Results 91 to 100 of about 22,160 (195)

Development status and challenges of anti-spoofing technology of GNSS/INS integrated navigation

open access: yesFrontiers in Physics
The threat of spoofing interference has posed a severe challenge to the security application of Global Navigation Satellite System (GNSS). It is particularly urgent and critical to carry out in-depth defense research on spoofing interference.
Lei Wang   +11 more
doaj   +1 more source

A New Threat for Pseudorange-Based RAIM: Adversarial Attacks on GNSS Positioning

open access: yesIEEE Access, 2019
Global Navigation Satellite System (GNSS) signals are very vulnerable to spoofing due to the low power level and opening service mode. Although pseudorange-based Receiver Autonomous Integrity Monitoring (RAIM) method performances effectively in spoofing ...
Yuan Sun, Li Fu
doaj   +1 more source

Pilot Spoofing Attack Detection and Countermeasure

open access: yesIEEE Transactions on Communications, 2018
In a time-division duplex multiple antenna system, the channel state information can be estimated using reverse training. A pilot spoofing (contamination) attack occurs when during the training phase, an adversary (spoofer) also sends synchronized, identical training (pilot) signal as that of the legitimate receiver.
openaire   +1 more source

A GPS Spoofing Generator Using an Open Sourced Vector Tracking-Based Receiver

open access: yesSensors, 2019
Spoofing can seriously threaten the use of the Global Positioning System (GPS) in critical applications such as positioning and navigation of autonomous vehicles.
Qian Meng   +4 more
doaj   +1 more source

A Combined Antijamming and Antispoofing Algorithm for GPS Arrays

open access: yesInternational Journal of Antennas and Propagation, 2019
The Global Positioning System (GPS), with its accurate positioning and timing information, has become a commonly used navigation instrument for many applications. However, it is susceptible to intentional interference such as jamming and spoofing.
Qiong Yang   +3 more
doaj   +1 more source

A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing

open access: yesSensors, 2019
This article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites ...
Jaroslaw Magiera
doaj   +1 more source

True image construction in quantum-secured single-pixel imaging under spoofing attack

open access: yesAPL Photonics
In this paper, we introduce a quantum-secured single-pixel imaging technique designed to withstand spoofing attacks, wherein adversaries attempt to deceive imaging systems with fake signals.
Jaesung Heo   +3 more
doaj   +1 more source

Facial Anti-Spoofing Using “Clue Maps”

open access: yesSensors
Spoofing attacks (or Presentation Attacks) are easily accessible to facial recognition systems, making the online financial system vulnerable. Thus, it is urgent to develop an anti-spoofing solution with superior generalization ability due to the high ...
Liang Yu Gong   +2 more
doaj   +1 more source

Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal. [PDF]

open access: yesSensors (Basel), 2020
Gluck T   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy