|
[1] Amazon prime air. https://www.amazon.com/Amazon-Prime-Air/b?node= 8037720011. [2] David Glade. Unmanned aerial vehicles: Implications for military operations. Technical report, DTIC Document, 2000. [3] Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, and Srdjan Capkun. On the requirements for successful gps spoofing attacks. In Proceedings of the 18th ACM conference on Computer and communications security, pages 75–86. ACM, 2011. [4] Todd Humphreys. Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil gps spoofing. University of Texas at Austin (July 18, 2012), 2012. [5] Kexiong Curtis Zeng, Yuanchao Shu, Shinan Liu, Yanzhi Dou, and Yaling Yang. A practical gps location spoofing attack in road navigation scenario. In Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications, pages 85–90. ACM, 2017. [6] Open source project: Gps-sdr-sim. https://github.com/osqzss/ gps-sdr-sim. [7] Global positioning system. https://en.wikipedia.org/wiki/Global_ Positioning_System. [8] Jon S Warner and Roger G Johnston. Gps spoofing countermeasures. Homeland Security Journal, 25(2):19–27, 2003. [9] Gps broadcast ephemeris data. https://cddis.nasa.gov/Data_and_ Derived_Products/GNSS/broadcast_ephemeris_data.html. [10] Farid Kendoul. Survey of advances in guidance, navigation, and control of unmanned rotorcraft systems. Journal of Field Robotics, 29(2):315–378, 2012. [11] Edwin Vattapparamban, İsmail Güvenç, Ali İ Yurekli, Kemal Akkaya, and Selçuk Uluağaç. Drones for smart cities: Issues in cybersecurity, privacy, and public safety. In Wireless Communications and Mobile Computing Conference (IWCMC), 2016 International, pages 216–221. IEEE, 2016. [12] Sait Murat Giray. Anatomy of unmanned aerial vehicle hijacking with signal spoofing. In Recent Advances in Space Technologies (RAST), 2013 6th International Conference on, pages 795–800. IEEE, 2013. [13] Soft defined radio. https://en.wikipedia.org/wiki/Software-defined_ radio. [14] Hackrf one official website. https://greatscottgadgets.com/hackrf/. [15] The clocking of hackrf one. https://github.com/mossmann/hackrf/wiki/ Clocking. [16] Gps spoofing attack and tcxo. https://forums.hak5.org/index.php? /topic/38290-gps-simulator/. [17] Ubuntu manpage : hackrf-transfer. http://manpages.ubuntu.com/manpages/ xenial/man1/hackrf_transfer.1.html. [18] Rinex format. https://en.wikipedia.org/wiki/RINEX. [19] Ftp server of gps broadcast ephemeris data. ftp://cddis.gsfc.nasa.gov/ gnss/data/daily/. [20] Open source project: Defcon24 - drones hijacking. https://github.com/ Aaron-Luo/DEFCON24. [21] Dji phantom 3 standard. http://www.dji.com/zh-tw/phantom-3-standard. [22] Dji go app. http://www.dji.com/zh-tw/phantom-3-standard/app# sub-feature. [23] Spread spectrum. https://en.wikipedia.org/wiki/Spread_spectrum. |