Development status and challenges of anti-spoofing technology of GNSS/INS integrated navigation
The threat of spoofing interference has posed a severe challenge to the security application of Global Navigation Satellite System (GNSS). It is particularly urgent and critical to carry out in-depth defense research on spoofing interference.
Lei Wang +11 more
doaj +1 more source
A New Threat for Pseudorange-Based RAIM: Adversarial Attacks on GNSS Positioning
Global Navigation Satellite System (GNSS) signals are very vulnerable to spoofing due to the low power level and opening service mode. Although pseudorange-based Receiver Autonomous Integrity Monitoring (RAIM) method performances effectively in spoofing ...
Yuan Sun, Li Fu
doaj +1 more source
Pilot Spoofing Attack Detection and Countermeasure
In a time-division duplex multiple antenna system, the channel state information can be estimated using reverse training. A pilot spoofing (contamination) attack occurs when during the training phase, an adversary (spoofer) also sends synchronized, identical training (pilot) signal as that of the legitimate receiver.
openaire +1 more source
Deep Learning-Based Location Spoofing Attack Detection and Time-of-Arrival Estimation through Power Received in IoT Networks. [PDF]
Aldosari W.
europepmc +1 more source
A GPS Spoofing Generator Using an Open Sourced Vector Tracking-Based Receiver
Spoofing can seriously threaten the use of the Global Positioning System (GPS) in critical applications such as positioning and navigation of autonomous vehicles.
Qian Meng +4 more
doaj +1 more source
A Combined Antijamming and Antispoofing Algorithm for GPS Arrays
The Global Positioning System (GPS), with its accurate positioning and timing information, has become a commonly used navigation instrument for many applications. However, it is susceptible to intentional interference such as jamming and spoofing.
Qiong Yang +3 more
doaj +1 more source
A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing
This article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites ...
Jaroslaw Magiera
doaj +1 more source
True image construction in quantum-secured single-pixel imaging under spoofing attack
In this paper, we introduce a quantum-secured single-pixel imaging technique designed to withstand spoofing attacks, wherein adversaries attempt to deceive imaging systems with fake signals.
Jaesung Heo +3 more
doaj +1 more source
Facial Anti-Spoofing Using “Clue Maps”
Spoofing attacks (or Presentation Attacks) are easily accessible to facial recognition systems, making the online financial system vulnerable. Thus, it is urgent to develop an anti-spoofing solution with superior generalization ability due to the high ...
Liang Yu Gong +2 more
doaj +1 more source
Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal. [PDF]
Gluck T +4 more
europepmc +1 more source

