Detection and Mitigation of Position Spoofing Attacks On Cooperative UAV Swarm Formations
Detection and Mitigation of Position Spoofing Attacks On Cooperative UAV Swarm Formations
Authorized licensed use limited to: XIDIAN UNIVERSITY. Downloaded on December 09,2024 at 13:00:07 UTC from IEEE Xplore. Restrictions apply.
1884 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 19, 2024
Authorized licensed use limited to: XIDIAN UNIVERSITY. Downloaded on December 09,2024 at 13:00:07 UTC from IEEE Xplore. Restrictions apply.
BI et al.: DETECTION AND MITIGATION OF POSITION SPOOFING ATTACKS 1885
Authorized licensed use limited to: XIDIAN UNIVERSITY. Downloaded on December 09,2024 at 13:00:07 UTC from IEEE Xplore. Restrictions apply.
1886 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 19, 2024
Authorized licensed use limited to: XIDIAN UNIVERSITY. Downloaded on December 09,2024 at 13:00:07 UTC from IEEE Xplore. Restrictions apply.
BI et al.: DETECTION AND MITIGATION OF POSITION SPOOFING ATTACKS 1887
The relaxation of (5e) to (6) is tight if Rank(Z) = 3. Algorithm 1 The Proposed CDI Algorithm
Also, define Input: B; M; xˆi , ∀i ∈ [1, N ]; rˆi j ,
∀i, j ∈ [1, N ], i ̸ = j; d; ϵ.
x̂ j
Ĝ i j = [ x̂ Tj − eiT ]. (9)
−ei Output: M
1 Set k ← 1;
Based on (8) and (9), (5d) can be rewritten as
2 while M can be further reduced do
I3 X x̂ j
[ x̂ Tj − eiT ] = Tr(Ĝ i j Z) = αi j , (10) 3 Select the k-th UAV of M and the set of its
XT Y −ei one-hop neighbors Nk ;
Based on (6)–(10), the feasibility problem (5) is further 4 Construct T ← B ∪ {k, Nk };
equivalently rewritten as the following feasibility problem: 5 Apply T to (12), and check feasibility using SDP.
find Z 6 if problem (12) is feasible T then
7 M ← M \ {k, Nk };
s.t. Z 1:3,1:3 = I 3 , (11a) 8 B ← B ∪ {k, Nk };
αi j < d ,
2
∀i ∈ N, j ∈ Ni , (11b) 9 end
αii ≤ ϵ, = ∀i ∈ N, (11c) 10 Set k ← (k + 1) mod |M|;
11 end
d
|r̂i2j − αi j | < ( )2 , ∀i ∈ N, j ∈ Ni , (11d)
2
Tr(Ĝ i j Z) = αi j , ∀i ∈ N, j ∈ Ni ∪ {i}, (11e)
A. Initialization of Malicious UAV Set
Z ⪰ 0, (11f)
Let M and B denote the sets of malicious and benign UAVs,
Rank(Z) = 3. (11g)
respectively. M ∪ B = N. Based on E r and E n , we propose
where constraint (11a) enforces the upper left 3 × 3 block to initialize M and B, as follows.
of Z to be an identity matrix, ensuring that the rank of the We come up with two Euclidean matrices, i.e., the generated
solution is at least three. Constraints (11a), (11f), and (11g) Euclidean matrix from individual reported positions, denoted
are equivalently derived from (5e). This is because both (11a) by E r ∈ R N ×N , and the detected Euclidean distances matrix
and (11f) constrain Z to be symmetric and in the form of (8), contaminated with noise, denoted by E n ∈ R N ×N , as
while rank constraint (11g) forces the lower right N × N block
ρ11 ∥ xˆ1 − xˆ1 ∥ ··· ρ1N ∥ xˆ1 − xˆN ∥
of Z, i.e., Y in (8), to be X T X, according to classic linear .. .. ..
Er = . . . , (13)
algebra theory.
Dropping the rank constraint (11g), we have the following ρ N 1 ∥ xˆN − xˆ1 ∥ · · · ρ N N ∥ xˆN − xˆN ∥
SDR problem:
r̂11 · · · r̂1N
find Z E n = ... ..
