TAG: Daniel Shepard

Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle

August 1, 2012By

By Daniel Shepard, Jahshan A. Bhatti, and Todd E. Humphreys  Unmanned aerial vehicle (uav) used in the spoofing tests; owned by the University of Texas.  A radio signal sent from a half-mile away deceived the GPS receiver of a UAV into thinking that it was rising straight up. In this way, the UAV’s dependence on civil GPS allowed the... read more

Straight Talk on Anti-Spoofing: Securing the Future of PNT

January 1, 2012By

Disruption created by intentional generation of fake GPS signals could have serious economic consequences. This article discusses how typical civil GPS receivers respond to an advanced civil GPS spoofing attack, and four techniques to counter such attacks: spread-spectrum security codes, navigation message authentication, dual-receiver correlation of military signals, and vestigial signal defense. Unfortunately, any kind of anti-spoofing, however necessary, is a tough sell. read more

This article is tagged with , , , , , and posted in Defense, OEM