Results 11 to 20 of about 8,112 (198)
GNSS Spoofing Detection and Mitigation Based on Maximum Likelihood Estimation [PDF]
Spoofing attacks are threatening the global navigation satellite system (GNSS). The maximum likelihood estimation (MLE)-based positioning technique is a direct positioning method originally developed for multipath rejection and weak signal processing. We find this method also has a potential ability for GNSS anti-spoofing since a spoofing attack that ...
Fei Wang, Hong Li, Mingquan Lu
openaire +4 more sources
A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing
This article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites ...
Jaroslaw Magiera
doaj +3 more sources
The proliferation of Software-Defined Networks (SDNs) has introduced unparalleled flexibility and efficiency to network management, but at the same time, it has introduced new challenges in securing network infrastructures.
Vanlalruata Hnamte, Jamal Hussain
doaj +3 more sources
Beamforming Techniques for Resilient Navigation with Small Antenna Arrays
This paper presents a comparative benchmarking of different beamforming techniques for robust multipath and spoofing mitigation in handheld receivers equipped with a small number of antenna elements.
Lucía Pallarés-Rodríguez +4 more
doaj +1 more source
Foundations of GNSS Spoofing Detection and Mitigation with Distributed GNSS SDR Receiver [PDF]
GNSS spoofing is an intentional and malicious action aimed at degrading and suppressing GNSS Positioning, Navigation, and Timing (PNT) services. Since it affects data and information segment of GNSS, it is considered a GNSS information (cyber-) security ...
Mia Filic
doaj +1 more source
To address phasor measurement unit (PMU) vulnerability to spoofing, we propose the use of a set-valued state estimation technique known as stochastic reachability (SR)-based distributed Kalman filter (DKF) that computes secure global positioning system ...
Sriramya Bhamidipati, Grace Gao
doaj +1 more source
GNSS Spoofing Mitigation Using Multiple Receivers
GNSS receivers are vulnerable to spoofing attacks, where false satellite signals are transmitted to trick the receiver to provide false position and/or time estimates. Novel algorithms are proposed for spoofing mitigation by exchanging double differences of pseudorange, or carrier phase, measurements between multiple GNSS receivers.
Stenberg, Niklas +3 more
openaire +3 more sources
Mitigating Address Spoofing Attacks in Hybrid SDN [PDF]
Address spoofing attacks like ARP spoofing and DDoS attacks are mostly launched in a networking environment to degrade the performance. These attacks sometimes break down the network services before the administrator comes to know about the attack condition.
Fahad Ubaid +3 more
openaire +1 more source
Mitigation of GNSS Time Synchronization Attacks in a Multicorrelator Receiver
Global navigation satellite systems (GNSSs) are widely used in various fields to provide high-precision timing. However, their low signal power and open signal structure render GNSS receivers vulnerable to time synchronization attacks (TSAs).
Xiangyong Shang +4 more
doaj +1 more source
Research on flood defense mechanism of SDN control layer:detection and mitigation
Aiming at the problem of spoofing flood defense in the control layer of SDN, a controller defense mechanism (CDM)was proposed, including a flood detection mechanism based on key features multi-classification and a flood mitigation mechanism based on SAVI.
Qizhao ZHOU, Junqing YU, Dong LI
doaj +2 more sources

