Results 101 to 110 of about 3,720 (193)
Analysis of GNSS replay-attack detectors exploiting unpredictable symbols [PDF]
Since its inception, GNSS (Global Navigation Satellite System) have become more popular year after year. GNSS is currently used in a wide variety of applications beyond the determination of the user position by means of a GNSS receiver.
Morales Ferré, Rubén +2 more
core +1 more source
Network connectivity plays an important role in the information exchange between different agents in the multi-level networks. In this paper, we establish a game-theoretic framework to capture the uncoordinated nature of the decision-making at different ...
Chen, Juntao, Zhu, Quanyan
core +1 more source
In this work we introduce the concept of quantum geo-encryption - a protocol that invokes direct quantum encryption of messages coupled to quantum location monitoring of the intended receiver.
Malaney, Robert
core +1 more source
GNSS Signal spoofing detection
This thesis elaborates on the implementation of spoofing detection techniques for GPS L1 C/A signals, topic which is up to the minute in the GNSS community. The interest of this topic has its origin on the fact that, currently, there is a large number of applications relying on GNSS communications.
openaire +1 more source
Symmetrical clock synchronization with time-correlated photon pairs
We demonstrate a point-to-point clock synchronization protocol based on bidirectionally exchanging photons produced in spontaneous parametric down conversion (SPDC).
Cerè, Alessandro +5 more
core +1 more source
GNSS Spoofing and Jammin in London
This research provides a thorough examination of GNSS interference, with a focus on multipath effects and interference events. Field trials in London, a global analysis of interference incidents, and a specific exploration of the Chinese context were conducted to gather a diverse dataset.
openaire +1 more source
Global Navigation Satellite Systems (GNSS) are widely used for positioning, navigation, and timing (PNT) applications, making them a critical infrastructure component.
Alexandru-Gabriel Romaniuc +2 more
doaj +1 more source
GNSS Spoofing Detection Using Static or Rotating Single-Antenna of a Static or Moving Victim
GNSS spoofing works as follows: the GNSS signal generator transmits a signal simulation of several satellites at the GNSS frequency. If the level of the simulated signal exceeds the signal strength of real satellites, the GNSS receiver will “ ...
Larisa A. Dobryakova +2 more
doaj +1 more source
Machine Learning and Location Verification in Vehicular Networks
Location information will play a very important role in emerging wireless networks such as Intelligent Transportation Systems, 5G, and the Internet of Things. However, wrong location information can result in poor network outcomes.
Ihsan, Ullah +2 more
core +1 more source
Improve the Security of GNSS Receivers Through Spoofing Mitigation
Spoofing attacks are one of the most dangerous threats for the application of the global navigation satellite system (GNSS), especially for autonomous driving and unmanned aerial vehicles.
Shuai Han +3 more
doaj +1 more source