.
.. ,
. (14)
Authorized licensed use limited to: XIDIAN UNIVERSITY. Downloaded on December 09,2024 at 13:00:07 UTC from IEEE Xplore. Restrictions apply.
1888 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 19, 2024
feasible, UAV k and its one-hop neighbors Nk are benign. They Algorithm 2 The Proposed E-CDI Algorithm
can be removed from M and added to B; i.e., M = M\{k, Nk } Input: B; M; xˆi , ∀i ∈ [1, N ]; rˆi j ,
and B = B∪{k, Nk }. Otherwise, they remain in M. The reason ∀i, j ∈ [1, N ], i ̸ = j; d; ϵ.
for considering a potentially malicious UAV k together with Output: M
its one-hop neighbors Nk is to increase the chance that UAV k 1 Set k ← 1;
is connected to B. Therefore, the feasibility checking problem 2 while M can be further reduced do
can be meaningfully carried out. In the case where UAV k and 3 Select the k-th UAV in M and the set of its
its one-hop neighbors Nk are disconnected from B (in other one-hop neighbors Nk ;
words, Nk and their neighbors all belong to M), then UAV k 4 Construct T ← B ∪ {k, Nk };
and its one-hop neighbors Nk remain in M. 5 Apply T to (12), and check feasibility using SDP.
In this way, we repeatedly assess the remaining UAVs in 6 if problem (12) is feasible upon T then
M until M cannot be further reduced. This algorithm can 7 M ← M \ {k, Nk };
quickly detect and identify malicious UAVs; but may overkill, 8 B ← B ∪ {k, Nk };
i.e., misjudge a benign UAV to be malicious in the situation 9 else
where the benign UAV only has a malicious one-hop neighbor 10 Set T1 ← {k, Nk }; i ← 1;
since they are always assessed together for feasibility and 11 while i ≤ |T1 | do
cannot be individually arbitrated. In this sense, the algorithm 12 Select the i-th UAV of {k, Nk }, denoted
is conservative and can be overprotective. by πi ;
13 Construct T2 ← B ∪ {πi };
C. Proposed E-CDI Algorithm 14 Apply T2 to (12) and check feasibility
A key difference between the E-CDI algorithm and the CDI using SDP;
algorithm (Algorithm 1) is that the E-CDI algorithm assesses 15 if problem (12) is feasible upon T2 then
each of the potentially malicious one-hop neighbors of a UAV 16 M ← M \ {πi };
belonging to M individually, each time the UAV and its one- 17 B ← B ∪ {πi };
hop neighbors fail the feasibility check. Specifically, each of 18 end
UAV k and its potentially malicious one-hop neighbors in Nk 19 i ← i + 1;
are assessed by temporarily joining B for feasibility check 20 end
again. Those that turn out to be benign are removed from 21 end
M and added to B. By this means, each connected malicious 22 Set k ← (k + 1) mod |M|;
UAV can be detected and identified. The details are provided 23 end
in Algorithm 2. The flowchart of the proposed CDI/E-CDI
algorithm is provided in Fig. 4.
Another key difference is that the E-CDI algorithm is able TABLE II
to detect collusion attacks, while the CDI algorithm cannot. S IMULATION PARAMETERS AND C ONFIGURATION
This is because the E-CDI assesses individual UAVs in a
neighborhood {k, Nk } if the neighborhood is detected to be
infected by malicious UAVs in the neighborhood. As a result,
the malicious UAVs (or UAVs that cannot be confirmed benign
due to their poor connectivity to other benign UAVs) can
be individually assessed and verified. In contrast, the CDI
algorithm may not achieve this since its assessment is based
on neighborhoods {k, Nk }, ∀k ∈ M.
d = 0.3. Note that both the reported positions and reported
V. S IMULATION R ESULTS distance measurements are contaminated with additive Gaus-
In this section, we consider three types of spoofing attacks to sian noises, wi ∼ N (0, 10−6 I 3 ) [32] and wi j ∼ N (0, 10−6 ),
gauge the capability of the proposed algorithm to counteract respectively. The key parameters of the simulations are sum-
these attacks. We conduct extensive simulations to compre- marized in Tab. II.
hensively evaluate the proposed algorithms in comparison We assess the performances of the proposed algorithms
with the established benchmarks on the key factors, i.e., the against three types of position spoofing attacks, as follows.
number of malicious UAVs, the scale of the network, distance
• Distributed spoofing attack Under this attack, several
measurement noise, and measurement distance.
malicious UAVs independently misreport their positions
in an attempt to compromise the UAV swarm formation.
A. Simulation Setting • Collusion attack Under this attack, several malicious
We consider a UAV swarm with the UAVs’ positions UAVs conspire to frame some benign UAVs and make
randomly generated according to a uniform distribution inside them falsely identified as malicious. Based on the
a unit cube [−0.5, +0.5]3 . The malicious UAVs are randomly reported positions from targeted benign UAVs, the mali-
chosen from the nodes. The distance measurement range is cious UAVs misreport their positions to be within the
Authorized licensed use limited to: XIDIAN UNIVERSITY. Downloaded on December 09,2024 at 13:00:07 UTC from IEEE Xplore. Restrictions apply.
BI et al.: DETECTION AND MITIGATION OF POSITION SPOOFING ATTACKS 1889
Fig. 4. The flowchart of the proposed CDI/E-CDI algorithm, where the shaded part accounts for the CDI algorithm, which is part of the more comprehensive
E-CDI algorithm.
neighborhood of those benign UAVs, though they can be malicious UAVs and the sampled UAVs as the output of
far away from the UAVs under attack. the approach.
• Mixed spoofing attack Under this attack, malicious The performance metrics considered are Precision, Recall,
UAVs launch attacks in both distributed and collu- and F1. The three classic metrics are given by [34]
sive fashions. Specifically, some of the malicious UAVs
independently carry out distributed spoofing attacks to |Q p ∩ Q t |
compromise the swarm formation. The rest of the mali- Precision = , (15a)
|Q p |
cious UAVs cooperate to further impair or corrode the |Q p ∩ Q t |
integrity of the UAV swarm. Recall = , (15b)
|Q t |
The benchmark algorithms considered are 2 × Precision × Recall
• NLOS-based approach: This approach [33] treats errors F1 = , (15c)
Precision + Recall
induced by the misbehavior of malicious UAVs as a
variant of NLOS, since NLOS and spoofed positions are where Q p stands for the predicted set by a specific algorithm,
alike, i.e., causing considerable deviations from the gen- Q t denotes the ground-truth test set, and |·| denotes cardinality.
uine positions. However, NLOS is a path error involving To evaluate the effect of the network topology, we consider
two UAVs in a swarm. Therefore, we mildly adjust it two other metrics, including “malicious ratio”, i.e., the ratio
to suit comparison by random sampling according to the of the number of malicious UAVs detected initially (as done
scale of the test sample. in Section IV-A) to the total number of UAVs, denoted by
• Random approach: This approach directly relies on R M = |M|/|N|. Correspondingly, the “benign ratio”, i.e., the
the earlier potential candidate set of malicious UAVs ratio of the number of UAVs initially determined as benign to
to conduct random sampling adjusted to the number of the total number of UAVs, is R B = 1 − R M .
Authorized licensed use limited to: XIDIAN UNIVERSITY. Downloaded on December 09,2024 at 13:00:07 UTC from IEEE Xplore. Restrictions apply.
1890 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 19, 2024
Authorized licensed use limited to: XIDIAN UNIVERSITY. Downloaded on December 09,2024 at 13:00:07 UTC from IEEE Xplore. Restrictions apply.
BI et al.: DETECTION AND MITIGATION OF POSITION SPOOFING ATTACKS 1891
Fig. 9. (a) The performance on precision of the proposed and baseline approaches. (b) The performance on recall of the proposed and baseline approaches.
(c) The performance on F1 of the proposed and baseline approaches. (d) The performance on F1 of the proposed and baseline approaches under different
scales of the swarm network. (e) The performance on F1 of the proposed and baseline approaches under different levels of distance measurement noise.
(f) The performance on F1 of the proposed and baseline approaches under different levels of measurement distance.
proposed approaches can be linked to the degradation of the UAVs, where the proposed CDI and E-CDI algorithms con-
network structure, as indicated by the increasing malicious sistently outperform all other algorithms. It is noticed that the
ratio in Fig. 8. E-CDI algorithm is initially better than the CDI algorithm.
On the other hand, there is a noticeable upward trend in the However, as the number of malicious UAVs increases, the CDI
detection of malicious UAVs under the NLOS-based approach, algorithm gradually surpasses the E-CDI algorithm when the
especially those with significant distance errors akin to NLOS number of malicious UAVs exceeds five. The reason is that
conditions. The NLOS-based approach, which involves select- when there are only a small number of malicious UAVs in
ing UAVs with the largest distance errors, simultaneously a swarm, the E-CDI algorithm is more likely to misclassify
amplifies the likelihood of encountering malicious UAVs. The benign UAVs as malicious. As the number of malicious UAVs
ascending trend in the Random approach can be explained increases and the network structure deteriorates, the E-CDI
by the situation where the rate of capturing malicious UAVs algorithm is increasingly advantageous. With a higher number
surpasses the expansion rate of the malicious set. of malicious UAVs, the E-CDI algorithm exhibits a greater
In Fig. 9(b), we examine the Recall of the proposed methods likelihood of correctly detecting malicious UAVs.
compared to the benchmarks across varying numbers of mali- We also notice in Fig. 9(c) that the NLOS-based approach
cious UAVs. Both the CDI and E-CDI algorithms outperform outperforms the Random approach due to its selection from
all benchmarks significantly. Moreover, E-CDI offers higher a relatively smaller malicious set with a higher probability,
Recall than CDI. The reason is that E-CDI sacrifices some achieved through sorting based on absolute distance error.
precision, potentially introducing redundancies, to ensure the In contrast, the Random approach selects from a larger set
capture of more malicious UAVs. Given the critical security encompassing all possible malicious UAVs. The increasing
nature of the problem studied, it is imperative to emphasize trend observed in both benchmark algorithms is attributed to
high Recall to identify as many malicious UAVs as possible the growing number of malicious UAVs, resulting in a higher
to safeguard the swarm. As also noticed, the Recall of both probability of detection by both benchmarks.
proposed algorithms declines due to the deteriorating network Fig. 9(d) presents the F1 performance of our proposed
structure, as discussed in Fig. 9(a). For the same reason, the algorithms compared to the benchmark algorithms across
Recall of the NLOS-based approach also declines, as discussed these varying network scales. Both the proposed CDI and E-
in Fig. 9(a). As for the Random-based approach, it is intriguing CDI algorithms consistently outperform the other algorithms.
to note that the trends in Precision in Fig. 9(a) and Recall in An intriguing observation is that the CDI algorithm surpasses
Fig. 9(b) bear resemblance. The conclusion drawn is that the the E-CDI algorithm across all network scales. This is primar-
expansion rate of captured malicious UAVs exceeds that of the ily attributed to the fixed number of malicious UAVs: As the
malicious set enlargement, leading to this consistent trend. network scales up, a larger number of benign UAVs are likely
Fig. 9(c) illustrates the F1 of the proposed methods along- to be present, offering supporting evidence. However, this
side the benchmarks across varying numbers of malicious also introduces a risk for the E-CDI algorithm, which, while
Authorized licensed use limited to: XIDIAN UNIVERSITY. Downloaded on December 09,2024 at 13:00:07 UTC from IEEE Xplore. Restrictions apply.
1892 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 19, 2024
Authorized licensed use limited to: XIDIAN UNIVERSITY. Downloaded on December 09,2024 at 13:00:07 UTC from IEEE Xplore. Restrictions apply.
BI et al.: DETECTION AND MITIGATION OF POSITION SPOOFING ATTACKS 1893
Fig. 11. The performance on F1 of the proposed and baseline approaches in collusion spoofing attack scenario. (a) Under different scales of malicious UAVs.
(b) Under different levels of distance measurement noise. (c) Under different levels of measurement distance.
Fig. 12. The performance evaluation on F1 of the proposed and baseline approaches in mixed spoofing attack scenario. (a) Under different scales of malicious
UAVs. (b) Under different levels of distance measurement noise. (c) Under different levels of measurement distance.
Fig. 11(b), as done in Fig. 9(e). On the other hand, a descend- Comparing the trends seen in Fig. 12(a) to those in Figs. 9(c)
ing trend is also noticed with the increasing permissible and 11(a), it is evident that the performance of the proposed
distance in Fig. 11(c), which is consistent with the observation E-CDI algorithm follows a similar ascending trend as observed
made in Fig. 9(f). Given that these two parameters exhibit a in Fig. 11(a), which is different from the trend in Fig. 9(c).
similar influence in both distributed and collusion scenarios, As malicious UAVs increase, the network structure undergoes
we can refer to the discussions about distributed spoofing in a notable transformation. Initially, both distributed attacks and
Section V-C for the sake of brevity. collusion attacks contribute evenly. However, with a greater
number of attackers, more malicious UAVs initially involved
E. Resistance to Mixed Spoofing Attack in distributed attacks inadvertently become participants in
As considered in Fig. 7, we proceed to assess the F1 collusion attacks. This shift results in the gradual dominance
metric of the proposed E-CDI algorithm, comparing it to of collusion attacks. Consequently, the performance trend
the benchmarks. A total of 100 UAV swarms are generated observed in the mixed spoofing attack aligns with the pattern
randomly and independently with consistent parameters with shown in Fig. 11(a), although there can be a slight performance
those considered in Fig. 7, except for the number of mali- degradation for the same number of malicious UAVs.
cious UAVs. Each data point represents the average of the In the case of the benchmarks, the ascending trend of
100 swarms. their F1 scores can be attributed to the presence of densely
In Fig. 12(a), we analyze the F1 performance of the concentrated UAVs, which tends to reduce the disparities
proposed E-CDI algorithm compared to the benchmarks in between the distance computed based on reported positions
the context of a mixed spoofing attack. In order to con- and the reported distance measurements, as discussed earlier.
duct a fair evaluation across various numbers of malicious Last but not least, we assess the impact of distance mea-
UAVs, we evenly distribute the malicious UAVs into two surement error and the permissible distance for distance
distinct groups. For instance, when dealing with six malicious measurement on the performance of the proposed E-CDI
UAVs, we assign three of them to execute distributed attacks. algorithm. It is noticed that Fig. 12(b) yields a declining
The remaining three are directed toward launching collusion trend like the one observed in Fig. 9(e), while Fig. 12(c)
attacks against a benign UAV. It is noted that the mixed displays a decreasing pattern like the one shown in Fig. 9(f).
spoofing attack cannot be simply regarded as the superposition Given that these two parameters have consistent effects under
of distributed and collusion attacks. The amalgamation of these the distributed and collusion attacks, the reason underlying
different attack types within the mixed scenario introduces the observations in Figs. 12(b) and 12(c) can be established,
substantial variations in the network structure. as discussed in Section V-C. It is worth highlighting that there
Authorized licensed use limited to: XIDIAN UNIVERSITY. Downloaded on December 09,2024 at 13:00:07 UTC from IEEE Xplore. Restrictions apply.
1894 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 19, 2024
exists a marginal performance decline for the same number [16] B. Pardhasaradhi and L. R. Cenkeramaddi, “GPS spoofing detection and
of malicious UAVs when compared to the distributed attacks. mitigation for drones using distributed radar tracking and fusion,” IEEE
Sensors J., vol. 22, no. 11, pp. 11122–11134, Jun. 2022.
This is due to the more intricate degradation of the network [17] A. Khan, N. Ivaki, and H. Madeira, “Are UAVs’ flight controller software
structure exacerbated by the interplay of mixed attacks. reliable?” in Proc. IEEE PRDC, 2022, pp. 194–204.
[18] K. Liu, Y. Zhao, G. Wang, and R. Xue, “Quadrotor visual navigation
VI. C ONCLUSION under GPS spoofing attack,” in Proc. 6th Int. Conf. Wireless Commun.,
Signal Process. Netw. (WiSPNET), Mar. 2021, pp. 270–277.
In this paper, we judiciously formulated a complicated
[19] Y. Dang, C. Benzaïd, T. Taleb, B. Yang, and Y. Shen, “Transfer learning
malicious UAV detection problem based on the reported based GPS spoofing detection for cellular-connected UAVs,” in Proc. Int.
positions and pairwise distance measurements of the UAVs as Wireless Commun. Mobile Comput. (IWCMC), May 2022, pp. 629–634.
a localization feasibility problem. Then, we relied on an SDR [20] W. Chen, Y. Dong, and Z. Duan, “Accurately redirecting a malicious
drone,” in Proc. IEEE 19th Annu. Consum. Commun. Netw. Conf.
approach to recast the formulated non-convex problem into a (CCNC), Jan. 2022, pp. 827–834.
convex SDP, which is the key to assessing the feasibility of [21] Z. Wang, X. Zhang, Z. Zhou, M. Lu, and H. Li, “GNSS spoofer
the reported positions and distance measurements. Moreover, localization for vehicles based on Doppler and clock drift double
difference,” IEEE Trans. Veh. Technol., vol. 72, no. 4, pp. 4466–4481,
we proposed two tailored iterative algorithms based on the Apr. 2023.
proposed SDP approach to detect and identify malicious UAVs [22] G. Michieletto, F. Formaggio, A. Cenedese, and S. Tomasin, “Robust
in UAV swarms. Extensive simulations demonstrated that the localization for secure navigation of UAV formations under GNSS
spoofing attack,” IEEE Trans. Autom. Sci. Eng., vol. 20, no. 4,
proposed algorithms can achieve superior performance to the pp. 2383–2396, Oct. 2023.
existing benchmarks and exhibit robustness across various [23] M. Babaghayou, N. Labraoui, A. A. A. Ari, N. Lagraa, M. A. Ferrag, and
UAV swarms. L. Maglaras, “SAMA: Security-aware monitoring approach for location
abusing and UAV GPS-spoofing attacks on Internet of Vehicles,” in Proc.
R EFERENCES LNICST, vol. 427, 2022, pp. 343–360.
[24] S. Bi, J. Cui, W. Ni, Y. Jiang, S. Yu, and X. Wang, “Three-dimensional
[1] S. Hu, W. Ni, X. Wang, A. Jamalipour, and D. Ta, “Joint optimization of
cooperative positioning for Internet of Things provenance,” IEEE Inter-
trajectory, propulsion, and thrust powers for covert UAV-on-UAV video
net Things J., vol. 9, no. 20, pp. 19945–19958, Oct. 2022.
tracking and surveillance,” IEEE Trans. Inf. Forensics Security, vol. 16,
pp. 1959–1972, 2021. [25] Y. Wang, X. Wen, Y. Cao, C. Xu, and F. Gao, “Bearing-based relative
localization for robotic swarm with partially mutual observations,” IEEE
[2] B. Liu, W. Ni, R. P. Liu, Y. J. Guo, and H. Zhu, “Decentralized, privacy-
Robot. Autom. Lett., vol. 8, no. 4, pp. 2142–2149, Apr. 2023.
preserving routing of cellular-connected unmanned aerial vehicles for
joint goods delivery and sensing,” IEEE Trans. Intell. Transp. Syst., [26] J. Yang, T. Zhang, X. Wu, T. Liang, and Q. Zhang, “Efficient scheduling
vol. 24, no. 9, pp. 9627–9641, 2023. in space–air–ground-integrated localization networks,” IEEE Internet
Things J., vol. 9, no. 18, pp. 17689–17704, Sep. 2022.
[3] X. Yuan, S. Hu, W. Ni, X. Wang, and A. Jamalipour, “Deep reinforce-
ment learning-driven reconfigurable intelligent surface-assisted radio [27] B. Jiang, B. D. O. Anderson, and H. Hmam, “3-D relative localization
surveillance with a fixed-wing UAV,” IEEE Trans. Inf. Forensics Secu- of mobile systems using distance-only measurements via semidefinite
rity, vol. 18, pp. 4546–4560, 2023. optimization,” IEEE Trans. Aerosp. Electron. Syst., vol. 56, no. 3,
pp. 1903–1916, Jun. 2020.
[4] A. V. Savkin, W. Ni, and M. Eskandari, “Effective UAV navigation for
cellular-assisted radio sensing, imaging, and tracking,” IEEE Trans. Veh. [28] Z. Wu, W. Quan, and T. Zhang, “Resource allocation in UAV-aided
Technol., vol. 72, no. 10, pp. 13729–13733, Oct. 2023. vehicle localization frameworks,” in Proc. IEEE/CIC Int. Conf. Commun.
Workshops China, Aug. 2019, pp. 98–103.
[5] K. Li, R. C. Voicu, S. S. Kanhere, W. Ni, and E. Tovar, “Energy efficient
legitimate wireless surveillance of UAV communications,” IEEE Trans. [29] P. Biswas, T.-C. Lian, T.-C. Wang, and Y. Ye, “Semidefinite pro-
Veh. Technol., vol. 68, no. 3, pp. 2283–2293, Mar. 2019. gramming based algorithms for sensor network localization,” ACM
Trans. Sensor Netw., vol. 2, no. 2, pp. 188–220, May 2006, doi:
[6] S. Hu, X. Yuan, W. Ni, and X. Wang, “Trajectory planning of cellular-
10.1145/1149283.1149286.
connected UAV for communication-assisted radar sensing,” IEEE Trans.
[30] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.:
Commun., vol. 70, no. 9, pp. 6385–6396, Sep. 2022.
Cambridge Univ. Press, 2004.
[7] X. Yuan, Z. Feng, W. Ni, R. P. Liu, J. A. Zhang, and W. Xu,
[31] M. Grant and S. Boyd. (2008). CVX: MATLAB Software for Disciplined
“Secrecy performance of terrestrial radio links under collaborative
Convex Programming. [Online]. Available: http://cvxr.com/cvx
aerial eavesdropping,” IEEE Trans. Inf. Forensics Security, vol. 15,
pp. 604–619, 2020. [32] I. Um, S. Park, S. Oh, and H. Kim, “Analyzing location accu-
racy of unmanned vehicle according to RTCM message frequency
[8] B. Song et al., “Reliability analysis of large-scale adaptive weighted net-
of RTK-GPS,” in Proc. 25th Asia–Pacific Conf. Commun. (APCC),
works,” IEEE Trans. Inf. Forensics Security, vol. 15, pp. 651–665, 2020.
Nov. 2019, pp. 326–330.
[9] X. Yuan, Z. Feng, W. Ni, Z. Wei, R. P. Liu, and C. Xu, “Connectivity
[33] W. Zhao, R. He, B. Ai, Z. Zhong, and H. Zhang, “Vehicle localization
of UAV swarms in 3D spherical spaces under (un)intentional ground
based on hypothesis test in NLOS scenarios,” IEEE Trans. Veh. Technol.,
interference,” IEEE Trans. Veh. Technol., vol. 69, no. 8, pp. 8792–8804,
vol. 71, no. 2, pp. 2198–2203, Feb. 2022.
Aug. 2020.
[34] S. Bi, W. Ni, Y. Jiang, and X. Wang, “Novel recommendation-based
[10] S. Bi et al., “A comprehensive survey on applications of AI technologies
approach for multidisciplinary development of future universities,” Sus-
to failure analysis of industrial systems,” Eng. Failure Anal., vol. 148,
tainability, vol. 14, no. 10, p. 5881, May 2022.
Jun. 2023, Art. no. 107172.
[11] Y. E. Yao, P. Dash, and K. Pattabiraman, “May the swarm be with you:
Sensor spoofing attacks against drone swarms,” in Proc. ACM SIGSAC
CCS, 2022, pp. 3511–3513.
[12] H. Choi et al., “Detecting attacks against robotic vehicles: A control
invariant approach,” in Proc. ACM SIGSAC Conf. Comput. Commun.
Secur., Oct. 2018, pp. 801–816. Siguo Bi received the Ph.D. degree in electronic
[13] I. Buske, A. Walther, D. Fitz, J. Acosta, A. Konovaltsev, and L. Kurz, science and technology from Fudan University,
“Smart GPS spoofing to countermeasure autonomously approaching Shanghai, China, in 2020. He is currently an Engi-
agile micro UAVs,” Proc. SPIE, vol. 12273, pp. 62–67, Nov. 2022. neer with Fudan University. His research interests
[14] Y. Liu, Y. Wang, J. Wang, and Y. Shen, “Distributed 3D relative include wireless sensor networks, convex optimiza-
localization of UAVs,” IEEE Trans. Veh. Technol., vol. 69, no. 10, tion, network security in UAV swarm, and machine
pp. 11756–11770, Oct. 2020. learning applied in communications.
[15] P. Jiang, H. Wu, and C. Xin, “DeepPOSE: Detecting GPS spoofing attack
via deep recurrent neural network,” Digit. Commun. Netw., vol. 8, no. 5,
pp. 791–803, Oct. 2022.
Authorized licensed use limited to: XIDIAN UNIVERSITY. Downloaded on December 09,2024 at 13:00:07 UTC from IEEE Xplore. Restrictions apply.
BI et al.: DETECTION AND MITIGATION OF POSITION SPOOFING ATTACKS 1895
Kai Li (Senior Member, IEEE) received the B.E. since 2018 and an Editor for IEEE T RANSACTIONS ON V EHICULAR T ECH -
degree from Shandong University, Weihai, China, NOLOGY . He served as the Secretary, then the Vice-Chair and Chair of the
in 2009, the M.S. degree from The Hong Kong IEEE Vehicular Technology Society (VTS) New South Wales (NSW) Chapter
University of Science and Technology, Hong Kong, from 2015 to 2022, the Workshop Chair for ISCIT 2023, the Track Chair
in 2010, and the Ph.D. degree in computer science for VTC-Spring 2017, the Track Co-Chair for IEEE VTC-Spring 2016, the
from The University of New South Wales, Sydney, Publication Chair for BodyNet 2015, and the Student Travel Grant Chair for
NSW, Australia, in 2014. Currently, he is a Visiting WPMC 2014.
Research Scientist with the Division of Electrical
Engineering, Department of Engineering, University
of Cambridge, U.K. Additionally, he is also a Senior
Research Scientist with the CISTER Research Cen-
tre, Porto, Portugal. He is also a CMU-Portugal Research Fellow, jointly
supported by Carnegie Mellon University, Pittsburgh, PA, USA, and the
Foundation for Science and Technology (FCT), Lisbon, Portugal. In 2022,
he was a Visiting Research Scholar with the CyLab Security and Privacy
Institute, CMU. Prior to this engagement, he was a Post-Doctoral Research Cong Wang received the B.E. and M.S. degrees
Fellow with the SUTD-MIT International Design Centre, Singapore University from Fudan University, China. Her research inter-
of Technology and Design, Singapore, from 2014 to 2016. He has also held ests include machine learning, bioinformatics, and
positions as a Visiting Research Assistant with the ICT Centre, CSIRO, statistics.
Brisbane, QLD, Australia, from 2012 to 2013, and a Research Assistant with
the Mobile Technologies Centre, The Chinese University of Hong Kong,
Hong Kong, from 2010 to 2011. He has been an Associate Editor for
the Nature Computer Science journal (Springer) since 2023, the Computer
Communications journal (Elsevier) and Ad Hoc Networks journal (Elsevier)
since 2021, and IEEE ACCESS journal since 2018.
Authorized licensed use limited to: XIDIAN UNIVERSITY. Downloaded on December 09,2024 at 13:00:07 UTC from IEEE Xplore. Restrictions apply.