Results 101 to 110 of about 3,720 (193)

Analysis of GNSS replay-attack detectors exploiting unpredictable symbols [PDF]

open access: yes, 2018
Since its inception, GNSS (Global Navigation Satellite System) have become more popular year after year. GNSS is currently used in a wide variety of applications beyond the determination of the user position by means of a GNSS receiver.
Morales Ferré, Rubén   +2 more
core   +1 more source

Resilient and Decentralized Control of Multi-level Cooperative Mobile Networks to Maintain Connectivity under Adversarial Environment

open access: yes, 2016
Network connectivity plays an important role in the information exchange between different agents in the multi-level networks. In this paper, we establish a game-theoretic framework to capture the uncoordinated nature of the decision-making at different ...
Chen, Juntao, Zhu, Quanyan
core   +1 more source

Quantum Geo-Encryption

open access: yes, 2016
In this work we introduce the concept of quantum geo-encryption - a protocol that invokes direct quantum encryption of messages coupled to quantum location monitoring of the intended receiver.
Malaney, Robert
core   +1 more source

GNSS Signal spoofing detection

open access: yes, 2022
This thesis elaborates on the implementation of spoofing detection techniques for GPS L1 C/A signals, topic which is up to the minute in the GNSS community. The interest of this topic has its origin on the fact that, currently, there is a large number of applications relying on GNSS communications.
openaire   +1 more source

Symmetrical clock synchronization with time-correlated photon pairs

open access: yes, 2018
We demonstrate a point-to-point clock synchronization protocol based on bidirectionally exchanging photons produced in spontaneous parametric down conversion (SPDC).
Cerè, Alessandro   +5 more
core   +1 more source

GNSS Spoofing and Jammin in London

open access: yesFrontiers in Humanities and Social Sciences
This research provides a thorough examination of GNSS interference, with a focus on multipath effects and interference events. Field trials in London, a global analysis of interference incidents, and a specific exploration of the Chinese context were conducted to gather a diverse dataset.
openaire   +1 more source

Global Navigation Satellite System Spoofing Attack Detection Using Receiver Independent Exchange Format Data and Long Short-Term Memory Algorithm

open access: yesInformation
Global Navigation Satellite Systems (GNSS) are widely used for positioning, navigation, and timing (PNT) applications, making them a critical infrastructure component.
Alexandru-Gabriel Romaniuc   +2 more
doaj   +1 more source

GNSS Spoofing Detection Using Static or Rotating Single-Antenna of a Static or Moving Victim

open access: yesIEEE Access, 2018
GNSS spoofing works as follows: the GNSS signal generator transmits a signal simulation of several satellites at the GNSS frequency. If the level of the simulated signal exceeds the signal strength of real satellites, the GNSS receiver will “ ...
Larisa A. Dobryakova   +2 more
doaj   +1 more source

Machine Learning and Location Verification in Vehicular Networks

open access: yes, 2019
Location information will play a very important role in emerging wireless networks such as Intelligent Transportation Systems, 5G, and the Internet of Things. However, wrong location information can result in poor network outcomes.
Ihsan, Ullah   +2 more
core   +1 more source

Improve the Security of GNSS Receivers Through Spoofing Mitigation

open access: yesIEEE Access, 2017
Spoofing attacks are one of the most dangerous threats for the application of the global navigation satellite system (GNSS), especially for autonomous driving and unmanned aerial vehicles.
Shuai Han   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy