Results 11 to 20 of about 37,470 (199)

Spoofing in aviation: Security threats on GPS and ADS-B systems [PDF]

open access: yesVojnotehnički Glasnik, 2021
Introduction/purpose: The paper provides a review of recent research in the field of GPS and ADS-B spoofing. Systems that rely on satellite positioning technology can be targeted by spoofing in order to generate incorrect positioning/timing, which is ...
Dejan V. Kožović   +1 more
doaj   +1 more source

Satellite Navigation Spoofing Interference Detection and Direction Finding Based on Array Antenna

open access: yesSensors, 2023
Satellite navigation signals are feeble when they reach the ground, so they are vulnerable to attacks from outside interference signals. By emitting spoofing interference signals similar to real satellite signals, spoofing interference can make receivers
Huiyun Yang   +4 more
doaj   +1 more source

Anti-Spoofing Method for Improving GNSS Security by Jointly Monitoring Pseudo-Range Difference and Pseudo-Range Sum Sequence Linearity

open access: yesSensors, 2023
Spoofing interference is one of the most emerging threats to the Global Navigation Satellite System (GNSS); therefore, the research on anti-spoofing technology is of great significance to improving the security of GNSS.
Xinran Zhang   +5 more
doaj   +1 more source

Research on Detection Technology of Spoofing under the Mixed Narrowband and Spoofing Interference

open access: yesRemote Sensing, 2022
The global navigation satellite system has achieved great success in the civil and military fields and is an important resource for space-time information services.
Long Huang   +6 more
doaj   +1 more source

Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer [PDF]

open access: yes, 2008
A portable civilian GPS spoofer is implemented on a digital signal processor and used to characterize spoofing effects and develop defenses against civilian spoofing.
Humphreys, Todd E.   +4 more
core   +1 more source

Spoofing Herzog and Herzog Spoofing [PDF]

open access: yesTransit, 2010
Author(s): Ames, Eric | Abstract: This essay explores how humor, parody, and self-parody have shaped and reshaped the public image of the filmmaker Werner Herzog, especially since the 1990s and with the help of various spectators, particularly those who create and circulate their own images of the iconic German director. To see this dynamic at work, we
openaire   +3 more sources

Improved Secure Address Resolution Protocol [PDF]

open access: yes, 2014
In this paper, an improved secure address resolution protocol is presented where ARP spoofing attack is prevented. The proposed methodology is a centralised methodology for preventing ARP spoofing attack.
Chaurasia, Vijay Kumar   +2 more
core   +1 more source

Calculation of the lower limit of the spoofing-signal ratio for a GNSS receiver-spoofer

open access: yesEURASIP Journal on Wireless Communications and Networking, 2018
A receiver-spoofer is one of the most covert global navigation satellite system (GNSS) spoofing attacks and can only be effectively detected by the combination of multiple anti-spoofing technologies.
Meng Zhou, Hong Li, Mingquan Lu
doaj   +1 more source

A New GNSS Spoofing Signal Power Control Algorithm for Receiver Sensors in Acquisition Phase and Subsequent Control

open access: yesSensors, 2022
Satellite navigation spoofing technology has become a hotspot of interference technology research because of its significant threat and high concealment.
Yangjun Gao, Guangyun Li
doaj   +1 more source

A Testbed for Developing and Evaluating GNSS Signal Authentication Techniques [PDF]

open access: yes, 2014
An experimental testbed has been created for developing and evaluating Global Navigation Satellite System (GNSS) signal authentication techniques.
Bhatti, Jahshan A.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy