2015
DOI: 10.11003/jpnt.2015.4.2.057
|View full text |Cite
|
Sign up to set email alerts
|

Effect of Spoofing on Unmanned Aerial Vehicle using Counterfeited GPS Signal

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 64 publications
(24 citation statements)
references
References 2 publications
0
20
0
1
Order By: Relevance
“…, ω N }, according to the value of ς i (t). The idea behind introducing (7) is that by analyzing the output signals, we can decide about the attack occurrence by checking if the received output is compatible with the introduced signals or not.…”
Section: B Signal Generationmentioning
confidence: 99%
See 1 more Smart Citation
“…, ω N }, according to the value of ς i (t). The idea behind introducing (7) is that by analyzing the output signals, we can decide about the attack occurrence by checking if the received output is compatible with the introduced signals or not.…”
Section: B Signal Generationmentioning
confidence: 99%
“…Due to the importance of assessing the vulnerabilities of UAVs, and developing new defense mechanisms, which could help in mitigating them, simulations of cyber attacks on UAVs are being executed [6]. [7] performed a GPS spoofing attack on a quadrotor, resulting in the UAV landing at an incorrect location. A deauthentication attack on a quadrotor was used by [8] to demonstrate its vulnerability, resulting in the loss of control by the operator.…”
Section: Introductionmentioning
confidence: 99%
“…The team found that, when spoofing signals were implanted, not only DLL and PLL tracking loops generate errors, but also pseudo moments could occur linear changes, which in turn led to the wrong navigation results and time offsets. Seong-Hun Seo et al, of Konkuk University in 2015, set up their software-based GNSS signal generator and conducted satellite navigation deceptive attack experiments against UAV [13]. The experimental results showed that despite the specific spoofing protection capabilities of the UAV, the deceptive attack method could accurately cheat the UAV to the target point when the attackers get the grasp of the movement state of the UAV.…”
Section: Introductionmentioning
confidence: 99%
“…Precise aircraft navigation information such as velocity is the basis of the stability control of the UAV [1][2][3][4][5]. The most commonly techniques used to obtain vehicle velocity include the inertial navigation system (INS) [6][7][8], global position system (GPS) [9,10], geomagnetic navigation and a GPS/INS [11][12][13] integrated navigation system. However, the methods mentioned above have problems such as integral and cumulative error, signal loss and the possibility to be interfered by continuously changing electromagnetic signal.…”
Section: Introductionmentioning
confidence: 99%