Figure 4-2 - uploaded by Farha Jahan
Content may be subject to copyright.
Simulation World Map  

Simulation World Map  

Source publication
Thesis
Full-text available
Unmanned systems or remotely piloted vehicles can easily accomplish tasks where human lives would be at risk. These systems are being deployed in areas which would be time-consuming, expensive and inconclusive if done by human intervention. Air, ground and underwater vehicles are three major classes of unmanned systems based on their operational en...

Similar publications

Article
Full-text available
Unmanned aerial vehicles (UAVs) have recently become popular for both recreational and commercial use and UAV networks have thus started to attract the attention of researchers in area of the computer communication and networking. One important topic in UAV networks is congestion control because congestion causes packet losses and delays which resu...

Citations

... For each spoofed signal indexed from 1 to Ns, the parameters including spoofing amplitude (Asi), coding phase (λsi), and carrier phase (ϕSi) may exhibit variations depending on the nature of the initiated attack. Throughout a spoofing attack [24], the receiver's reception is influenced, and the maximum total signal received is a crucial metric in evaluating the effectiveness of the deception. And given by: y total (t) = y(t) + y s (t) + l(t) ...
Article
Full-text available
In the contemporary landscape dominated by widespread Global Navigation Satellite Systems (GNSS) usage for various navigational applications across aerial and terrestrial domains, route determination efficiency is increasingly reliant on the accuracy of inputs derived from GNSS, primarily facilitated by GPS and associated modules. However, the rising occurrence of spoofing mechanisms has introduced distortions in this realm, necessitating thorough examination. The discernible impact of GNSS signals on seamless navigation underscores their pivotal role in precise path determination. Yet, sophisticated spoofing methodologies disrupt this, compromising the integrity of GNSS-derived information. Addressing these challenges requires closer scrutiny of vulnerabilities and the formulation of robust countermeasures to fortify the GNSS infrastructure. This research embarks on exploring adaptive filtering techniques tailored for detecting and eliminating spurious signals introduced by sophisticated spoofing mechanisms. The primary goal is to establish an uninterruptible and dependable GNSS system. The scientific foundation involves a rigorous examination of signal processing methodologies, with a focus on adaptive filtering algorithms adept at discerning original signals from falsifiedones. By delving into these intricacies of adaptive filtering, this research aims to enhance GNSS resilience against spoofing threats, considering the nuanced characteristics of spoofed signals, and developing strategies capable of distinguishing them from authentic GNSS signals. The scientific rigor extends to the formulation of algorithms attuned to dynamic signal variations, ensuring adaptability to evolving spoofing techniques. This scientific inquiry contributes substantively to GNSS security by advancing the theoretical foundations of adaptive filtering mechanisms. Through systematic experimentation and empirical validation, the research aims not only to detect but also to eliminate spoofed signals, fostering an environment where GNSS users can rely on an uninterrupted and resilient navigation system. The results obtained from this study carry the promise of guiding the advancement of advanced counter-spoofing technologies, safeguarding the enduring integrity and reliability of GNSS against continuously evolving adversarial tactics.
... Jamming generally refers to transmitting a certain bandwidth and high-power noise signal on the frequency of satellite navigation so that the signal-to-noise ratio of the receiver decreases and cannot work normally. Jamming is very simple to implement and relatively inexpensive, but it can easily to be detected by anti-radiation equipment [9]. Then, the interference source can be removed. ...
... By such means, they induced the drone to land in the Tabas desert area of Iran, 140 km away from the U.S. military base, but the drone mistakenly thought it was landing at the U.S. military base designated by the U.S. military. Figure 6a shows the simulation process of Iran capturing the RQ-170; Figure 6b,c are the news report pictures of the U.S. drone captured by Iran [9]. Although the U.S. has repeatedly denied it, Figure 6 shows that the UAV is intact. ...
Article
Full-text available
With the development of satellite navigation technology, the research focus of GNSS has shifted from improving positioning accuracy to expanding system application and improving system performance. At the same time, improving the survivability of satellite navigation systems has become a research hotspot in the field of navigation, especially with regard to anti-spoofing. This paper first briefly analyzes the common interference types of satellite navigation and then focuses on spoofing. We analyze the characteristics and technical mechanism of satellite navigation and the positioning signal. Spoofing modes are classified and introduced separately according to signal generation, implementation stage and deployment strategy. After an introduction of GNSS spoofing technology, we summarize the research progress of GNSS anti-spoofing technology over the last decade. For anti-spoofing technology, we propose a new classification standard and analyze and compare the implementation difficulty, effect and adaptability of the current main spoofing detection technologies. Finally, we summarize with considerations, prospective challenges and development trends of GNSS spoofing and anti-spoofing technology in order to provide a reference for future research.
... This testbed can also be used to validate the communication behavior in a UAV-Network [29,42,74,3]. This simulator was further extended to develop and incorporate a GNSS simulator called GNSSim [41,75]. The authors used UAVSim in combination with GNSSim to design and simulate GPS related attacks such as GPS jamming and spoofing on UAVs [76]. ...
Article
Full-text available
Over the past two decades, Unmanned Aerial Vehicles (UAVs), more commonly known as drones, have gained a lot of attention, and are rapidly becoming ubiquitous because of their diverse applications such as surveillance, disaster management, pollution monitoring, film-making, and military reconnaissance. However, incidents such as fatal system failures, malicious attacks, and disastrous misuses have raised concerns in the recent past. Security and viability concerns in drone-based applications are growing at an alarming rate. Besides, UAV networks (UAVNets) are distinctive from other ad-hoc networks. Therefore, it is necessary to address these issues to ensure proper functioning of these UAVs while keeping their uniqueness in mind. Furthermore, adequate security and functionality require the consideration of many parameters that may include an accurate cognizance of the working mechanism of vehicles, geographical and weather conditions, and UAVNet communication. This is achievable by creating a simulator that includes these aspects. A performance evaluation through relevant drone simulator becomes indispensable procedure to test features, configurations, and designs to demonstrate superiority to comparative schemes and suitability. Thus, it becomes of paramount importance to establish the credibility of simulation results by investigating the merits and limitations of each simulator prior to selection. Based on this motivation, we present a comprehensive survey of current drone simulators. In addition, open research issues and research challenges are discussed and presented.
... The test bed performance analysis in different scenarios for different modes of operations has also been presented, which advocates its performance in a generic computing environment. 24 This test bed was further enhanced with an independent GNSS simulation module, GNSSim, 25,26 which used CNI OS3 by implementing a generic satellite constellation-based positioning application, that is, a GNSS. This feature allows GNSSim to simulate GPS, GLONASS, BeiDou, and Galileo satellite systems through minor variations in configuration files. ...
Article
Full-text available
Simulation test beds serve as a cost-effective and safe way to evaluate the system performance of various real world systems. With the rising concerns in the security of sensitive and critical systems, such as unmanned aerial vehicles (UAVs), a software simulation test bed is clearly the best choice given that the environment and various system components are modeled correctly. This becomes critical given the recently developed autonomous aerial vehicles. We therefore evaluate several available simulation test beds and use the most promising test bed to analyze the impact of Global Positioning System (GPS)-related attacks on navigation of UAVs. We also introduce a novel technique for GPS spoofing, attack detection, and mitigation. This paper presents GPS spoofing and GPS jamming attacks with their anatomy, design, and impact evaluation on navigation as well as a novel GPS spoofing mitigation and detection technique for UAVs, using UAVSim: an open source simulation test bed.