2020 22nd International Conference on Transparent Optical Networks (ICTON) 2020
DOI: 10.1109/icton51198.2020.9203087
|View full text |Cite
|
Sign up to set email alerts
|

GNSS Location Verification in Connected and Autonomous Vehicles Using in-Vehicle Multimodal Sensor Data Fusion

Abstract: Connected and Autonomous Vehicles (CAVs) rely on Global Navigation Satellite Systems (GNSS), e.g., the Global Positioning System (GPS), for the provision of accurate location information for various functionalities including Vehicle-to-Vehicle/Infrastructure (V2V/V2I) communication and self-navigation. However, GNSSbased location awareness is prone to spoofing attacks, where the attacker generates counterfeit satellite signals. This in turn poses a serious threat to the CAV, e.g., car, drone, etc., as well as … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Spurious signals can be easily detected as the signal looks different from typical satellite signals. Adding location verification, cryptography, cooperative GPS receiver through information exchange with neighboring vehicles, and using message authentication can defend vehicle's GPS from spoofing and jamming attacks (Heng et al, 2015; Milaat & Liu, 2018; Souli et al, 2020). A summary of cyberattacks and countermeasures concerning CAV sensors is presented in Table 2.…”
Section: Cav Cybersecuritymentioning
confidence: 99%
See 2 more Smart Citations
“…Spurious signals can be easily detected as the signal looks different from typical satellite signals. Adding location verification, cryptography, cooperative GPS receiver through information exchange with neighboring vehicles, and using message authentication can defend vehicle's GPS from spoofing and jamming attacks (Heng et al, 2015; Milaat & Liu, 2018; Souli et al, 2020). A summary of cyberattacks and countermeasures concerning CAV sensors is presented in Table 2.…”
Section: Cav Cybersecuritymentioning
confidence: 99%
“…These attacks can be conducted in isolation or in support of other categories of attacks. A malicious node can either physically join the Ethernet network utilizing a free switch port (Sommer et al, 2019) or can remotely access the network by user-associated security negligence. • Traffic confidentiality attacks: This category of attack affects authentication and privacy.…”
Section: Ethernet Attacksmentioning
confidence: 99%
See 1 more Smart Citation