| GNSS spoofing / jamming | Sensor / Localization | Manipulate or deny navigation signal. | Wrong position, unsafe route, geofence violation. | GNSS/INS mismatch, map inconsistency, radar/AIS cross-check. | Multi-sensor localization, spoofing detector, geofencing, safety envelope. |
| AIS spoofing / fake identity | Sensors / C2 | Create fake vessel identity, position, speed, or intent. | False target reasoning, wrong give-way decision, route distortion. | Radar track without AIS match, impossible kinematics, identity anomaly. | Radar-camera cross-check, trust scoring, AIS authentication where available. |
| Radar interference | Sensors | Noise, reflections, intentional interference, clutter shaping. | Missed vessel, false obstacle, degraded CPA estimate. | Signal health drop, inter-sensor disagreement, sudden track instability. | Adaptive filtering, sensor diversity, fallback speed limits. |
| Camera adversarial examples | AI Perception | Visual pattern or lighting causes detection error. | Missed buoy, false obstacle, wrong class confidence. | Camera-only anomaly, disagreement with radar/AIS, uncertainty spike. | Multimodal fusion, adversarial testing, confidence gating. |
| Sensor desynchronization | Fusion | Clock drift, delayed frames, replayed packets. | Incorrect track association and motion prediction. | Timestamp gaps, impossible accelerations, packet sequence anomaly. | Secure timebase, replay protection, temporal consistency checks. |
| C2 link compromise | C2 / Fleet | Inject, modify, or suppress remote commands and telemetry. | Unauthorized mission change, lost operator override, fleet disruption. | Command provenance failure, link anomaly, operator mismatch. | Mutual authentication, encryption, authorization, command safing. |
| Mission-plan tampering | Planning | Alter waypoints, geofences, survey lines, or no-go regions. | Restricted-zone entry, incomplete survey, collision exposure. | Plan signature failure, route-policy violation, unexpected delta. | Signed plans, two-person review, policy validator, immutable logs. |
| Edge AI model poisoning | Model pipeline / Edge | Compromise training data, weights, calibration, or deployment artifact. | Systematic perception error or unsafe confidence profile. | Regression drift, scenario-test failure, hash mismatch. | Model provenance, signed artifacts, validation gates, rollback. |
| Firmware compromise | Edge / Actuator | Alter low-level software, drivers, sensor firmware, or controller firmware. | Hidden unsafe behavior below autonomy software layer. | Attestation failure, unexpected I/O, integrity-monitor alert. | Secure boot, measured boot, attestation, least-privilege services. |
| Unsafe OTA update | Update pipeline | Deliver malicious or untested update to vessel or fleet. | Fleet-wide regression or backdoor deployment. | Signature failure, staged rollout anomaly, safety-case mismatch. | Signed OTA, staged deployment, canary vessels, rollback, SBOM. |
| Telemetry leakage | C2 / Logs | Expose routes, mission details, sensor coverage, or operational patterns. | Operational intelligence leak and targeted attack planning. | Unusual egress, access anomaly, data classification mismatch. | Encryption, access control, retention policy, data minimization. |
| Fleet coordination poisoning | Fleet target fusion | Share poisoned tracks, false obstacles, or false confidence to multiple vessels. | Coordinated wrong route updates or fleet-scale traffic disruption. | Cross-vessel inconsistency, source trust anomaly, impossible target. | Byzantine-resilient fusion, source scoring, independent verification. |
| Data replay attack | Sensors / Logs / C2 | Replay stale sensor frames, telemetry, or commands. | Vessel reasons over old world state or repeats unsafe action. | Nonce failure, timestamp anomaly, scene mismatch. | Freshness checks, signed timestamps, monotonic counters. |
| False obstacle injection | Perception / Planning | Introduce false obstacle through sensor or fusion layer. | Denial of route, unsafe reroute, mission abort. | Single-modality track, sudden obstacle birth, map contradiction. | Sensor consensus, track maturity thresholds, operator review. |
| Route-planner manipulation | Planning and Control | Modify costs, constraints, or risk scoring. | Planner selects risky or inefficient path while appearing valid. | Policy violation, explainability mismatch, cost anomaly. | Constraint checks, independent safety monitor, verified planner envelope. |
| Safety monitor bypass | Safety monitor | Disable or trick emergency stop and fallback enforcement. | Loss of final protection before actuator command. | Heartbeat failure, monitor-state inconsistency, unsafe command pass-through. | Independent monitor, hard interlocks, command envelope, fail-safe design. |