Results 1 to 10 of about 23,123 (168)

Spoofing Detection Using GNSS/INS/Odometer Coupling for Vehicular Navigation [PDF]

open access: yesSensors, 2018
Location information is one of the most vital information required to achieve intelligent and context-aware capability for various applications such as driverless cars. However, related security and privacy threats are a major holdback.
Ali Broumandan, Gérard Lachapelle
doaj   +4 more sources

GNSS Spoofing Detection Based on Coupled Visual/Inertial/GNSS Navigation System [PDF]

open access: yesSensors, 2021
Spoofing attacks are one of the severest threats for global navigation satellite systems (GNSSs). This kind of attack can damage the navigation systems of unmanned air vehicles (UAVs) and other unmanned vehicles (UVs), which are highly dependent on GNSSs.
Nianzu Gu, Fei Xing, Zheng You
doaj   +2 more sources

Research on Detection Technology of Spoofing under the Mixed Narrowband and Spoofing Interference

open access: yesRemote Sensing, 2022
The global navigation satellite system has achieved great success in the civil and military fields and is an important resource for space-time information services.
Long Huang   +6 more
doaj   +2 more sources

GNSS Spoofing Detection Using Q Channel Energy

open access: yesRemote Sensing, 2023
Spoofing interference poses a significant challenge to the Global Navigation Satellite System (GNSS). To effectively combat intermediate spoofing signals, this paper presents an enhanced spoofing detection method based on abnormal energy of the ...
Jiaqi Wang   +5 more
doaj   +3 more sources

Towards Fingerprint Spoofing Detection in the Terahertz Range [PDF]

open access: yesSensors, 2020
Spoofing attacks using imitations of fingerprints of legal users constitute a serious threat. In this study, a terahertz time domain spectroscopy (TDS) setup in a reflection configuration was used for the non-intrusive detection of fingerprint spoofing ...
Norbert Pałka, Marcin Kowalski
doaj   +2 more sources

Performance Analysis of Direct GPS Spoofing Detection Method with AHRS/Accelerometer [PDF]

open access: yesSensors, 2020
The global positioning system (GPS) is an essential technology that provides positioning capabilities and is used in various applications such as navigation, surveying, mapping, robot simultaneous localization and mapping (SLAM), location-based service ...
Keum-Cheol Kwon, Duk-Sun Shim
doaj   +2 more sources

An Accurate GNSS Spoofing Detection Method Based on Multiscale Eye Diagrams [PDF]

open access: yesSensors
Spoofing detection is critical for GNSS security. To address the issues of low detection rates and insufficient coverage in traditional methods, this study proposes an eye diagram detection method based on the multiscale Canny algorithm with minimum ...
Chuanyu Wu, Yuanfa Ji, Xiyan Sun
doaj   +2 more sources

GNSS Spoofing Detection via the Intersection Angle between Two Directions of Arrival in a Single Rotating Antenna [PDF]

open access: yesSensors
Spoofing against the Global Navigation Satellite System (GNSS) is an attack with strong concealment, posing a significant threat to the security of the GNSS. Many strategies have been developed to prevent such attacks, but current detection methods based
Shimiao Chen   +4 more
doaj   +2 more sources

GNSS Spoofing Detection via Self-Consistent Verification of Receiver’s Clock State [PDF]

open access: yesSensors
Global Navigation Satellite System (GNSS) signals are highly vulnerable to spoofing attacks, which can cause positioning errors and pose serious threats to user receivers. Therefore, the development of efficient and reliable spoofing detection techniques
Yu Chen   +10 more
doaj   +2 more sources

A GNSS Spoofing Detection and Direction-Finding Method Based on Low-Cost Commercial Board Components

open access: yesRemote Sensing, 2023
The Global Navigation Satellite System (GNSS) is vulnerable to deliberate spoofing signal attacks. Once the user wrongly locks on the spoofing signal, the wrong position, velocity, and time (PVT) information will be calculated, which will harm the user ...
Pengrui Mao   +9 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy