نتایج جستجو برای: spoofing order
تعداد نتایج: 910816 فیلتر نتایج به سال:
The openness of wireless networks enables adversaries to deception as other devices. Spoofing attacks are vulnerable in wireless network, which are allowed the many form of attacks in the network. Wireless spoofing attacks are effortless to start and can extensively impact the performance of networks. A physical property coupled with each node is proposed which uses spatial information, hard to...
Visa 3-D Secure is an e-payment system based on the integration of SSL/TLS with the three-domain architecture. It employs cryptographic techniques to secure communication links among participants in e-commerce transactions and also provides credit card verification via Visa Secure Server. Although several security vulnerabilities can be addressed, spoofing attacks are still effective and can be...
An innate deficiency of the Internet is its susceptibility to IP spoofing. Whereas a router uses a forwarding table to determine where it should send a packet, previous research has found that a router can similarly employ an incoming table to verify where a packet should come from, thereby detecting IP spoofing. Based on a previous protocol for building incoming tables, SAVE, this paper introd...
Global Positioning System (GPS) is used ubiquitously in a wide variety of applications ranging from navigation and tracking to modern smart grids and communication networks. However, it has been demonstrated that modern GPS receivers are vulnerable to signal spoofing attacks. For example, today it is possible to change the course of a ship or force a drone to land in an hostile area by simply s...
A method is developed to detect GNSS spoofing by processing beat carrier-phase measurements from a pair of antennas in a CDGPS-type calculation. This system Copyright © 2014 by Mark L. Psiaki, Brady W. O'Hanlon, Steven P. Powell, Jahshan A. Bhatti, Kyle D. Wesson, Todd E. Humphreys, & Andrew Schofield. All rights reserved. Preprint from ION GNSS+ 2014 detects spoofing attacks that are resistant...
It is well-known that in wireless local area networks, authenticating nodes by their MAC addresses is not secure since it is very easy for an attacker to learn one of the authorized addresses and change his MAC address accordingly. In this paper, in order to prevent MAC address spoofing attacks, we propose to use dynamically changing MAC addresses and make each address usable for only one sessi...
In order to develop security systems for identity authentication, face recognition (FR) technology has been applied. One of the main problems of applying FR technology is that the systems are especially vulnerable to attacks with spoofing faces (e.g., 2D pictures). To defend from these attacks and to enhance the reliability of FR systems, many anti-spoofing approaches have been recently develop...
Global navigation satellite system (GNSS) spoofing causes the victim receiver to deduce false positioning and timing data; this notably threatens navigational safety. Thus, anti-spoofing techniques that improve reliability of GNSS systems, for which interference detection is critical, are essential. Based on distortion tracking loop correlation function symmetry target caused by gradual adjustm...
In order to obtain higher detection probability of the GPS spoofing, a general identification scheme with decision fusion is proposed. Firstly, the singular values of the wavelet transformation coefficients of both spoofing and genuine signal are computed and formed as the feature vectors. Then, the feature vectors are input into three classifiers, which are the support vector machines (SVM), t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید