2020 IEEE 2nd International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS) 2020
DOI: 10.1109/icecocs50124.2020.9314449
|View full text |Cite
|
Sign up to set email alerts
|

Anti-Jamming techniques for aviation GNSS-based navigation systems: Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Especially in the context of global navigation satellite systems (GNSS), intentional interference such as jamming and spoofing has been on the rise in recent years and can have significant adverse effects on the navigation performance of GNSS receivers, as discussed for example in [ 11 , 12 , 13 , 14 , 15 ].…”
Section: State-of-the-art-review and Paper Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Especially in the context of global navigation satellite systems (GNSS), intentional interference such as jamming and spoofing has been on the rise in recent years and can have significant adverse effects on the navigation performance of GNSS receivers, as discussed for example in [ 11 , 12 , 13 , 14 , 15 ].…”
Section: State-of-the-art-review and Paper Contributionsmentioning
confidence: 99%
“…Future aviation applications, and in particular unmanned aerial vehicles (UAVs), will increasingly rely on GNSS-based navigation and positioning solutions [ 14 , 15 ]. Safety-critical applications, such as those from the aviation domain, require a high capability of anti-spoofing and anti-jamming detection, or, in other words, a high identification accuracy of genuine and malicious transmitters.…”
Section: State-of-the-art-review and Paper Contributionsmentioning
confidence: 99%
“…A comprehensive survey of intentional RFI and countermeasures, including detection, localization, classification, and mitigation, over the last four decades can be found in [ 13 ]. For an overview over the last decade, the interested reader can refer to [ 13 , 14 , 15 , 16 , 17 ] for spoofing and [ 18 , 19 , 20 , 21 ] on jamming.…”
Section: Introductionmentioning
confidence: 99%
“…10 In both cases, jamming disrupts the reception of the legitimate signals and obstructs the attacked communication link. 8 In fact, jamming poses a serious challenge to wireless communication systems and networks, for example, internet of things, e-health, 11 satellite-based navigational systems, 12 smart cities, and smart homes. 13 Furthermore, jamming techniques are rapidly evolving which makes them difficult to mitigate.…”
Section: Introductionmentioning
confidence: 99%