期刊文献+
共找到1,019篇文章
< 1 2 51 >
每页显示 20 50 100
Robust spoofing detection and mitigation in GNSS using iterative refinement and adaptive filtering
1
作者 Xiaoqin JIN Xiaoyu ZHANG +2 位作者 Shihui XU Shoupeng LI Shuaiyong ZHENG 《Chinese Journal of Aeronautics》 2025年第8期52-64,共13页
Global Navigation Satellite Systems(GNSSs)face significant security threats from spoofing attacks.Typical anti-spoofing methods rely on estimating the delays between spoofing and authentic signals using multicorrelato... Global Navigation Satellite Systems(GNSSs)face significant security threats from spoofing attacks.Typical anti-spoofing methods rely on estimating the delays between spoofing and authentic signals using multicorrelator outputs.However,the accuracy of the delay estimation is limited by the spacing of the correlators.To address this,an innovative anti-spoofing method is introduced,which incorporates distinct coarse and refined stages for more accurate spoofing estimation.By leveraging the coarse delay estimates obtained through maximum likelihood estimation,the proposed method establishes the Windowed Sum of the Relative Delay(WSRD)statistics to detect the presence of spoofing signals.The iterative strategy is then employed to enhance the precision of the delay estimation.To further adapt to variations in the observation noise caused by spoofing intrusions and restore precise position,velocity,and timing solutions,an adaptive extended Kalman filter is proposed.This comprehensive framework offers detection,mitigation,and recovery against spoofing attacks.Experimental validation using datasets from the Texas Spoofing Test Battery(TEXBAT)demonstrates the effectiveness of the proposed anti-spoofing method.With 41 correlators,the method achieves a detection rate exceeding 90%at a false alarm rate of 10-5,with position or time errors below 15 m.Notably,this refined anti-spoofing approach shows robust detection and mitigation capabilities,requiring only a single antenna without the need for additional external sensors.These advancements can significantly contribute to the development of GNSS anti-spoofing measures. 展开更多
关键词 Global Navigation Satellite System(GNSS) spoofing detection spoofing mitigation Multicorrelator Adaptive filters
原文传递
Preventing IP Spoofing in Kubernetes Using eBPF
2
作者 Absar Hussain Abdul Aziz +1 位作者 Hassan Jamil Syed Shoaib Raza 《Computers, Materials & Continua》 2025年第8期3105-3124,共20页
Kubernetes has become the dominant container orchestration platform,withwidespread adoption across industries.However,its default pod-to-pod communicationmechanism introduces security vulnerabilities,particularly IP s... Kubernetes has become the dominant container orchestration platform,withwidespread adoption across industries.However,its default pod-to-pod communicationmechanism introduces security vulnerabilities,particularly IP spoofing attacks.Attackers can exploit this weakness to impersonate legitimate pods,enabling unauthorized access,lateral movement,and large-scale Distributed Denial of Service(DDoS)attacks.Existing security mechanisms such as network policies and intrusion detection systems introduce latency and performance overhead,making them less effective in dynamic Kubernetes environments.This research presents PodCA,an eBPF-based security framework designed to detect and prevent IP spoofing in real time while minimizing performance impact.PodCA integrates with Kubernetes’Container Network Interface(CNI)and uses eBPF to monitor and validate packet metadata at the kernel level.It maintains a container network mapping table that tracks pod IP assignments,validates packet legitimacy before forwarding,and ensures network integrity.If an attack is detected,PodCA automatically blocks spoofed packets and,in cases of repeated attempts,terminates compromised pods to prevent further exploitation.Experimental evaluation on an AWS Kubernetes cluster demonstrates that PodCA detects and prevents spoofed packets with 100%accuracy.Additionally,resource consumption analysis reveals minimal overhead,with a CPU increase of only 2–3%per node and memory usage rising by 40–60 MB.These results highlight the effectiveness of eBPF in securing Kubernetes environments with low overhead,making it a scalable and efficient security solution for containerized applications. 展开更多
关键词 CNCF eBPF PODS spoofING IP DDOS container orchestration PACKETS EKS CNI CNM VM
在线阅读 下载PDF
A triple-band miniaturized end-fire antenna based on odd-mode spoof surface plasmonic polariton waveguide resonator
3
作者 BAI Yukun MAO Mengqun 《Optoelectronics Letters》 2025年第8期462-467,共6页
A triple-band miniaturized end-fire antenna based on the odd modes of spoof surface plasmonic polariton(SSPP)waveguide resonator is proposed in this paper.To meet the ever increasing demand for more communication chan... A triple-band miniaturized end-fire antenna based on the odd modes of spoof surface plasmonic polariton(SSPP)waveguide resonator is proposed in this paper.To meet the ever increasing demand for more communication channels and less antenna sizes,multi-band antennas are currently under intensive investigation.By a novel feeding method,three odd modes are excited on an SSPP waveguide resonator,which performs as an end-fire antenna operating at three bands,7.15-7.26 GHz,11.6-12.2 GHz and 13.5-13.64 GHz.It exhibits reasonably high and stable maximum gains of 5.26 dBi,7.97 dBi and 10.1 dBi and maximum efficiencies of 64%,92%and 98%at the three bands,respectively.Moreover,in the second band,the main beam angle shows a frequency dependence with a total scanning angle of 19°.The miniaturized triple-band antenna has a great potential in wireless communication systems,satellite communication and radar systems. 展开更多
关键词 odd modes waveguide resonatorwhich triple band antenna end fire antenna feeding methodthree spoof surface plasmonic polariton sspp waveguide communication channels miniaturized antenna
原文传递
Anti-Spoofing:Integrated Information Authentication of BeiDou-ⅡCivil Navigation Message 被引量:1
4
作者 Wu Zhijun Liang Cheng +2 位作者 Zhang Yun Liu Rusen Yue Meng 《China Communications》 SCIE CSCD 2024年第9期242-261,共20页
The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can le... The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication. 展开更多
关键词 anti-spoofing AUTHENTICATION BeiDou-II civil navigation message(BDII-CNAV) SIGNATURE spoofing attack
在线阅读 下载PDF
GNSS spoofing detection for single antenna receivers via CNR variation monitoring
5
作者 LIAO Maoyou LYU Xu +1 位作者 MENG Ziyang YOU Zheng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1276-1286,共11页
In this paper,a method for spoofing detection based on the variation of the signal’s carrier-to-noise ratio(CNR)is proposed.This method leverages the directionality of the antenna to induce varying gain changes in th... In this paper,a method for spoofing detection based on the variation of the signal’s carrier-to-noise ratio(CNR)is proposed.This method leverages the directionality of the antenna to induce varying gain changes in the signals across different incident directions,resulting in distinct CNR variations for each signal.A model is developed to calculate the variation value of the signal CNR based on the antenna gain pattern.This model enables the differentiation of the variation values of the CNR for authentic satellite signals and spoofing signals,thereby facilitating spoofing detection.The proposed method is capable of detecting spoofing signals with power and CNR similar to those of authentic satellite signals.The accuracy of the signal CNR variation value calculation model and the effectiveness of the spoofing detection method are verified through a series of experiments.In addition,the proposed spoofing detection method works not only for a single spoofing source but also for distributed spoofing sources. 展开更多
关键词 spoofing detection global navigation satellite system(GNSS) variation of carrier-to-noise ratio(CNR) antenna directionality
在线阅读 下载PDF
Game-theoretic physical layer authentication for spoofing detection in internet of things
6
作者 Yue Wu Tao Jing +2 位作者 Qinghe Gao Yingzhen Wu Yan Huo 《Digital Communications and Networks》 CSCD 2024年第5期1394-1404,共11页
The Internet of Things(IoT)has permeated various fields relevant to our lives.In these applications,countless IoT devices transmit vast amounts of data,which often carry important and private information.To prevent ma... The Internet of Things(IoT)has permeated various fields relevant to our lives.In these applications,countless IoT devices transmit vast amounts of data,which often carry important and private information.To prevent malicious users from spoofing these information,the first critical step is effective authentication.Physical Layer Authentication(PLA)employs unique characteristics inherent to wireless signals and physical devices and is promising in the IoT due to its flexibility,low complexity,and transparency to higher layer protocols.In this paper,the focus is on the interaction between multiple malicious spoofers and legitimate receivers in the PLA process.First,the interaction is formulated as a static spoof detection game by including the spoofers and receivers as players.The best authentication threshold of the receiver and the attack rate of the spoofers are consideblack as Nash Equilibrium(NE).Then,closed-form expressions are derived for all NEs in the static environment in three cases:multiplayer games,zero-sum games with collisions,and zero-sum games without collisions.Considering the dynamic environment,a Multi-Agent Deep Deterministic Policy Gradient(MADDPG)algorithm is proposed to analyze the interactions of receiver and spoofers.Last,comprehensive simulation experiments are conducted and demonstrate the impact of environmental parameters on the NEs,which provides guidance to design effective PLA schemes. 展开更多
关键词 IOT Game theory Physical layer authentication Nash equilibrium spoofing detection
在线阅读 下载PDF
Reconfigurable exceptional point-based sensing with 0.001λsensitivity using spoof localized surface plasmons
7
作者 Yaoran Zhang Hao Hu +4 位作者 Francisco JoséGarcía-Vidal Jingjing Zhang Liangliang Liu Yu Luo Zhuo Li 《Advanced Photonics Nexus》 2024年第5期58-66,共9页
Recent breakthroughs in the field of non-Hermitian physics present unprecedented opportunities,from fundamental theories to cutting-edge applications such as multimode lasers,unconventional wave transport,and high-per... Recent breakthroughs in the field of non-Hermitian physics present unprecedented opportunities,from fundamental theories to cutting-edge applications such as multimode lasers,unconventional wave transport,and high-performance sensors.The exceptional point,a spectral singularity widely existing in non-Hermitian systems,provides an indispensable route to enhance the sensitivity of optical detection.However,the exceptional point of the forementioned systems is set once the system is built or fabricated,and machining errors make it hard to reach such a state precisely.To this end,we develop a highly tunable and reconfigurable exceptional point system,i.e.,a single spoof plasmonic resonator suspended above a substrate and coupled with two freestanding Rayleigh scatterers.Our design offers great flexibility to control exceptional point states,enabling us to dynamically reconfigure the exceptional point formed by various multipolar modes across a broadband frequency range.Specifically,we experimentally implement five distinct exceptional points by precisely manipulating the positions of two movable Rayleigh scatterers.In addition,the enhanced perturbation strength offers remarkable sensitivity enhancement for detecting deep-subwavelength particles with the minimum dimension down to 0.001λ(withλto be the free-space wavelength). 展开更多
关键词 non-Hermitian optics spoof localized surface plasmons exceptional points ultrasensitive microwave sensors
在线阅读 下载PDF
GNSS spoofing detection based on uncultivated wolf pack algorithm 被引量:3
8
作者 孙闽红 邵章义 +1 位作者 包建荣 余旭涛 《Journal of Southeast University(English Edition)》 EI CAS 2017年第1期1-4,共4页
In order to solve the problem that the global navigation satellite system(GNSS) receivers can hardly detect the GNSS spoofing when they are deceived by a spoofer,a model-based approach for the identification of the ... In order to solve the problem that the global navigation satellite system(GNSS) receivers can hardly detect the GNSS spoofing when they are deceived by a spoofer,a model-based approach for the identification of the GNSS spoofing is proposed.First,a Hammerstein model is applied to model the spoofer/GNSS transmitter and the wireless channel.Then,a novel method based on the uncultivated wolf pack algorithm(UWPA) is proposed to estimate the model parameters.Taking the estimated model parameters as a feature vector,the identification of the spoofing is realized by comparing the Euclidean distance between the feature vectors.Simulations verify the effectiveness and the robustness of the proposed method.The results show that,compared with the other identification algorithms,such as least square(LS),the iterative method and the bat-inspired algorithm(BA),although the UWPA has a little more time-eomplexity than the LS and the BA algorithm,it has better estimation precision of the model parameters and higher identification rate of the GNSS spoofing,even for relative low signal-to-noise ratios. 展开更多
关键词 global navigation satellite system(GNSS) spoofing detection system identification uncultivated wolf pack algorithm
在线阅读 下载PDF
Evaluation of global navigation satellite system spoofing efficacy 被引量:4
9
作者 WANG Yue SUN Fuping +2 位作者 HAO Jinming ZHANG Lundong WANG Xian 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第6期1238-1257,共20页
