2022
DOI: 10.3390/electronics11050801
|View full text |Cite
|
Sign up to set email alerts
|

Impacts of GPS Spoofing on Path Planning of Unmanned Surface Ships

Abstract: The Artificial Potential Field (APF) method is a classical path planning method for unmanned ships, relying on Global Positioning System (GPS) positioning information for path planning. Unfortunately, once the path planning algorithm uses inaccurate or even fake data, it will lead to ship collision, grounding, or deviation from the course, causing severe economic losses and causing significant security risks to other sailing ships. This paper aims to study the impacts of GPS spoofing on the path planning of un… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…However, they have low computational powers and small memories, making it hard to secure them by applying heavy encryption security algorithms [18], [19]. Another example is the IoT devices communicate with each other based on different communication networks such as Wi-Fi, Near-Field Communication (NFC), and Global Positioning System (GPS) [20]. However, most of these networks are vulnerable to DoS attacks, which affect the availability of accessing data all the time [21], [22].…”
Section: B Wds Security Issuementioning
confidence: 99%
“…However, they have low computational powers and small memories, making it hard to secure them by applying heavy encryption security algorithms [18], [19]. Another example is the IoT devices communicate with each other based on different communication networks such as Wi-Fi, Near-Field Communication (NFC), and Global Positioning System (GPS) [20]. However, most of these networks are vulnerable to DoS attacks, which affect the availability of accessing data all the time [21], [22].…”
Section: B Wds Security Issuementioning
confidence: 99%
“…These attacks encompass sophisticated techniques such as DoS, jamming, and spoofing, each posing distinct challenges to the security and reliability of MASS operations [36]. It is essential to delve into the technical details of these cyberattacks, aligning them with corresponding Tactics, Techniques, and Procedures (TTPs) specific to the MASS context [52].…”
Section: Cyberattacks In Mass Ecosystemmentioning
confidence: 99%
“…Implementing advanced intrusion detection systems and signal processing techniques proves essential in identifying anomalous patterns while developing resilient communication protocols and alternative frequency channels enhances the system's robustness against jamming attempts. DoS Attacks emerge as a critical cybersecurity concern, challenging the system's resilience [41] [52]. To assess its robustness, the study executed a DoS assault by overwhelming the AIS receivers with simultaneous signals generated using our enhanced AISTX in [41].…”
Section: B Jamming Attacksmentioning
confidence: 99%
“…When there are multiple spoofing signals, this method may also fail, and forming a null for the spoofing signal will also cause a certain degree of attenuation of the real signal power [20,21]. Additionally, the cost of large-scale dedicated antenna arrays is high, limiting its practical applications [22][23][24].…”
Section: Introductionmentioning
confidence: 99%