Results 11 to 20 of about 22,758 (191)

Improved Secure Address Resolution Protocol [PDF]

open access: yes, 2014
In this paper, an improved secure address resolution protocol is presented where ARP spoofing attack is prevented. The proposed methodology is a centralised methodology for preventing ARP spoofing attack.
Chaurasia, Vijay Kumar   +2 more
core   +1 more source

Biometrics Evaluation Under Spoofing Attacks [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2014
While more accurate and reliable than ever, the trustworthiness of biometric verification systems is compromised by the emergence of spoofing attacks. Responding to this threat, numerous research publications address isolated spoofing detection, resulting in efficient counter-measures for many biometric modes.
Ivana Chingovska   +2 more
openaire   +1 more source

GNSS Signal Authentication via Power and Distortion Monitoring [PDF]

open access: yes, 2017
We propose a simple low-cost technique that enables civil Global Positioning System (GPS) receivers and other civil global navigation satellite system (GNSS) receivers to reliably detect carry-off spoofing and jamming.
Evans, Brian L.   +3 more
core   +1 more source

A Testbed for Developing and Evaluating GNSS Signal Authentication Techniques [PDF]

open access: yes, 2014
An experimental testbed has been created for developing and evaluating Global Navigation Satellite System (GNSS) signal authentication techniques.
Bhatti, Jahshan A.   +3 more
core   +1 more source

Spoofing attack of drone

open access: yes2018 IEEE 4th International Conference on Computer and Communications (ICCC), 2018
Nowadays, the increasing application of drones makes our lives more and more convenient. Various tasks such as: surveillance, emergency rescue, aerial photography, etc. can be accomplished by drones now. In China, some express companies have begun to use drones to do the deliveries. There are two main ways to navigate a drone.
Zhang Renyu   +3 more
openaire   +3 more sources

Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer [PDF]

open access: yes, 2008
A portable civilian GPS spoofer is implemented on a digital signal processor and used to characterize spoofing effects and develop defenses against civilian spoofing.
Humphreys, Todd E.   +4 more
core   +1 more source

Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-antenna Receiver Defense Against a Portable Civil GPS Spoofer [PDF]

open access: yes, 2011
In this work we demonstrate the use of a dual antenna receiver that employs a receiver-autonomous angle-ofarrival spoofing countermeasure. This defense is conjectured to be effective against all but the most sophisticated spoofing attempts.
Montgomery, Paul Y.
core   +1 more source

The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques [PDF]

open access: yes, 2012
A battery of recorded spoofing scenarios has been compiled for evaluating civil Global Positioning System (GPS) signal authentication techniques. The battery can be considered the data component of an evolving standard meant to define the notion of ...
Bhatti, Jahshan A.   +3 more
core   +1 more source

Spoofing Attacks Against Vehicular FMCW Radar [PDF]

open access: yesProceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, 2021
The safety and security of the passengers in vehicles in the face of cyber attacks is a key element in the automotive industry, especially with the emergence of the Advanced Driver Assistance Systems (ADAS) and the vast improvement in Autonomous Vehicles (AVs). Such platforms use various sensors, including cameras, LiDAR and mmWave radar. These sensors
Komissarov, Rony, Wool, Avishai
openaire   +2 more sources

Revisiting Email Spoofing Attacks

open access: yes, 2018
The email system is the central battleground against phishing and social engineering attacks, and yet email providers still face key challenges to authenticate incoming emails. As a result, attackers can apply spoofing techniques to impersonate a trusted entity to conduct highly deceptive phishing attacks.
Hu, Hang, Wang, Gang
openaire   +2 more sources

Home - About - Disclaimer - Privacy