Results 61 to 70 of about 7,918 (196)
Securing Autonomous Vehicles Against GPS Spoofing Attacks: A Deep Learning Approach
With the rapid advancement of technology and multimedia systems, ensuring security has become a critical concern. Connected and Autonomous Vehicles (CAVs) are vulnerable to various hacking techniques, including jamming and spoofing.
Maliha Shabbir +3 more
doaj +1 more source
Data‐Based Detection of Antagonistic Agents in a Robot Swarm Solving a Dynamic Coverage Task
ABSTRACT Robot swarms can be deployed as moving surveillance systems, for instance, as mobile anti‐poaching systems for monitoring wildlife and detecting poaching activities. Since poachers have an interest in evading detection, robots are at risk of being hijacked and manipulated to behave antagonistically, for example, to prevent the correct ...
Ingeborg Wenger +2 more
wiley +1 more source
A Hybrid Encryption Framework for Secure and Real‐Time Vehicular Communications
ABSTRACT The rapid expansion of Vehicular Ad Hoc Networks (VANETs) has amplified concerns regarding data security, integrity, and privacy. This paper presents SECURIDE, a Secure Intelligent Data Exchange for Connected Vehicles that provides a comprehensive encryption–decryption framework for safeguarding multimedia data and communication channels in ...
Muhammad Usama, Muhammad Usman Hadi
wiley +1 more source
Network connectivity plays an important role in the information exchange between different agents in the multi-level networks. In this paper, we establish a game-theoretic framework to capture the uncoordinated nature of the decision-making at different ...
Chen, Juntao, Zhu, Quanyan
core +1 more source
Intrusion Detection System for Platooning Connected Autonomous Vehicles [PDF]
The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety.
Aparicio-Navarro, Francisco J +6 more
core +1 more source
As the worlds predominant navigation system GPS is critical to modern life, finding applications in diverse areas like information security, healthcare, marketing, and power and water grid management. Unfortunately this diversification has only served to underscore the insecurity of GPS and the critical need to harden this system against manipulation ...
Mahsa Foruhandeh +4 more
openaire +2 more sources
Analysis of the GPS Spoofing Vulnerability in the Drone 3DR Solo [PDF]
At present, the boom in unmanned aerial vehicles (UAV) has been increasing in recent years, placing them in an important way in the commercial market. The use of UAV in the daily tasks of industry, commerce or as entertainment for children and adults becomes more recurrent.
Sandra Pérez Arteaga +4 more
openaire +2 more sources
Enhancing Food Safety in the Cold Chain Through Internet of Things and Artificial Intelligence
ABSTRACT Effective cold chain management is crucial for ensuring food safety, but traditional monitoring approaches remain reactive and fragmented. Industry 4.0 technologies, such as the Internet of Things (IoT) and artificial intelligence (AI), offer transformative potential for real‐time tracking, automation, and predictive analytics.
Wagner Augusto Müller +2 more
wiley +1 more source
The A New Strategy to Enhance the Security of GPS Location by PGP Algorithm in Smart Containers
Dynamic navigation devices like Global Positioning Systems (GPSs) are deployed for various purposes in different areas and these devices are usually the central point of interest of various groups like hackers to exploit the data sent and received by ...
Mehrunnisa Saleem jan +2 more
doaj
Enhanced GNSS Authentication Based on the Joint CHIMERA/OSNMA Scheme
The authentication of the navigation signals can be considered as the contribution of the system to the robustness against spoofing attacks and it is becoming an important requirement for a growing number of user communities.
Beatrice Motella +2 more
doaj +1 more source

