricted areas, deploying police drones to intercept them, and transmitting signals to program new flight paths to land. The redirecting signals include spoofing GPS signals to simulate satellite constellations and jamming signals to disable the target drone's controls. The police drones position themselves close to the targets and then transmit the redirect signals to safely guide the intruders to designated landing areas.
3. UAVs with Onboard Neural Networks for Real-Time Sensor Data Analysis and Autonomous Electronic Attack Mitigation
DROBOTICS LLC, 2025
UAVs equipped with neural networks to resist electronic attacks that try to hijack or interfere with their flight. The UAVs have onboard neural networks that analyze real-time sensor data to detect cyber attacks and respond appropriately. The networks analyze images, GPS, and communications to identify attacks like spoofing, jamming, or disorientation. They can then autonomously mitigate the attacks, like continuing the flight path or seeking better connectivity, without being compromised.
4. AI-Assisted UAV Detection and Control System with Adaptive Signal Conditioning, Jamming, and Spoofing
AVGARDE SYSTEMS PRIVATE LTD, 2025
Detecting and taking countermeasures against unmanned aerial vehicles (UAVs) using AI-assisted object classification and adaptive jamming/spoofing. The system receives signals reflected by objects, conditions them to improve resolution and SNR, then uses AI to classify if the object is a UAV. If so, it takes over control using jamming and spoofing. Jamming disorients the UAV for a time, then spoofing establishes communication to remotely maneuver it. The jamming and spoofing parameters adapt based on range and velocity.
5. UAV with Integrated GPS Spoofing Detection Using 3-Axis Magnetometer for Signal Integrity Monitoring
SNAP INC, 2025
A UAV with a GPS spoofing detection system that enables autonomous flight control by monitoring GPS signal integrity. The system employs a 3-axis magnetometer to measure aircraft orientation and compare it with GPS heading data. When the two measurements do not match, the system detects potential GPS spoofing and triggers corrective actions, such as returning to a safe location. This integrated GPS and magnetometer system provides a comprehensive solution to GPS spoofing protection in UAVs.
6. Unmanned Aerial Vehicle Position Verification Using Signal Fingerprint Comparison and Spoofing Detection
INTEL CORP, 2024
Verifying the position of unmanned aerial vehicles (UAVs) to improve security and accuracy in situations where GPS signals are unreliable. The techniques include: comparing reported positions against known signal fingerprints at that location, measuring signals from the UAV and comparing to known fingerprints, requesting the UAV to transmit signals from its location, and detecting GPS spoofing by comparing UAV-reported signals to known fingerprints.
7. Datalink Communication System with Dual-Transmitter and Dual-Receiver Architecture for Frequency Diverse Signal Duplication
CALECTIVE LLC, 2022
Tamper-resistant datalink communications system for drones that detects and prevents unauthorized interference and hacking through a dual-transmitter, dual-receiver architecture with frequency diversity and signal duplication. The system converts and duplicates control signals transmitted from a ground controller to a drone, with verification signals sent back to the ground station to confirm successful receipt. This architecture provides enhanced security and reliability for drone operations.
8. State Machine Replication-Based Distributed Trust Management System for Mobile Computing Devices
NOKIA TECHNOLOGIES OY, 2022
Distributed trust management for mobile computers like drones operating in sensitive environments to prevent attacks like false updates, malicious commands, and joining by imposter drones. The method involves each drone using a state machine replication protocol to locally assess the trustworthiness of other drones. When a drone wants to perform a sensitive operation, it requests approval from other drones. The requester's trust level is determined based on the assessments. The requester's trust level is updated based on the global assessment. This allows distributed trust verification without central coordination.
9. Autonomous UAV Cyber Attack Detection and Neutralization System Using Machine Learning-Based Sensor Signal Analysis
GENERAL ELECTRIC CO, 2021
A system and method for autonomous cyber attack detection, localization and neutralization in UAVs to protect them from cyber attacks without major redesigns, additional sensors or redundant systems. It uses machine learning to detect attacks by monitoring key sensor signals and looking for abnormal behavior outside normal operating ranges.
10. Anti-Drone System with Drone Feature Analysis and GPS Spoofing Signal Injection Mechanism
KOREA ADVANCED INSTITUTE OF SCIENCE AND TECHNOLOGY, 2021
Anti-drone system that enables precise and efficient drone neutralization through GPS spoofing analysis. The system analyzes drone features, such as safety mechanisms and flight algorithms, to determine the most effective hijacking strategy. It then injects a GPS spoofing signal to the target drone, which automatically adjusts its flight path based on the identified strategy. This approach ensures accurate and precise neutralization of drones without disrupting their normal operation, while minimizing collateral damage and maintaining situational awareness.
11. Encryption Method for Secure Command Transmission Between UAVs Using Fixed and Dynamic Feature Parameters
SZ DJI SOFTWARE TECHNOLOGY CO LTD, 2020
Secure command transmission between unmanned aerial vehicles (UAVs) through a novel encryption approach that preserves the unique characteristics of each UAV while maintaining command integrity. The method employs fixed and dynamic feature parameters for encryption, enabling secure command transmission between UAVs without compromising their operational capabilities. Each UAV stores its unique feature parameters in an external device, which establishes wireless communication. The external device encrypts commands using the UAV's fixed parameters, while the UAV verifies the commands through its dynamic parameters. This approach ensures secure command transmission while preventing replay attacks and maintaining accurate execution.
12. UAV Controller with Secure Processor for Encrypted Communication Using Shared Secret Key and Payload Integrity Verification
DRONE DELIVERY CANADA CORP, 2020
Secure communication between a remote computing system and an unmanned aerial vehicle (UAV) through a novel cryptographic approach. The system employs a UAV controller with a secure processor and communications module to establish encrypted communication channels between the controller and the flight management system. The controller extracts UAV-specific data from messages, computes a shared secret key, and maintains a database of encrypted keys. When receiving a message, the controller verifies the message's integrity by comparing its encrypted payload with a computed hash. This ensures secure data transmission between the controller and the flight management system, enabling real-time control of the UAV while maintaining confidentiality.
13. Aircraft Flight Control System with Deviation-Based GPS Spoofing Detection
SUBARU CORP, 2020
Aircraft flight control system detects GPS spoofing by monitoring deviation from scheduled flight route. The system continuously measures aircraft position and compares it to planned route, triggering spoofing detection when deviation exceeds a threshold. This enables early identification of GPS signal tampering, allowing prompt corrective action to prevent navigation errors.
14. Networked IoT System for GNSS Signal Spoofing Detection Using Comparative Averaging
QUALCOMM INC, 2025
A system for detecting GNSS signal spoofing using static IoT devices. The system comprises a network of static IoT devices that continuously monitor GNSS signals and compare short-term and long-term averages of GNSS fixes. When a device detects a discrepancy between the two averages, it sends a warning message to a server, which analyzes the data to determine if a spoofing condition is present. If confirmed, the server sends a spoofing alert message to affected user equipment, providing location information of the spoofer and a spoofed zone.
15. Signal Authentication System Utilizing Doppler Nulling for Temporal Spatial Parameter Analysis
ROCKWELL COLLINS INC, 2024
Authenticating signals using Doppler nulling to improve resilience against spoofing and Denial of Service attacks compared to conventional methods. The technique involves scanning for signals using Doppler nulling to determine their parameters like time of arrival and frequency. By resolving the temporal spatial characteristics of the transmitter's radiation, it provides spatial awareness of relative speeds and directions. This information can then be used to authenticate received signals by comparing their parameters to the expected ones determined during the scanning. The technique allows low susceptibility to spoofing and Denial of Service attacks since it relies on the specific temporal characteristics of the transmitter's motion.
16. System and Method for Anomaly Detection in GNSS Satellite Signal Monitoring
HONEYWELL INT INC, 2024
A method and system for detecting and mitigating GNSS spoofing threats in aircraft navigation systems. The system monitors satellite signals and compares predicted orbital information with actual values to detect anomalies indicative of spoofing. Spoofing alerts are generated and displayed to pilots, enabling corrective action to prevent navigation system failures and ensure safe flight operations.
17. GNSS Receiver with Beamformer-Based Signal Authentication and Replication System
L3HARRIS INTERSTATE ELECTRONICS CORP, 2024
A GNSS receiver with anti-spoofing capability that uses a beamformer to generate multiple down converted signals, a processor to identify authentic signals, and GNSS signal replicators to generate replicas of authentic signals based on timing settings used to track them. The processor determines which signals are authentic by analyzing the signal strength variation when the beam pattern is dithered.
18. GNSS Spoofing Detection System with Receiver Stations and Master Control for Aircraft Alerting
ROCKWELL COLLINS INC, 2024
A system and method for detecting and alerting aircraft to potential GNSS spoofing threats in a protected airspace surrounding an airport. The system comprises multiple receiver stations with GNSS receivers and antennas at surveyed locations, which continuously monitor GNSS signals and compare their determined positions to their true locations. If a receiver station detects a nonzero probability of spoofing, it reports to a master control station, which transmits regular updates to aircraft within range, enabling them to adjust their protection levels accordingly. The system can also detect spoofing sources and provide directional information to aircraft.
19. GNSS Receiver with Reduced Operational Mode for Spoofing Detection and Mitigation
QUALCOMM INC, 2023
Reducing GNSS signal processing power to prevent positioning errors caused by satellite spoofing. The technique operates the receiver in reduced operational mode when spoofing is detected, specifically disabling critical processing functions like data demodulation, time setting, and error recovery. This enables the receiver to operate in a reduced state with respect to the GNSS bands most likely to be spoofed, thereby mitigating the adverse effects of spoofing on positioning and timing applications.
20. GNSS Receiver with CRPA-Based Digital Beamforming for Spoofing Signal Isolation
L3HARRIS INTERSTATE ELECTRONICS CORP, 2023
A GNSS receiver that detects and mitigates spoofing attacks using a controlled reception pattern antenna (CRPA) with digital beamforming. The CRPA generates multiple survey beams that simultaneously steer a null towards the spoofing source and a beam towards the true GNSS signals. The receiver determines the presence of a spoofer by analyzing the carrier-to-noise ratio (C/No) signatures of multiple GNSS signals, and uses the CRPA's beamforming capabilities to isolate and reject the spoofing signals.
21. GNSS Receiver with Digital Beamforming and Null Steering for Spoofing Detection and Mitigation
L3HARRIS INTERSTATE ELECTRONICS CORP, 2023
A GNSS receiver that detects and mitigates spoofing attacks using digital beamforming and null steering. The receiver generates multiple antenna patterns to survey the environment and identifies spoofing signals by detecting signal power anomalies. It then steers a null to cancel out the spoofing signals, preventing them from affecting the receiver's position and velocity estimates. The receiver also determines its attitude by associating signal strength patterns with the locations of GNSS satellites.
22. GNSS Spoofing Detection via Carrier-to-Noise Ratio Anomaly Monitoring
HONEYWELL INTERNATIONAL INC, 2023
System and method for detecting GNSS spoofing using carrier-to-noise ratio (C/No) monitoring. The system calculates C/No comparison values based on received GNSS signal measurements and compares them against previous values to detect anomalies indicative of spoofing. The system also monitors for sudden C/No increases, common C/No decreases across multiple satellites, and expected C/No values based on satellite geometry to identify spoofing attempts.
23. Integrated Secure Device Manager System with Module-Based Cryptographic Authentication for Cyber-Physical Vehicles
WHITEFOX DEFENSE TECHNOLOGIES INC, 2023
Integrated Secure Device Manager (ISDM) system for secure identification of drones and other cyber-physical vehicles. The ISDM system involves an ISDM module per vehicle, a gateway network to detect and authenticate the modules, and a central authority that issues cryptographic authorization tokens to approved modules. This enables secure detection, identification, and management of authorized unmanned vehicles while preventing unauthorized access and spoofing.
24. Method for Identifying Falsified GNSS Signals Using Temporal Dither Characteristic Analysis
NATIONAL TECHNOLOGY & ENGINEERING SOLUTIONS OF SANDIA LLC, 2022
Method for identifying true and falsified GNSS signals that permits continued navigation based upon the true signals. The method detects a plurality of GNSS carrier signals, temporally tracks characteristics of the plurality of GNSS carrier signals for dither, compares the dither data, identifies at least one falsified GNSS carrier signal based upon a degree of correlation of the dither data, and determines navigation information based on the plurality of GNSS carrier signals not identified as falsified GNSS carrier signals.
25. Triangle-Based Signal Processing for Spoofing Detection in GPS Receivers Using Sparse Optimization and Pre-Computed Waveform Functions
UNIV TEXAS, 2022
Detecting spoofing attacks on GPS receivers through a novel triangle-based signal processing approach. The method employs a sparse optimization algorithm to identify the unique components of a received signal's correlator output, distinguishing between genuine GPS signals and spoofing attacks. The approach leverages pre-computed discrete-time waveform functions stored in a memory device, which are used to model the signal's correlator output. By analyzing the sparse vector of these pre-computed functions, the algorithm can selectively identify the spoofing signal's components, enabling accurate detection of spoofing attacks.
26. Networked IoT System for GNSS Signal Discrepancy Detection via Averaged Fix Analysis
QUALCOMM INC, 2022
A system for detecting GNSS signal spoofing using static IoT devices. The system comprises a network of static IoT devices that continuously monitor GNSS signals and compare short-term and long-term averages of GNSS fixes. When a device detects a discrepancy between the two averages, it sends a warning message to a server, which analyzes the data to determine if a spoofing condition is present. If confirmed, the server sends a spoofing alert message to affected user equipment, providing location information of the spoofer and a spoofed zone.
