Simulation and Analysis for Error from Satellite Tracking Segment Anti-spoofing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Satellite and Terrestrial Network Analysis The Performance of Satellite Spoofing

In this paper, we analyze the performance of protocols in a network that consists of both satellite and terrestrial components. One method, proposed by outside research, to improve the performance of network transfers over satellite is to use a performance enhancing proxy often dubbed spoofing. Spoofing involves the transparent splitting of a network connection between the source and destinatio...

متن کامل

On the Use of a Feedback Tracking Architecture for Satellite Navigation Spoofing Detection

In this paper, the Extended Coupled Amplitude Delay Lock Loop (ECADLL) architecture, previously introduced as a solution able to deal with a multipath environment, is revisited and improved to tailor it to spoofing detection purposes. Exploiting a properly-defined decision algorithm, the architecture is able to effectively detect a spoofer attack, as well as distinguish it from other kinds of i...

متن کامل

Simulation of Error Control Schemes for Wireless and Satellite ATM

This paper summarizes the results of a set of simulations of error control schemes for transmission of ATM cells in Wireless and Satellite ATM networks. For Wireless ATM networks, we consider a scheme which incorporates separate FECs for ATM cell header and payload. This scheme is an effective scheme and achieves a trade-off between coding rate and bandwidth. A concatenated FEC scheme (RSCCC) i...

متن کامل

Speaker Recognition Anti-spoofing

Progress in the development of spoofing countermeasures for automatic speaker recognition is less advanced than equivalent work related to other biometric modalities. This chapter outlines the potential for even state-of-the-art automatic speaker recognition systems to be spoofed. While the use of a multitude of different datasets, protocols and metrics complicates the meaningful comparison of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security and Its Applications

سال: 2016

ISSN: 1738-9976,1738-9976

DOI: 10.14257/ijsia.2016.10.8.09