Sökning: "Förfalskningsattacker"
Hittade 4 uppsatser innehållade ordet Förfalskningsattacker.
1. Distributed Relay/Replay Attacks on GNSS Signals
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : In modern society, Global Navigation Satellite Systems (GNSSs) are ubiquitously relied upon by many systems, among others in critical infrastructure, for navigation and time synchronization. To overcome the prevailing vulnerable state of civilian GNSSs, many detection schemes for different attack types (i.e. LÄS MER
2. Impacts of misbehavior in Intelligent Transportation Systems (ITS) : The case of cooperative maneuvers
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Connected and autonomous vehicles are emerging technologies that have fostered the Intelligent Transportation System (ITS). ITS has the objective of optimizing traffic safety, mobility, and fuel consumption. To achieve this, a range of different services are provided that utilize communication in a vehicular network. LÄS MER
3. VePMAD: A Vehicular Platoon Management Anomaly Detection System : A Case Study of Car-following Mode, Middle Join and Exit Maneuvers
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Vehicle communication using sensors and wireless channels plays an important role to allow exchanging information. Adding more components to allow exchanging more information with infrastructure enhanced the capabilities of vehicles and enabled the rise of Cooperative Intelligent Transport Systems (C-ITS). LÄS MER
4. A Comparison of Smartphone GPSL1 and Galileo E1-B/C Spoofing Resilience
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Location-based services have grown in importance as smartphones, and location-based applications have become an integral part of everyday life. While Global Navigation Satellite Systems (GNSSs) provide the most accurate position determination, open service GNSS signals remain unprotected and susceptible to spoofing attacks. LÄS MER