Tuning-Free, Low Memory Robust Estimator to Mitigate GPS Spoofing Attacks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Cross Ambiguity Function Using Image Processing Approach to Detect GPS Spoofing Attacks

The Global Positioning System (GPS) is vulnerable to various deliberate and unintentional interferences. Therefore, identifying and coping with various interferences in this system is essential. This paper analyzes a method of reducing the dimensions of Cross Ambiguity Function (CAF) images in improving the identification of spoofing interference at the GPS using Multi-Layer Perceptron Neural N...

متن کامل

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks

The aviation industry’s increasing reliance on GPS to facilitate navigation and air traffic monitoring opens new attack vectors with the purpose of hijacking UAVs or interfering with air safety. We propose Crowd-GPS-Sec to detect and localize GPS spoofing attacks on moving airborne targets such as UAVs or commercial airliners. Unlike previous attempts to secure GPS, Crowd-GPS-Sec neither requir...

متن کامل

A Robust PMU Placement Method Against Spoofing Attacks; Spoofing Detection and Data Refinement

In some recent articles, the spoofing of Phasor measurement unit (PMU) GPS receiver has been highlighted as a threat to power grid protection system. Having spoofed PMU GPS signals, one can manipulate the measurements and inject bad data to power grid protection system. The previous anti spoofing methods are all based on GPS signal analysis. The mentioned methods are just able to detect spoofin...

متن کامل

Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks

Results from Global Positioning System (GPS) spoofing tests against Phasor Measurement Units (PMUs) are presented, demonstrating that PMUs are vulnerable to spoofing attacks. A GPS spoofer can manipulate PMU time stamps by injecting a counterfeit ensemble of GPS signals into the antenna of the PMU’s time reference receiver. A spoofer-induced timing error of only a few tens of microseconds cause...

متن کامل

Revisiting Email Spoofing Attacks

The email system is the central battleground against phishing and social engineering attacks, and yet email providers still face key challenges to authenticate incoming emails. As a result, attackers can apply spoofing techniques to impersonate a trusted entity to conduct highly deceptive phishing attacks. In this work, we study email spoofing to answer three key questions: (1) How do email pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Control Systems Letters

سال: 2020

ISSN: 2475-1456

DOI: 10.1109/lcsys.2019.2922497