2025 ASEE Annual Conference & Exposition

GPS Spoofing on UAV Simulation using Ardupilot

Presented at Software Engineering Division (SWED) Technical Session 3

In this paper, we show a technique which can be employed in simulating GPS spoofing attacks through the use of Ardupilot, which is an open-source software allowing for the simulation of UAV (Unmanned Aerial Vehicles). As concerns about GPS spoofing are raised, the harm it poses to navigation reliant systems and applications become an increasingly pressing issue. In order to resolve this problem, it is a necessity to understand how a GPS spoof works in practice and learn how to combat it through testing. Our simulated framework will greatly assist in this endeavor. In our methodology, we utilize the Ardupilot simulation system and the MAVProxy system to artificially send GPS data to the UAV's navigation system, essentially simulating a GPS spoof. We created a Python script to perform this GPS injection and make the UAV fly in a circular motion. The aim of the proposed system is to be able to operate in a virtual environment, thus reducing required hardware, and minimizing the risks that come with testing actual UAV systems. Throughout the progress of the project, a GPS spoofing script was created, incorporated into the ArduPilot simulation system, and tested on how effectively it is able to affect the movement of the UAV. This simulation will help in creating a framework to help detect a GPS spoof attack as well as allow us to understand the effects of a GPS spoof on a UAV. In addition to this, we evaluate the extent to which a remote attacker is able to exert control over a UAV through GPS spoofing.

Authors
  1. David Li University of Maryland College Park
Download paper (1.89 MB)

Are you a researcher? Would you like to cite this paper? Visit the ASEE document repository at peer.asee.org for more tools and easy citations.