=Paper=
{{Paper
|id=Vol-3094/invited_paper
|storemode=property
|title=Analysis of the Impact of a GPS Spoofing Attack on a UAV
|pdfUrl=https://ceur-ws.org/Vol-3094/invited_paper.pdf
|volume=Vol-3094
|authors=Elena Basan,Oleg Makarevich,Maria Lapina,Massimo Mecella
}}
==Analysis of the Impact of a GPS Spoofing Attack on a UAV ==
Analysis of the Impact of a GPS Spoofing Attack on a UAV Elena Basan 1, Oleg Makarevich 1, Maria Lapina 2 and Massimo Mecella 3 1 Southern Federal University, Chekhov St. 2, Taganrog, 347922, Russia 2 North-Caucasus Federal University, Prospect Kulakova 2, 355000, Stavropol, Russia 3 SAPIENZA Università di Roma, via Ariosto 25, I-00185 Roma, Italy Abstract The paper discusses scenarios of GPS spoofing attacks on UAVs. Three scenarios are proposed: when the attack is not carried out, when a low-intensity attack is carried out, and when an intense attack is carried out. After that, logs from the UAV are collected and the result of the attack is analyzed in relation to its impact on the cyber-physical parameters of the UAV. This analysis is carried out with the aim of further developing an intrusion detection and response system. It is necessary to understand which parameters change to what extent and under the influence of which attack scenario. Keywords 1 GPS, Spoofing Attack, UAV, Kalman filters, attack scenario 1. Introduction Today, an attack on the global navigation system GPS, if properly executed, can lead to serious consequences for a UAV or a group of UAVs [1]. The flight controller, in addition to the natural error present in the sensor readings, is also affected by natural GPS vulnerabilities such as signal blocking or jamming that compromise the availability of the GPS signal. In the GPS Spoofing Attack, satellites transmitting a GPS signal are forged to manipulate the UAV's navigation system by transmitting fake coordinates created by an attacker with a higher power than the original signal [2], [3]. However, civil GPS does not have the protection mechanisms used to transmit the signal. Consequently, civilian GPS is highly vulnerable to spoofing attacks [4,5]. A targeted attack that takes control of the UAV or simply destroys it can easily harm everyone in the UAV's flight area or damage other vehicles [6-8]. Therefore, GPS spoofing has become an important research topic, since an attacker can hijack a UAV, use it to eavesdrop or attack people or objects without the need to stay close to the target. Thus, the topic related to the analysis of the impact of the GPS spoofing attack on the UAV navigation system is very relevant. Before developing a protection system against such attacks, it is necessary to understand how the attack affects the UAV and its subsystems to further analyze this influence and detect the attack. The main purpose of this paper is to analyze the possibility of detecting an attack on the UAV navigation system by analyzing changes in the readings of the flight controller sensors. It is necessary to determine which cyber-physical parameters change the readings because of a GPS spoofing attack. Once the sets of parameters that are susceptible to attack are determined, you can develop a system for detecting and preventing attacks and intrusions. AISMA-2021: International Workshop on Advanced in Information Security Management and Applications, October 1, 2021, Stavropol, Krasnoyarsk, Russia EMAIL: ebasan@sfedu.ru (Elena Basan), obmakarevich@sfedu.ru (Oleg Makarevich), mlapina@ncfu.ru (Maria Lapina), mecella@diag.uniroma1.it (Massimo Mecella) ORCID: 0000-0001-6127-4484 (Elena Basan), 0000-0003-0066-8564 (Oleg Makarevich), 0000-0001-8117-9142 (Maria Lapina), 0000-0002-9730-8882 (Massimo Mecella) © 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) 6 2. Analysis of methods of protection against spoofing attacks on UAVS GPS system Today there are many methods for detecting an attack on a UAV navigation system. Let us analyze the parameters for detecting attacks on which various methods are based. Today there are many methods for detecting an attack on a UAV navigation system. Let us analyze the parameters for detecting attacks on which various methods are based. In [9], a method for detecting a GPS spoofing attack based on the use of neural networks is presented. Let us determine the parameters that the authors take to generate data for training a neural network. Satellite Number: Used to identify the various satellites orbiting the Earth. This number can be read from the content of the decoded received GPS signals. Signal-to-Noise Ratio: SNR is an indicator of the strength of the GPS signal after being mixed with noise and interference. It can be measured and calculated from the received signals using special algorithms [10]. Pseudo range: Each GPS satellite has a unique Gold code; its autocorrelation function is in the shape of an equilateral triangle, which peaks with perfect correlation. This characteristic can be used to determine the