A GPS Spoofing Generator Using an Open Sourced Vector Tracking-Based Receiver
Spoofing can seriously threaten the use of the Global Positioning System (GPS) in critical applications such as positioning and navigation of autonomous vehicles.
Qian Meng +4 more
doaj +1 more source
GNSS Spoofing Suppression Based on Multi-Satellite and Multi-Channel Array Processing
The endless spoofing interference affects the credibility of the navigation system seriously. In order to suppress the forward spoofing which is more threatening to military signals in GNSS, this paper proposes a spoofing suppression algorithm based on ...
Shaojie Ni +6 more
doaj +1 more source
The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques [PDF]
A battery of recorded spoofing scenarios has been compiled for evaluating civil Global Positioning System (GPS) signal authentication techniques. The battery can be considered the data component of an evolving standard meant to define the notion of ...
Bhatti, Jahshan A. +3 more
core +1 more source
GNSS Spoofing Network Monitoring Based on Differential Pseudorange
Spoofing is becoming a serious threat to various Global Navigation Satellite System (GNSS) applications, especially for those that require high reliability and security such as power grid synchronization and applications related to first responders and ...
Zhenjun Zhang, Xingqun Zhan
doaj +1 more source
GNSS Signal Authentication via Power and Distortion Monitoring [PDF]
We propose a simple low-cost technique that enables civil Global Positioning System (GPS) receivers and other civil global navigation satellite system (GNSS) receivers to reliably detect carry-off spoofing and jamming.
Evans, Brian L. +3 more
core +1 more source
Synthetic GNSS spoofing data generation using field recorded signals
With the increase in GNSS user base, the studies of threats and vulnerabilities of GNSS system are also increased. Among the threats, spoofing is of particular interest because of the risk associated with it. The studies on spoofing are generally limited
Abdul Malik Khan +2 more
doaj +1 more source
Spoofing Control Strategy for Precise Position Offset Based on INS/GNSS Tightly Coupled Navigation
To deceive Inertial Navigation System(INS)/Global Navigation Satellite System(GNSS) integrated navigation terminals, the entry point is still to inject GNSS spoofing signals to the target system.
Shuhai Lu +6 more
doaj +1 more source
Learning Meta Model for Zero- and Few-shot Face Anti-spoofing [PDF]
Face anti-spoofing is crucial to the security of face recognition systems. Most previous methods formulate face anti-spoofing as a supervised learning problem to detect various predefined presentation attacks, which need large scale training data to ...
Fu, Tianyu +8 more
core +2 more sources
Spoof plasmon hybridization [PDF]
AbstractPlasmon hybridization between closely spaced nanoparticles yields new hybrid modes not found in individual constituents, allowing for the engineering of resonance properties as well as field enhancement capabilities of metallic nanostructure.
Zhang, Jingjing +5 more
openaire +3 more sources
Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-antenna Receiver Defense Against a Portable Civil GPS Spoofer [PDF]
In this work we demonstrate the use of a dual antenna receiver that employs a receiver-autonomous angle-ofarrival spoofing countermeasure. This defense is conjectured to be effective against all but the most sophisticated spoofing attempts.
Montgomery, Paul Y.
core +1 more source

