Results 151 to 160 of about 8,142 (196)
Some of the next articles are maybe not open access.
A GNSS Acquisition Method with the Capability of Spoofing Detection and Mitigation
Chinese Journal of Electronics, 2018For Global navigation satellite system (GLASS), spoofing attack is extremely dangerous and destructive since it can lead GLASS receivers to generate misleading time and position information. Thus, reliable and timely spoofing detection and mitigation methods are of great importance.
Mingquan Lu
exaly +2 more sources
Research on GNSS Spoofing Mitigation Technology Based on Spoofing Correlation Peak Cancellation
IEEE Communications Letters, 2022Bin Yang, Mei Tian, Ya-Wei Ji
exaly +2 more sources
GNSS Spoofing Mitigation in the Position Domain
The International Technical Meeting of the The Institute of Navigation, 2021In this paper we present an alternative approach to spoofing mitigation. We leverage the fact that under most attack modes, both the authentic and spoofed signals are received by the victim. Once an attack is detected by conventional spoofing detection means, the receiver scans the vicinity of each satellite signal’s correlation peak for secondary ...
Fabian Rothmaier +3 more
openaire +1 more source
Recent Trends in Interference Mitigation and Spoofing Detection
International Journal of Embedded and Real-Time Communication Systems, 2012This paper gives a classification of intentional and unintentional threats, such as interference, jamming and spoofing, and discusses some of the recent trends concerning techniques for their detection and mitigation. Despite the fact that these phenomena have been studied since the early stages of Global Positioning System (GPS), they were mainly ...
DOVIS, Fabio +3 more
openaire +2 more sources
A spoofing mitigation technique for dynamic applications
2016 8th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC), 2016Global Navigation Satellite System (GNSS) is becoming pervasive technology, widely used in many fields, like aviation, railway, maritime and road navigation systems. As a consequence an increasing number of applications are being created and it has become necessary to protect the GNSS receiver from malicious attacks, in order to guarantee the ...
BERARDO, MATTIA +3 more
openaire +2 more sources
On mitigation of pilot spoofing attack
2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017In a time-division duplex (TDD) multiple antenna system, the channel state information (CSI) can be estimated using reverse training. A pilot contamination (spoofing) attack occurs when during the training phase, an adversary also sends identical training (pilot) signal as that of the legitimate receiver. This contaminates channel estimation and alters
openaire +1 more source
Detecting and Mitigating Spoofing Attack Against an Automotive Radar
2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), 2018Applying cyber security mechanisms, such as cryptography, trusted computing, and network intrusion detection, is insufficient to secure cyber-physical systems (CPS) such as smart vehicles, because most sensors (and actuators) are designed without security considerations and remain vulnerable to sensor spoofing attacks in the analog domain.
Prateek Kapoor +2 more
openaire +1 more source
Detection and mitigation of pilot spoofing attack
2017 51st Asilomar Conference on Signals, Systems, and Computers, 2017In a time-division duplex (TDD) multiple antenna system, the channel state information (CSI) can be estimated using reverse training. A pilot contamination (spoofing) attack occurs when during the training phase, an adversary (spoofer) also sends identical training (pilot) signal as that of the legitimate receiver.
openaire +1 more source
Applicability of Null-Steering for Spoofing Mitigation in Civilian GPS
2014 IEEE 79th Vehicular Technology Conference (VTC Spring), 2014Civilian GPS signals are currently used in many critical applications, such as precise timing for power grids and telecommunication networks. Spoofing may cause their improper functioning. It is a threat which emerges with the growing availability of GPS constellation simulators and other devices which may be used to perform such attack. Development of
Jaroslaw Magiera, Ryszard J. Katulski
openaire +1 more source