transmission time signal from the satellite to the receiver by cross correlating the Gold code with its copy generated by the receiver. Doppler shift: The GPS carrier signal is multiplied by the reference signal at the receiver. Carrier Phase Offset: Referring to [11], the carrier phase offset observed at a time can be captured. In paper [12], the impact of GPS spoofing on UAVs is analyzed using a series of tests in a simulation environment. The results are presented as a deviation from the original UAV trajectory during flight. The authors emulated GPS spoofing attacks by changing the readings of the parameters of the GPS receiver. For each flight, after 45 seconds from the start of the mission, the GPS readings were distorted. The duration of each attack ranged from 1 second to 20 seconds in 1 second increments. The attack type is determined based on how the attack affected the GPS parameters and is defined as follows. Random Longitude: Changes longitude readings randomly from a valid range of values (-180 to 180); Random Latitude: Changes the latitude reading at random from the valid range of values (-90 to 90); Random Position: Changes the position reading randomly along three axes (latitude, longitude, and altitude); Delayed message: does not change the message information but delivers it with a certain delay; Force Landing: Changes elevation values higher than the actual value while attempting to force an unplanned landing. Secondary drone capture distorts the position readings randomly from the trajectory of another drone along three axes (latitude, longitude, and altitude); Capture from the Attacker's Position: Changes the position readings at random from a static position, set by the attacker, along three axes (latitude, longitude, and altitude). Thus, in the context of changing the parameters that are affected by the attack, this study analyzes only the position of the UAV and the delay of transmitted messages. The paper [13] presents the following detection method. The GPS spoofing detection system has been developed using dynamic identification. A centroid motion model and an orientation motion model were created. Measurement information from inertial measurement units (IMU) and position information from GPS are visualized responses to the dynamic laws of motion of a UAV. These two types of measurement information were used to estimate the dynamic parameters of the UAV online using two extended Kalman filters (EKF). The detection of GPS false signals has been efficiently implemented by monitoring the relative errors estimations. Numerical modeling has shown that dynamics parameters can be estimated online using combined filters. In this work, the following parameters were investigated: Position error, Speed error, Attitude error, Attitude angle error, Accelerometer, Gyroscope, GPS positioning. The method proposed in [14] is based on the use of a support vector machine for data analysis of a hybrid navigation system. The inertial system (IS) gives an error in free fall, which increases over time. 7 The deviation from the error becomes worse when the UAV is equipped with a microelectromechanical (MEMS) inertial navigation system. GPS is the fundamental mechanism for calibrating the inertial system for correct navigation. Evaluating errors over time can help detect spoofing attacks. Indeed, from the experimental data, the authors found that in normal conditions, the error between the GPS and inertial navigation system has a certain distribution, and that at the time of the error of attack grows abnormally. The anomaly disappears over time, because the action of the GPS in the inertial unit hides the effect of the attack. In this case, the error is determined for the following parameters: position determined by GPS, speed determined by GPS rotation speed, acceleration position determined by IS, speed determined by IS. In paper [15], the authors develop and implement a new intrusion detection and response scheme that operates on UAVs and ground stations to detect anomalies that threaten network performance. This paper proposes a set of methods for detecting and responding to anomaly based on tracking UAV behavior and categorizing them (normal, abnormal, suspicious, and malicious) according to the cyberattack that was detected. The authors focused on the most dangerous cyberattacks that can target a UAV network: spreading false information, spoofing GPS, jamming, and attacks using black and gray holes. Numerous experiments confirm that the proposed scheme is effective for detecting attacks even with many UAVs and intruders. It demonstrates high detection rate, low false alarm rate and fast detection with low communication overhead. A set of rules is proposed for modeling the normal behavior of nodes based on the characteristics of GPS spoofing attacks [16, 17]: 1) a GPS spoofing attack generates a signal strength intensity (SSI) to gain control of the drone, and this SSI is higher than satellites, as shown by Shepard et al. [18] and Kim et al [19]. 