A survey on security attacks and defense techniques for connected and autonomous vehicles

M Pham, K Xiong - Computers & Security, 2021 - Elsevier
Autonomous Vehicle has been transforming intelligent transportation systems. As
telecommunication technology improves, autonomous vehicles are getting connected to …

[HTML][HTML] Satellite-based communications security: A survey of threats, solutions, and research challenges

P Tedeschi, S Sciancalepore, R Di Pietro - Computer Networks, 2022 - Elsevier
Satellite-based Communication (SATCOM) systems are gaining renewed momentum in
Industry and Academia, thanks to innovative services introduced by leading tech companies …

The security of autonomous driving: Threats, defenses, and future directions

K Ren, Q Wang, C Wang, Z Qin… - Proceedings of the IEEE, 2019 - ieeexplore.ieee.org
Autonomous vehicles (AVs) have promised to drastically improve the convenience of driving
by releasing the burden of drivers and reducing traffic accidents with more precise control …

Known vulnerabilities of global navigation satellite systems, status, and potential mitigation techniques

RT Ioannides, T Pany, G Gibbons - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Global navigation satellite systems (GNSS) like GPS but also Galileo, GLONASS, and
Beidou represent an important infrastructure to our society. They provide position and timing …

Hostile control of ships via false GPS signals: Demonstration and detection

J Bhatti, TE Humphreys - … : Journal of the Institute of Navigation, 2017 - Wiley Online Library
An attacker's ability to control a maritime surface vessel by broadcasting counterfeit civil
Global Positioning System (GPS) signals is analyzed and demonstrated. The aim of this …

Mapping the values of IoT

R Nicolescu, M Huth, P Radanliev… - Journal of Information …, 2018 - journals.sagepub.com
We investigate the emerging meanings of “value” associated with the Internet of Things.
Given the current political economy, we argue that the multiple meanings of “value” cannot …

GNSS signal authentication via power and distortion monitoring

KD Wesson, JN Gross, TE Humphreys… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We propose a simple low-cost technique that enables civil global positioning system
receivers and other civil global navigation satellite system (GNSS) receivers to reliably …

Crowd-GPS-Sec: Leveraging crowdsourcing to detect and localize GPS spoofing attacks

K Jansen, M Schäfer, D Moser… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
The aviation industry's increasing reliance on GPS to facilitate navigation and air traffic
monitoring opens new attack vectors with the purpose of hijacking UAVs or interfering with …

GNSS vulnerabilities and existing solutions: A review of the literature

J Zidan, EI Adegoke, E Kampert, SA Birrell… - IEEE …, 2020 - ieeexplore.ieee.org
This literature review paper focuses on existing vulnerabilities associated with global
navigation satellite systems (GNSSs). With respect to the civilian/non encrypted GNSSs, they …

Covert spoofing algorithm of UAV based on GPS/INS-integrated navigation

Y Guo, M Wu, K Tang, J Tie, X Li - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
A covert spoofing algorithm of an unmanned aerial vehicle (UAV) based on GPS/inertial-
navigation-system-integrated navigation is analyzed in this paper. The proposed algorithm …