2014 Seventh International Symposium on Computational Intelligence and Design 2014
DOI: 10.1109/iscid.2014.131
|View full text |Cite
|
Sign up to set email alerts
|

Civilian Unmanned Aerial Vehicle Vulnerability to GPS Spoofing Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…He et al 13 proposed a GPS spoofing detection scheme based on signal distortion detection. Because the initial phase of GPS signal and C/A code are relatively stable in the frequency of each modulation level.…”
Section: Methods Based On Physical Characteristics Of Gps Signalmentioning
confidence: 99%
See 1 more Smart Citation
“…He et al 13 proposed a GPS spoofing detection scheme based on signal distortion detection. Because the initial phase of GPS signal and C/A code are relatively stable in the frequency of each modulation level.…”
Section: Methods Based On Physical Characteristics Of Gps Signalmentioning
confidence: 99%
“…But with the discovery of cold start attacks and bypass attacks, the adversary can obtain part of the key information from these attacks, the security of the original cryptosystem can no longer be guaranteed. 13 Hanlon et al 14 design a safe antileak scheme. They set up a secure GPS receiver, both receivers will receive the unknown encrypted GPS signal.…”
Section: Methods Based On Cryptographymentioning
confidence: 99%
“…As early as 2011, Iranian air defence forces used deception jamming technology to capture a US "RQ‐170" unmanned reconnaissance aircraft on the country's eastern border, which was the first time that deception jamming technology was applied in actual combat [22]. Humphrey’s team at Texas State University designed an early satellite navigation signal simulator to realise the settings of spoofing signal delay and spoofing power, which laid the platform foundation for the subsequent advancement of deceptive jamming research [23]. Bertold Van den Bergh analysed the risks posed by off‐the‐shelf civilian GPS jammers to UAVs, described and implemented countermeasures using custom hardware and software, tested the proposed solution under ideal and field conditions, and the results showed that the system achieved good performance with a little additional system cost [24].…”
Section: Related Workmentioning
confidence: 99%
“…Some DoS attacks may affect the infotainment system, while others target the CAN bus to disturb the critical parts such as the steering, throttle, and brakes. The ECUs responsible for these parts may be overloaded with DoS attacks, so they fail to initiate commands in real-time to control the vehicle [59][60][61][62].…”
Section: )mentioning
confidence: 99%