Abstract

Due to the tremendous advancement in interactive multimedia systems and technologies, security has become a major aspect. Advanced technology can be utilized for hacking autonomous systems like Unmanned Aerial vehicles (UAVs) in different ways such as spoofing and jamming. It can be spoofed by the injection of fake signals into the sensors. For the protection of the UAVs from the Global Positioning System (GPS) signal spoofing attack, we propose a new methodology by incorporating a machine learning (ML) algorithm such as Support Vector Machine (SVM). A detailed analysis of several learning algorithms is also carried out to choose the suitable learning algorithm for the proposed work. Once the suitable ML algorithm is selected, we perform K-fold analyses to develop other learning models by choosing different values of K-folds thus we called them K-learning models. The purpose of developing K-learning models is to apply voting techniques to the developed K-learning models. Moreover, the signal features used in the proposed work are jitter, jitter (absolute), jitter (local), jitter (RAP), jitter (ppq5), shimmer, shimmer (local), shimmer (dB), shimmer (apq3), shimmer (apq5) and frequency modulation. Based on these features of the signal, we train our proposed model for the detection of counterfeit GPS signals. To gauge the performance of the proposed model, we perform different experimentation analyses such as accuracy, precision, recall, and F1-score. The results and analysis show the effectiveness of the proposed work over existing techniques.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.