Results 41 to 50 of about 4,930 (199)

A GPS Spoofing Generator Using an Open Sourced Vector Tracking-Based Receiver

open access: yesSensors, 2019
Spoofing can seriously threaten the use of the Global Positioning System (GPS) in critical applications such as positioning and navigation of autonomous vehicles.
Qian Meng   +4 more
doaj   +1 more source

Detection and Mitigation of Spoofing Attacks Against Time Synchronization and Positioning

open access: yesIEEE Access, 2023
Global Navigation Satellite System (GNSS) receivers are vulnerable to intentional spoofing attacks which can manipulate position, velocity, and time (PVT) measurements.
Junhwan Lee   +3 more
doaj   +1 more source

Security of GPS/INS based On-road Location Tracking Systems

open access: yes, 2018
Location information is critical to a wide-variety of navigation and tracking applications. Today, GPS is the de-facto outdoor localization system but has been shown to be vulnerable to signal spoofing attacks.
Narain, Sashank   +2 more
core   +1 more source

GPS Spoofing-Resilient Filtering Using Self-Contained Sensors and Chimera Signal Enhancement

open access: yesNavigation
To protect civilian Global Positioning System (GPS) users from spoofing, the Air Force Research Lab has developed the chips-message robust authentication (Chimera) signal enhancement for the GPS L1C signal.
Tara Mina   +3 more
doaj   +1 more source

Improving Cross Ambiguity Function Using Image Processing Approach to Detect GPS Spoofing Attacks [PDF]

open access: yesIranian Journal of Electrical and Electronic Engineering, 2023
The Global Positioning System (GPS) is vulnerable to various deliberate and unintentional interferences. Therefore, identifying and coping with various interferences in this system is essential.
K. Zarrinnegar   +4 more
doaj  

Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs

open access: yes, 2019
Recent developments have made autonomous vehicles (AVs) closer to hitting our roads. However, their security is still a major concern among drivers as well as manufacturers.
Behfarnia, Ali, Eslami, Ali
core   +1 more source

Intrusion Detection System for Platooning Connected Autonomous Vehicles [PDF]

open access: yes, 2019
The deployment of Connected Autonomous Vehicles (CAVs) in Vehicular Ad Hoc Networks (VANETs) requires secure wireless communication in order to ensure reliable connectivity and safety.
Aparicio-Navarro, Francisco J   +6 more
core   +1 more source

A Lightweight and Real-Time Hardware Architecture for Interference Detection and Mitigation of Time Synchronization Attacks Based on MLP Neural Networks

open access: yesIEEE Access, 2021
Stationary GPS receivers provide time information for critical infrastructures, such as phasor measurement units (PMUs), communication networks, and financial systems.
Niloofar Orouji   +2 more
doaj   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, Volume 43, Issue 3, Page 2254-2341, May 2026.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Learning-based Detection of GPS Spoofing Attack for Quadrotors

open access: yesCoRR
Accepted in IEEE Industrial Electronics Society Annual Online ...
Pengyu Wang   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy