Results 21 to 30 of about 22,160 (195)
GNSS Spoofing Detection Based on Coupled Visual/Inertial/GNSS Navigation System
Spoofing attacks are one of the severest threats for global navigation satellite systems (GNSSs). This kind of attack can damage the navigation systems of unmanned air vehicles (UAVs) and other unmanned vehicles (UVs), which are highly dependent on GNSSs.
Nianzu Gu, Fei Xing, Zheng You
doaj +1 more source
Trustworthy Users: Using IOTA and IPFS for Attribute Validation in CP-ABE and dCP-ABE Schemes
Attribute spoofing is a major security threat in information exchange solutions based on Ciphertext-Policy Attribute-Based-Encryption (CP-ABE) and distributed CP-ABE (dCP-ABE), which can compromise privacy and security.
Aintzane Mosteiro-Sanchez +3 more
doaj +1 more source
Random-Training-Assisted Pilot Spoofing Detection and Security Enhancement
The pilot spoofing attack is considered as an active eavesdropping activity launched by an adversary during the reverse channel training phase. By transmitting the same pilot signal as the legitimate user, the pilot spoofing attack is able to degrade the
Xiaowen Tian, Ming Li, Qian Liu
doaj +1 more source
Improved Secure Address Resolution Protocol [PDF]
In this paper, an improved secure address resolution protocol is presented where ARP spoofing attack is prevented. The proposed methodology is a centralised methodology for preventing ARP spoofing attack.
Chaurasia, Vijay Kumar +2 more
core +1 more source
Synthetic GNSS spoofing data generation using field recorded signals
With the increase in GNSS user base, the studies of threats and vulnerabilities of GNSS system are also increased. Among the threats, spoofing is of particular interest because of the risk associated with it. The studies on spoofing are generally limited
Abdul Malik Khan +2 more
doaj +1 more source
Global navigation satellite systems (GNSS) sensors estimate its position, velocity, and time (PVT) using pseudorange measurements. When there is no interference, the pseudoranges are due to authentic satellites, and the bearings is distinguishable ...
Bethi Pardhasaradhi +4 more
doaj +1 more source
GNSS Signal Authentication via Power and Distortion Monitoring [PDF]
We propose a simple low-cost technique that enables civil Global Positioning System (GPS) receivers and other civil global navigation satellite system (GNSS) receivers to reliably detect carry-off spoofing and jamming.
Evans, Brian L. +3 more
core +1 more source
Revisiting Email Spoofing Attacks
The email system is the central battleground against phishing and social engineering attacks, and yet email providers still face key challenges to authenticate incoming emails. As a result, attackers can apply spoofing techniques to impersonate a trusted entity to conduct highly deceptive phishing attacks.
Hang Hu 0002, Gang Wang 0011
openaire +2 more sources
Spoofing Control Strategy for Precise Position Offset Based on INS/GNSS Tightly Coupled Navigation
To deceive Inertial Navigation System(INS)/Global Navigation Satellite System(GNSS) integrated navigation terminals, the entry point is still to inject GNSS spoofing signals to the target system.
Shuhai Lu +6 more
doaj +1 more source
D-ARP: An Efficient Scheme to Detect and Prevent ARP Spoofing
Nowadays, cyber-attack is a severe criminal violation, and it is one of the most active fields of research. A Man-in-the-middle attack (MITM) is a type of cyber-attack in which an unauthorized third party secretly accesses the communication between two ...
Sabah M. Morsy, Dalia Nashat
doaj +1 more source

