Results 31 to 40 of about 3,720 (193)

A Testbed for Developing and Evaluating GNSS Signal Authentication Techniques [PDF]

open access: yes, 2014
An experimental testbed has been created for developing and evaluating Global Navigation Satellite System (GNSS) signal authentication techniques.
Bhatti, Jahshan A.   +3 more
core   +1 more source

Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer [PDF]

open access: yes, 2008
A portable civilian GPS spoofer is implemented on a digital signal processor and used to characterize spoofing effects and develop defenses against civilian spoofing.
Humphreys, Todd E.   +4 more
core   +1 more source

GNSS induced spoofing simulation based on path planning

open access: yesIET Radar, Sonar & Navigation, 2022
Global navigation satellite Systems (GNSS) are highly susceptible to various interferences because of their inherent vulnerability. In these interferences, induced spoofing is very difficult to be detected because it can gradually drag off the tracking ...
Wenyi Wang, Jinming Wang
doaj   +1 more source

GNSS Signal Authentication via Power and Distortion Monitoring [PDF]

open access: yes, 2017
We propose a simple low-cost technique that enables civil Global Positioning System (GPS) receivers and other civil global navigation satellite system (GNSS) receivers to reliably detect carry-off spoofing and jamming.
Evans, Brian L.   +3 more
core   +1 more source

A Method of Detections’ Fusion for GNSS Anti-Spoofing [PDF]

open access: yesSensors, 2016
The spoofing attack is one of the security threats of systems depending on the Global Navigation Satellite System (GNSS). There have been many GNSS spoofing detection methods, and each of them focuses on a characteristic of the GNSS signal or a measurement that the receiver has obtained.
Huiqi Tao, Hong Li, Mingquan Lu
openaire   +3 more sources

GNSS Spoofing Suppression Based on Multi-Satellite and Multi-Channel Array Processing

open access: yesFrontiers in Physics, 2022
The endless spoofing interference affects the credibility of the navigation system seriously. In order to suppress the forward spoofing which is more threatening to military signals in GNSS, this paper proposes a spoofing suppression algorithm based on ...
Shaojie Ni   +6 more
doaj   +1 more source

Global Navigation Satellite System Spoofing Detection in Inertial Satellite Navigation Systems

open access: yesInventions, 2023
The susceptibility of global navigation satellite systems (GNSSs) to interference significantly limits the possibility of their use. From the standpoint of possible consequences, the most dangerous interference is the so-called spoofing.
Maksim Zharkov   +3 more
doaj   +1 more source

The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques [PDF]

open access: yes, 2012
A battery of recorded spoofing scenarios has been compiled for evaluating civil Global Positioning System (GPS) signal authentication techniques. The battery can be considered the data component of an evolving standard meant to define the notion of ...
Bhatti, Jahshan A.   +3 more
core   +1 more source

Detecting GNSS spoofing using deep learning

open access: yesEURASIP Journal on Advances in Signal Processing, 2023
Abstract Global Navigation Satellite System (GNSS) is pervasively used in position, navigation, and timing (PNT) applications. As a consequence, important assets have become vulnerable to intentional attacks on GNSS, where of particular relevance is spoofing transmissions that aim at superseding legitimate signals with forged ones in order to ...
Parisa Borhani Darian   +3 more
openaire   +2 more sources

GNSS spoofing detection via opportunistic IRIDIUM signals [PDF]

open access: yesProceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
In this paper, we study the privately-own IRIDIUM satellite constellation, to provide a location service that is independent of the GNSS. In particular, we apply our findings to propose a new GNSS spoofing detection solution, exploiting unencrypted IRIDIUM Ring Alert (IRA) messages that are broadcast by IRIDIUM satellites.
Gabriele Oligeri   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy