Results 111 to 120 of about 2,540 (199)

Machine Learning For In-Region Location Verification In Wireless Networks

open access: yes, 2019
In-region location verification (IRLV) aims at verifying whether a user is inside a region of interest (ROI). In wireless networks, IRLV can exploit the features of the channel between the user and a set of trusted access points. In practice, the channel
Brighente, Alessandro   +3 more
core   +1 more source

A Systematic Literature Review of Current Machine Learning Approaches for Detecting GNSS Spoofing Attacks

open access: yesIEEE Access
Global Navigation Satellite System (GNSS) spoofing attacks become increasingly important due to their impact on navigation security as well as their significant risks to privacy and infrastructure in civilian and military domains.
Susan Bertram   +2 more
doaj   +1 more source

Joint Antenna Array Attitude Tracking and Spoofing Detection Based on Phase Difference Measurements [PDF]

open access: yes, 2016
Spoofing attacks are a serious problem for civil GNSS applications with safety content, such as airplane landing or maritime navigation in harbors. Also many strategically important infrastructures, such as electric power grids or mobile communications ...
Appel, Manuel   +2 more
core  

Avionics-based GNSS integrity augmentation performance in a jamming environment [PDF]

open access: yes, 2015
Intentional and unintentional radiofrequency interference (i.e., jamming) can result in degraded navigation accuracy or complete loss of the GNSS signal tracking.
Hill, Chris   +3 more
core  

An Experimental Evaluation of the GNSS Jamming Threat [PDF]

open access: yes, 2015
Jamming is the act of intentionally directing a disturbing electromagnetic wave towards a communication system in order to disrupt or prevent signal reception.
BALDINI Gianmarco   +6 more
core  

GNSS Spoofing - Advanced Mechanizms of Detection

open access: yesTransport and Communications, 2023
Vojtech Šimák, Jozef Šedo
openaire   +1 more source

Generalized Likelihood Ratio Satellite Navigation Spoofing Detection Algorithm Based on Moving Variance

open access: yesIEEE Access
The vulnerability of Global Navigation Satellite Systems (GNSS) to spoofing limits their widespread use in military security and national economy. Therefore, fast and accurate detection of GNSS spoofing is of great significance.
Pingping Qu   +5 more
doaj   +1 more source

Blockchain-based secure communication for UAV networks: a decentralized approach to GNSS spoofing detection

open access: yesAviation
Ensuring secure communication in Unmanned Aerial Vehicle (UAV) networks is a critical challenge due to vulnerabilities such as GNSS (Global Navigation Satellite System) spoofing, jamming, and unauthorized data manipulation.
Paulina Draugelytė, Ivan Suzdalev
doaj   +1 more source

Home - About - Disclaimer - Privacy