Results 21 to 30 of about 8,112 (198)
GNSS Signal Authentication via Power and Distortion Monitoring [PDF]
We propose a simple low-cost technique that enables civil Global Positioning System (GPS) receivers and other civil global navigation satellite system (GNSS) receivers to reliably detect carry-off spoofing and jamming.
Evans, Brian L. +3 more
core +1 more source
As a structural interference, spoofing is difficult to detect by the target receiver while the advent of a repeater makes the implementation of spoofing much easier.
Yanbing Guo, Lingjuan Miao, Xi Zhang
doaj +1 more source
Impact Assessment of GNSS Spoofing Attacks on INS/GNSS Integrated Navigation System
In the face of emerging Global Navigation Satellite System (GNSS) spoofing attacks, there is a need to give a comprehensive analysis on how the inertial navigation system (INS)/GNSS integrated navigation system responds to different kinds of spoofing ...
Yang Liu +3 more
doaj +1 more source
Nowadays, Global Navigation Satellite Systems are the main source for high accuracy positioning and timing. For this reason, they are essential both for everyday activities and services, and for the industrial and critical infrastructure sectors ...
Sara Baldoni +2 more
doaj +1 more source
3D Radio Map-Based GPS Spoofing Detection and Mitigation for Cellular-Connected UAVs
With the upcoming 5G and beyond wireless communication system, cellular-connected Unmanned Aerial Vehicles (UAVs) are emerging as a new pattern to give assistance for target searching, emergency rescue, and network recovery.
Yongchao Dang +3 more
doaj +1 more source
The vulnerability of the Global Navigation Satellite System (GNSS) open service signals to spoofing and meaconing poses a risk to the users of safety-of-life applications.
Silvio Semanjski +3 more
doaj +1 more source
Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-antenna Receiver Defense Against a Portable Civil GPS Spoofer [PDF]
In this work we demonstrate the use of a dual antenna receiver that employs a receiver-autonomous angle-ofarrival spoofing countermeasure. This defense is conjectured to be effective against all but the most sophisticated spoofing attempts.
Montgomery, Paul Y.
core +1 more source
GPS Spoofing Attacks in FANETs: A Systematic Literature Review
Flying Ad-Hoc Networks (FANETs) are groups of UAVs connected in an Ad-Hoc manner to accomplish a common mission. The widespread acceptance of UAVs due to their low cost and high efficiency has attracted malicious security attacks against them.
Ala Altaweel +2 more
doaj +1 more source
Security Code Smells in Android ICC [PDF]
Android Inter-Component Communication (ICC) is complex, largely unconstrained, and hard for developers to understand. As a consequence, ICC is a common source of security vulnerability in Android apps.
Frischknecht, Patrick +3 more
core +2 more sources
Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer [PDF]
A portable civilian GPS spoofer is implemented on a digital signal processor and used to characterize spoofing effects and develop defenses against civilian spoofing.
Humphreys, Todd E. +4 more
core +1 more source

