Secure trajectory planning against undetectable spoofing attacks
نویسندگان
چکیده
منابع مشابه
Infinite families of optimal splitting authentication codes secure against spoofing attacks of higher order
We consider the problem of constructing optimal authentication codes with splitting. New infinite families of such codes are obtained. In particular, we establish the first known infinite family of optimal authentication codes with splitting that are secure against spoofing attacks of order two.
متن کاملSecure verification technique for defending IP spoofing attacks
The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attacks in the network, a secure authentication technique is required to defend against spoofing attacks. In order to achieve this, in this paper, we p ropose a (SVT) for defending IP spoofing attacks. Our technique authentic...
متن کاملEnhancing the Security of Visa 3-D Secure against Spoofing Attacks
Visa 3-D Secure is an e-payment system based on the integration of SSL/TLS with the three-domain architecture. It employs cryptographic techniques to secure communication links among participants in e-commerce transactions and also provides credit card verification via Visa Secure Server. Although several security vulnerabilities can be addressed, spoofing attacks are still effective and can be...
متن کاملDetection and Exclusion RAIM Algorithm against Spoofing/Replaying Attacks
Malicious attacks, notably spoofing and replaying, in addition to jamming, have been shown increasingly practical even for attackers without high levels of sophistication. This makes malicious interference and manipulation a significant threat for Global Navigation Satellite Systems (GNSS)-based applications. Receiver Autonomous Integrity Monitoring (RAIM) has been widely used in safety-critica...
متن کاملDefense against DDoS Attacks Using IP Address Spoofing
Distributed Denial of Service (DDoS) attacks is launched by large number of compromised host to interrupt the services of the legitimate users. It is most challenging to defense against such attacks because most of the attacker use source IP address spoofing in order to hide their identity and such attack packets appear to the target server as if they came from a legitimate client. In this pape...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Automatica
سال: 2020
ISSN: 0005-1098
DOI: 10.1016/j.automatica.2019.108655