Results 71 to 80 of about 7,963 (189)
Two-Step Trajectory Spoofing Algorithm for Loosely Coupled GNSS/IMU and NIS Sequence Detection
Satellite navigation spoofing has become a central issue of jamming technology research because of its serious threat and ability to conceal itself. Increasingly, targets are equipped with more robust GNSS/IMU systems and normalized innovation squared ...
Yangjun Gao, Zhiwei Lv, Lundong Zhang
doaj +1 more source
Access Control in Healthcare IoT: A Comprehensive Survey
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir +3 more
wiley +1 more source
A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing
This article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites ...
Jaroslaw Magiera
doaj +1 more source
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security.
Hanzo, Lajos +3 more
core +1 more source
The Case of Fleeting Orders and Flickering Quotes
ABSTRACT The literature controversially discusses the ambiguous motives and driving forces behind quickly cancelled limit orders (fleeting orders), which are characteristic of high‐frequency markets. In particular, manipulative and dysfunctional characteristics are feared. We analyze top‐of‐book fleeting orders—so‐called flickering quotes—and show with
Markus Ulze +2 more
wiley +1 more source
Taxonomy of IMT Interference on Aeronautical Systems
Abstract The rapid deployment of 5G and future 6G networks has raised concerns about interference with critical aeronautical systems, particularly radio altimeters and Wireless Avionics Intra‐Communications (WAIC). This paper offers a comprehensive taxonomy of the 5G/6G signal interference mechanisms, operational impacts, and mitigation strategies in ...
Valéria C. M. N. Leite, Alison Moraes
wiley +1 more source
A Combined Antijamming and Antispoofing Algorithm for GPS Arrays
The Global Positioning System (GPS), with its accurate positioning and timing information, has become a commonly used navigation instrument for many applications. However, it is susceptible to intentional interference such as jamming and spoofing.
Qiong Yang +3 more
doaj +1 more source
A new global navigation satellite system (GNSS) dataset of digitized RF signals named the Oak Ridge Spoofing and Interference Test Battery (OAKBAT) has been created. OAKBAT contains digitized spoofing signals that serve as both a supporting “sibling,” and an advancement to the widely used Texas Spoofing Test Battery (TEXBAT) dataset [1].
Austin Albright +3 more
openaire +2 more sources
The ubiquitousness of location based services (LBS) has proven effective for many applications such as commercial, military, and emergency responders. Software-defined radio (SDR) has emerged as an adequate framework for development and testing of global
Akopian, David +2 more
core +1 more source
A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley +1 more source

