{"id":"https://openalex.org/W4378901133","doi":"https://doi.org/10.1109/access.2023.3281731","title":"GPS Spoofing Attacks in FANETs: A Systematic Literature Review","display_name":"GPS Spoofing Attacks in FANETs: A Systematic Literature Review","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4378901133","doi":"https://doi.org/10.1109/access.2023.3281731"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3281731","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3281731","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10139317.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10139317.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023732141","display_name":"Ala Altaweel","orcid":"https://orcid.org/0000-0002-0451-7758"},"institutions":[{"id":"https://openalex.org/I29891158","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63","country_code":"AE","type":"education","lineage":["https://openalex.org/I29891158"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Ala Altaweel","raw_affiliation_strings":["Department of Computer Engineering, Information and Network Security Research Group, College of Computing and Informatics, University of Sharjah, Sharjah, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Information and Network Security Research Group, College of Computing and Informatics, University of Sharjah, Sharjah, United Arab Emirates","institution_ids":["https://openalex.org/I29891158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074581510","display_name":"M. Hena","orcid":null},"institutions":[{"id":"https://openalex.org/I29891158","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63","country_code":"AE","type":"education","lineage":["https://openalex.org/I29891158"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Hena Mukkath","raw_affiliation_strings":["Department of Computer Engineering, Information and Network Security Research Group, College of Computing and Informatics, University of Sharjah, Sharjah, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Information and Network Security Research Group, College of Computing and Informatics, University of Sharjah, Sharjah, United Arab Emirates","institution_ids":["https://openalex.org/I29891158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049545076","display_name":"Ibrahim Kamel","orcid":"https://orcid.org/0000-0001-5546-939X"},"institutions":[{"id":"https://openalex.org/I29891158","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63","country_code":"AE","type":"education","lineage":["https://openalex.org/I29891158"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Ibrahim Kamel","raw_affiliation_strings":["Department of Computer Engineering, Information and Network Security Research Group, College of Computing and Informatics, University of Sharjah, Sharjah, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Information and Network Security Research Group, College of Computing and Informatics, University of Sharjah, Sharjah, United Arab Emirates","institution_ids":["https://openalex.org/I29891158"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023732141"],"corresponding_institution_ids":["https://openalex.org/I29891158"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":42.9339,"has_fulltext":true,"cited_by_count":57,"citation_normalized_percentile":{"value":0.99816849,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"11","issue":null,"first_page":"55233","last_page":"55280"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.928600013256073,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.942650556564331},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7824872136116028},{"id":"https://openalex.org/keywords/global-positioning-system","display_name":"Global Positioning System","score":0.7444840669631958},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5778113007545471},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.46419963240623474},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4468826949596405},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12445920705795288},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.12266087532043457}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.942650556564331},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7824872136116028},{"id":"https://openalex.org/C60229501","wikidata":"https://www.wikidata.org/wiki/Q18822","display_name":"Global Positioning System","level":2,"score":0.7444840669631958},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5778113007545471},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.46419963240623474},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4468826949596405},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12445920705795288},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.12266087532043457}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2023.3281731","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3281731","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10139317.