Results 21 to 30 of about 7,918 (196)

A GPS-Adaptive Spoofing Detection Method for the Small UAV Cluster

open access: yesDrones, 2023
The small UAV (unmanned aerial vehicle) cluster has become an important trend in the development of UAVs because it has the advantages of being unmanned, having a small size and low cost, and ability to complete many collaborative tasks.
Lianxiao Meng   +3 more
doaj   +1 more source

Spoofer-to-Target Association in Multi-Spoofer Multi-Target Scenario for Stealthy GPS Spoofing

open access: yesIEEE Access, 2021
Global navigation satellite system (GNSS) based navigation is omnipresent in today’s world, providing position, velocity, and time (PVT) information with inexpensive GPS receivers.
Bethi Pardhasaradhi   +2 more
doaj   +1 more source

Deep Learning Detection of GPS Spoofing

open access: yes, 2022
Unmanned aerial vehicles (UAVs) are widely deployed in air navigation, where numerous applications use them for safety-of-life and positioning, navigation, and timing tasks. Consequently, GPS spoofing attacks are more and more frequent. The aim of this work is to enhance GPS systems of UAVs, by providing the ability of detecting and preventing spoofing
Jullian Parra, Olivia   +5 more
openaire   +1 more source

On the requirements for successful GPS spoofing attacks [PDF]

open access: yesProceedings of the 18th ACM conference on Computer and communications security, 2011
An increasing number of wireless applications rely on GPS signals for localization, navigation, and time synchronization. However, civilian GPS signals are known to be susceptible to spoofing attacks which make GPS receivers in range believe that they reside at locations different than their real physical locations.
Nils Ole Tippenhauer   +3 more
openaire   +2 more sources

3D Radio Map-Based GPS Spoofing Detection and Mitigation for Cellular-Connected UAVs

open access: yesIEEE Transactions on Machine Learning in Communications and Networking, 2023
With the upcoming 5G and beyond wireless communication system, cellular-connected Unmanned Aerial Vehicles (UAVs) are emerging as a new pattern to give assistance for target searching, emergency rescue, and network recovery.
Yongchao Dang   +3 more
doaj   +1 more source

DeepPOSE: Detecting GPS spoofing attack via deep recurrent neural network

open access: yesDigital Communications and Networks, 2022
The Global Positioning System (GPS) has become a foundation for most location-based services and navigation systems, such as autonomous vehicles, drones, ships, and wearable devices.
Peng Jiang, Hongyi Wu, Chunsheng Xin
doaj   +1 more source

The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques [PDF]

open access: yes, 2012
A battery of recorded spoofing scenarios has been compiled for evaluating civil Global Positioning System (GPS) signal authentication techniques. The battery can be considered the data component of an evolving standard meant to define the notion of ...
Bhatti, Jahshan A.   +3 more
core   +1 more source

Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer [PDF]

open access: yes, 2008
A portable civilian GPS spoofer is implemented on a digital signal processor and used to characterize spoofing effects and develop defenses against civilian spoofing.
Humphreys, Todd E.   +4 more
core   +1 more source

Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-antenna Receiver Defense Against a Portable Civil GPS Spoofer [PDF]

open access: yes, 2011
In this work we demonstrate the use of a dual antenna receiver that employs a receiver-autonomous angle-ofarrival spoofing countermeasure. This defense is conjectured to be effective against all but the most sophisticated spoofing attempts.
Montgomery, Paul Y.
core   +1 more source

GPS spoofing-based time synchronisation attack in advanced metering infrastructure and its protection

open access: yesThe Journal of Engineering, 2020
Advanced metering infrastructure (AMI) plays a key role in power systems. Since smart meters and meter collectors are synchronised to the time synchronisation devices (TSDs) in the head end system (HES) of AMI, they are vulnerable to global positioning ...
Qian Bin   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy