Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing
نویسندگان
چکیده
منابع مشابه
LBP - TOP Based Countermeasure against Face Spoofing Attacks
User authentication is an important step to protect information and in this field face biometrics is advantageous. Face biometrics is natural, easy to use and less human-invasive. Unfortunately, recent work has revealed that face biometrics is vulnerable to spoofing attacks using low-tech cheap equipments. This article presents a countermeasure against such attacks based on the LBP −TOP operato...
متن کاملProtecting Against Fingerprint Spoofing in Mobile Devices | Synaptics
Biometric forms of authentication are becoming increasingly popular in mobile devices. Passwords and PINs are being replaced by this convenient and more secure form of identification. Although biometric forms of identification provide a higher level of security, hacking and spoofing techniques are also becoming more sophisticated. There are anti-spoofing technologies that can help defend agains...
متن کاملGame-Theoretic Resource Allocation for Protecting Large Public Events
High profile large scale public events are attractive targets for terrorist attacks. The recent Boston Marathon bombings on April 15, 2013 have further emphasized the importance of protecting public events. The security challenge is exacerbated by the dynamic nature of such events: e.g., the impact of an attack at different locations changes over time as the Boston marathon participants and spe...
متن کاملA Game Theoretic Approach for Greening, Pricing, And Advertising Policies in A Green Supply Chain
In this paper, greening, pricing, and advertising policies in a supply chain will be examined with government intervention. The supply chain has two members. First, a manufacturer seeking to determine the wholesale price and the greening level and second, a retailer that has to determine the advertising cost and the retail price. The government is trying to encourage the manufacturer to green t...
متن کاملA Countermeasure against Spoofing and DoS Attacks based on Message Sequence and Temporary ID in CAN
The development of Information and Communications Technologies (ICT) has affected various fields including the automotive industry. Therefore, vehicle network protocols such as Controller Area Network (CAN), Local Interconnect Network (LIN), and FlexRay have been introduced. Although CAN is the most widely used for vehicle network protocol, its security issue is not properly addressed. In this ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Internet of Things Journal
سال: 2020
ISSN: 2327-4662,2372-2541
DOI: 10.1109/jiot.2019.2963337