Cryptography Is Not Enough: Relay Attacks on Authenticated GNSS Signals.
Maryam MotallebighomiHarshad SathayeMridula SinghAanjhan RanganathanPublished in: CoRR (2022)
Keyphrases
- cellular automata
- countermeasures
- signal processing
- information security
- cryptographic algorithms
- cryptographic protocols
- cooperative
- malicious attacks
- security mechanisms
- spectral analysis
- security threats
- key exchange protocol
- security risks
- authentication scheme
- watermarking algorithm
- image watermarking
- navigation systems
- security protocols
- base station
- key exchange
- key agreement protocol
- watermarking scheme
- access control