Results 91 to 100 of about 23,142 (187)
Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source
GNSS Spoofing Network Monitoring Based on Differential Pseudorange
Spoofing is becoming a serious threat to various Global Navigation Satellite System (GNSS) applications, especially for those that require high reliability and security such as power grid synchronization and applications related to first responders and ...
Zhenjun Zhang, Xingqun Zhan
doaj +1 more source
GNSS Spoofing Detection by Means of Signal Quality Monitoring (SQM) Metric Combinations
Global navigation satellite system (GNSS) signal is vulnerable and easily interfered by spoofing because of its opening signal structure and weak signal power.
Chao Sun +4 more
doaj +1 more source
Two-Step Trajectory Spoofing Algorithm for Loosely Coupled GNSS/IMU and NIS Sequence Detection
Satellite navigation spoofing has become a central issue of jamming technology research because of its serious threat and ability to conceal itself. Increasingly, targets are equipped with more robust GNSS/IMU systems and normalized innovation squared ...
Yangjun Gao, Zhiwei Lv, Lundong Zhang
doaj +1 more source
Pilot Spoofing Attack Detection and Countermeasure
In a time-division duplex multiple antenna system, the channel state information can be estimated using reverse training. A pilot spoofing (contamination) attack occurs when during the training phase, an adversary (spoofer) also sends synchronized, identical training (pilot) signal as that of the legitimate receiver.
openaire +1 more source
The use of navigation spoofing techniques can be an effective method of managing the operation of black-flying unmanned aerial vehicles (UAVs). However, more and more UAVs are equipped with inertial measurement units, adopt loosely coupled GNSS/INS ...
Haoyan Chen, Zhijin Wen, Changbiao Lei
doaj +1 more source
The vulnerability of Global Navigation Satellite Systems (GNSS) to spoofing limits their widespread use in military security and national economy. Therefore, fast and accurate detection of GNSS spoofing is of great significance.
Pingping Qu +5 more
doaj +1 more source
An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4
Unmanned Aerial Vehicles (UAVs) are aerial vehicles that can go to a particular position without human control or with remote human control. It is because unmanned control mainly relies on position estimation that a lot of research has been studied on GPS spoofing attacks.
Ji Hyuk Jung +3 more
openaire +2 more sources
GNSS spoofing detection: Theoretical analysis and performance of the Ratio Test metric in open sky
Nowadays more and more applications rely on the information provided by Global Navigation Satellite Systems (GNSSs), but the vulnerability of GNSS signals to interference, jamming and spoofing is a growing concern.
Jie Huang +3 more
doaj +1 more source
GNSS Spoofing Discovery by Using a Type-Based Detector
With the increase in the number of devices relying on Global Navigation Satellite Sustems (GNSS) and the wide use of such technology for critical applications, such as in aviation and autonomous vehicles, security is a main concern.
Runzhou Fan, Harry Leib
doaj +1 more source

