This project is a Python-based GPS spoofing detection tool designed to analyze and detect anomalies in GPS data, which is a crucial step toward defending against malicious interference with Unmanned Aerial Systems (UAS). Initially built for dataset-based detection, this tool will evolve into a specialized weapon in the COUNTER-UAS (C-UAS) arsenal for real-time operational use.
GPS spoofing is a serious threat to drones and autonomous systems. This tool aims to detect, analyze, and respond to spoofing threats in real-time, ensuring safe UAS operations in critical zones.
- β Dataset-based GPS spoofing detection
- π Anomaly detection using statistical and signal-based features
- π Real-time data parsing (upgradable)
- π§ Machine learning-ready architecture for future upgrades
- π‘οΈ Modular structure for easy integration into larger C-UAS frameworks
This tool serves as a special weapon module for C-UAS missions where detection of malicious GPS interference is vital. Example applications:
βοΈ Drone fleet protection in defense zones- π Industrial area perimeter security
- π Border surveillance and no-fly zone enforcement
- π‘οΈ VIP event protection and anti-surveillance
-
Detects inconsistencies in:
- Velocity and acceleration jumps
- Sudden location shifts
- Signal time/frequency anomalies (if present)
-
Logs suspicious patterns
-
Generates human-readable reports
| Phase | Feature | Description |
|---|---|---|
| β 1 | Dataset-based detection | Core module using pre-recorded GPS data |
| π 2 | Real-time GPS feed integration | Integrate with GNSS receivers (USB, NMEA, serial, etc.) |
| π 3 | Machine learning engine | Use unsupervised models (e.g., Isolation Forest, Autoencoders) for anomaly detection |
| π 4 | Signal integrity analysis | Use SDR (e.g., HackRF One) to analyze signal characteristics |
| π 5 | Counter-response module | Alert and initiate countermeasures (e.g., drone landing, GPS fallback) |
| π 6 | Integration with C-UAS radar + RF | Fuse GPS spoof detection with RF jamming and radar input |
| π 7 | Hardware deployment | Deploy on Raspberry Pi or embedded UAS module for field use |
- Python 3.8+
- Pandas / NumPy
- Scikit-learn (for upgrade)
- Matplotlib / Seaborn (optional visualization)
- PySerial / pynmea2 (for live GPS feed upgrade)
- SDR tools (planned)
Use your own dataset or download open-source spoofing datasets like:
- Texas Spoofing Test Datasets (UT Austin)
- Custom drone flight path logs
- β Live GPS stream from drones
- β Mobile app/command center GUI
- π Integration with blockchain-based telemetry logging
- βοΈ Cloud-based alert system (Twilio/Telegram/Discord)
- π― Integration into weaponized UAS defense stations
You can simulate spoofing by introducing:
- Sudden jumps in GPS coordinates
- High-speed movements beyond physical limits
- Inconsistent timestamps
The script will flag such anomalies and provide a classification report.
This project is licensed under the MIT License.
Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.