2016 IEEE Conference on Communications and Network Security (CNS) 2016
DOI: 10.1109/cns.2016.7860525
|View full text |Cite
|
Sign up to set email alerts
|

GPS spoofing attack characterization and detection in smart grids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 41 publications
(25 citation statements)
references
References 9 publications
0
25
0
Order By: Relevance
“…6) which proves ψ H h (λ; r 1:∞ ) ≤ ψ H h (λ;r), ∀λ ∈ |X |−1 . For the Legendre transforms the inequality is reversed, yielding Ψ H h (ω; r 1:∞ ) ≥ Ψ H h (ω;r), ∀ω ∈ P(X ).…”
mentioning
confidence: 64%
See 1 more Smart Citation
“…6) which proves ψ H h (λ; r 1:∞ ) ≤ ψ H h (λ;r), ∀λ ∈ |X |−1 . For the Legendre transforms the inequality is reversed, yielding Ψ H h (ω; r 1:∞ ) ≥ Ψ H h (ω;r), ∀ω ∈ P(X ).…”
mentioning
confidence: 64%
“…Modern networks are vulnerable to malicious attacks. For instance, the civilian global positioning system (GPS) is particularly exposed to spoofing attacks [4], which can impair wireless ad-hoc communication systems [5], or alter the timing information in smart grids [6], [7]. As a consequence, the timestamp information of the system may be altered to the point that the data arriving to a central decision unit can be considered unlabeled.…”
Section: A Related Workmentioning
confidence: 99%
“…noise drawn from the σ 2 w -variance distribution whose PDF is f w (x/σ w )/σ w and CDF is F w (x/σ w ), where f w (x) and F w (x) are the corresponding unit-variance PDF and CDF, and Q i (·) implies a binary quantizer which produces 1 if the argument is DRAFT larger than a scalar threshold τ i and 0 otherwise. The thresholds of N quantizers are identical given any time index 1 . We assume that the PDF f w (w) is log-concave, which is often met in practice such as Gaussian distributions, and the thresholds of N quantizers are identical given any time index.…”
Section: Problem Setupmentioning
confidence: 99%
“…DRAFT Then the variates p (1) , p (2) · · · , p (K) are distributed as K descending ordered statistics from an uniform…”
Section: Approximations On Permutation Matrix Recovery Probabilitymentioning
confidence: 99%
“…Over a larger geographical area, cooperative authentication through pairwise checking by cross-correlation with encrypted P(Y) signal was used. Detection mechanisms for GNSS spoofing in power systems are also being explored in industry and academia [39]. Impact analysis of GNSS spoofing on power systems applications is also being researched [17].…”
Section: Current Efforts and Collaborative Opportunities Secure Amentioning
confidence: 99%