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a1b5fc9dc38d478e90b2189adb6605e3","is_oa":true,"landing_page_url":"https://doaj.org/article/a1b5fc9dc38d478e90b2189adb6605e3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 55233-55280 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3281731","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3281731","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10139317.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.6200000047683716}],"awards":[],"funders":[{"id":"https://openalex.org/F4320316805","display_name":"University of Sharjah","ror":"https://ror.org/00engpz63"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4378901133.pdf","grobid_xml":"https://content.openalex.org/works/W4378901133.grobid-xml"},"referenced_works_count":102,"referenced_works":["https://openalex.org/W1999167282","https://openalex.org/W2070449754","https://openalex.org/W2397741397","https://openalex.org/W2413631189","https://openalex.org/W2508212710","https://openalex.org/W2566763967","https://openalex.org/W2581103495","https://openalex.org/W2606556751","https://openalex.org/W2612030603","https://openalex.org/W2753312046","https://openalex.org/W2762121107","https://openalex.org/W2763307487","https://openalex.org/W2765906326","https://openalex.org/W2781929860","https://openalex.org/W2785735866","https://openalex.org/W2786782150","https://openalex.org/W2789343279","https://openalex.org/W2794772989","https://openalex.org/W2795155796","https://openalex.org/W2796114981","https://openalex.org/W2798224074","https://openalex.org/W2802603544","https://openalex.org/W2804543662","https://openalex.org/W2807105862","https://openalex.org/W2810140724","https://openalex.org/W2810910757","https://openalex.org/W2887706515","https://openalex.org/W2894629498","https://openalex.org/W2896610007","https://openalex.org/W2899516785","https://openalex.org/W2899771611","https://openalex.org/W2902875442","https://openalex.org/W2904976413","https://openalex.org/W2910780793","https://openalex.org/W2914408397","https://openalex.org/W2917161534","https://openalex.org/W2918472297","https://openalex.org/W2919486271","https://openalex.org/W2936762562","https://openalex.org/W2938880258","https://openalex.org/W2942437319","https://openalex.org/W2943121541","https://openalex.org/W2944772476","https://openalex.org/W2948765495","https://openalex.org/W2968773007","https://openalex.org/W2980110727","https://openalex.org/W2987256267","https://openalex.org/W2994954803","https://openalex.org/W2996356094","https://openalex.org/W2996388770","https://openalex.org/W2996771639","https://openalex.org/W3005863531","https://openalex.org/W3007519464","https://openalex.org/W3009926973","https://openalex.org/W3011717424","https://openalex.org/W3014606712","https://openalex.org/W3022020286","https://openalex.org/W3033237219","https://openalex.org/W3044415608","https://openalex.org/W3090147969","https://openalex.org/W3092407777","https://openalex.org/W3092423827","https://openalex.org/W3096032994","https://openalex.org/W3103937464","https://openalex.org/W3108599538","https://openalex.org/W3111844817","https://openalex.org/W3112040548","https://openalex.org/W3119629583","https://openalex.org/W3119918358","https://openalex.org/W3122924023","https://openalex.org/W3128793638","https://openalex.org/W3131200310","https://openalex.org/W3134269199","https://openalex.org/W3135653208","https://openalex.org/W3154305192","https://openalex.org/W3157894430","https://openalex.org/W3160560967","https://openalex.org/W3166186908","https://openalex.org/W3180272457","https://openalex.org/W3191559392","https://openalex.org/W3195539663","https://openalex.org/W3214343395","https://openalex.org/W4200349140","https://openalex.org/W4205429426","https://openalex.org/W4205608252","https://openalex.org/W4205637629","https://openalex.org/W4206504716","https://openalex.org/W4207085178","https://openalex.org/W4211168064","https://openalex.org/W4214897310","https://openalex.org/W4226427184","https://openalex.org/W4226431129","https://openalex.org/W4233147299","https://openalex.org/W4280641354","https://openalex.org/W4281289204","https://openalex.org/W4282970004","https://openalex.org/W4283211571","https://openalex.org/W4296105750","https://openalex.org/W4296211548","https://openalex.org/W6756040250","https://openalex.org/W6763778905","https://openalex.org/W6769293770"],"related_works":["https://openalex.org/W2998478967","https://openalex.org/W2188559950","https://openalex.org/W2989910292","https://openalex.org/W3128793638","https://openalex.org/W2607818178","https://openalex.org/W2123299109","https://openalex.org/W2021230337","https://openalex.org/W2945504560","https://openalex.org/W2060145807","https://openalex.org/W4248806346"],"abstract_inverted_index":{"Flying":[0],"Ad-Hoc":[1,11],"Networks":[2],"(FANETs)":[3],"are":[4,91,241],"groups":[5],"of":[6,21,76,211,226,237,293],"UAVs":[7,22,99],"connected":[8],"in":[9,80,115,133],"an":[10,71],"manner":[12],"to":[13,24,45,55,96,100,103,110,175,205,220],"accomplish":[14],"a":[15,125,258,265,281,296],"common":[16],"mission.":[17],"The":[18,158,214],"widespread":[19],"acceptance":[20],"due":[23,44],"their":[25,136,166,176],"low":[26],"cost":[27],"and":[28,53,86,135,144,149,173,207,229,271,291],"high":[29],"efficiency":[30],"has":[31],"attracted":[32],"malicious":[33],"security":[34],"attacks":[35,39,114,132],"against":[36],"them.":[37],"These":[38],"cannot":[40],"be":[41,104],"easily":[42],"prevented":[43],"UAVs\u2019":[46],"limited":[47],"computational":[48],"power,":[49],"short":[50],"battery":[51],"life,":[52],"inability":[54],"execute":[56],"complex":[57],"algorithms.":[58],"FANETs":[59,134],"rely":[60],"on":[61,129,165,180,198],"the":[62,77,84,98,187,209,222,227,238],"Global":[63],"Positioning":[64],"System":[65],"(GPS)":[66],"for":[67,280],"localization.":[68],"GPS":[69,89,112,130,212,278],"Spoofing,":[70],"easy-to-launch":[72],"attack,":[73,228],"is":[74],"one":[75],"main":[78],"challenges":[79],"FANETs.":[81,116],"In":[82],"which,":[83],"legitimate":[85],"not-encrypted":[87],"civilian":[88],"signals":[90,95,188],"overridden":[92],"by":[93,190],"counterfeit":[94],"deceive":[97],"collide":[101],"or":[102,201,247],"hijacked.":[105],"Researchers":[106],"proposed":[107,239],"various":[108,183,191],"countermeasures":[109],"address":[111],"Spoofing":[113,131,279],"To":[117],"further":[118],"assist":[119],"future":[120],"research,":[121],"this":[122],"paper":[123],"provides":[124],"systematic":[126],"literature":[127],"review":[128],"defense":[137,160,215],"mechanisms.":[138],"After":[139],"formulating":[140],"eight":[141,285],"research":[142,154],"questions":[143],"applying":[145],"well-defined":[146],"inclusion/exclusion":[147],"criteria":[148],"quality":[150],"assessment":[151],"tools,":[152],"70":[153],"articles":[155,286],"were":[156,162,217],"extracted.":[157],"existing":[159],"mechanisms":[161,216],"classified":[163],"based":[164],"objectives":[167],"(i.e.,":[168,178],"detection,":[169],"mitigation,":[170],"and/or":[171],"prevention)":[172],"according":[174],"basis":[177],"relying":[179,197],"readings":[181],"from":[182],"drones\u2019":[184],"devices/sensors,":[185],"processing":[186],"received":[189],"sensors,":[192],"employing":[193],"machine":[194],"learning":[195],"algorithms,":[196],"game":[199],"theory,":[200],"leveraging":[202],"cryptographic":[203],"techniques":[204],"authenticate":[206],"protect":[208],"confidentiality":[210],"signals).":[213],"also":[218],"analyzed":[219],"identify":[221],"attacker":[223],"models,":[224],"impacts":[225],"detection":[230,242],"performance.":[231],"This":[232],"study":[233],"found":[234],"that":[235],"most":[236,275],"methods":[240],"approaches,":[243],"rather":[244,256],"than":[245,257],"mitigation":[246],"prevention.":[248],"Also,":[249],"almost":[250],"all":[251],"papers":[252],"used":[253],"simulation":[254],"experiments":[255],"proof-of-concept":[259,297],"implementation,":[260],"which":[261],"does":[262],"not":[263],"demonstrate":[264],"convincing":[266],"performance":[267],"under":[268],"realistic":[269],"mobility":[270],"propagation":[272],"models.":[273],"Moreover,":[274],"solutions":[276],"addressed":[277,287],"single":[282],"UAV.":[283],"Only":[284],"multiple":[288],"UAV":[289],"scenarios":[290],"none":[292],"them":[294],"provided":[295],"evaluation.":[298]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":23},{"year":2024,"cited_by_count":26},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