2) an attacker transmits multiple signals from one antenna; therefore, they have almost the same power level [20]. The detection process is carried out as follows: The detection system collects SSI information from transmitters (satellites and intruders) and then estimates the distribution of the SSI random variable using a normal distribution. Moreover, SSIs will be correctly distributed (ie have almost the same value) if they are within the mean [21]. However, SSIs that are in this range are identified as being generated by the same transmitter. Therefore, the transmitter is suspected in the implementation of GPS spoofing attacks. In addition, a reasonable maximum SSI can be set to limit the spurious signal power, since according to Wen et al. [22] An attacker can increase the signal strength by at least 3 dB. Thus, we can conclude that the reviewed works focus on the parameters related to UAV positioning and GPS signal characteristics. Moreover, most of the results were obtained by the authors using modeling methods, and not on real attacks on UAVs. Of course, conducting a real attack on a UAV can be dangerous, as it will lead to unforeseen consequences. Nevertheless, to expand the range of indicators for detecting an attack, it is proposed to investigate the results of an experiment that included a full- scale model of a UAV for carrying out an attack. The purpose of this article is to analyze the results of an attack on a UAV and to identify sets of features that change under the influence of a GPS spoofing attack [7]. 3. Experimental stand and attack scenario To carry out the attack, a UAV was developed, the design of which uses the Pixhawk 4 flight controller. This flight controller is the most popular and modern solution on the market for flight controllers for drone-type UAVs [23]. The attack scenario is that the UAV should hover over one fixed point and keep over it all the time. Attacker use HackRF. This device allows you to create a fake signal and create false satellites with higher power so that the UAV picks up the signal from them, and not from the true satellites [24]. In this case, the attacker transmits fake coordinates in order to smoothly move the UAV to another point and fix it there. The aim of the attacker is to intercept control of the UAV using a GPS spoofing attack [25]. Thus, the UAV, after determining its current location, receives the static coordinates of the target. A drone-type UAV moves to a given target and fixes its position in space while maintaining altitude. In case of external physical impact, for example, the impact of natural factors or the physical impact of another object, the UAV autopilot system increases engine speed and sets the opposite direction to maintain a given position. When the UAV is displaced from the set 8 position, the position hold system increases the engine speed depending on the distance between the set point and the actual location of the UAV. Upon returning to the set point, the operation of the engines goes into the normal mode of maintaining the altitude. You can set the direction vector and speed of the attacked device by broadcasting a fake geo position. Using the fact that the UAV is trying to counteract the displacement, starting to move towards the initial position, it is possible to set the direction of movement necessary for the attacker. By changing the distance from the fake geolocation to the specified one, you can increase or decrease the speed of movement, for a more accurate direction and control of the attacked UAV. 4. Analysis of the UAV logbook after the attack Figure 1 shows the readings of the drone's flight altitude during the attack and normal flight, respectively. Comparing the two upper graphs, we can say that during an attack, the altitude readings obtained from the GPS system change slightly, no global changes are observed, during normal flight the altitude remains practically unchanged. (a) (b) (c) Figure 1: UAV altitude graph (a) during normal flight (b) with a short-term attack (c) with a long-term attack term attack (c) with a long-term attack 9 Let us analyze the changes in the UAV flight altitude indicator. Figure 1 shows that during a short- term attack, as shown in Figure 1 (b), the flight altitude changed slightly within the range from 15 to 20 meters, only at the end we see a small sharp takeoff of the UAV to an altitude of more than 20 meters. At the same time, it can be seen from Figure 1 (c) that there is a significant change in the flight altitude readings obtained from the GPS sensor (red line in the graphs), while the accelerometer readings (blue line in the graphs) remain stable. This suggests that, in fact, the quadcopter could not change the flight altitude, the attacker simply could not guess the exact flight altitude and therefore the graph has peak values. Thus, the altitude indicator may be susceptible to attack, or it may not, it depends on the preparedness of the attacker. Moreover, this indicator changes only in relation to the measurements made by the GPS sensor, the readings of the accelerometer are stable. As can be seen from graph 1 (a), during normal flight, when there is no attack, if the flight altitude changes, then both sensors and the accelerometer and the GPS receiver will show the same values. Let us analyze the indicator - the number of GPS satellites detected by the UAV. The GPS readings during normal flight make it clear that the GPS system is working stably, there is no sharp loss of GPS fixation and the satellites used, there is also no abrupt change in the UAV positioning, which is typical during an attack, as can be seen from Figure 2. (a) (b) (c) Figure 2: The number of GPS satellites used (a) during normal flight (b) during a short-term attack on the UAV's GPS system (c) during a prolonged attack 10 (a) (b) (c) Figure 3: Actual and calculated UAV flight paths (a) during normal flight (b) during a short attack (b) during a prolonged attack Figure 3 (a) shows a complete coincidence of the flight path obtained from the accelerometer and from the GPS receiver. In a short-term attack on the GPS, the goal was to move the UAV from the starting point to fix it at the point indicated by the attacker. Figure 3 (b) shows that the UAV was displaced, as evidenced by the shift of the red line to the lower left corner (initially, the UAV was in the upper right corner). But the trajectories of the red and blue lines do not coincide. On closer inspection, we can see that the red line repeats the blue pattern only with a smaller radius. Nevertheless, it is clearly seen that the UAV positioning system is in an unstable state and shows different coordinates 11 by GPS and from the inertial system. In Figure 3 (c), the UAV should be fixed in the lower left corner. The attacker tried to move it first to the upper left corner and then to the lower right corner. At the same time, the picture seems confusing at first glance. In fact, the attacker is trying to smoothly move the UAV by picking up the coordinates and gradually moving the UAV. At the same time, by the end of the attack, the UAV was displaced, which is confirmed by the coincidence of the red and blue lines in the lower right corner of the figure. Thus, an attack can be detected by a mismatch in the coordinates recorded by the GPS sensor and the accelerometer, and other sensors. (a) (b) (c) Figure 4: Graph of GPS noise readings (a) during normal flight (b) with a short-term attack (c) with a long-term attack The norm for GPS noise is 80, in this case, as can be seen in Figure 4 (a), during normal flight the noise is slightly higher than the norm, this is not a critical reading, it may be due to the terrain on which the flight was carried out, as well as weather conditions. For example, during the period of this experiment, strong gusts of wind were observed. One of the indicators that will allow detecting an attack with high accuracy is the GPS noise level. This is because despite the possibility of falsifying the exact number of satellites, calculating the flight altitude, smoothly displacing the UAV from a given trajectory, thereby, having a minimal effect on the previous parameters, an attacker will not be able to fake the GPS noise level parameter. This is because the main feature of the attack is the generation of a stronger GPS signal so that the true GPS signal from the satellites is blocked by the attacker's signal. Figure 4 shows the results of changes in GPS noise. However, it should be noted that the graph of the noise level during normal flight at the same level throughout the flight is the same, there are minor 12 changes. For a situation where an attack is carried out, everything is obvious. From graph 4 b, c it becomes clear that up to a certain period a normal flight took place, after the attack, the graph clearly shows the consequences - a sharp and large deviation from the norm of the GPS noise level. Also, the green line makes it clear that there is a sharp jamming of the GPS signal. Figures 4 (b), (c) show that there is a sharp increase in the noise level to 200, then this value does not stay at the same level but changes the readings all the time. Consider two parameters by changing which one can indirectly judge the presence of an attack. Before that it was considered parameters directly connected with the coordinates of the UAV or drone navigation system, but the attack may affect other parameters of the UAV. Let us analyze how the CPU utilization parameter changed. Figure 5 shows the results of changing the CPU, both during normal flight and during an attack. (а) (b) (c) Figure 5: Graph of readings of changes in the CPU load level (a) during normal flight (b) during a short- term attack (c) during a long-term attack As can be seen from the graphs, when there is an attack, CPU load peaks is starting to be more. The more intense the attack, the more the CPU utilization changes, as can be seen from Figure 5 (c) the peaks of the utilization level during an intense attack are much larger. This is because the UAV is constantly trying to move to the point indicated by the attacker, while resistance arises from inertial systems that try to keep the UAV at the point indicated by the operator. The UAV performs many additional movements. 13 Next, consider the power consumption level changes in different flight conditions, in Figure 6. (а) (b) (c) Figure 6: Graph of readings of changes in the level of consumed power (a) during normal flight (b) with a short-term attack (c) with a long-term attack Figure 6 shows that the power consumption parameter underwent the greatest changes during an intense attack. As with the CPU changes, this involves multiple movements of the UAV. For example, an attacker may aim to disable a UAV by exhausting its resources; the more UAVs moves, the faster its battery will be discharged. Given the limited resources of the UAV, this can become a significant problem. 5. Conclusion Typical signs of an attack on the GPS system are most often recognized by a sharp decrease in the number of satellites used by the system and the difference in readings between the actual flight path and the trajectory built by the GPS system, so an attack can be identified by a sharp increase in GPS noise and signal jamming, and by changing the altitude readings of the UAV [26]. Despite the large number of methods for countering attacks aimed at spoofing navigation signals, this topic is still relevant. Today, there are cases of successful implementation of attacks on the navigation system of 14 UAVs [27]. Based on the results of an experimental study and analysis of the on-board log of the UAV that was attacked and that was received during normal flight, the following was determined. When conducting an attack, such parameters as: flight altitude, GPS noise level, the number of GPS satellites recorded, the level of power consumption by the battery and the level of CPU utilization. From Figure 3, where the UAV's flight path is shown, it abruptly changed its flight path and moved unevenly. Initially, the UAV was supposed to stay at one point, and in Figure 3, where the flight path is presented, there is a point and around it there are small changes in the blue line, but then the trajectory changes sharply. All other changes in the parameters of the UAV are related to this, which just indicated the presence of an attack. In general, we can say that such changes in the flight trajectory could indicate a change in the behavior or scenario of the UAV's behavior. But because a high level of noise and jumps in the number of satellites were recorded, we can say that this is an attack. Correlation of the analyzed parameters can unambiguously reveal the attack and determine its type. Each attack affects a certain number of subsystems, you can set which parameters which attack affects to determine its type [28]. The collected data in the form of time series can be used in the future to train a neural network, which can be trained on these sets and will help decide about the presence of an attack. In addition, it should be noted that the addition of new parameters for analyzing the presence of an attack may allow detecting new threats to the security of the UAV. For example, when the power consumption of the battery increases, there is a threat of exhausting the resources of the UAV. When the CPU load increases, the UAV mission is threatened, because computing power is spent not on calculations according to the algorithm, but on a constant change in the flight route. 6. Acknowledgements Research related to UAV attack experiments and analysis of experimental data, as well as an attack scenario supported by the Russian Science Foundation grant number 21-79-00194, https://rscf.ru/project/21-79-00194/ in Southern Federal University. UAV design and normal behavior is supported in the context of the collaboration between Sapienza, NCFU and SFU. 7. References [1] C. Li and X. Wang, "Jamming research of the UAV GPS/INS integrated navigation system based on trajectory cheating," 2016 9th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), Datong, 2016, pp. 1113-1117, doi: 10.1109/CISP-BMEI.2016.7852880. [2] D. Shepard, T. Humphreys and A. Fansler, "Evaluation of the vulnerability of phasor measurement units to gps spoofing attacks", In: International Journal of Critical Infrastructure Protection, 2012. [3] J. Warner and R. Johnston, "A simple demonstration that the global positioning system (gps) is vulnerable to spoofing", In: Journal of Security Administration, 2003. [4] E. T. Lester, "Military position source challenges for worldwide ads-b out compliance", In: Integrated Communications Navigation and Surveillance Conference, 2013. [5] J. S. Warner and R. G. Johnston, "GPS spoofing countermeasures", Homeland Security J., vol. 25, no. 2, pp. 19-27, Dec. 2003. [6] Clifton A. Ericson, Software safety in a nutshell. http://www.dcs.gla.ac.uk/~johnson/teaching/safety/reports/Clif_Ericson1.htm [7] S.-H. Seo, B.-H. Lee, S.-H. Im and G.-I. Jee, "Effect of spoofing on unmanned aerial vehicle using counterfeited gps signal", Journal of Positioning Navigation and Timing, pp. 57-65, 06 2015. [8] "Global positioning system directorate", In: Systems engineering and integration Interface Specification IS-GPS-200G Technical Report, 2012. [9] M. R. Manesh, J. Kenney, W. C. Hu, V. K. Devabhaktuni and N. Kaabouch, "Detection of GPS Spoofing Attacks on Unmanned Aerial Systems," 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 2019, pp. 1-6, doi: 10.1109/CCNC.2019.8651804. 15 [10] M. Riahi Manesh, A. Quadri and N. Kaabouch, "An Optimized SNR Estimation Technique Using Particle Swarm Optimization Algorithm", IEEE Computing and Communication Workshop and Conference, pp. 1-7, 2017 [11] M. R. Manesh, Y. Arjoune and N. Kaabouch, "A bit error rate estimation method for wireless communication systems," 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2018, pp. 835-840, doi: 10.1109/CCWC.2018.8301620. [12] D. Mendes, N. Ivaki and H. Madeira, "Effects of GPS Spoofing on Unmanned Aerial Vehicles," 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), Taipei, Taiwan, 2018, pp. 155-160, doi: 10.1109/PRDC.2018.00026. [13] S. Leyuan, H. Wende, Z. Yifan, W. Yueke and Y. Jun, "GPS Spoofing Detection of Unmanned Aerial Vehicles by Dynamics Identification," 2018 IEEE CSAA Guidance, Navigation and Control Conference (CGNCC), Xiamen, China, 2018, pp. 1-6, doi: 10.1109/GNCC42960.2018.9019147. [14] G. Panice et al., "A SVM-based detection approach for GPS spoofing attacks to UAV," 2017 23rd International Conference on Automation and Computing (ICAC), Huddersfield, 2017, pp. 1-11, doi: 10.23919/IConAC.2017.8081999. [15] H. Sedjelmaci, S. M. Senouci and N. Ansari, "A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks," in IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 48, no. 9, pp. 1594-1606, Sept. 2018, doi: 10.1109/TSMC.2017.2681698. [16] E. Basan, M. A. Lapina, M. Mecella, "Protected Group Control System for Mobile Robots",CEUR workshop proceedings: Proceedings of the International Workshop on Data Mining and Knowledge Engineering, Stavropol, Sun SITE, 2020, pp. 4-12. [17] H. Wen, P. Y.-R. Huang, J. Dyer, A. Archinal and J. Fagan, "Countermeasures for GPS signal spoofing", Proc. 18th Int. Tech. Meeting Satellite Div. Inst. Navig., pp. 1285-1290, 2005. [18] D. P. Shepard, J. A. Bhatti, T. E. Humphreys and A. A. Fansler, "Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks", Proc. ION GNSS Meeting, pp. 1-15, 2012. [19] A. Kim, B. Wampler, J. Goppert and I. Hwang, "Cyber attack vulnerabilities analysis for unmanned aerial vehicles", Proc. Infotech@Aerospace Conf., pp. 1-30, 2012. [20] I. Hwang, S. Kim, Y. Kim and C. E. Seah, "A Survey of Fault Detection, Isolation, and Reconfiguration Methods," in IEEE Transactions on Control Systems Technology, vol. 18, no. 3, pp. 636-653, May 2010, doi: 10.1109/TCST.2009.2026285. [21] N. Wisitpongphan, F. Bai, P. Mudalige, V. Sadekar and O. Tonguz, "Routing in sparse vehicular ad hoc wireless networks", IEEE J. Sel. Areas Commun., vol. 25, no. 8, pp. 1538-1556, Oct. 2007. [22] H. Wen, P. Y.-R. Huang, J. Dyer, A. Archinal and J. Fagan, "Countermeasures for GPS signal spoofing", Proc. 18th Int. Tech. Meeting Satellite Div. Inst. Navig., pp. 1285-1290, 2005. [23] J. Leško, M. Schreiner, D. Megyesi and L. Kovács, "Pixhawk PX-4 Autopilot in Control of a Small Unmanned Airplane," 2019 Modern Safety Technologies in Transportation (MOSATT), Kosice, Slovakia, 2019, pp. 90-93, doi: 10.1109/MOSATT48908.2019.8944101. [24] R. P. Hudhajanto et al., "Low Cost Nano Satellite Communication System Using GNURadio, HackRF, and Raspberry Pi," 2018 International Conference on Applied Engineering (ICAE), Batam, 2018, pp. 1-4, doi: 10.1109/INCAE.2018.8579395 [25] M. Ö. Demir, G. K. Kurt and A. E. Pusane, "On the Limitations of GPS Time-Spoofing Attacks," 2020 43rd International Conference on Telecommunications and Signal Processing (TSP), Milan, Italy, 2020, pp. 313-316, doi: 10.1109/TSP49548.2020.9163444. [26] N. Proshkin, E. Basan and M. Lapina, "Radio Frequency Method for Emulating Multiple UAVs", 2021 17th International Conference on Intelligent Environments (IE), 2021, pp. 1-4, doi: 10.1109/IE51775.2021.9486599. [27] E. Basan, M. Lapina, N. Mudruk, E. Abramov, "Intelligent Intrusion Detection System for a Group of UAVs". In: Tan Y., Shi Y. (eds) Advances in Swarm Intelligence. ICSI 2021. Lecture Notes in Computer Science, vol 12690. Springer, Cham. https://doi.org/10.1007/978-3-030-78811-7_22. [28] E. Basan, O. Peskova, M. Lapina, "Analysis of communication channels for the organization of control and interaction of UAVs from the security viewpoint", CEUR Workshop Proceedings. – 2021, vol. 3047, pp. 17 - 23. 16