27. Satellite Signal Spoofing Detection Method Using Signature Comparison in Aircraft Navigation Systems
GE AVIATION SYSTEMS LTD, 2022
Method for detecting spoofing of satellite signals in aircraft navigation systems, comprising receiving an apparent satellite signal, determining characteristic signatures such as power level and secondary characteristics, comparing these signatures to current transmission data values, and indicating spoofing when the difference exceeds a predetermined tolerance.
28. System with GNSS Receiver for Detecting and Mitigating Spoofed Satellite Signals Using Pre- and Post-Spoofing Location Analysis
QUALCOMM INC, 2022
A system and method for detecting and mitigating spoofed satellite navigation signals. The system includes a GNSS receiver, a memory, and one or more processors that determine a first location associated with a location determined based on GNSS signals prior to the likely spoofing of the at least one GNSS signal, and determine a second location based on one or more locations determined after determining the spoofing has ceased. The method includes determining a first location associated with a location determined based on GNSS signals prior to the likely spoofing of the at least one GNSS signal, determining a second location based on one or more locations determined after determining the spoofing has ceased, and determining a spoofing region based on the first and second locations.
29. GNSS Receiver with CRPA-Based Digital Beamforming for Spoofing Detection and Null Steering
INTERSTATE ELECTRONICS CORP, 2021
A GNSS receiver with spoofing detection and mitigation capabilities, utilizing a controlled reception pattern antenna (CRPA) with digital beamforming to survey multiple directions and identify spoofing attacks based on carrier-to-noise ratio (C/No) signatures. The system generates multiple survey beams to detect spoofing signals, and simultaneously directs nulls to reject the spoofing signals, thereby protecting the GNSS receiver from spoofing attacks.
30. GNSS Receiver with Digital Beamforming for Spoofing Detection and Null Steering
INTERSTATE ELECTRONICS CORP, 2021
A GNSS receiver that uses digital beamforming to detect and counter spoofing attacks. The receiver generates multiple antenna patterns simultaneously, including a main lobe and nulls, to survey the environment and identify spoofing signals. When spoofing is detected, the receiver steers the null to null out the spoofing signals, preventing them from affecting the GNSS position estimate. The receiver also uses the beamforming capabilities to determine its own attitude and orientation in space, providing an additional reference for calibration of the inertial measurement unit (IMU).
31. Anti-Drone System with Electromagnetic Pulse Emission and UAV Detection Sensors
DIEHL DEFENCE GMBH & CO KG, 2020
An anti-drone defense system that uses high-energy electromagnetic pulses to disrupt and disable unmanned aerial vehicles (UAVs), preventing them from operating or transmitting data. The system detects UAVs using sensors and emits directional or non-directional microwave pulses to disable their electronics, thereby neutralizing the threat without causing collateral damage.
32. GNSS Receiver with Beamformer-Based Signal Authentication and Replication
INTERSTATE ELECTRONICS CORP, 2020
A GNSS receiver with anti-spoofing capability that uses a beamformer to generate multiple down converted signals, a processor to identify authentic signals, and GNSS signal replicators to generate replicas of authentic signals based on timing settings used to track them. The processor determines which signals are authentic by analyzing the signal strength variation when the beamformer's spot beam pattern is dithered.
33. Hybrid Network Localization System with Spoofing Detection and Machine Learning Algorithms
ISTANBUL TEKNIK UNIVERSITESI, 2020
A high-precision localization system for hybrid heterogeneous networks that detects and prevents spoofing attacks. The system combines terrestrial and aerial communication systems, using machine learning-based localization algorithms to determine user locations. It incorporates a spoofing detection module that verifies location estimates against GNSS data, triggering a warning and re-acquisition of physical layer information when anomalies are detected.
34. Unmanned Aerial Vehicle Detection and Countermeasure System with Protocol Manipulation and Blind Signal Characterization
GENGHISCOMM HOLDINGS LLC, 2020
Detection and countermeasure against unmanned aerial vehicles (UAVs) that can detect and respond to UAVs that employ unanticipated communication protocols. The technique involves protocol manipulation to expose vulnerabilities and mislead UAVs. It uses signal detection, machine learning, and blind signal characterization to find UAV signals. Protocol manipulation attacks like jamming, spoofing, power drain, and collision induction are used to impede UAV communications, disrupt control, and take over.
Get Full Report
Access our comprehensive collection of 34 documents related to this technology
