Results 91 to 100 of about 2,540 (199)
Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks [PDF]
Modern power systems have begun integrating synchrophasor technologies into part of daily operations. Given the amount of solutions offered and the maturity rate of application development it is not a matter of "if" but a matter of "when" in regards to ...
Barella, Richard +6 more
core +2 more sources
A Survey of Clock Synchronization Over Packet-Switched Networks [PDF]
Clock synchronization is a prerequisite for the realization of emerging applications in various domains such as industrial automation and the intelligent power grid.
Lévesque, M, Tipper, D
core +1 more source
Recent advancements in unmanned aerial vehicle (UAV) technology have facilitated its widespread adoption across a spectrum of sectors, such as commercial logistics, agricultural surveillance, industrial diagnostics, and military maneuvers. However, the widespread adoption has also engendered a burgeoning array of security concerns.
Hailong Xi +8 more
wiley +1 more source
Emulation of Realistic GNSS Scenarios Over 3D Wave Field Synthesis and Over‐The‐Air Testing
This contribution takes the over‐the‐air testing method for wireless devices and combines it with the wave field synthesis technique to increase the efficiency, reliability and especially the realism of the tests. The main focus of this contribution is to use the aforementioned method to emulate realistic GNSS scenarios inside an anechoic chamber ...
Renato Zea Vintimilla +5 more
wiley +1 more source
Performance Analysis of GNSS/INS Loosely Coupled Integration Systems under Spoofing Attacks
The loosely coupled integration of Global Navigation Satellite System (GNSS) and Inertial Navigation System (INS) have been widely used to improve the accuracy, robustness and continuity of navigation services.
Rui Xu +4 more
doaj +1 more source
Analysis of GNSS replay-attack detectors exploiting unpredictable symbols [PDF]
Since its inception, GNSS (Global Navigation Satellite System) have become more popular year after year. GNSS is currently used in a wide variety of applications beyond the determination of the user position by means of a GNSS receiver.
Morales Ferré, Rubén +2 more
core +1 more source
A Resilience‐Driven Concept to Manage Drone Intrusions in U‐Space
With the U‐space revolution, drones are not only going to reshape both the physical space and the cyberspace of the future urban environment but are also introducing new multi‐domain risks. This work proposes a concept for improving the U‐space resilience through a novel service, named DARS (drone attack resilience service), relying on an artificial ...
Domenico Pascarella +6 more
wiley +1 more source
In this work we introduce the concept of quantum geo-encryption - a protocol that invokes direct quantum encryption of messages coupled to quantum location monitoring of the intended receiver.
Malaney, Robert
core +1 more source
The Use of Bearing Measurements for Detecting GNSS Spoofing
GNSS are well known to be accurate providers of position information across the globe. Because of high signal availabilities, robust receivers, and well-populated constellations, operators typically believe that the location information provided by their GNSS receiver is correct.
Swaszek, Peter F. +2 more
openaire +2 more sources
This article proposes a feedback node aided distributed spoofing (FNA‐DS) system, enabling flexible implementation of distributed spoofing. Field experiments using a self‐developed distributed spoofing prototype validate the FNA‐DS system's effectiveness and expose limitations in existing direction of arrival based anti‐spoofing techniques.
Minghan Zhong +3 more
wiley +1 more source

