Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "repeater" wg kryterium: Temat


Wyświetlanie 1-5 z 5
Tytuł:
On the application of GNSS signal repeater as a spoofer
Autorzy:
Dobryakova, L.
Ochin, E.
Powiązania:
https://bibliotekanauki.pl/articles/360710.pdf
Data publikacji:
2014
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
spoofer
spoofing
GNSS
repeater
Opis:
Spoofing and antispoofing algorithms have become an important research topic within the GNSS discipline. The power of the GNSS signal on the earth’s surface averages –160 dBw. While many GNSS receivers leave large space for signal dynamics, enough power space is left for the GNSS signals to be spoofed. The goal of spoofing is to provide the receiver with a misleading signal, fooling the receiver to use fake signals in space for positioning calculations. The receiver will produce a misleading position solution. The purpose of this paper is to analyze the vulnerability of the satellite signal in repeater’s output from the viewpoint of GNSS spoofing attacks. The article discusses a new approach to GNSS spoofing, based on the application of GNSS signals repeating by potential terrorists. Practical spoofing that provides misleading navigation results at the receiver is difficult to conduct due to the signal infrastructure, and by applying trivial anti-spoofing algorithms in GPS receivers, spoofing attack can be easily detected. To detect spoofing attacks of this type we have a variety of methods. For example, the authors suggest the use of paired navigators and GNSS compasses as detectors of GNSS spoofing.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2014, 40 (112); 53-57
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The vulnerability of unmanned vehicles to terrorist attacks such as Global Navigation Satellite System spoofing
Autorzy:
Dobryakova, L.
Lemieszewski, Ł.
Ochin, E.
Powiązania:
https://bibliotekanauki.pl/articles/135170.pdf
Data publikacji:
2016
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
GNSS
navigation
jammer
jamming
anti-jamming
spoofer
spoofing
anti-spoofing
repeater
Opis:
Spoofing, anti-spoofing, jamming, and anti-jamming algorithms have become an important research topic within the Global Navigation Satellite System (GNSS) discipline. While many GNSS receivers leave large space for signal dynamics, enough power space is left for the GNSS signals to be spoofed. GNSS signal power on the earth’s surface is around 160 dBW. The goal of spoofing is to provide the receiver with a slightly more powerful misleading signal, stronger than the original GNSS signal, fooling the receiver into using fake signals for positioning calculations. The receiver will generate a misleading position of the navigator. Practical spoofing that provides misleading navigation results of the receiver is difficult to conduct due to the signal infrastructure. Using trivial anti-spoofing algorithms in GNSS receivers, spoofing attacks can be easily detected. The article discusses the vulnerability of unmanned vehicles and provides an approach to anti-spoofing based on measuring distance between two antennas.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2016, 46 (118); 181-188
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Protecting vehicles vulnerable to terrorist attacks, such as GNSS jamming, by electromagnetic interference shielding of antenna
Autorzy:
Dobryakova, L.
Lemieszewski, Ł.
Ochin, E.
Powiązania:
https://bibliotekanauki.pl/articles/135431.pdf
Data publikacji:
2017
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
GNSS
navigation
jammer
jamming
anti-jamming
spoofer
spoofing
anti-spoofing
repeater
Opis:
Spoofing, anti-spoofing, jamming and anti-jamming technologies have become an important research topic within the GNSS discipline. While many GNSS receivers leave a large space for signal dynamics, enough power space is left for the GNSS signals to be spoofed and/or jammed. The goal of spoofing is to provide the receiver with a misleading signal, fooling the receiver into using fake signals in the extra space for positioning calculations. The receiver will then generate a false position, thus misleading the navigator. The goal of jamming is to add noise to the satellite signal which leads to fooling the receiver into using “signals plus noise” for positioning calculations. This article discusses the approach to anti-jamming based on the shielding of antennas from the signal jammer.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2017, 50 (122); 77-83
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Bayesian virtual metrology for quality inspection of mobile repeater systems
Autorzy:
Kim, S. D.
Kim, J. S.
Mun, B. M.
Bae, S. J.
Powiązania:
https://bibliotekanauki.pl/articles/406820.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Bayesian approach
regression
conjugate priors
ICS repeater
Markov chain Monte Carlo
Opis:
The technology of wideband code division multiple access (WCDMA) has been applied to band selective interference cancellation system (ICS) repeaters. To inspect the telecommunication quality of the systems, quality engineers must check the shape of the signals at the corresponding frequency band of the repeaters. However, measuring the signal quality is a repetitive manual task which requires much inspection time and high costs. In the case of small-sized samples, such as the example of an ICS repeater system, Bayesian approaches have been employed to improve the estimation accuracy by incorporating prior information on the parameters of the model in consideration. This research proposes a virtual method of quality inspection for products using a correlation structure of measurement data, mainly in a Bayesian regression framework. The Bayesian regression model derives prior information from historical measurement data to predict measurements of other frequency bandwidths by exploiting the correlation structure of each measurement data. Empirical results show the potential for reducing inspection costs and time by predicting the values of adjoining frequency bandwidths through measured data of a frequency bandwidth in the course of quality inspections of ICS repeater systems.
Źródło:
Management and Production Engineering Review; 2016, 7, 4; 48-53
2080-8208
2082-1344
Pojawia się w:
Management and Production Engineering Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Countering a Self-protection Frequency-shifting Jamming against LFM Pulse Compression Radars
Autorzy:
Baher Safa Hanbali, S.
Kastantin, R.
Powiązania:
https://bibliotekanauki.pl/articles/226354.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
anti-jamming
LFM
range-Doppler coupling
frequency-shifting jammer
repeater jammer
Opis:
The well-known range-Doppler coupling property of the LFM (Linear Frequency Modulation) pulse compression radar makes it more vulnerable to repeater jammer that shifts radar signal in the frequency domain before retransmitting it back to the radar. The repeater jammer, in this case, benefits from the pulse compression processing gain of the radar receiver, and generates many false targets that appear before and after the true target. Therefore, the radar cannot distinguish between the true target and the false ones. In this paper, we present a new technique to counter frequency shifting repeater jammers. The proposed technique is based on introducing a small change in the sweep bandwidth of LFM waveform. The effectiveness of the proposed technique is justified by mathematical analysis and demonstrated by simulation.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 2; 145-150
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-5 z 5

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies