Results 51 to 60 of about 2,540 (199)

Authentication of Satellite Navigation Signals by Wiretap Coding and Artificial Noise

open access: yes, 2018
In order to combat the spoofing of global navigation satellite system (GNSS) signals we propose a novel approach for satellite signal authentication based on information-theoretic security.
Formaggio, Francesco, Tomasin, Stefano
core   +1 more source

Radio Frequency Interference Impact Assessment on Global Navigation Satellite Systems [PDF]

open access: yes, 2009
The Institute for the Protection and Security of the Citizen of the EC Joint Research Centre (IPSC-JRC) has been mandated to perform a study on the Radio Frequency (RF) threat against telecommunications and ICT control systems. This study is divided into
FORTUNY GUASCH Joaquim   +1 more
core   +1 more source

Improving GNSS Spoofing Awareness in Smartphones via Statistical Processing of Raw Measurements

open access: yesIEEE Open Journal of the Communications Society, 2023
Due to the low received power of Global Navigation Satellite Signals (GNSS), the performance of GNSS receivers can be disrupted by anthropogenic radio frequency interferences, with intentional jamming and spoofing activities being among the most critical
Akmal Rustamov   +2 more
doaj   +1 more source

Taxonomy of IMT Interference on Aeronautical Systems

open access: yesRadio Science, Volume 61, Issue 4, April 2026.
Abstract The rapid deployment of 5G and future 6G networks has raised concerns about interference with critical aeronautical systems, particularly radio altimeters and Wireless Avionics Intra‐Communications (WAIC). This paper offers a comprehensive taxonomy of the 5G/6G signal interference mechanisms, operational impacts, and mitigation strategies in ...
Valéria C. M. N. Leite, Alison Moraes
wiley   +1 more source

A New Threat for Pseudorange-Based RAIM: Adversarial Attacks on GNSS Positioning

open access: yesIEEE Access, 2019
Global Navigation Satellite System (GNSS) signals are very vulnerable to spoofing due to the low power level and opening service mode. Although pseudorange-based Receiver Autonomous Integrity Monitoring (RAIM) method performances effectively in spoofing ...
Yuan Sun, Li Fu
doaj   +1 more source

Secure Trajectory Planning Against Undetectable Spoofing Attacks

open access: yes, 2019
This paper studies, for the first time, the trajectory planning problem in adversarial environments, where the objective is to design the trajectory of a robot to reach a desired final state despite the unknown and arbitrary action of an attacker.
Bianchin, Gianluca   +2 more
core   +1 more source

Robust GNSS Services for Road Transportation: Analysis and studies to mitigate GNSS threats in the road transportation sector [PDF]

open access: yes, 2016
The application of Global Navigation Satellite System (GNSS) services in the road transportation sector has substantially increased in recent years. Position Velocity and Time (PVT) information is playing and will play even more in the future a crucial ...
BALDINI Gianmarco   +4 more
core   +1 more source

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, Volume 11, Issue 2, Page 349-366, April 2026.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

Understanding the Autonomous Electric Vehicle Cyber Threat Landscape: A Focus on Infrastructure, Threats and Ontology‐Based Modelling

open access: yesEnergy Internet, Volume 3, Issue 1, Page 39-51, April 2026.
ABSTRACT The development of autonomous electric vehicles (AEVs) represents the convergence of two simultaneous automotive revolutions: electric vehicles (EVs) and autonomous vehicles (AVs). AVs require sensors, decision‐making systems and actuation systems to achieve autonomous driving, whereas EVs require intelligent management and real‐time ...
Ohud Alsadi   +5 more
wiley   +1 more source

Security of GPS/INS based On-road Location Tracking Systems

open access: yes, 2018
Location information is critical to a wide-variety of navigation and tracking applications. Today, GPS is the de-facto outdoor localization system but has been shown to be vulnerable to signal spoofing attacks.
Narain, Sashank   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy