127
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      R2U2: monitoring and diagnosis of security threats for unmanned aerial systems

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references32

          • Record: found
          • Abstract: not found
          • Article: not found

          Specifying real-time properties with metric temporal logic

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            GNSS Spoofing and Detection

              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques

              GPS-dependent positioning, navigation, and timing synchronization procedures have a significant impact on everyday life. Therefore, such a widely used system increasingly becomes an attractive target for illicit exploitation by terrorists and hackers for various motives. As such, spoofing and antispoofing algorithms have become an important research topic within the GPS discipline. This paper will provide a review of recent research in the field of GPS spoofing/anti-spoofing. The vulnerability of GPS to a spoofing attack will be investigated and then different spoofing generation techniques will be discussed. After introducing spoofing signal model, a brief review of recently proposed anti-spoofing techniques and their performance in terms of spoofing detection and spoofing mitigation will be provided. Limitations of anti-spoofing algorithms will be discussed and some methods will be introduced to ameliorate these limitations. In addition, testing the spoofing/anti-spoofing methods is a challenging topic that encounters some limitations due to stringent emission regulations. This paper will also provide a review of different test scenarios that have been adopted for testing anti-spoofing techniques.
                Bookmark

                Author and article information

                Journal
                Formal Methods in System Design
                Form Methods Syst Des
                Springer Nature America, Inc
                0925-9856
                1572-8102
                August 2017
                April 12 2017
                August 2017
                : 51
                : 1
                : 31-61
                Article
                10.1007/s10703-017-0275-x
                fee305a0-e456-4f90-b89c-6a7fbda9433f
                © 2017

                http://creativecommons.org/licenses/by/4.0

                History

                Comments

                Comment on this article