Essays about: "spoofing"

Showing result 11 - 15 of 49 essays containing the word spoofing.

  1. 11. Cybersecurity of Maritime Communication Systems : Spoofing attacks against AIS and DSC

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Joakim Forsberg; [2022]
    Keywords : Cybersecurity; AIS; DSC; Spoofing; Software Defined Radios;

    Abstract : For a long time, ships have relied on navigators that could figure out their course andlocation based on seeing objects around them. However, this approach is limited to thenavigators’ ability, and with the increasing number of ships, this job becomes harder andharder. READ MORE

  2. 12. A Positioning System for Landing a UAV on a UGV in a GNSS-Denied Scenario

    University essay from Linköpings universitet/Institutionen för systemteknik

    Author : Tim Wiik; [2022]
    Keywords : Sensor fusion; UAV; UGV; NIR-LED; Extended kalman filter; Unmanned Aerial Vehicle; Unmanned Ground Vehicle; Autonomous Landing; GNSS-denied Scenario;

    Abstract : A system of an unmanned aerial vehicle (UAV) collaborating with an unmanned ground vehicle (UGV) for use in for example surveillance, reconnaissance, transport and target acquisition is studied. The project investigates the problem of estimating the relative position, velocity and orientation between the UAV and the UGV required to autonomously land the UAV on the UGV during movement. READ MORE

  3. 13. Anomalous Behavior Detection in Aircraft based Automatic Dependent Surveillance–Broadcast (ADS-B) system using Deep Graph Convolution and Generative model (GA-GAN)

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Jayesh Kenaudekar; [2022]
    Keywords : Intrusion detection aircraft aviation security adsb protocol AI deep learning machine learning graph generative model surveillance broadcast;

    Abstract : The Automatic Dependent Surveillance-Broadcast (ADS-B) is a key component of the Next Generation Air Transportation System (Next Gen) that manages the increasingly congested airspace and operation. From Jan 2020, the U.S. Federal Aviation Administration (FAA) mandated the use of (ADS-B) as a key component of Next Gen project. READ MORE

  4. 14. IoT Penetration Testing : Examining the cyber security of connected vehicles

    University essay from KTH/Datavetenskap

    Author : Jacob Ingers; Jonas Sjöblom; [2022]
    Keywords : ;

    Abstract : The connected car is rapidly becoming the norm in the automotive industry. With connected devices playing such a big part in today’s society our view of what constitutes a car is beginning to change. READ MORE

  5. 15. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE