Results 1 to 10 of about 22,141 (176)

Spoofing attack recognition for GNSS-based train positioning using a BO-LightGBM method [PDF]

open access: yesScience Progress
Trustworthy positioning is critical in the operational control and management of trains. For a train positioning system (TPS) based on a global navigation satellite system (GNSS), a spoofing attack significantly threatens the trustworthiness of ...
Jiaqi Bi   +3 more
doaj   +3 more sources

An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4

open access: yesIEEE Access
Unmanned Aerial Vehicles (UAVs) are aerial vehicles that can go to a particular position without human control or with remote human control. It is because unmanned control mainly relies on position estimation that a lot of research has been studied on ...
Ji Hyuk Jung   +3 more
doaj   +4 more sources

Spoofing Attack Results Determination in Code Domain Using a Spoofing Process Equation [PDF]

open access: yesSensors, 2019
When a user receiver is tracking an authentic signal, a spoofing signal can be transmitted to the user antenna. The question is under what conditions does the tracking point of the receiver move from the authentic signal to the spoofing signal?
Beomju Shin   +5 more
doaj   +2 more sources

Physical Layer Spoofing Attack Detection in MmWave Massive MIMO 5G Networks

open access: yesIEEE Access, 2021
Identity spoofing attacks pose one of the most serious threats to wireless networks, where the attacker can masquerade as legitimate users by modifying its own identity.
Weiwei Li   +3 more
doaj   +3 more sources

Secure localization of land vehicles under GPS spoofing attack with decomposition Kalman filter [PDF]

open access: yesScientific Reports
This study presents a secure vehicle localization framework designed to maintain accuracy under GPS spoofing attacks. The framework integrates a spoofing detection mechanism operating in three adaptive modes and employs refined dynamic, measurement, and ...
Meihong Zhao   +3 more
doaj   +2 more sources

Reliable Detection of Location Spoofing and Variation Attacks

open access: yesIEEE Access, 2023
Location spoofing is a critical attack in mobile communications. While several previous studies investigated the detection of location spoofing attacks, they are limited in their performance and lack the consideration of emerging attack variations.
Chiho Kim   +5 more
doaj   +2 more sources

Adversarial Evasion Attacks on SVM-Based GPS Spoofing Detection Systems [PDF]

open access: yesSensors
GPS spoofing remains a critical threat in the use of autonomous vehicles. Machine-learning-based detection systems, particularly support vector machines (SVMs), demonstrate high accuracy in their defense against conventional spoofing attacks.
Sunghyeon An   +2 more
doaj   +2 more sources

Secrecy Analysis and Active Pilot Spoofing Attack Detection for Multigroup Multicasting Cell-Free Massive MIMO Systems

open access: yesIEEE Access, 2019
In this paper, we investigate the secure transmission in multigroup multicasting cell-free massive MIMO system in the presence of pilot spoofing attack.
Xianyu Zhang   +4 more
doaj   +3 more sources

Development of a Model for Spoofing Attacks in Internet of Things

open access: yesMathematics, 2022
Internet of Things (IoT) allows the integration of the physical world with network devices for proper privacy and security in a healthcare system. IoT in a healthcare system is vulnerable to spoofing attacks that can easily represent themselves as a ...
Faheem Khan   +6 more
doaj   +1 more source

Detection of face spoofing attacks on biometric identification systems

open access: yesAdaptivni Sistemi Avtomatičnogo Upravlinnâ, 2023
The object of the study is spoofing attacks on identification systems based on human face biometrics. The article provides an overview of the main types of spoofing attacks and features of their detection, as well as an overview of existing solutions for
D. Zhuravlov, О. Polshakova
doaj   +1 more source

Home - About - Disclaimer - Privacy