Spoofing and anti-spoofing technologies of global navigation satellite system: A survey
Z Wu, Y Zhang, Y Yang, C Liang, R Liu - IEEE Access, 2020 - ieeexplore.ieee.org
A large number of facts prove that Global Navigation Satellite System (GNSS) has certain
security risks and is threatened by attacks. In particular, GNSS civilian signal receivers have …
security risks and is threatened by attacks. In particular, GNSS civilian signal receivers have …
Seamless GPS/inertial navigation system based on self-learning square-root cubature Kalman filter
To improve the seamless navigation ability of an integrated Global Positioning System
(GPS)/inertial navigation system in GPS-denied environments, a hybrid navigation strategy …
(GPS)/inertial navigation system in GPS-denied environments, a hybrid navigation strategy …
Introduction to IoT security
In a world with “things” and devices interconnected at every level, from wearables to home
and building automation, to smart cities and infrastructure, to smart industries, and to smart …
and building automation, to smart cities and infrastructure, to smart industries, and to smart …
Dynamic GPS spoofing attack detection, localization, and measurement correction exploiting PMU and SCADA
GPS receiver is the source of synchronization in phasor measurement unit (PMU) networks.
While it guarantees time precision, it is vulnerable to cyberattacks, which may modify the …
While it guarantees time precision, it is vulnerable to cyberattacks, which may modify the …
A GPS spoofing detection and classification correlator-based technique using the LASSO
This article proposes a global navigation satellite system (GNSS) spoofing detection and
classification technique for single-antenna receivers. We formulate an optimization problem …
classification technique for single-antenna receivers. We formulate an optimization problem …
WSNEAP: An efficient authentication protocol for IIoT-oriented wireless sensor networks
F Yi, L Zhang, L Xu, S Yang, Y Lu, D Zhao - Sensors, 2022 - mdpi.com
With the development of the Industrial Internet of Things (IIoT), industrial wireless sensors
need to upload the collected private data to the cloud servers, resulting in a large amount of …
need to upload the collected private data to the cloud servers, resulting in a large amount of …
Global autonomous positioning in GNSS-challenged environments: A bioinspired strategy by polarization pattern
J Yang, X Liu, Q Zhang, T Du… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
How to determine the absolute position of users, such as underwater autonomous vehicles,
ships or other long-range vehicles, is a fascinating and challenging issue, especially in …
ships or other long-range vehicles, is a fascinating and challenging issue, especially in …
UAVs path deviation attacks: Survey and research challenges
Recently, Unmanned Aerial Vehicles (UAVs) are employed for a plethora of civilian
applications. Such flying vehicles can accomplish tasks under the pilot's eyesight within the …
applications. Such flying vehicles can accomplish tasks under the pilot's eyesight within the …
Rejection of smooth GPS time synchronization attacks via sparse techniques
This article presents a novel time synchronization attack (TSA) model for the Global
Positioning System (GPS) based on clock data behavior changes in a higher-order …
Positioning System (GPS) based on clock data behavior changes in a higher-order …
Multi-period power system state estimation with PMUs under GPS spoofing attacks
This paper introduces a dynamic network model together with a phasor measurement unit
(PMU) measurement model suitable for power system state estimation under spoofing …
(PMU) measurement model suitable for power system state estimation under spoofing …