نتایج جستجو برای: gps spoofing
تعداد نتایج: 34969 فیلتر نتایج به سال:
Unmanned aerial vehicles (UAVs) are an emerging technology in the 5G-and-beyond systems with promise of assisting cellular communications and supporting IoT deployment remote density areas. Safe secure navigation is essential for UAV autonomous deployment. Indeed, opensource simulator can use commercial software-defined radio tools to generate fake global positioning system (GPS) signals spoof ...
Introduction/purpose: The paper provides a review of recent research in the field GPS and ADS-B spoofing. Systems that rely on satellite positioning technology can be targeted by spoofing order to generate incorrect positioning/timing, which is accomplished inserting false signals into "victim's" receiver. Attackers try insert information systems that, for example, provide navigation airplanes ...
A prominent security threat to unmanned aerial vehicle (UAV) is capture it by GPS spoofing, in which the attacker manipulates signal of UAV it. This paper introduces an anti-spoofing model mitigate impact spoofing attack on mission security. In this model, linear regression (LR) used predict and optimal route its destination. On basis, a countermeasure mechanism proposed reduce attack. Confront...
امروزه بسیاری از سامانه های نظامی و تجاری از سیستم های [1]gps برای مکان یابی استفاده می کنند. یکی از تهدیدهایی که به سیستم های gps آسیب وارد می کند، گمراه سازی[2] است. در گمراه سازی، سیگنالی شبیه سیگنال gps تولید می شود که حاوی اطلاعات غلط است و گیرنده gps به اشتباه سیگنال آن را آشکار سازی کرده و موقعیت مکانی خود را از روی آن بدست می آورد و به این ترتیب مکان خود را به اشتباه محاسبه می کند و گمر...
Modern vehicular systems rely on the Global Positioning System (GPS) technology to provide accurate and timely services. However, GPS has been proved be characterized by an intrinsic insecure design, thus being subject several security attacks. Current solutions can reliably detect spoofing attacks leveraging physical features of received signals or resorting multiple antennas. these techniques...
In recent years, security of autonomous vehicles is emerging as popular research topics. Especially, autonomous vehicles are equipped with many sensors such as GPS, IMU, wheel encoders and some of them are vulnerable to the attack, such as spoofing. Our objective is to detect and classify attacks of the right encoder sensor by using variables of GPS, IMU, two wheel encoder sensors. We also anal...
Many operations in power grids, such as fault detection and event location estimation, depend on precise timing information. In this paper, a novel Time Synchronization Attack (TSA) is proposed to attack the timing information in smart grid. Since many applications in smart grid utilize synchronous measurements and most of the measurement devices are equipped with global positioning system (GPS...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید