Results 101 to 110 of about 2,540 (199)
Symmetrical clock synchronization with time-correlated photon pairs
We demonstrate a point-to-point clock synchronization protocol based on bidirectionally exchanging photons produced in spontaneous parametric down conversion (SPDC).
Cerè, Alessandro +5 more
core +1 more source
Machine Learning and Location Verification in Vehicular Networks
Location information will play a very important role in emerging wireless networks such as Intelligent Transportation Systems, 5G, and the Internet of Things. However, wrong location information can result in poor network outcomes.
Ihsan, Ullah +2 more
core +1 more source
Network connectivity plays an important role in the information exchange between different agents in the multi-level networks. In this paper, we establish a game-theoretic framework to capture the uncoordinated nature of the decision-making at different ...
Chen, Juntao, Zhu, Quanyan
core +1 more source
GNSS Spoofing Detection Based on Opportunistic Position Information
The limited or no protection for civilian Global Navigation Satellite System (GNSS) signals makes spoofing attacks relatively easy. With modern mobile devices often featuring network interfaces, state-of-the-art signals of opportunity (SOP) schemes can provide accurate network positions in replacement of GNSS.
Wenjie Liu 0017, Panos Papadimitratos
openaire +2 more sources
GNSS Spoof Detection Using Passive Ranging
Advances in electronics technology have enabled the creation of malicious RF interference of GNSS signals. For example jamming completely denies the GNSS user of position, navigation, and time (PNT) information. While a serious concern when we expect PNT at all times, current generation GNSS receivers often warn the user when PNT is unavailable.
Swaszek, Peter F. +2 more
openaire +2 more sources
GNSS Spoofing Detection Using Static or Rotating Single-Antenna of a Static or Moving Victim
GNSS spoofing works as follows: the GNSS signal generator transmits a signal simulation of several satellites at the GNSS frequency. If the level of the simulated signal exceeds the signal strength of real satellites, the GNSS receiver will “ ...
Larisa A. Dobryakova +2 more
doaj +1 more source
Self-supervised federated GNSS spoofing detection with opportunistic data
Global navigation satellite systems (GNSS) are vulnerable to spoofing attacks, with adversarial signals manipulating the location or time information of receivers, potentially causing severe disruptions. The task of discerning the spoofing signals from benign ones is naturally relevant for machine learning, thus recent interest in applying it for ...
Wenjie Liu, Panos Papadimitratos
openaire +2 more sources
Global Navigation Satellite Systems (GNSS) are widely used for positioning, navigation, and timing (PNT) applications, making them a critical infrastructure component.
Alexandru-Gabriel Romaniuc +2 more
doaj +1 more source
Detection of Induced GNSS Spoofing Using S-Curve-Bias
In Global Navigation Satellite System (GNSS), a spoofing attack consists of forged signals which possibly cause the attacked receivers to deduce a false position, a false clock, or both.
Wenyi Wang +3 more
doaj +1 more source
Global Navigation Satellite Systems (GNSS) are essential for applications that rely on positioning, velocity, and timing (PVT) information. Unfortunately, a surge in interferences in GNSS frequency bands causes severe security risks for various ...
Nadir Khan +3 more
doaj +1 more source

