Matches in SemOpenAlex for { <https://semopenalex.org/work/W3159578034> ?p ?o ?g. }
- W3159578034 endingPage "e507" @default.
- W3159578034 startingPage "e507" @default.
- W3159578034 abstract "Unmanned Aerial Systems (UAVs, Drones), initially known only for their military applications, are getting increasingly popular in the civil sector as well. Over the military canvas, drones have already proven themselves as a potent force multiplier through unmanned, round-the-clock, long-range and high-endurance missions for surveillance, reconnaissance, search and rescue, and even armed combat applications. With the emergence of the Internet of Things (IoT), commercial deployments of drones are also growing exponentially, ranging from cargo and taxi services to agriculture, disaster relief, risk assessment and monitoring of critical infrastructures. Irrespective of the deployment sector, drones are often entrusted to conduct safety, time and liability critical tasks, thus requiring secure, robust and trustworthy operations. In contrast, the rise in UAVs’ demand, coupled with market pressure to reduce size, weight, power and cost (SwaP-C) parameters, has caused vendors to often ignore security aspects, thus inducing serious safety and security threats. As UAVs rely on Global Positioning System (GPS) for positioning and navigation, they can fall prey to GPS jamming and spoofing attacks. The vulnerability of GPS to spoofing has serious implications for UAVs, as victim drones using civil GPS can be misdirected or even completely hijacked for malicious intents, as already demonstrated in several academic research efforts using commercially available GPS spoofing hardware. Beside UAVs, GPS spoofing attacks are equally applicable to other GPS-dependent platforms, including manned aircraft, ground vehicles, and cellular systems. This paper conducts a comprehensive review of GPS spoofing threats, with a special focus on their applicability over UAVs and other GPS-dependent mobile platforms. It presents a novel taxonomy of GPS spoofing attacks and critically analyzes different spoofing techniques based upon placement of spoofing device, attack stealthiness, attack methodologies, and objectives of the attacker. We also discuss some of the recent experiments from open literature which utilized commercially available hardware for successfully conducting spoofing attacks." @default.
- W3159578034 created "2021-05-10" @default.
- W3159578034 creator A5032009749 @default.
- W3159578034 creator A5066671755 @default.
- W3159578034 creator A5074903170 @default.
- W3159578034 date "2021-05-06" @default.
- W3159578034 modified "2023-09-26" @default.
- W3159578034 title "On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions" @default.
- W3159578034 cites W1576648175 @default.
- W3159578034 cites W1620598987 @default.
- W3159578034 cites W1633229921 @default.
- W3159578034 cites W1877570691 @default.
- W3159578034 cites W1921864689 @default.
- W3159578034 cites W2000634356 @default.
- W3159578034 cites W2021230337 @default.
- W3159578034 cites W2314418883 @default.
- W3159578034 cites W2327737748 @default.
- W3159578034 cites W2332630870 @default.
- W3159578034 cites W2346214124 @default.
- W3159578034 cites W2559990582 @default.
- W3159578034 cites W2610334615 @default.
- W3159578034 cites W2610728744 @default.
- W3159578034 cites W2797821788 @default.
- W3159578034 cites W2807547061 @default.
- W3159578034 cites W2810910757 @default.
- W3159578034 cites W2900644580 @default.
- W3159578034 cites W2904864580 @default.
- W3159578034 cites W2907671185 @default.
- W3159578034 cites W2917161534 @default.
- W3159578034 cites W2918082931 @default.
- W3159578034 cites W2918472297 @default.
- W3159578034 cites W2922348018 @default.
- W3159578034 cites W2938880258 @default.
- W3159578034 cites W2942437319 @default.
- W3159578034 cites W2944772476 @default.
- W3159578034 cites W2958837779 @default.
- W3159578034 cites W2964523010 @default.
- W3159578034 cites W2996771639 @default.
- W3159578034 cites W2997542111 @default.
- W3159578034 cites W3011717424 @default.
- W3159578034 cites W3022865759 @default.
- W3159578034 cites W3025230023 @default.
- W3159578034 cites W3066307143 @default.
- W3159578034 cites W3083973727 @default.
- W3159578034 cites W4232965362 @default.
- W3159578034 cites W4236320116 @default.
- W3159578034 cites W4253574939 @default.
- W3159578034 doi "https://doi.org/10.7717/peerj-cs.507" @default.
- W3159578034 hasPubMedCentralId "https://www.ncbi.nlm.nih.gov/pmc/articles/8114815" @default.
- W3159578034 hasPubMedId "https://pubmed.ncbi.nlm.nih.gov/34013033" @default.
- W3159578034 hasPublicationYear "2021" @default.
- W3159578034 type Work @default.
- W3159578034 sameAs 3159578034 @default.
- W3159578034 citedByCount "23" @default.
- W3159578034 countsByYear W31595780342021 @default.
- W3159578034 countsByYear W31595780342022 @default.
- W3159578034 countsByYear W31595780342023 @default.
- W3159578034 crossrefType "journal-article" @default.
- W3159578034 hasAuthorship W3159578034A5032009749 @default.
- W3159578034 hasAuthorship W3159578034A5066671755 @default.
- W3159578034 hasAuthorship W3159578034A5074903170 @default.
- W3159578034 hasBestOaLocation W31595780341 @default.
- W3159578034 hasConcept C105339364 @default.
- W3159578034 hasConcept C111919701 @default.
- W3159578034 hasConcept C14279187 @default.
- W3159578034 hasConcept C167900197 @default.
- W3159578034 hasConcept C38652104 @default.
- W3159578034 hasConcept C41008148 @default.
- W3159578034 hasConcept C54355233 @default.
- W3159578034 hasConcept C59519942 @default.
- W3159578034 hasConcept C60229501 @default.
- W3159578034 hasConcept C76155785 @default.
- W3159578034 hasConcept C86803240 @default.
- W3159578034 hasConceptScore W3159578034C105339364 @default.
- W3159578034 hasConceptScore W3159578034C111919701 @default.
- W3159578034 hasConceptScore W3159578034C14279187 @default.
- W3159578034 hasConceptScore W3159578034C167900197 @default.
- W3159578034 hasConceptScore W3159578034C38652104 @default.
- W3159578034 hasConceptScore W3159578034C41008148 @default.
- W3159578034 hasConceptScore W3159578034C54355233 @default.
- W3159578034 hasConceptScore W3159578034C59519942 @default.
- W3159578034 hasConceptScore W3159578034C60229501 @default.
- W3159578034 hasConceptScore W3159578034C76155785 @default.
- W3159578034 hasConceptScore W3159578034C86803240 @default.
- W3159578034 hasLocation W31595780341 @default.
- W3159578034 hasLocation W31595780342 @default.
- W3159578034 hasLocation W31595780343 @default.
- W3159578034 hasOpenAccess W3159578034 @default.
- W3159578034 hasPrimaryLocation W31595780341 @default.
- W3159578034 hasRelatedWork W1498479123 @default.
- W3159578034 hasRelatedWork W2076796034 @default.
- W3159578034 hasRelatedWork W2598630260 @default.
- W3159578034 hasRelatedWork W3154305192 @default.
- W3159578034 hasRelatedWork W3156470394 @default.
- W3159578034 hasRelatedWork W3193520027 @default.
- W3159578034 hasRelatedWork W4220818162 @default.
- W3159578034 hasRelatedWork W4283310730 @default.
- W3159578034 hasRelatedWork W4312550622 @default.