J Claybrook, S Kildare - Science, 2018 - science.org
… A GPSspoofer sends a fake signal to GPS receivers within a certain distance. The spoofed GPS receivers always indicate the wrong location … MMW radar jamming and spoofingattacks …
… GPS signals are necessary for CAVs to be able to drive autonomously; In a GPSspoofing attack, the received GPS … Essentially, the attacker can transmit fake GPS signals with elevated …
S Khan, S Parkinson - … in Autonomous Transport Systems: Threats …, 2024 - Springer
… use of connected and autonomousvehicles (CAVs)… GPSspoofingattacks (GSA) and existing security solutions. The consequence of GSA revolves around incentives to launch an attack …
K Lim, KM Tuladhar, H Kim - 2019 16th IEEE annual consumer …, 2019 - ieeexplore.ieee.org
… the smart vehicle systems, pilot assisted self-drivingvehicles … a scheme for detecting location spoofingattacks without any … installed on vehicles to detect the locationspoofingattack, so …
F Lin, H Yan, J Li, Z Liu, L Lu, Z Ba… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
… the occurrence of phantom spoofingattacks, our system must know the location of objects in … Given that object detection forms a crucial component in almost all autonomousvehicles (…
F Wang, Y Hong, X Ban - IEEE Transactions on Intelligent …, 2023 - ieeexplore.ieee.org
… to fail the production-grade autonomousdriving systems. … focus on GPSspoofing on ground vehicles in this paper, GPS … GPSspoofingattacks: the constant bias attack and the stealthy …
GC Lewin - Robotics in Education: Current Research and …, 2020 - Springer
… (GPS), a cornerstone technology for autonomousvehicles of all sorts, can be spoofed to cause vehicles to miscalculate their position – an attack … – similar in functionality to a GPS – was …
B Manale, T Mazri - International Journal of Electronic …, 2022 - inderscienceonline.com
… global positioning system (GPS), it is a device that provides the vehicle’s location. … GPS sensor faces many attacks such as spoofing and jammingattacks, and to deal with these attacks, …
W Xu, C Yan, W Jia, X Ji, J Liu - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
… detect objects in the presence of jammingattacks. In case the … , we study both spoofing attacks and jammingattacks. Note … We believe the location information of an attacker can help a …