Attendee Sign In Sign in to access papers, presentations, photos and videos

Session A3a: GNSS Security: Interference, Jamming, and Spoofing 2

RETURN TO SESSION LIST


Date: Wednesday, January 29, 2025
Time: 1:45 p.m. - 3:25 p.m.
Location: Beacon A
In-Person presenters in this session provide pre-recorded presentations for viewing by registered attendees on Tuesday, January 28.

Session Chairs

Dr. Jianming She
The MITRE Corporation


Zixi Liu
Stanford University

Sign in to:

  • Add papers to your schedule
  • Download full papers and presentations

In-Person Presentations
These presentations will be given in-person at the conference. Presenters will provide a pre-recorded presentation for on-demand viewing by virtual attendees.
1:50 Detection and Identification of Inauthentic Signals Based on the Frequency Drift of the GNSS Receiver Clock
   
Zhen Zhu, East Carolina University; Sanjeev Gunawardena, Air Force Institute of Technology; Mark Carroll, Air Force Research Laboratory; Nathan Pax, University of Dayton Research Institute; Eric Vinande, and Jason Pontious, Air Force Research Laboratory
2:12 Consumer INS Coupled with Carrier Phase Measurements for GNSS Spoofing Detection
 
Tore Johansson, Marco Spanghero, and Panos Papadimitratos, KTH Royal Institute of Technology Peer Reviewed
2:35 Performance of Optimal INS Monitor Against Live Spoofing
 
Birendra Kujur, Samer Khanafseh, Boris Pervan, Illinois Institute of Technology Peer Reviewed
2:58 A Particle Filter Based Sensor Fusion Approach for GNSS Spoofing Detection Incorporating Ground Vehicle Navigation Constraints
Muhammad Sami Irfan, Sagar Dasgupta, and Mizanur Rahman, The University of Alabama
3:25 - 3:55, Break. Refreshments in Exhibit Hall
On-Demand Presentations
Pre-recorded presentations will become available for viewing by registered attendees on Tuesday, January 28.
  Datasets for Evaluating Anti-Spoofing Algorithms in GPS/INS Integrated Navigation
Yimin Guo, Yanhong Kou, Yiwei Wang, Yun Zhao, Beihang University
  Evaluation for BDSBAS Single-Frequency Service Assisted by Data Authentication
   
Xiaoshuang Li, Kun Fang, Hongwen Wang, Shujing Wang, and Zhipeng Wang, Beihang University

RETURN TO SESSION LIST