Results 91 to 100 of about 23,142 (187)

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

GNSS Spoofing Network Monitoring Based on Differential Pseudorange

open access: yesSensors, 2016
Spoofing is becoming a serious threat to various Global Navigation Satellite System (GNSS) applications, especially for those that require high reliability and security such as power grid synchronization and applications related to first responders and ...
Zhenjun Zhang, Xingqun Zhan
doaj   +1 more source

GNSS Spoofing Detection by Means of Signal Quality Monitoring (SQM) Metric Combinations

open access: yesIEEE Access, 2018
Global navigation satellite system (GNSS) signal is vulnerable and easily interfered by spoofing because of its opening signal structure and weak signal power.
Chao Sun   +4 more
doaj   +1 more source

Two-Step Trajectory Spoofing Algorithm for Loosely Coupled GNSS/IMU and NIS Sequence Detection

open access: yesIEEE Access, 2019
Satellite navigation spoofing has become a central issue of jamming technology research because of its serious threat and ability to conceal itself. Increasingly, targets are equipped with more robust GNSS/IMU systems and normalized innovation squared ...
Yangjun Gao, Zhiwei Lv, Lundong Zhang
doaj   +1 more source

Pilot Spoofing Attack Detection and Countermeasure

open access: yesIEEE Transactions on Communications, 2018
In a time-division duplex multiple antenna system, the channel state information can be estimated using reverse training. A pilot spoofing (contamination) attack occurs when during the training phase, an adversary (spoofer) also sends synchronized, identical training (pilot) signal as that of the legitimate receiver.
openaire   +1 more source

Optimization of covert spoofing parameters for loosely coupled GNSS/INS systems based on improved genetic algorithm

open access: yesScientific Reports
The use of navigation spoofing techniques can be an effective method of managing the operation of black-flying unmanned aerial vehicles (UAVs). However, more and more UAVs are equipped with inertial measurement units, adopt loosely coupled GNSS/INS ...
Haoyan Chen, Zhijin Wen, Changbiao Lei
doaj   +1 more source

Generalized Likelihood Ratio Satellite Navigation Spoofing Detection Algorithm Based on Moving Variance

open access: yesIEEE Access
The vulnerability of Global Navigation Satellite Systems (GNSS) to spoofing limits their widespread use in military security and national economy. Therefore, fast and accurate detection of GNSS spoofing is of great significance.
Pingping Qu   +5 more
doaj   +1 more source

An Analysis of GPS Spoofing Attack and Efficient Approach to Spoofing Detection in PX4

open access: yesIEEE Access
Unmanned Aerial Vehicles (UAVs) are aerial vehicles that can go to a particular position without human control or with remote human control. It is because unmanned control mainly relies on position estimation that a lot of research has been studied on GPS spoofing attacks.
Ji Hyuk Jung   +3 more
openaire   +2 more sources

GNSS spoofing detection: Theoretical analysis and performance of the Ratio Test metric in open sky

open access: yesICT Express, 2016
Nowadays more and more applications rely on the information provided by Global Navigation Satellite Systems (GNSSs), but the vulnerability of GNSS signals to interference, jamming and spoofing is a growing concern.
Jie Huang   +3 more
doaj   +1 more source

GNSS Spoofing Discovery by Using a Type-Based Detector

open access: yesIEEE Access
With the increase in the number of devices relying on Global Navigation Satellite Sustems (GNSS) and the wide use of such technology for critical applications, such as in aviation and autonomous vehicles, security is a main concern.
Runzhou Fan, Harry Leib
doaj   +1 more source

Home - About - Disclaimer - Privacy