7,422 research outputs found
Security of GPS/INS based On-road Location Tracking Systems
Location information is critical to a wide-variety of navigation and tracking
applications. Today, GPS is the de-facto outdoor localization system but has
been shown to be vulnerable to signal spoofing attacks. Inertial Navigation
Systems (INS) are emerging as a popular complementary system, especially in
road transportation systems as they enable improved navigation and tracking as
well as offer resilience to wireless signals spoofing, and jamming attacks. In
this paper, we evaluate the security guarantees of INS-aided GPS tracking and
navigation for road transportation systems. We consider an adversary required
to travel from a source location to a destination, and monitored by a INS-aided
GPS system. The goal of the adversary is to travel to alternate locations
without being detected. We developed and evaluated algorithms that achieve such
goal, providing the adversary significant latitude. Our algorithms build a
graph model for a given road network and enable us to derive potential
destinations an attacker can reach without raising alarms even with the
INS-aided GPS tracking and navigation system. The algorithms render the
gyroscope and accelerometer sensors useless as they generate road trajectories
indistinguishable from plausible paths (both in terms of turn angles and roads
curvature). We also designed, built, and demonstrated that the magnetometer can
be actively spoofed using a combination of carefully controlled coils. We
implemented and evaluated the impact of the attack using both real-world and
simulated driving traces in more than 10 cities located around the world. Our
evaluations show that it is possible for an attacker to reach destinations that
are as far as 30 km away from the true destination without being detected. We
also show that it is possible for the adversary to reach almost 60-80% of
possible points within the target region in some cities
Efficient wireless location estimation through simultaneous localization and mapping
Conventional Wi-Fi location estimation techniques using radio fingerprinting typically require a lengthy initial site survey. It is suggested that the lengthy site survey is a barrier to adoption of the radio fingerprinting technique. This research investigated two methods for reducing or eliminating the site survey and instead build the radio map on-the-fly. The first approach utilized a deterministic algorithm to predict the user's location near each access point and subsequently construct a radio map of the entire area. This deterministic algorithm performed only fairly and only under limited conditions, rendering it unsuitable for most typical real-world deployments. Subsequently, a probabilistic algorithm was developed, derived from a robotic mapping technique called simultaneous localization and mapping. The standard robotic algorithm was augmented with a modified particle filter, modified motion and sensor models, and techniques for hardware-agnostic radio measurements (utilizing radio gradients and ranked radio maps). This algorithm performed favorably when compared to a standard implementation of the radio fingerprinting technique, but without needing an initial site survey. The algorithm was also reasonably robust even when the number of available access points were decreased.Ph.D.Committee Chair: Owen, Henry; Committee Member: Copeland, John; Committee Member: Giffin, Jonathon; Committee Member: Howard, Ayanna; Committee Member: Riley, Georg
Recent Advances in Indoor Localization Systems and Technologies
Despite the enormous technical progress seen in the past few years, the maturity of indoor localization technologies has not yet reached the level of GNSS solutions. The 23 selected papers in this book present the recent advances and new developments in indoor localization systems and technologies, propose novel or improved methods with increased performance, provide insight into various aspects of quality control, and also introduce some unorthodox positioning methods
Filtering based multi-sensor data fusion algorithm for a reliable unmanned surface vehicle navigation
When considering the working conditions under which an unmanned surface vehicle (USV) operates, the navigational sensors, which already have inherent uncertainties, are subjected to environment influences that can affect the accuracy, security and reliability of USV navigation. To combat this, multi-sensor data fusion algorithms will be developed in this paper to deal with the raw sensor measurements from three kinds of commonly used sensors and calculate improved navigational data for USV operation in a practical environment. Unscented Kalman Filter, as an advanced filtering technology dedicated to dealing with non-linear systems, has been adopted as the underlying algorithm with the performance validated within various computer-based simulations where practical, dynamic navigational influences, such as ocean currents, provide force against the vessel’s structure, are to be considered
Index to 1986 NASA Tech Briefs, volume 11, numbers 1-4
Short announcements of new technology derived from the R&D activities of NASA are presented. These briefs emphasize information considered likely to be transferrable across industrial, regional, or disciplinary lines and are issued to encourage commercial application. This index for 1986 Tech Briefs contains abstracts and four indexes: subject, personal author, originating center, and Tech Brief Number. The following areas are covered: electronic components and circuits, electronic systems, physical sciences, materials, life sciences, mechanics, machinery, fabrication technology, and mathematics and information sciences
A Survey of Air-to-Ground Propagation Channel Modeling for Unmanned Aerial Vehicles
In recent years, there has been a dramatic increase in the use of unmanned
aerial vehicles (UAVs), particularly for small UAVs, due to their affordable
prices, ease of availability, and ease of operability. Existing and future
applications of UAVs include remote surveillance and monitoring, relief
operations, package delivery, and communication backhaul infrastructure.
Additionally, UAVs are envisioned as an important component of 5G wireless
technology and beyond. The unique application scenarios for UAVs necessitate
accurate air-to-ground (AG) propagation channel models for designing and
evaluating UAV communication links for control/non-payload as well as payload
data transmissions. These AG propagation models have not been investigated in
detail when compared to terrestrial propagation models. In this paper, a
comprehensive survey is provided on available AG channel measurement campaigns,
large and small scale fading channel models, their limitations, and future
research directions for UAV communication scenarios
Applications of Context-Aware Systems in Enterprise Environments
In bring-your-own-device (BYOD) and corporate-owned, personally enabled (COPE) scenarios, employees’ devices store both enterprise and personal data, and have the ability to remotely access a secure enterprise network. While mobile devices enable users to access such resources in a pervasive manner, it also increases the risk of breaches for sensitive enterprise data as users may access the resources under insecure circumstances. That is, access authorizations may depend on the context in which the resources are accessed. In both scenarios, it is vital that the security of accessible enterprise content is preserved. In this work, we explore the use of contextual information to influence access control decisions within context-aware systems to ensure the security of sensitive enterprise data. We propose several context-aware systems that rely on a system of sensors in order to automatically adapt access to resources based on the security of users’ contexts. We investigate various types of mobile devices with varying embedded sensors, and leverage these technologies to extract contextual information from the environment. As a direct consequence, the technologies utilized determine the types of contextual access control policies that the context-aware systems are able to support and enforce. Specifically, the work proposes the use of devices pervaded in enterprise environments such as smartphones or WiFi access points to authenticate user positional information within indoor environments as well as user identities
- …