期刊文献+
共找到71篇文章
< 1 2 4 >
每页显示 20 50 100
Attack Detection for Spoofed Synchrophasor Measurements Using Segmentation Network 被引量:3
1
作者 Wei Qiu Chengcheng Li +3 位作者 Qiu Tang Kaiqi Sun Yilu Liu Wenxuan Yao 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2022年第5期1327-1337,共11页
Synchrophasor measurements are essential to realtime situational awareness of the smart grid but vulnerable to cyber-attacks during the process of transmission and invocation.To ensure data security and mitigate the i... Synchrophasor measurements are essential to realtime situational awareness of the smart grid but vulnerable to cyber-attacks during the process of transmission and invocation.To ensure data security and mitigate the impact of spoofed synchrophasor measurements,this work proposes a novel object detection method using a Weight-based One-dimensional Convolutional Segmentation Network(WOCSN)with the ability of attack behavior identification and time localization.In WOCSN,automatic data feature extraction can be achieved by onedimensional convolution from the input signal,thereby reducing the impact of handcrafted features.A weight loss function is designed to distribute the contribution for normal and attack signals.Then,attack time is located via the proposed binary method based on pixel segmentation.Furthermore,the actual synchrophasor data collected from four locations are used for the performance evaluation of the WOCSN.Finally,combined with designed evaluation metrics,the time localization ability of WOCSN is validated in the scenarios of composite attacks with different spoofed intensities and time-sensitivities. 展开更多
关键词 Data security spoofed synchrophasor measurements weight-based one-dimensional convolutional segmentation network(WOCSN)
原文传递
Robust spoofing detection and mitigation in GNSS using iterative refinement and adaptive filtering
2
作者 Xiaoqin JIN Xiaoyu ZHANG +2 位作者 Shihui XU Shoupeng LI Shuaiyong ZHENG 《Chinese Journal of Aeronautics》 2025年第8期52-64,共13页
Global Navigation Satellite Systems(GNSSs)face significant security threats from spoofing attacks.Typical anti-spoofing methods rely on estimating the delays between spoofing and authentic signals using multicorrelato... Global Navigation Satellite Systems(GNSSs)face significant security threats from spoofing attacks.Typical anti-spoofing methods rely on estimating the delays between spoofing and authentic signals using multicorrelator outputs.However,the accuracy of the delay estimation is limited by the spacing of the correlators.To address this,an innovative anti-spoofing method is introduced,which incorporates distinct coarse and refined stages for more accurate spoofing estimation.By leveraging the coarse delay estimates obtained through maximum likelihood estimation,the proposed method establishes the Windowed Sum of the Relative Delay(WSRD)statistics to detect the presence of spoofing signals.The iterative strategy is then employed to enhance the precision of the delay estimation.To further adapt to variations in the observation noise caused by spoofing intrusions and restore precise position,velocity,and timing solutions,an adaptive extended Kalman filter is proposed.This comprehensive framework offers detection,mitigation,and recovery against spoofing attacks.Experimental validation using datasets from the Texas Spoofing Test Battery(TEXBAT)demonstrates the effectiveness of the proposed anti-spoofing method.With 41 correlators,the method achieves a detection rate exceeding 90%at a false alarm rate of 10-5,with position or time errors below 15 m.Notably,this refined anti-spoofing approach shows robust detection and mitigation capabilities,requiring only a single antenna without the need for additional external sensors.These advancements can significantly contribute to the development of GNSS anti-spoofing measures. 展开更多
关键词 Global Navigation Satellite System(GNSS) Spoofing detection Spoofing mitigation Multicorrelator Adaptive filters
原文传递
Preventing IP Spoofing in Kubernetes Using eBPF
3
作者 Absar Hussain Abdul Aziz +1 位作者 Hassan Jamil Syed Shoaib Raza 《Computers, Materials & Continua》 2025年第8期3105-3124,共20页
Kubernetes has become the dominant container orchestration platform,withwidespread adoption across industries.However,its default pod-to-pod communicationmechanism introduces security vulnerabilities,particularly IP s... Kubernetes has become the dominant container orchestration platform,withwidespread adoption across industries.However,its default pod-to-pod communicationmechanism introduces security vulnerabilities,particularly IP spoofing attacks.Attackers can exploit this weakness to impersonate legitimate pods,enabling unauthorized access,lateral movement,and large-scale Distributed Denial of Service(DDoS)attacks.Existing security mechanisms such as network policies and intrusion detection systems introduce latency and performance overhead,making them less effective in dynamic Kubernetes environments.This research presents PodCA,an eBPF-based security framework designed to detect and prevent IP spoofing in real time while minimizing performance impact.PodCA integrates with Kubernetes’Container Network Interface(CNI)and uses eBPF to monitor and validate packet metadata at the kernel level.It maintains a container network mapping table that tracks pod IP assignments,validates packet legitimacy before forwarding,and ensures network integrity.If an attack is detected,PodCA automatically blocks spoofed packets and,in cases of repeated attempts,terminates compromised pods to prevent further exploitation.Experimental evaluation on an AWS Kubernetes cluster demonstrates that PodCA detects and prevents spoofed packets with 100%accuracy.Additionally,resource consumption analysis reveals minimal overhead,with a CPU increase of only 2–3%per node and memory usage rising by 40–60 MB.These results highlight the effectiveness of eBPF in securing Kubernetes environments with low overhead,making it a scalable and efficient security solution for containerized applications. 展开更多
关键词 CNCF eBPF PODS SPOOFING IP DDOS container orchestration PACKETS EKS CNI CNM VM
在线阅读 下载PDF
The Application of RVM in GNSS Anti-Spoofing Field Based on the Hybrid Kernel Function
4
作者 Junzhi Li Qiuying Yu +1 位作者 Gangqiang Li Yu He 《IEEE/CAA Journal of Automatica Sinica》 2025年第9期1893-1907,共15页
With the widespread application of global navigation satellite system(GNSS),spoofing attacks pose a threat to the security and reliability of GNSS.It is of great significance to design effective GNSS spoofing detectio... With the widespread application of global navigation satellite system(GNSS),spoofing attacks pose a threat to the security and reliability of GNSS.It is of great significance to design effective GNSS spoofing detection technology to ensure the security and reliability of GNSS system applications for receiver users.Traditional spoofing detection techniques generally only determine whether a spoofing attack has occurred by monitoring the feature changes of one or two data information in the receiver.However,some spoofing modes can cleverly make the monitored data very close to the real data,thus avoiding these detection methods and easily making them ineffective.In this study,a GNSS spoofing jamming detection method based on hybrid kernel relevance vector machine(RVM)is proposed.The improved signal quality monitoring(SQM)movement variance,carrier noise ratio movement variance,pseudo range Doppler consistency,pseudorange residual,Doppler frequency,clock offset and clock drift are used as detection characteristics.This technology can detect GNSS spoofing signals,effectively improving the safety and reliability of GNSS systems.The experimental results show that this technology has high detection accuracy and anti-interference ability and can effectively respond to various forms of spoofing attacks. 展开更多
关键词 Global navigation satellite system(GNSS) GNSS spoofing relevance vector machine(RVM) spoofing detection
在线阅读 下载PDF
A new predictive based secure geographic routing strategy for UAV network under location spoofing attack
5
作者 Zihao ZHOU Jie TANG +3 位作者 Zhutian YANG Junyuan FAN Xiaokai SONG Kai Kit WONG 《Chinese Journal of Aeronautics》 2025年第10期47-58,共12页
Unmanned aerial vehicle(UAV)swarm network consisting of a collection of micro UAVs can be used for many applications.It is well established that packet routing is a fundamental problem to achieve UAV collaboration.How... Unmanned aerial vehicle(UAV)swarm network consisting of a collection of micro UAVs can be used for many applications.It is well established that packet routing is a fundamental problem to achieve UAV collaboration.However,the highly dynamic nature of UAVs,frequently changing network topologies and security issues,poses significant challenges to packet forwarding in UAV networks.The existing topology-based routing protocols are not well suited in UAV network due to their high controlling overhead or excessive end-to-end delay.Geographic routing is regarded as a promising solution,as it only requires local information.In order to enhance the accuracy and security of geographic routing in highly dynamic UAV network,in this paper,we propose a new predictive geographic(PGeo)routing strategy with location verification.First,a detection mechanism is adopted to recognize malicious UAVs falsifying their location.Then,an accurate average service time of a packet in the medium access control(MAC)layer is derived to assist location prediction.The proposed delay model can provide a theoretical basis for future work,and our simulation results reveal that PGeo outstrips the existing geographic routing protocols in terms of packet delivery ratio in the presence of location spoofing behavior. 展开更多
关键词 Unmanned aerial vehicle Secure communication Geographic routing Location spoofing Delay estimation Location prediction Location verification
原文传递
A Dynamic Deceptive Defense Framework for Zero-Day Attacks in IIoT:Integrating Stackelberg Game and Multi-Agent Distributed Deep Deterministic Policy Gradient
6
作者 Shigen Shen Xiaojun Ji Yimeng Liu 《Computers, Materials & Continua》 2025年第11期3997-4021,共25页
The Industrial Internet of Things(IIoT)is increasingly vulnerable to sophisticated cyber threats,particularly zero-day attacks that exploit unknown vulnerabilities and evade traditional security measures.To address th... The Industrial Internet of Things(IIoT)is increasingly vulnerable to sophisticated cyber threats,particularly zero-day attacks that exploit unknown vulnerabilities and evade traditional security measures.To address this critical challenge,this paper proposes a dynamic defense framework named Zero-day-aware Stackelberg Game-based Multi-Agent Distributed Deep Deterministic Policy Gradient(ZSG-MAD3PG).The framework integrates Stackelberg game modeling with the Multi-Agent Distributed Deep Deterministic Policy Gradient(MAD3PG)algorithm and incorporates defensive deception(DD)strategies to achieve adaptive and efficient protection.While conventional methods typically incur considerable resource overhead and exhibit higher latency due to static or rigid defensive mechanisms,the proposed ZSG-MAD3PG framework mitigates these limitations through multi-stage game modeling and adaptive learning,enabling more efficient resource utilization and faster response times.The Stackelberg-based architecture allows defenders to dynamically optimize packet sampling strategies,while attackers adjust their tactics to reach rapid equilibrium.Furthermore,dynamic deception techniques reduce the time required for the concealment of attacks and the overall system burden.A lightweight behavioral fingerprinting detection mechanism further enhances real-time zero-day attack identification within industrial device clusters.ZSG-MAD3PG demonstrates higher true positive rates(TPR)and lower false alarm rates(FAR)compared to existing methods,while also achieving improved latency,resource efficiency,and stealth adaptability in IIoT zero-day defense scenarios. 展开更多
关键词 Industrial internet of things zero-day attacks Stackelberg game distributed deep deterministic policy gradient defensive spoofing dynamic defense
在线阅读 下载PDF
Prediction-based trajectory anomaly detection in UAV system with GPS spoofing attack
7
作者 Tianci HUANG Huici WU +1 位作者 Xiaofeng TAO Zhiqing WEI 《Chinese Journal of Aeronautics》 2025年第10期32-46,共15页
The Global Positioning System(GPS)plays an indispensable role in the control of Unmanned Aerial Vehicle(UAV).However,the civilian GPS signals,transmitted over the air without any encryption,are vulnerable to spoofing ... The Global Positioning System(GPS)plays an indispensable role in the control of Unmanned Aerial Vehicle(UAV).However,the civilian GPS signals,transmitted over the air without any encryption,are vulnerable to spoofing attacks,which further guides the UAV on deviated positions or trajectories.To counter the GPS,,m spoofing on UAV system and to detect the position/trajectory anomaly in real time,a motion state vector based stack long short-term memory trajectory prediction scheme is firstly proposed,leveraging the temporal and spatial features of UAV kinematics.Based on the predicted results,an ensemble voting-based trajectory anomaly detection scheme is proposed to detect the position anomalies in real time with the information of motion state sequences.The proposed prediction-based trajectory anomaly detection scheme outperforms the existing offline detection schemes designed for fixed trajectories.Software In The Loop(SITL)based online prediction and online anomaly detection are demonstrated with random 3D flight trajectories.Results show that the coefficient of determination(R^(2))and Root Mean Square Error(RMSE)of the prediction scheme can reach 0.996 and 3.467,respectively.The accuracy,recall,and F1-score of the proposed anomaly detection scheme can reach 0.984,0.988,and 0.983,respectively,which outperform deep ensemble learning,LSTM-based classifier,machine learning classifier and GA-XGBoost based schemes.Moreover,results show that compared with LSTM-based classifier,the average duration(from the moment starting an attack to the moment the attack being detected)and distance of the proposed scheme are reduced by 24.4%and 19.5%,respectively. 展开更多
关键词 Unmanned aerial vehicle(UAV) Position spoofing and detection Deep learning Anomaly detection Trajectory prediction Security Machine learning
原文传递
A triple-band miniaturized end-fire antenna based on odd-mode spoof surface plasmonic polariton waveguide resonator
8
作者 BAI Yukun MAO Mengqun 《Optoelectronics Letters》 2025年第8期462-467,共6页
A triple-band miniaturized end-fire antenna based on the odd modes of spoof surface plasmonic polariton(SSPP)waveguide resonator is proposed in this paper.To meet the ever increasing demand for more communication chan... A triple-band miniaturized end-fire antenna based on the odd modes of spoof surface plasmonic polariton(SSPP)waveguide resonator is proposed in this paper.To meet the ever increasing demand for more communication channels and less antenna sizes,multi-band antennas are currently under intensive investigation.By a novel feeding method,three odd modes are excited on an SSPP waveguide resonator,which performs as an end-fire antenna operating at three bands,7.15-7.26 GHz,11.6-12.2 GHz and 13.5-13.64 GHz.It exhibits reasonably high and stable maximum gains of 5.26 dBi,7.97 dBi and 10.1 dBi and maximum efficiencies of 64%,92%and 98%at the three bands,respectively.Moreover,in the second band,the main beam angle shows a frequency dependence with a total scanning angle of 19°.The miniaturized triple-band antenna has a great potential in wireless communication systems,satellite communication and radar systems. 展开更多
关键词 odd modes waveguide resonatorwhich triple band antenna end fire antenna feeding methodthree spoof surface plasmonic polariton sspp waveguide communication channels miniaturized antenna
原文传递
GNSS spoofing detection based on uncultivated wolf pack algorithm 被引量:3
9
作者 孙闽红 邵章义 +1 位作者 包建荣 余旭涛 《Journal of Southeast University(English Edition)》 EI CAS 2017年第1期1-4,共4页
In order to solve the problem that the global navigation satellite system(GNSS) receivers can hardly detect the GNSS spoofing when they are deceived by a spoofer,a model-based approach for the identification of the ... In order to solve the problem that the global navigation satellite system(GNSS) receivers can hardly detect the GNSS spoofing when they are deceived by a spoofer,a model-based approach for the identification of the GNSS spoofing is proposed.First,a Hammerstein model is applied to model the spoofer/GNSS transmitter and the wireless channel.Then,a novel method based on the uncultivated wolf pack algorithm(UWPA) is proposed to estimate the model parameters.Taking the estimated model parameters as a feature vector,the identification of the spoofing is realized by comparing the Euclidean distance between the feature vectors.Simulations verify the effectiveness and the robustness of the proposed method.The results show that,compared with the other identification algorithms,such as least square(LS),the iterative method and the bat-inspired algorithm(BA),although the UWPA has a little more time-eomplexity than the LS and the BA algorithm,it has better estimation precision of the model parameters and higher identification rate of the GNSS spoofing,even for relative low signal-to-noise ratios. 展开更多
关键词 global navigation satellite system(GNSS) spoofing detection system identification uncultivated wolf pack algorithm
在线阅读 下载PDF
卫星链路中TCP传输性能改进与仿真 被引量:4
10
作者 叶青娣 《现代电子技术》 2010年第11期51-54,共4页
卫星信道与地面有线信道具有不同的特点,当TCP协议直接应用于卫星链路上时,其吞吐量等性能会受到影响。针对卫星链路的特点,分析了现有的卫星链路进行TCP传输的几种解决方案,使用NS 2仿真软件,建立了仿真模型,并在给定的仿真环境下得出... 卫星信道与地面有线信道具有不同的特点,当TCP协议直接应用于卫星链路上时,其吞吐量等性能会受到影响。针对卫星链路的特点,分析了现有的卫星链路进行TCP传输的几种解决方案,使用NS 2仿真软件,建立了仿真模型,并在给定的仿真环境下得出了一些卫星链路下TCP传输性能和卫星spoofing技术的仿真结论。卫星链路具有时延大、误码率高等特点,仿真结果说明卫星spoofing技术和PS技术相结合的方案对卫星链路TCP传输性能改善是十分有益的。 展开更多
关键词 卫星通信 TCP协议 spoofing技术 PS技术
在线阅读 下载PDF
一种基于Intranet的分布式IP Spoof检测系统
11
作者 姚羽 张志强 +1 位作者 高福祥 于戈 《控制工程》 CSCD 2005年第2期183-185,共3页
提出了基于Intranet的分布式IPSpoof检测系统。该系统能高效检测Intranet内的IPSpoof行为。分析了目前的IPSpoof防范技术。根据Intranet的特点详细介绍了系统的设计。给出了IPSpoof判定方法、检测系统的关键部件Monitor的设计,并给出了... 提出了基于Intranet的分布式IPSpoof检测系统。该系统能高效检测Intranet内的IPSpoof行为。分析了目前的IPSpoof防范技术。根据Intranet的特点详细介绍了系统的设计。给出了IPSpoof判定方法、检测系统的关键部件Monitor的设计,并给出了数据采集模块的实现。实验表明,该系统具备高精度、高实时性和低流量的特点,可以在不同规模的Intranet以及网络安全系统中广泛使用。 展开更多
关键词 IP spoof 分布式Monitor 攻击检测 检测系统 网络安全 IP欺骗
在线阅读 下载PDF
基于TCP/IP协议应用层漏洞的网络攻击分析 被引量:2
12
作者 侯松 《科技信息》 2012年第18期277-278,共2页
近年来,计算机和网络技术在全世界范围内得到迅猛发展和广泛应用,网络应用已经深入人们日常生活的各个方面。人类充分享受到了网络给工作和生活带来的巨大便利。但是另一方面,由于计算机系统和网络系统仍处于不断发展中,其本身还存在大... 近年来,计算机和网络技术在全世界范围内得到迅猛发展和广泛应用,网络应用已经深入人们日常生活的各个方面。人类充分享受到了网络给工作和生活带来的巨大便利。但是另一方面,由于计算机系统和网络系统仍处于不断发展中,其本身还存在大量的漏洞,也使得越来越多的网络安全问题开始出现。本文将在分析TCP/IP协议应用层常见应用的基础上重点探讨基于telnet、Web Spoofing以及FTP Bouncing三种最常见的网络漏洞攻击。 展开更多
关键词 TCP/IP 网络漏洞 TELNET Web SPOOFING FTP Bouncing
在线阅读 下载PDF
Modified Cepstral Feature for Speech Anti-spoofing
13
作者 何明瑞 ZAIDI Syed Faham Ali +3 位作者 田娩鑫 单志勇 江政儒 徐珑婷 《Journal of Donghua University(English Edition)》 CAS 2023年第2期193-201,共9页
The hidden danger of the automatic speaker verification(ASV)system is various spoofed speeches.These threats can be classified into two categories,namely logical access(LA)and physical access(PA).To improve identifica... The hidden danger of the automatic speaker verification(ASV)system is various spoofed speeches.These threats can be classified into two categories,namely logical access(LA)and physical access(PA).To improve identification capability of spoofed speech detection,this paper considers the research on features.Firstly,following the idea of modifying the constant-Q-based features,this work considered adding variance or mean to the constant-Q-based cepstral domain to obtain good performance.Secondly,linear frequency cepstral coefficients(LFCCs)performed comparably with constant-Q-based features.Finally,we proposed linear frequency variance-based cepstral coefficients(LVCCs)and linear frequency mean-based cepstral coefficients(LMCCs)for identification of speech spoofing.LVCCs and LMCCs could be attained by adding the frame variance or the mean to the log magnitude spectrum based on LFCC features.The proposed novel features were evaluated on ASVspoof 2019 datase.The experimental results show that compared with known hand-crafted features,LVCCs and LMCCs are more effective in resisting spoofed speech attack. 展开更多
关键词 spoofed speech detection log magnitude spectrum linear frequency cepstral coefficient(LFCC) hand-crafted feature
在线阅读 下载PDF
DeepPOSE:Detecting GPS spoofing attack via deep recurrent neural network 被引量:6
14
作者 Peng Jiang Hongyi Wu Chunsheng Xin 《Digital Communications and Networks》 SCIE CSCD 2022年第5期791-803,共13页
The Global Positioning System(GPS)has become a foundation for most location-based services and navigation systems,such as autonomous vehicles,drones,ships,and wearable devices.However,it is a challenge to verify if th... The Global Positioning System(GPS)has become a foundation for most location-based services and navigation systems,such as autonomous vehicles,drones,ships,and wearable devices.However,it is a challenge to verify if the reported geographic locations are valid due to various GPS spoofing tools.Pervasive tools,such as Fake GPS,Lockito,and software-defined radio,enable ordinary users to hijack and report fake GPS coordinates and cheat the monitoring server without being detected.Furthermore,it is also a challenge to get accurate sensor readings on mobile devices because of the high noise level introduced by commercial motion sensors.To this end,we propose DeepPOSE,a deep learning model,to address the noise introduced in sensor readings and detect GPS spoofing attacks on mobile platforms.Our design uses a convolutional and recurrent neural network to reduce the noise,to recover a vehicle's real-time trajectory from multiple sensor inputs.We further propose a novel scheme to map the constructed trajectory from sensor readings onto the Google map,to smartly eliminate the accumulation of errors on the trajectory estimation.The reconstructed trajectory from sensors is then used to detect the GPS spoofing attack.Compared with the existing method,the proposed approach demonstrates a significantly higher degree of accuracy for detecting GPS spoofing attacks. 展开更多
关键词 GPS spoofing attack Position estimation Recurrent neural network
在线阅读 下载PDF
TSLV:Time-Slice-Based Location Verification for VANET 被引量:3
15
作者 薛小平 刘名扬 +1 位作者 林铌忠 张越好 《China Communications》 SCIE CSCD 2011年第5期130-143,共14页
Position-spoofing-based attacks seriously threaten the security of Vehicular Ad Hoc Network(VANET).An effective solution to detect position spoofing is location verification.However,since vehicles move fast and the to... Position-spoofing-based attacks seriously threaten the security of Vehicular Ad Hoc Network(VANET).An effective solution to detect position spoofing is location verification.However,since vehicles move fast and the topology changes quickly in VANET,the static location verification method in Wireless Sensor Network(WSN) is not suitable for VANET.Taking into account the dynamic changing topology of VANET and collusion,we propose a Time-Slice-based Location Verification scheme,named TSLV,to resist position spoofing in VANET.Specifically,TSLV transforms the dynamic topology into static topology by time slice and each time slice corresponds to a verification process.The verifier can implement location verification for the corresponding prover.During the verification process,the verifier first filters out vehicles which provide unreasonably claimed locations,and then uses the Mean Square Error(MSE)-based cluster approach to separate the consistent vehicles by time slice,and uses the consistent set for its verification.In addition,security analysis and simulation show that TSLV can defend against the collusion attack effectively. 展开更多
关键词 location verification POSITION SPOOFING TIME SLICE RSS-based DISTANCE detection
在线阅读 下载PDF
Evaluation of global navigation satellite system spoofing efficacy 被引量:4
16
作者 WANG Yue SUN Fuping +2 位作者 HAO Jinming ZHANG Lundong WANG Xian 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第6期1238-1257,共20页
The spoofing capability of Global Navigation Satellite System(GNSS)represents an important confrontational capability for navigation security,and the success of planned missions may depend on the effective evaluation ... The spoofing capability of Global Navigation Satellite System(GNSS)represents an important confrontational capability for navigation security,and the success of planned missions may depend on the effective evaluation of spoofing capability.However,current evaluation systems face challenges arising from the irrationality of previous weighting methods,inapplicability of the conventional multi-attribute decision-making method and uncertainty existing in evaluation.To solve these difficulties,considering the validity of the obtained results,an evaluation method based on the game aggregated weight model and a joint approach involving the grey relational analysis and technique for order preference by similarity to an ideal solution(GRA-TOPSIS)are firstly proposed to determine the optimal scheme.Static and dynamic evaluation results under different schemes are then obtained via a fuzzy comprehensive assessment and an improved dynamic game method,to prioritize the deceptive efficacy of the equipment accurately and make pointed improvement for its core performance.The use of judging indicators,including Spearman rank correlation coefficient and so on,combined with obtained evaluation results,demonstrates the superiority of the proposed method and the optimal scheme by the horizontal comparison of different methods and vertical comparison of evaluation results.Finally,the results of field measurements and simulation tests show that the proposed method can better overcome the difficulties of existing methods and realize the effective evaluation. 展开更多
关键词 Global Navigation Satellite System(GNSS)spoofing index system for spoofing strategy game aggregated weight model grey relational analysis and technique for order preference by similarity to an ideal solution(GRA-TOPSIS)method dynamic game method
在线阅读 下载PDF
Improved adaptively robust estimation algorithm for GNSS spoofer considering continuous observation error 被引量:4
17
作者 GAO Yangjun LI Guangyun +2 位作者 LYU Zhiwei ZHANG Lundong LI Zhongpan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第5期1237-1248,共12页
Once the spoofer has controlled the navigation sys-tem of unmanned aerial vehicle(UAV),it is hard to effectively control the error convergence to meet the threshold condition only by adjusting parameters of estimation... Once the spoofer has controlled the navigation sys-tem of unmanned aerial vehicle(UAV),it is hard to effectively control the error convergence to meet the threshold condition only by adjusting parameters of estimation if estimation of the spoofer on UAV has continuous observation error.Aiming at this problem,the influence of the spoofer’s state estimation error on spoofing effect and error convergence conditions is theoretically analyzed,and an improved adaptively robust estimation algo-rithm suitable for steady-state linear quadratic estimator is pro-posed.It enables the spoofer’s estimator to reliably estimate UAV status in real time,improves the robustness of the estima-tor in responding to observation errors,and accelerates the con-vergence time of error control.Simulation experiments show that the mean value of normalized innovation squared(NIS)is reduced by 88.5%,and the convergence time of NIS value is reduced by 76.3%,the convergence time of true trajectory error of UAV is reduced by 42.3%,the convergence time of estimated trajectory error of UAV is reduced by 67.4%,the convergence time of estimated trajectory error of the spoofer is reduced by 33.7%,and the convergence time of broadcast trajectory error of the spoofer is reduced by 54.8%when the improved algorithm is used.The improved algorithm can make UAV deviate from pre-set trajectory to spoofing trajectory more effectively and more subtly. 展开更多
关键词 SPOOFING unmanned aerial vehicle(UAV) spoofer adaptively robust estimation global navigation satellite system(GNSS) normalized innovation squared(NIS)
在线阅读 下载PDF
A New Approach to Estimate True Position of Unmanned Aerial Vehicles in an INS/GPS Integration System in GPS Spoofing Attack Conditions 被引量:5
18
作者 Mohammad Majidi Alireza Erfanian Hamid Khaloozadeh 《International Journal of Automation and computing》 EI CSCD 2018年第6期747-760,共14页
This paper presents a new approach to estimate the true position of an unmanned aerial vehicle (UAV) in the conditions of spoofing attacks on global positioning system (GPS) receivers. This approach consists of tw... This paper presents a new approach to estimate the true position of an unmanned aerial vehicle (UAV) in the conditions of spoofing attacks on global positioning system (GPS) receivers. This approach consists of two phases, the spoofing detection phase which is accomplished by hypothesis test and the trajectory estimation phase which is carried out by applying the adapted particle filters to the integrated inertial navigation system (INS) and GPS. Due to nonlinearity and unfavorable impacts of spoofing signals on GPS receivers, deviation in position calculation is modeled as a cumulative uniform error. This paper also presents a procedure of applying adapted particle swarm optimization filter (PSOF) to the INS/GPS integration system as an estimator to compensate spoofing attacks. Due to memory based nature of PSOF and benefits of each particle's experiences, application of PSOF algorithm in the INS/GPS integ- ration system leads to more precise positioning compared with general particle filter (PF) and adaptive unscented particle filer (AUPF) in the GPS spoofing attack scenarios. Simulation results show that the adapted PSOF algorithm is more reliable and accurate in estim- ating the true position of UAV in the condition of spoofing attacks. The validation of the proposed method is done by root mean square error (RMSE) test. 展开更多
关键词 Inertial navigation system (INS)/global positioning system (GPS) integration unmanned aerial vehicles (UAVs) position estimation SPOOFING particle based filters
原文传递
Spoof surface plasmon-based bandpass filter with extremely wide upper stopband 被引量:2
19
作者 刘小勇 祝雷 冯一军 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第3期174-177,共4页
We investigate the guiding modes of spoof surface plasmon polaritons (SPPs) on a symmetric ultra-thin plasmonic structure. From the analysis, we deduce the operating frequency region of the single-mode propagation. ... We investigate the guiding modes of spoof surface plasmon polaritons (SPPs) on a symmetric ultra-thin plasmonic structure. From the analysis, we deduce the operating frequency region of the single-mode propagation. Based on this property, a spoof SPPs lowpass filter is then constituted in the microwave frequency. By introducing a transmission zero at the lower frequency band using a pair of stepped-impedance stubs, a wide passband filter is further realized. The proposed filter is fed by.a transducer composed of a microstrip line with a flaring ground. The simulated results show that the presented filter has an extremely wide upper stopband in addition to excellent passband filtering characteristics such as low loss, wide band, and high square ratio. A prototype passband filter is also fabricated to validate the predicted performances. The proposed spoof-SPPs filter is believed to be very promising for other surface waveguide components in microwave and terahertz bands. 展开更多
关键词 spoof surface plasmon polaritons bandpass filter stop band dispersion relation
原文传递
Design and verification of a broadband highly-efficient plasmonic circulator 被引量:1
20
作者 Jianfei Han Shu Zhen +4 位作者 Weihua Wang Kui Han Haipeng Li Lei Zhao Xiaopeng Shen 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第3期248-252,共5页
Circulators play a significant role in radar and microwave communication systems.This paper proposes a broadband and highly efficient plasmonic circulator,which consists of spoof surface plasmon polaritons(SSPPs)waveg... Circulators play a significant role in radar and microwave communication systems.This paper proposes a broadband and highly efficient plasmonic circulator,which consists of spoof surface plasmon polaritons(SSPPs)waveguides and ferrite disks to support non-reciprocal mode coupling.The simulated performance of symmetrically designed circulator shows that it has an insertion loss of roughly 0.5 dB while the isolation and return loss is more than 12 dB in the frequency range of 6.0 GHz–10.0 GHz(relative bandwidth of 50%).Equivalent circuit model has been proposed to explain the operating mechanism of the plasmonic circulator.The equivalent circuit model,numerical simulations,and experimental results are consistent with each other,which demonstrates the good performance of the proposed plasmonic circulator. 展开更多
关键词 PLASMONIC CIRCULATOR spoof surface plasmon polaritons FERRITE
原文传递
上一页 1 2 4 下一页 到第
使用帮助 返回顶部