The spoofing capability of Global Navigation Satellite System(GNSS)represents an important confrontational capability for navigation security,and the success of planned missions may depend on the effective evaluation ... The spoofing capability of Global Navigation Satellite System(GNSS)represents an important confrontational capability for navigation security,and the success of planned missions may depend on the effective evaluation of spoofing capability.However,current evaluation systems face challenges arising from the irrationality of previous weighting methods,inapplicability of the conventional multi-attribute decision-making method and uncertainty existing in evaluation.To solve these difficulties,considering the validity of the obtained results,an evaluation method based on the game aggregated weight model and a joint approach involving the grey relational analysis and technique for order preference by similarity to an ideal solution(GRA-TOPSIS)are firstly proposed to determine the optimal scheme.Static and dynamic evaluation results under different schemes are then obtained via a fuzzy comprehensive assessment and an improved dynamic game method,to prioritize the deceptive efficacy of the equipment accurately and make pointed improvement for its core performance.The use of judging indicators,including Spearman rank correlation coefficient and so on,combined with obtained evaluation results,demonstrates the superiority of the proposed method and the optimal scheme by the horizontal comparison of different methods and vertical comparison of evaluation results.Finally,the results of field measurements and simulation tests show that the proposed method can better overcome the difficulties of existing methods and realize the effective evaluation. 展开更多
关键词 Global Navigation Satellite System(GNSS)spoofing index system for spoofing strategy game aggregated weight model grey relational analysis and technique for order preference by similarity to an ideal solution(GRA-TOPSIS)method dynamic game method
在线阅读 下载PDF
Improved adaptively robust estimation algorithm for GNSS spoofer considering continuous observation error 被引量:4
10
作者 GAO Yangjun LI Guangyun +2 位作者 LYU Zhiwei ZHANG Lundong LI Zhongpan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第5期1237-1248,共12页
Once the spoofer has controlled the navigation sys-tem of unmanned aerial vehicle(UAV),it is hard to effectively control the error convergence to meet the threshold condition only by adjusting parameters of estimation... Once the spoofer has controlled the navigation sys-tem of unmanned aerial vehicle(UAV),it is hard to effectively control the error convergence to meet the threshold condition only by adjusting parameters of estimation if estimation of the spoofer on UAV has continuous observation error.Aiming at this problem,the influence of the spoofer’s state estimation error on spoofing effect and error convergence conditions is theoretically analyzed,and an improved adaptively robust estimation algo-rithm suitable for steady-state linear quadratic estimator is pro-posed.It enables the spoofer’s estimator to reliably estimate UAV status in real time,improves the robustness of the estima-tor in responding to observation errors,and accelerates the con-vergence time of error control.Simulation experiments show that the mean value of normalized innovation squared(NIS)is reduced by 88.5%,and the convergence time of NIS value is reduced by 76.3%,the convergence time of true trajectory error of UAV is reduced by 42.3%,the convergence time of estimated trajectory error of UAV is reduced by 67.4%,the convergence time of estimated trajectory error of the spoofer is reduced by 33.7%,and the convergence time of broadcast trajectory error of the spoofer is reduced by 54.8%when the improved algorithm is used.The improved algorithm can make UAV deviate from pre-set trajectory to spoofing trajectory more effectively and more subtly. 展开更多
关键词 spoofING unmanned aerial vehicle(UAV) spoofer adaptively robust estimation global navigation satellite system(GNSS) normalized innovation squared(NIS)
在线阅读 下载PDF
一种基于Intranet的分布式IP Spoof检测系统
11
作者 姚羽 张志强 +1 位作者 高福祥 于戈 《控制工程》 CSCD 2005年第2期183-185,共3页
提出了基于Intranet的分布式IPSpoof检测系统。该系统能高效检测Intranet内的IPSpoof行为。分析了目前的IPSpoof防范技术。根据Intranet的特点详细介绍了系统的设计。给出了IPSpoof判定方法、检测系统的关键部件Monitor的设计,并给出了... 提出了基于Intranet的分布式IPSpoof检测系统。该系统能高效检测Intranet内的IPSpoof行为。分析了目前的IPSpoof防范技术。根据Intranet的特点详细介绍了系统的设计。给出了IPSpoof判定方法、检测系统的关键部件Monitor的设计,并给出了数据采集模块的实现。实验表明,该系统具备高精度、高实时性和低流量的特点,可以在不同规模的Intranet以及网络安全系统中广泛使用。 展开更多
关键词 IP spoof 分布式Monitor 攻击检测 检测系统 网络安全 IP欺骗
在线阅读 下载PDF
A New Approach to Estimate True Position of Unmanned Aerial Vehicles in an INS/GPS Integration System in GPS Spoofing Attack Conditions 被引量:5
12
作者 Mohammad Majidi Alireza Erfanian Hamid Khaloozadeh 《International Journal of Automation and computing》 EI CSCD 2018年第6期747-760,共14页
This paper presents a new approach to estimate the true position of an unmanned aerial vehicle (UAV) in the conditions of spoofing attacks on global positioning system (GPS) receivers. This approach consists of tw... This paper presents a new approach to estimate the true position of an unmanned aerial vehicle (UAV) in the conditions of spoofing attacks on global positioning system (GPS) receivers. This approach consists of two phases, the spoofing detection phase which is accomplished by hypothesis test and the trajectory estimation phase which is carried out by applying the adapted particle filters to the integrated inertial navigation system (INS) and GPS. Due to nonlinearity and unfavorable impacts of spoofing signals on GPS receivers, deviation in position calculation is modeled as a cumulative uniform error. This paper also presents a procedure of applying adapted particle swarm optimization filter (PSOF) to the INS/GPS integration system as an estimator to compensate spoofing attacks. Due to memory based nature of PSOF and benefits of each particle's experiences, application of PSOF algorithm in the INS/GPS integ- ration system leads to more precise positioning compared with general particle filter (PF) and adaptive unscented particle filer (AUPF) in the GPS spoofing attack scenarios. Simulation results show that the adapted PSOF algorithm is more reliable and accurate in estim- ating the true position of UAV in the condition of spoofing attacks. The validation of the proposed method is done by root mean square error (RMSE) test. 展开更多
关键词 Inertial navigation system (INS)/global positioning system (GPS) integration unmanned aerial vehicles (UAVs) position estimation spoofING particle based filters
原文传递
Spoof surface plasmon-based bandpass filter with extremely wide upper stopband 被引量:2
13
作者 刘小勇 祝雷 冯一军 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第3期174-177,共4页
We investigate the guiding modes of spoof surface plasmon polaritons (SPPs) on a symmetric ultra-thin plasmonic structure. From the analysis, we deduce the operating frequency region of the single-mode propagation. ... We investigate the guiding modes of spoof surface plasmon polaritons (SPPs) on a symmetric ultra-thin plasmonic structure. From the analysis, we deduce the operating frequency region of the single-mode propagation. Based on this property, a spoof SPPs lowpass filter is then constituted in the microwave frequency. By introducing a transmission zero at the lower frequency band using a pair of stepped-impedance stubs, a wide passband filter is further realized. The proposed filter is fed by.a transducer composed of a microstrip line with a flaring ground. The simulated results show that the presented filter has an extremely wide upper stopband in addition to excellent passband filtering characteristics such as low loss, wide band, and high square ratio. A prototype passband filter is also fabricated to validate the predicted performances. The proposed spoof-SPPs filter is believed to be very promising for other surface waveguide components in microwave and terahertz bands. 展开更多
关键词 spoof surface plasmon polaritons bandpass filter stop band dispersion relation
原文传递
DeepPOSE:Detecting GPS spoofing attack via deep recurrent neural network 被引量:3
14
作者 Peng Jiang Hongyi Wu Chunsheng Xin 《Digital Communications and Networks》 SCIE CSCD 2022年第5期791-803,共13页
The Global Positioning System(GPS)has become a foundation for most location-based services and navigation systems,such as autonomous vehicles,drones,ships,and wearable devices.However,it is a challenge to verify if th... The Global Positioning System(GPS)has become a foundation for most location-based services and navigation systems,such as autonomous vehicles,drones,ships,and wearable devices.However,it is a challenge to verify if the reported geographic locations are valid due to various GPS spoofing tools.Pervasive tools,such as Fake GPS,Lockito,and software-defined radio,enable ordinary users to hijack and report fake GPS coordinates and cheat the monitoring server without being detected.Furthermore,it is also a challenge to get accurate sensor readings on mobile devices because of the high noise level introduced by commercial motion sensors.To this end,we propose DeepPOSE,a deep learning model,to address the noise introduced in sensor readings and detect GPS spoofing attacks on mobile platforms.Our design uses a convolutional and recurrent neural network to reduce the noise,to recover a vehicle's real-time trajectory from multiple sensor inputs.We further propose a novel scheme to map the constructed trajectory from sensor readings onto the Google map,to smartly eliminate the accumulation of errors on the trajectory estimation.The reconstructed trajectory from sensors is then used to detect the GPS spoofing attack.Compared with the existing method,the proposed approach demonstrates a significantly higher degree of accuracy for detecting GPS spoofing attacks. 展开更多
关键词 GPS spoofing attack Position estimation Recurrent neural network
在线阅读 下载PDF
Spoofing技术在卫星链路TCP传输运用研究 被引量:3
15
作者 郭伟 《煤炭技术》 CAS 北大核心 2010年第11期146-147,150,共3页
从卫星链路角度对卫星信道传输TCP协议的几种典型的改进方法进行了比较分析,得出协议欺骗技术是可以相对显著地提高TCP/IP协议性能在卫星通信网中发挥的一种技术。最后通过仿真验证了spoofing技术性能。
关键词 TCP/IP 卫星链路 协议欺骗技术
原文传递
GPS Spoofing Attack Detection in Smart Grids Based on Improved CapsNet 被引量:1
16
作者 Yuancheng Li Shanshan Yang 《China Communications》 SCIE CSCD 2021年第3期174-186,共13页
This paper analyzes the influence of the global positionong system(GPS)spoofing attack(GSA)on phasor measurement units(PMU)measurements.We propose a detection method based on improved Capsule Neural Network(CapsNet)to... This paper analyzes the influence of the global positionong system(GPS)spoofing attack(GSA)on phasor measurement units(PMU)measurements.We propose a detection method based on improved Capsule Neural Network(CapsNet)to handle this attack.In the improved CapsNet,the gated recurrent unit(GRU)is added to the front of the full connection layer of the CapsNet.The improved CapsNet trains and updates the network parameters according to the historical measurements of the smart grid.The detection method uses different structures to extract the temporal and spatial features of the measurements simultaneously,which can accurately distinguish the attacked data from the normal data,to improve the detection accuracy.Finally,simulation experiments are carried out on IEEE 14-,IEEE 118-bus systems.The experimental results show that compared with other detection methods,our method is proved to be more efficient. 展开更多
关键词 smart grid detection method improved capsule neural network phasor measurement units global positioning system spoofing attack
在线阅读 下载PDF
High-confinement ultra-wideband bandpass filter using compact folded slotline spoof surface plasmon polaritons 被引量:1
17
作者 Xue-Wei Zhang Shao-Bin Liu +3 位作者 Ling-Ling Wang Qi-Ming Yu Jian-Lou Shi-Ning Sun 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第1期255-262,共8页
A novel bandpass filter(BPF)based on spoof surface plasmon polaritons(SSPPs)using a compact folded slotline structure is proposed and experimentally demonstrated.The proposed novel SSPPs structure compared with a conv... A novel bandpass filter(BPF)based on spoof surface plasmon polaritons(SSPPs)using a compact folded slotline structure is proposed and experimentally demonstrated.The proposed novel SSPPs structure compared with a conventional plasmonic waveguide with slot line SSPPs unit structure at the same size,the considerable advantages in much lower asymptotic frequency with tight field confinement,which enable the proposed filter to be more miniaturization.A high-efficient mode conversion structure is designed to transition from TE-mode to SSPPs-mode by gradient slotline lengths.The low-frequency stop-band can be committed with microstrip to slotline evolution on both sides of the dielectric,while the high-frequency cutoff band is realized by the proposed SSPPs structure.The influence of dispersion relation,electric field distribution,surface current,and structural parameters on the transmission characteristics of the proposed BPF are analyzed by finite difference time domain(FDTD).To validate the design concept,the prototype of the miniaturized SSPPs BPF has been manufactured and measured.The experimental results show high performance of the fabricated sample,in which the working in a range of 0.9 GHz-5.2 GHz with the relative bandwidth is 142%,the insertion loss less than 0.5 dB,the reflection coefficient less than-10 dB,and the group delay is less than one ns.This works provides a mirror for realizing the miniaturization of waveguides,and the application and development of high-confinement SSPPs functional devices in the microwave and THz regimes. 展开更多
关键词 spoof surface plasmon polaritons(SSPPs) bandpass filter ULTRA-WIDEBAND high-confinement
原文传递
Spoof surface plasmon polaritons excited leaky-wave antenna with continuous scanning range from endfire to forward 被引量:1
18
作者 Tao Zhong Hou Zhang 《Chinese Physics B》 SCIE EI CAS CSCD 2020年第9期320-325,共6页
A novel leaky-wave antenna(LWA)utilizing spoof surface plasmon polaritons(SSPPs)excitation is proposed with continuous scanning range from endfire to forward.The designed transmission line unit supports two SSPPS mode... A novel leaky-wave antenna(LWA)utilizing spoof surface plasmon polaritons(SSPPs)excitation is proposed with continuous scanning range from endfire to forward.The designed transmission line unit supports two SSPPS modes,of which the 2nd order mode is applied in the design.A novel strategy has been devised to excite the spatial radiation of the-1st order harmonics by arranging periodic counter changed sinusoidal structures on both sides of the SSPPs transmission line.Both full-wave simulation and measurement results show that the proposed LWA presents wide scanning angle from endfire to forward.In the frequency range from 4 GHz to 10 GHz,LWAs achieve scanning from 90°to+20°,covering the entire backward quadrant continuously. 展开更多
关键词 leaky-wave antenna spoof surface plasmon polaritons wide scanning-angle
原文传递
Single-beam leaky-wave antenna with wide scanning angle and high scanning rate based on spoof surface plasmon polariton 被引量:1
19
作者 Huan Jiang Xiang-Yu Cao +2 位作者 Tao Liu Liaori Jidi Sijia Li 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第10期399-405,共7页
We propose a single-beam leaky-wave antenna(LWA) with a wide-scanning angle and a high-scanning rate based on spoof surface plasmon polariton(SSPP) in this paper. The SSPP transmission line(TL) is etched with periodic... We propose a single-beam leaky-wave antenna(LWA) with a wide-scanning angle and a high-scanning rate based on spoof surface plasmon polariton(SSPP) in this paper. The SSPP transmission line(TL) is etched with periodically arranged circular patches, which converts the slow-wave mode into the fast-wave region for radiation. The proposed LWA is designed, fabricated, and tested. The simulated results imply that the proposed LWA not only achieves a high radiation efficiency of about 81.4%, and a high scanning rate of 12.12, but also has a large scanning angle of 176° over a narrow operation bandwidth of 8.3-9.6 GHz(for |S_(11)| <-10 dB). In addition, the simulated average gain of the LWA can reach as high as 10.9 d Bi. The measured scanning angle range is 175° in the operation band of 8.2-9.6 GHz, and the measured average gain is 10.6 dBi. The experimental results are consistent with the simulation, validating its performance. An antenna with high radiation efficiency, wide scanning angle range, and high scanning rate has great potential for application in radar and wireless communication systems. 展开更多
关键词 spoof surface plasmon polariton(SSPP) leaky wave antenna wide scanning angle high scanning rate
原文传递
Multi-UAV Cooperative GPS Spoofing Based on YOLO Nano 被引量:4
20
作者 Yongjie Ding Zhangjie Fu 《Journal of Cyber Security》 2021年第2期69-78,共10页
In recent years,with the rapid development of the drone industry,drones have been widely used in many fields such as aerial photography,plant protection,performance,and monitoring.To effectively control the unauthoriz... In recent years,with the rapid development of the drone industry,drones have been widely used in many fields such as aerial photography,plant protection,performance,and monitoring.To effectively control the unauthorized flight of drones,using GPS spoofing attacks to interfere with the flight of drones is a relatively simple and highly feasible attack method.However,the current method uses ground equipment to carry out spoofing attacks.The attack range is limited and the flexibility is not high.Based on the existing methods,this paper proposes a multi-UAV coordinated GPS spoofing scheme based on YOLO Nano,which can launch effective attacks against target drones with autonomous movement:First,a single-attack drone based on YOLO Nano is proposed.The target tracking scheme achieves accurate tracking of the target direction on a single-attack drone;then,based on the single-UAV target tracking,a multi-attack drone coordinated target tracking scheme based on the weighted least squares method is proposed to realize the target drone Finally,a new calculation method for false GPS signals is proposed,which adaptively adjusts the flight trajectory of the attacking drone and the content of the false GPS signal according to the autonomous movement of the target drone. 展开更多
关键词 UAV safety GPS spoofing MULTI-UAV target detection
在线阅读 下载PDF
上一页 1 2 51 下一页 到第
使用帮助 返回顶部