Results 31 to 40 of about 4,930 (199)

GPS-Spoofing Attack Detection Technology for UAVs Based on Kullback–Leibler Divergence

open access: yesDrones, 2021
Here, we developed a method for detecting cyber security attacks aimed at spoofing the Global Positioning System (GPS) signal of an Unmanned Aerial Vehicle (UAV).
Elena Basan   +5 more
doaj   +1 more source

A Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes

open access: yesSensors, 2021
We consider how to protect Unmanned Aerial Vehicles (UAVs) from Global Positioning System (GPS) spoofing attacks to provide safe navigation. The Global Navigation Satellite System (GNSS) is widely used for locating drones and is by far the most popular ...
Elena Basan   +5 more
doaj   +1 more source

An autonomous GNSS anti-spoofing technique [PDF]

open access: yes, 2016
open3siIn recent years, the problem of Position, Navigation and Timing (PNT) resiliency has received significant attention due to an increasing awareness on threats and the vulnerability of the current GNSS signals.
Christian Wullems   +2 more
core   +1 more source

Increasing the resiliency of power systems in presence of GPS spoofing attacks: A data‐driven deep‐learning algorithm

open access: yesIET Generation, Transmission & Distribution, 2023
The growing use of wireless technologies in power systems has raised concerns about cybersecurity, particularly regarding GPS spoofing attacks (GSAs). These attacks manipulate GPS data, leading to modifications in the phase angle of phasor measurement ...
Mohammad Sabouri   +6 more
doaj   +1 more source

A Combined Antijamming and Antispoofing Algorithm for GPS Arrays

open access: yesInternational Journal of Antennas and Propagation, 2019
The Global Positioning System (GPS), with its accurate positioning and timing information, has become a commonly used navigation instrument for many applications. However, it is susceptible to intentional interference such as jamming and spoofing.
Qiong Yang   +3 more
doaj   +1 more source

An Integrated Framework for Sensing Radio Frequency Spectrum Attacks on Medical Delivery Drones

open access: yes, 2020
Drone susceptibility to jamming or spoofing attacks of GPS, RF, Wi-Fi, and operator signals presents a danger to future medical delivery systems. A detection framework capable of sensing attacks on drones could provide the capability for active responses.
Kulp, Philip H., Mei, Nagi
core   +1 more source

SCER Spoofing Attacks on the Galileo Open Service and Machine Learning Techniques for End-User Protection

open access: yesIEEE Access, 2020
Spoofing attacks pose a clear cybersecurity risk for all systems relying on Global Navigation Satellite Systems (GNSS) for time synchronization or positioning.
Francisco Gallardo, Antonio Perez Yuste
doaj   +1 more source

Detecting Signal Spoofing Attack in UAVs Using Machine Learning Models

open access: yesIEEE Access, 2021
Due to the tremendous advancement in interactive multimedia systems and technologies, security has become a major aspect. Advanced technology can be utilized for hacking autonomous systems like Unmanned Aerial vehicles (UAVs) in different ways such as ...
Arslan Shafique   +2 more
doaj   +1 more source

A Crowd-Assisted Real-time Public Transport Information Service: No More Endless Wait [PDF]

open access: yes, 2016
Many passengers have expressed frustration in waiting for public bus endlessly without knowing the estimated ar- rival time. In many developing countries, requiring bus operators to invest in the installation of a GPS unit on every bus in order to track ...
Keoh, Sye Loong   +3 more
core   +1 more source

The GPS Assimilator: a Method for Upgrading Existing GPS User Equipment to Improve Accuracy, Robustness, and Resistance to Spoofing [PDF]

open access: yes, 2010
Preprint of the 2010 ION GNSS Conference Portland, OR, September 21–24, 2010A conceptual method is presented for upgrading existing GPS user equipment, without requiring hardware or software modifications to the equipment, to improve the equipment’s ...
Bhatti, Jahshan   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy