GNSS Spoofing Detection Using Multiple Sensing Devices and LSTM Networks

Xin Qi, Toshio Sato, Zheng Wen, Yutaka Katsuyama, Kazuhiko Tamesue, Takuro Sato

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

The rise of next-generation logistics systems featuring autonomous vehicles and drones has brought to light the severe problem of Global navigation satellite system (GNSS) location data spoofing. While signal-based anti-spoofing techniques have been studied, they can be challenging to apply to current commercial GNSS modules in many cases. In this study, we explore using multiple sensing devices and machine learning techniques such as decision tree classifiers and Long short-term memory (LSTM) networks for detecting GNSS location data spoofing. We acquire sensing data from six trajectories and generate spoofing data based on the Software-defined radio (SDR) behavior for evaluation. We define multiple features using GNSS, beacons, and Inertial measurement unit (IMU) data and develop models to detect spoofing. Our experimental results indicate that LSTM networks using ten-sequential past data exhibit higher performance, with the accuracy F1 scores above 0.92 using appropriate features including beacons and generalization ability for untrained test data. Additionally, our results suggest that distance from beacons is a valuable metric for detecting GNSS spoofing and demonstrate the potential for beacon installation along future drone highways.

Original languageEnglish
Pages (from-to)1372-1379
Number of pages8
JournalIEICE Transactions on Communications
VolumeE106–B
Issue number12
DOIs
Publication statusPublished - 2023 Dec

Keywords

  • Bluetooth beacons
  • GNSS
  • LSTM
  • drones
  • machine learning
  • spoofing

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'GNSS Spoofing Detection Using Multiple Sensing Devices and LSTM Networks'. Together they form a unique fingerprint.

Cite this