Tuning-Free, Low Memory Robust Estimator to Mitigate GPS Spoofing Attacks
نویسندگان
چکیده
منابع مشابه
Improving Cross Ambiguity Function Using Image Processing Approach to Detect GPS Spoofing Attacks
The Global Positioning System (GPS) is vulnerable to various deliberate and unintentional interferences. Therefore, identifying and coping with various interferences in this system is essential. This paper analyzes a method of reducing the dimensions of Cross Ambiguity Function (CAF) images in improving the identification of spoofing interference at the GPS using Multi-Layer Perceptron Neural N...
متن کاملCrowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks
The aviation industry’s increasing reliance on GPS to facilitate navigation and air traffic monitoring opens new attack vectors with the purpose of hijacking UAVs or interfering with air safety. We propose Crowd-GPS-Sec to detect and localize GPS spoofing attacks on moving airborne targets such as UAVs or commercial airliners. Unlike previous attempts to secure GPS, Crowd-GPS-Sec neither requir...
متن کاملA Robust PMU Placement Method Against Spoofing Attacks; Spoofing Detection and Data Refinement
In some recent articles, the spoofing of Phasor measurement unit (PMU) GPS receiver has been highlighted as a threat to power grid protection system. Having spoofed PMU GPS signals, one can manipulate the measurements and inject bad data to power grid protection system. The previous anti spoofing methods are all based on GPS signal analysis. The mentioned methods are just able to detect spoofin...
متن کاملEvaluation of the vulnerability of phasor measurement units to GPS spoofing attacks
Results from Global Positioning System (GPS) spoofing tests against Phasor Measurement Units (PMUs) are presented, demonstrating that PMUs are vulnerable to spoofing attacks. A GPS spoofer can manipulate PMU time stamps by injecting a counterfeit ensemble of GPS signals into the antenna of the PMU’s time reference receiver. A spoofer-induced timing error of only a few tens of microseconds cause...
متن کاملRevisiting Email Spoofing Attacks
The email system is the central battleground against phishing and social engineering attacks, and yet email providers still face key challenges to authenticate incoming emails. As a result, attackers can apply spoofing techniques to impersonate a trusted entity to conduct highly deceptive phishing attacks. In this work, we study email spoofing to answer three key questions: (1) How do email pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Control Systems Letters
سال: 2020
ISSN: 2475-1456
DOI: 10.1109/lcsys.2019.2922497