Results 151 to 160 of about 8,142 (196)
Some of the next articles are maybe not open access.

A GNSS Acquisition Method with the Capability of Spoofing Detection and Mitigation

Chinese Journal of Electronics, 2018
For Global navigation satellite system (GLASS), spoofing attack is extremely dangerous and destructive since it can lead GLASS receivers to generate misleading time and position information. Thus, reliable and timely spoofing detection and mitigation methods are of great importance.
Mingquan Lu
exaly   +2 more sources

GNSS Spoofing Mitigation in the Position Domain

The International Technical Meeting of the The Institute of Navigation, 2021
In this paper we present an alternative approach to spoofing mitigation. We leverage the fact that under most attack modes, both the authentic and spoofed signals are received by the victim. Once an attack is detected by conventional spoofing detection means, the receiver scans the vicinity of each satellite signal’s correlation peak for secondary ...
Fabian Rothmaier   +3 more
openaire   +1 more source

Recent Trends in Interference Mitigation and Spoofing Detection

International Journal of Embedded and Real-Time Communication Systems, 2012
This paper gives a classification of intentional and unintentional threats, such as interference, jamming and spoofing, and discusses some of the recent trends concerning techniques for their detection and mitigation. Despite the fact that these phenomena have been studied since the early stages of Global Positioning System (GPS), they were mainly ...
DOVIS, Fabio   +3 more
openaire   +2 more sources

A spoofing mitigation technique for dynamic applications

2016 8th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC), 2016
Global Navigation Satellite System (GNSS) is becoming pervasive technology, widely used in many fields, like aviation, railway, maritime and road navigation systems. As a consequence an increasing number of applications are being created and it has become necessary to protect the GNSS receiver from malicious attacks, in order to guarantee the ...
BERARDO, MATTIA   +3 more
openaire   +2 more sources

On mitigation of pilot spoofing attack

2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017
In a time-division duplex (TDD) multiple antenna system, the channel state information (CSI) can be estimated using reverse training. A pilot contamination (spoofing) attack occurs when during the training phase, an adversary also sends identical training (pilot) signal as that of the legitimate receiver. This contaminates channel estimation and alters
openaire   +1 more source

Detecting and Mitigating Spoofing Attack Against an Automotive Radar

2018 IEEE 88th Vehicular Technology Conference (VTC-Fall), 2018
Applying cyber security mechanisms, such as cryptography, trusted computing, and network intrusion detection, is insufficient to secure cyber-physical systems (CPS) such as smart vehicles, because most sensors (and actuators) are designed without security considerations and remain vulnerable to sensor spoofing attacks in the analog domain.
Prateek Kapoor   +2 more
openaire   +1 more source

Detection and mitigation of pilot spoofing attack

2017 51st Asilomar Conference on Signals, Systems, and Computers, 2017
In a time-division duplex (TDD) multiple antenna system, the channel state information (CSI) can be estimated using reverse training. A pilot contamination (spoofing) attack occurs when during the training phase, an adversary (spoofer) also sends identical training (pilot) signal as that of the legitimate receiver.
openaire   +1 more source

Applicability of Null-Steering for Spoofing Mitigation in Civilian GPS

2014 IEEE 79th Vehicular Technology Conference (VTC Spring), 2014
Civilian GPS signals are currently used in many critical applications, such as precise timing for power grids and telecommunication networks. Spoofing may cause their improper functioning. It is a threat which emerges with the growing availability of GPS constellation simulators and other devices which may be used to perform such attack. Development of
Jaroslaw Magiera, Ryszard J. Katulski
openaire   +1 more source

Home - About - Disclaimer - Privacy