Visual/Inertial/GNSS Integrated Navigation System under GNSS Spoofing Attack

نویسندگان

چکیده

Visual/Inertial/GNSS (VIG) integrated navigation and positioning systems are widely used in unmanned vehicles other systems. This VIG system is vulnerable to of GNSS spoofing attacks. Relevant research on the harm that causes performance analyses under not sufficient. In this paper, an open-source algorithm, VINS-Fusion, based nonlinear optimization, analyze a attack. The influence visual inertial odometer (VIO) scale estimation error transformation matrix deviation transition period detection analyzed. Deviation correction methods GNSS-assisted compensation coefficient method optimal pose selection proposed for VIG-integrated areas. For area can revisit many times, global map-matching proposed. An outfield experiment with attack carried out paper. result shows that, even if measurements seriously affected by spoofing, still run independently, following preset waypoint. method, depress circumstances

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Face Recognition Systems under Spoofing Attack

Face recognition system is one of the most successful application of computer vision, which has been deployed largely in recent years. In last decade, several algorithms for face recognition have been proposed in the literature. To increase reliability of face recognition systems, the systems must be able to differentiate between real genuine faces and fake faces (spoofed faces). In this paper,...

متن کامل

Multiple Antennas Secure Transmission under Pilot Spoofing and Jamming Attack

Transmitter-side channel state information (CSI) of the legitimate destination plays a critical role in physical layer secure transmissions. However, channel training procedure is vulnerable to the pilot spoofing attack (PSA) or pilot jamming attack (PJA) by an active eavesdropper (Eve), which inevitably results in severe private information leakage. In this paper, we propose a random channel t...

متن کامل

Attack Class: Address Spoofing

We present an analysis of a class of attacks we call address spoofing. Fundamentals of internetwork routing and communication are presented, followed by a discussion of the address spoofing class. The attack class is made concrete with a discussion of a well known incident. We conclude by dispelling several myths of purported security solutions including the security provided by one-time passwo...

متن کامل

GNSS/INS/Star Tracker Integrated Navigation System for Earth-Moon Transfer Orbit

Over the last few years, new Global Navigation Satellite System (GNSS) applications have emerged that go far beyond the original objectives of GNSS which was providing position, velocity and timing (PVT) services for land, maritime, and air applications. Indeed, today, GNSS is used in Low Earth Orbit (LEO) for a wide range of applications such as real-time navigation, formation flying, precise ...

متن کامل

Delay Spoofing Reduction in GPS Navigation System based on Time and Transform Domain Adaptive Filtering

Due to widespread use of Global Positioning System (GPS) in different applications, the issue of GPS signal interference cancelation is becoming an increasing concern. One of the most important intentional interferences is spoofing signals. An effective interference (delay spoof) reduction method based on adaptive filtering is developed in this paper. The principle of method is using adaptive f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Remote Sensing

سال: 2022

ISSN: ['2315-4632', '2315-4675']

DOI: https://doi.org/10.3390/rs14235975