2018 Global Wireless Summit (GWS) 2018
DOI: 10.1109/gws.2018.8686727
|View full text |Cite
|
Sign up to set email alerts
|

Capture of UAVs Through GPS Spoofing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 37 publications
(17 citation statements)
references
References 3 publications
1
16
0
Order By: Relevance
“…Another example of exploiting GPS vulnerability is that of the UnicornTeam, a group of security researchers focusing on systems based on radio technologies. They proved, in [14], through several approaches, that it is possible to spoof a GPS receiver, which the present authors have also demonstrated in [15]. Some more robust systems have already been developed in order to solve the problem of unauthorized drones.…”
Section: Introductionsupporting
confidence: 55%
“…Another example of exploiting GPS vulnerability is that of the UnicornTeam, a group of security researchers focusing on systems based on radio technologies. They proved, in [14], through several approaches, that it is possible to spoof a GPS receiver, which the present authors have also demonstrated in [15]. Some more robust systems have already been developed in order to solve the problem of unauthorized drones.…”
Section: Introductionsupporting
confidence: 55%
“…However, this also leaves the system more vulnerable to spoofing attacks [128] . A fake GNSS signal can be broadcast in an area making the UAV in that area perceive as if it is located in a different position, giving virtual control of the UAV to the spoofer [ 129 , 130 ].…”
Section: Uav Neutralizing Techniquesmentioning
confidence: 99%
“…It is relatively difficult to spoof military drones as they are highly equipped with encryption mechanisms. Spoofing can be done using multiple transmitting antennas [37], in which the attackers transmitting antenna combines with the corresponding receiving antenna and transmits the false signals. The spoofer can take the drone to any trajectory he/she wants without even giving the controller a hint as fake coordinates are sent to the controller at regular intervals.…”
Section: A Security Issues In Dronesmentioning
confidence: 99%