Results 21 to 30 of about 8,112 (198)

GNSS Signal Authentication via Power and Distortion Monitoring [PDF]

open access: yes, 2017
We propose a simple low-cost technique that enables civil Global Positioning System (GPS) receivers and other civil global navigation satellite system (GNSS) receivers to reliably detect carry-off spoofing and jamming.
Evans, Brian L.   +3 more
core   +1 more source

Spoofing Detection and Mitigation in a Multi-correlator GPS Receiver Based on the Maximum Likelihood Principle

open access: yesSensors, 2018
As a structural interference, spoofing is difficult to detect by the target receiver while the advent of a repeater makes the implementation of spoofing much easier.
Yanbing Guo, Lingjuan Miao, Xi Zhang
doaj   +1 more source

Impact Assessment of GNSS Spoofing Attacks on INS/GNSS Integrated Navigation System

open access: yesSensors, 2018
In the face of emerging Global Navigation Satellite System (GNSS) spoofing attacks, there is a need to give a comprehensive analysis on how the inertial navigation system (INS)/GNSS integrated navigation system responds to different kinds of spoofing ...
Yang Liu   +3 more
doaj   +1 more source

On the Use of Differential Correction Clustering for Facing Spoofing Attacks to GNSS Augmentation Networks

open access: yesIEEE Access, 2020
Nowadays, Global Navigation Satellite Systems are the main source for high accuracy positioning and timing. For this reason, they are essential both for everyday activities and services, and for the industrial and critical infrastructure sectors ...
Sara Baldoni   +2 more
doaj   +1 more source

3D Radio Map-Based GPS Spoofing Detection and Mitigation for Cellular-Connected UAVs

open access: yesIEEE Transactions on Machine Learning in Communications and Networking, 2023
With the upcoming 5G and beyond wireless communication system, cellular-connected Unmanned Aerial Vehicles (UAVs) are emerging as a new pattern to give assistance for target searching, emergency rescue, and network recovery.
Yongchao Dang   +3 more
doaj   +1 more source

Use of Supervised Machine Learning for GNSS Signal Spoofing Detection with Validation on Real-World Meaconing and Spoofing Data—Part I

open access: yesSensors, 2020
The vulnerability of the Global Navigation Satellite System (GNSS) open service signals to spoofing and meaconing poses a risk to the users of safety-of-life applications.
Silvio Semanjski   +3 more
doaj   +1 more source

Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-antenna Receiver Defense Against a Portable Civil GPS Spoofer [PDF]

open access: yes, 2011
In this work we demonstrate the use of a dual antenna receiver that employs a receiver-autonomous angle-ofarrival spoofing countermeasure. This defense is conjectured to be effective against all but the most sophisticated spoofing attempts.
Montgomery, Paul Y.
core   +1 more source

GPS Spoofing Attacks in FANETs: A Systematic Literature Review

open access: yesIEEE Access, 2023
Flying Ad-Hoc Networks (FANETs) are groups of UAVs connected in an Ad-Hoc manner to accomplish a common mission. The widespread acceptance of UAVs due to their low cost and high efficiency has attracted malicious security attacks against them.
Ala Altaweel   +2 more
doaj   +1 more source

Security Code Smells in Android ICC [PDF]

open access: yes, 2018
Android Inter-Component Communication (ICC) is complex, largely unconstrained, and hard for developers to understand. As a consequence, ICC is a common source of security vulnerability in Android apps.
Frischknecht, Patrick   +3 more
core   +2 more sources

Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer [PDF]

open access: yes, 2008
A portable civilian GPS spoofer is implemented on a digital signal processor and used to characterize spoofing effects and develop defenses against civilian spoofing.
Humphreys, Todd E.   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy