Results 31 to 40 of about 2,540 (199)

GNSS Signal Authentication via Power and Distortion Monitoring [PDF]

open access: yes, 2017
We propose a simple low-cost technique that enables civil Global Positioning System (GPS) receivers and other civil global navigation satellite system (GNSS) receivers to reliably detect carry-off spoofing and jamming.
Evans, Brian L.   +3 more
core   +1 more source

An autonomous GNSS anti-spoofing technique [PDF]

open access: yes, 2016
open3siIn recent years, the problem of Position, Navigation and Timing (PNT) resiliency has received significant attention due to an increasing awareness on threats and the vulnerability of the current GNSS signals.
Christian Wullems   +2 more
core   +1 more source

A Testbed for Developing and Evaluating GNSS Signal Authentication Techniques [PDF]

open access: yes, 2014
An experimental testbed has been created for developing and evaluating Global Navigation Satellite System (GNSS) signal authentication techniques.
Bhatti, Jahshan A.   +3 more
core   +1 more source

Probabilistic Detection of GNSS Spoofing using Opportunistic Information

open access: yes2023 IEEE/ION Position, Location and Navigation Symposium (PLANS), 2023
Global Navigation Satellite Systems (GNSS) are integrated into many devices. However, civilian GNSS signals are usually not cryptographically protected. This makes attacks that forge signals relatively easy. Considering modern devices often have network connections and onboard sensors, the proposed here Probabilistic Detection of GNSS Spoofing (PDS ...
Wenjie Liu, Panos Papadimitratos
openaire   +3 more sources

Spoofing in civil aviation: Security and safety of GPS/GNSS and ADS-B systems [PDF]

open access: yesMegatrend Revija, 2021
Aircraft systems that rely on satellite positioning technology, such as GNSS and ADS-B, can be the target of a spoofing attack - a sophisticated and very dangerous form of radio frequency interference in which false signals are inserted into the "victim ...
Kožović Dejan V.   +1 more
doaj   +1 more source

The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques [PDF]

open access: yes, 2012
A battery of recorded spoofing scenarios has been compiled for evaluating civil Global Positioning System (GPS) signal authentication techniques. The battery can be considered the data component of an evolving standard meant to define the notion of ...
Bhatti, Jahshan A.   +3 more
core   +1 more source

Global Navigation Satellite System Spoofing Detection in Inertial Satellite Navigation Systems

open access: yesInventions, 2023
The susceptibility of global navigation satellite systems (GNSSs) to interference significantly limits the possibility of their use. From the standpoint of possible consequences, the most dangerous interference is the so-called spoofing.
Maksim Zharkov   +3 more
doaj   +1 more source

APNT for GNSS Spoof Detection

open access: yesThe International Technical Meeting of the The Institute of Navigation, 2017
Global Navigation Satellite Systems (GNSS) are well known to be accurate providers of position, navigation, and time (PNT) information across the globe. With capable receivers and well-populated satellite constellations, GNSS users typically believe that the position and time information provided by their GNSS receiver is perfectly accurate.
Swaszek, Peter F.   +2 more
openaire   +2 more sources

Two-Step Trajectory Spoofing Algorithm for Loosely Coupled GNSS/IMU and NIS Sequence Detection

open access: yesIEEE Access, 2019
Satellite navigation spoofing has become a central issue of jamming technology research because of its serious threat and ability to conceal itself. Increasingly, targets are equipped with more robust GNSS/IMU systems and normalized innovation squared ...
Yangjun Gao, Zhiwei Lv, Lundong Zhang
doaj   +1 more source

Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-antenna Receiver Defense Against a Portable Civil GPS Spoofer [PDF]

open access: yes, 2011
In this work we demonstrate the use of a dual antenna receiver that employs a receiver-autonomous angle-ofarrival spoofing countermeasure. This defense is conjectured to be effective against all but the most sophisticated spoofing attempts.
Montgomery, Paul Y.
core   +1 more source

Home - About - Disclaimer - Privacy