A survey on security attacks and defense techniques for connected and autonomous vehicles
M Pham, K Xiong - Computers & Security, 2021 - Elsevier
Autonomous Vehicle has been transforming intelligent transportation systems. As
telecommunication technology improves, autonomous vehicles are getting connected to …
telecommunication technology improves, autonomous vehicles are getting connected to …
[HTML][HTML] Satellite-based communications security: A survey of threats, solutions, and research challenges
Satellite-based Communication (SATCOM) systems are gaining renewed momentum in
Industry and Academia, thanks to innovative services introduced by leading tech companies …
Industry and Academia, thanks to innovative services introduced by leading tech companies …
The security of autonomous driving: Threats, defenses, and future directions
Autonomous vehicles (AVs) have promised to drastically improve the convenience of driving
by releasing the burden of drivers and reducing traffic accidents with more precise control …
by releasing the burden of drivers and reducing traffic accidents with more precise control …
Known vulnerabilities of global navigation satellite systems, status, and potential mitigation techniques
RT Ioannides, T Pany, G Gibbons - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Global navigation satellite systems (GNSS) like GPS but also Galileo, GLONASS, and
Beidou represent an important infrastructure to our society. They provide position and timing …
Beidou represent an important infrastructure to our society. They provide position and timing …
Hostile control of ships via false GPS signals: Demonstration and detection
J Bhatti, TE Humphreys - … : Journal of the Institute of Navigation, 2017 - Wiley Online Library
An attacker's ability to control a maritime surface vessel by broadcasting counterfeit civil
Global Positioning System (GPS) signals is analyzed and demonstrated. The aim of this …
Global Positioning System (GPS) signals is analyzed and demonstrated. The aim of this …
Mapping the values of IoT
R Nicolescu, M Huth, P Radanliev… - Journal of Information …, 2018 - journals.sagepub.com
We investigate the emerging meanings of “value” associated with the Internet of Things.
Given the current political economy, we argue that the multiple meanings of “value” cannot …
Given the current political economy, we argue that the multiple meanings of “value” cannot …
GNSS signal authentication via power and distortion monitoring
We propose a simple low-cost technique that enables civil global positioning system
receivers and other civil global navigation satellite system (GNSS) receivers to reliably …
receivers and other civil global navigation satellite system (GNSS) receivers to reliably …
Crowd-GPS-Sec: Leveraging crowdsourcing to detect and localize GPS spoofing attacks
The aviation industry's increasing reliance on GPS to facilitate navigation and air traffic
monitoring opens new attack vectors with the purpose of hijacking UAVs or interfering with …
monitoring opens new attack vectors with the purpose of hijacking UAVs or interfering with …
GNSS vulnerabilities and existing solutions: A review of the literature
This literature review paper focuses on existing vulnerabilities associated with global
navigation satellite systems (GNSSs). With respect to the civilian/non encrypted GNSSs, they …
navigation satellite systems (GNSSs). With respect to the civilian/non encrypted GNSSs, they …
Covert spoofing algorithm of UAV based on GPS/INS-integrated navigation
Y Guo, M Wu, K Tang, J Tie, X Li - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
A covert spoofing algorithm of an unmanned aerial vehicle (UAV) based on GPS/inertial-
navigation-system-integrated navigation is analyzed in this paper. The proposed algorithm …
navigation-system-integrated navigation is analyzed in this paper. The proposed algorithm …