2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2019
DOI: 10.1109/pimrc.2019.8904129
|View full text |Cite
|
Sign up to set email alerts
|

A detection and identification method based on signal power for different types of Electronic Jamming attacks on GPS signals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…However, GPS and other communication systems are particularly vulnerable to jamming attacks. When a GPS system is jammed, it becomes difficult to determine the accurate position, velocity, and time information required for navigation [105]. IMUs and LIDAR systems, which rely on accurate positional data, can also be affected by jamming attacks.…”
Section: Jamming Attacksmentioning
confidence: 99%
“…However, GPS and other communication systems are particularly vulnerable to jamming attacks. When a GPS system is jammed, it becomes difficult to determine the accurate position, velocity, and time information required for navigation [105]. IMUs and LIDAR systems, which rely on accurate positional data, can also be affected by jamming attacks.…”
Section: Jamming Attacksmentioning
confidence: 99%
“…In the literature [36,44], various approaches are proposed to solve the problem of detecting interference signals from radio systems. The selection of the appropriate method The second factor interfering with measurements in applications requiring the highest precision is the variation of the antenna phase centre position depending on the incident wavelength.…”
Section: Noise In the Gnss Receiver-identificationmentioning
confidence: 99%
“…In the literature [ 36 , 44 ], various approaches are proposed to solve the problem of detecting interference signals from radio systems. The selection of the appropriate method is dictated by the computational capabilities of the GNSS receiver.…”
Section: Simulation Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2019 Esat Elezi proposed a strategy that detects and identifies spoof by signal power [3]. But he did not implement it in the real world, instead, he did the simulation experiment only.…”
Section: Countermeasuresmentioning
confidence: 99%