نتایج جستجو برای: spoofing order

تعداد نتایج: 910816  

2014
Beulah Shekhar

The openness of wireless networks enables adversaries to deception as other devices. Spoofing attacks are vulnerable in wireless network, which are allowed the many form of attacks in the network. Wireless spoofing attacks are effortless to start and can extensively impact the performance of networks. A physical property coupled with each node is proposed which uses spatial information, hard to...

Journal: :The Journal of Korea Information and Communications Society 2013

2013
Pita Jarupunphol Wipawan Buathong

Visa 3-D Secure is an e-payment system based on the integration of SSL/TLS with the three-domain architecture. It employs cryptographic techniques to secure communication links among participants in e-commerce transactions and also provides credit card verification via Visa Secure Server. Although several security vulnerabilities can be addressed, spoofing attacks are still effective and can be...

2010
Toby Ehrenkranz Jun Li Patrick D. McDaniel

An innate deficiency of the Internet is its susceptibility to IP spoofing. Whereas a router uses a forwarding table to determine where it should send a packet, previous research has found that a router can similarly employ an incoming table to verify where a packet should come from, thereby detecting IP spoofing. Based on a previous protocol for building incoming tables, SAVE, this paper introd...

Journal: :CoRR 2016
Aanjhan Ranganathan Hildur Ólafsdóttir Srdjan Capkun

Global Positioning System (GPS) is used ubiquitously in a wide variety of applications ranging from navigation and tracking to modern smart grids and communication networks. However, it has been demonstrated that modern GPS receivers are vulnerable to signal spoofing attacks. For example, today it is possible to change the course of a ship or force a drone to land in an hostile area by simply s...

2014
Mark L. Psiaki Brady W. O'Hanlon Jahshan A. Bhatti Kyle D. Wesson Todd E. Humphreys

A method is developed to detect GNSS spoofing by processing beat carrier-phase measurements from a pair of antennas in a CDGPS-type calculation. This system Copyright © 2014 by Mark L. Psiaki, Brady W. O'Hanlon, Steven P. Powell, Jahshan A. Bhatti, Kyle D. Wesson, Todd E. Humphreys, & Andrew Schofield. All rights reserved. Preprint from ION GNSS+ 2014 detects spoofing attacks that are resistant...

2012
Kemal Bicakci Yusuf Uzunay

It is well-known that in wireless local area networks, authenticating nodes by their MAC addresses is not secure since it is very easy for an attacker to learn one of the authorized addresses and change his MAC address accordingly. In this paper, in order to prevent MAC address spoofing attacks, we propose to use dynamically changing MAC addresses and make each address usable for only one sessi...

2015
Sooyeon Kim Yuseok Ban Sangyoun Lee

In order to develop security systems for identity authentication, face recognition (FR) technology has been applied. One of the main problems of applying FR technology is that the systems are especially vulnerable to attacks with spoofing faces (e.g., 2D pictures). To defend from these attacks and to enhance the reliability of FR systems, many anti-spoofing approaches have been recently develop...

Journal: :IEEE Sensors Journal 2022

Global navigation satellite system (GNSS) spoofing causes the victim receiver to deduce false positioning and timing data; this notably threatens navigational safety. Thus, anti-spoofing techniques that improve reliability of GNSS systems, for which interference detection is critical, are essential. Based on distortion tracking loop correlation function symmetry target caused by gradual adjustm...

Journal: :I. J. Network Security 2017
Minhong Sun Yuan Qin Jianrong Bao Xutao Yu

In order to obtain higher detection probability of the GPS spoofing, a general identification scheme with decision fusion is proposed. Firstly, the singular values of the wavelet transformation coefficients of both spoofing and genuine signal are computed and formed as the feature vectors. Then, the feature vectors are input into three classifiers, which are the support vector machines (SVM), t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید