Results 151 to 160 of about 4,930 (199)
Risk Assessment Method for CPS-Based Distributed Generation Cluster Control in Active Distribution Networks Under Cyber Attacks. [PDF]
Ouyang J, Mo F, Huang F, Chen Y.
europepmc +1 more source
The Rise of GPS Spoofing Attacks on Drones in the Russia-Ukraine War
Noor Ul Amin Jhanjhi +6 more
openaire +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
On the Limitations of GPS Time-Spoofing Attacks
2020 43rd International Conference on Telecommunications and Signal Processing (TSP), 2020In recent years, there has been a number of incidents against the security of the location services. Jamming and spoofing attacks are intensively studied to find effective detection and mitigation techniques to provide secure signaling. However, the effects of the number of spoofing signals are not completely understood yet.
Mehmet Özgün Demir +2 more
openaire +2 more sources
GPS Spoofing Attack Recognition for UAVs With Limited Samples
IEEE Internet of Things JournalWei Wang, Zhisheng Yin
exaly +2 more sources
Quickest detection of GPS spoofing attack
MILCOM 2012 - 2012 IEEE Military Communications Conference, 2012GPS is being increasingly used in critical infrastructures in modern society. Therefore, the reliability of GPS is extremely important. Recently, the vulnerability of GPS to a spoofing attack has been discussed in the literature. A malicious attacker may spoof a GPS receiver, causing it to provide incorrect navigation and timing information, which may ...
Zhenghao Zhang +3 more
openaire +1 more source
Detection of GPS Spoofing Attacks on Unmanned Aerial Systems
2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2019Unmanned Aerial Systems (UAS) have received a huge interest in military and civil applications. Applications of UAS are dependent on successful communications of these systems with different entities in their networks. A UAS network can include the UAS, ground control station, navigation satellite system, and automatic dependent surveillance-broadcast (
Mohsen Riahi Manesh +4 more
openaire +1 more source
GPS spoofing attack characterization and detection in smart grids
2016 IEEE Conference on Communications and Network Security (CNS), 2016The problem of global positioning system (GPS) spoofing attacks on smart grids endowed with phasor measurement units (PMUs) is addressed, taking into account the dynamical behavior of the states of the system. First, it is shown how GPS spoofing introduces a timing synchronization error in the phasor readings recorded by the PMUs and alters the ...
Parth Pradhan +4 more
openaire +1 more source
Quadrotor Visual Navigation Under GPS Spoofing Attack
2021 Sixth International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2021This paper presents a quadrotor visual navigation system under the GPS spoofing attack. We use HACKRF to send spoofing signals to the quadrotor. The quadrotor is detected during the outer loop of the system. If the quadrotor is spoofed, the quadrotor switch to visual navigation instead of using GPS signals.
Kai Liu, Yuyang Zhao, Gang Wang, Rui Xue
openaire +1 more source
Impact of GPS Time Spoofing Attacks on Cyber Physical Systems
2019 IEEE International Conference on Industrial Technology (ICIT), 2019The development of software defined radio platforms and related open source software have made it possible to generate and broadcast global positioning system (GPS) signals easily and at low cost. Since GPS time is widely used in time sensitive systems for time reference, any attack on GPS can have serious consequences.
Xiao Wei, Biplab Sikdar 0001
openaire +1 more source

