Results 151 to 160 of about 22,160 (195)

Spoofing Attack of Drone

2018 IEEE 4th International Conference on Computer and Communications (ICCC), 2018
This paper investigates the requirements of spoofing attack on multiple drones which are navigated by GPS signals and can communicate with each other. Moreover, the performance of spoofing attack with different numbers of counterfeit signals is studied.
Zhang Renyu   +3 more
openaire   +3 more sources

Detecting and Localizing Wireless Spoofing Attacks

2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2007
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. Although the identity of a node can be verified through cryptographic authentication, authentication is not always possible because it requires key management and additional infrastructural overhead.
Yingying Chen 0001   +2 more
openaire   +1 more source

Quickest detection of GPS spoofing attack

MILCOM 2012 - 2012 IEEE Military Communications Conference, 2012
GPS is being increasingly used in critical infrastructures in modern society. Therefore, the reliability of GPS is extremely important. Recently, the vulnerability of GPS to a spoofing attack has been discussed in the literature. A malicious attacker may spoof a GPS receiver, causing it to provide incorrect navigation and timing information, which may ...
Zhenghao Zhang   +3 more
openaire   +1 more source

On the Limitations of GPS Time-Spoofing Attacks

2020 43rd International Conference on Telecommunications and Signal Processing (TSP), 2020
In recent years, there has been a number of incidents against the security of the location services. Jamming and spoofing attacks are intensively studied to find effective detection and mitigation techniques to provide secure signaling. However, the effects of the number of spoofing signals are not completely understood yet.
Mehmet Özgün Demir   +2 more
openaire   +2 more sources

On mitigation of pilot spoofing attack

2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017
In a time-division duplex (TDD) multiple antenna system, the channel state information (CSI) can be estimated using reverse training. A pilot contamination (spoofing) attack occurs when during the training phase, an adversary also sends identical training (pilot) signal as that of the legitimate receiver. This contaminates channel estimation and alters
openaire   +1 more source

On Iris Spoofing Using Print Attack

2014 22nd International Conference on Pattern Recognition, 2014
Human iris contains rich textural information which serves as the key information for biometric identifications. It is very unique and one of the most accurate biometric modalities. However, spoofing techniques can be used to obfuscate or impersonate identities and increase the risk of false acceptance or false rejection.
Priyanshu Gupta   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy