The new algorithm can prevent cyber-attacks on GPS devices
Scientists have developed a new algorithm that can help detect and prevent cyberattacks on GPS-enabled devices in real time.
This algorithm was developed by researchers at the University of Texas at San Antonio (UTSA) in the US, which can help mitigate the impact of fake GPS attacks on the grid and the technologies that depend on GPS Nikolaos Gatsis from UTSA said: "The toxic agents are capable of breaking the device's understanding of time and location by emitting signals that pretend to be GPS signals."
Gatsis, a researcher on the work published in IEEE Transactions on Electronics, said: "This can be harmful to many different technology sectors." The US grid is an example, it depends on GPS to provide time stamps for measurements at power stations across the country. Although reliable, researchers at laboratories around the world have shown that this system could be exploited by cyberattacks, disrupting data about the time and location of Connection systems.
David Akopian of UTSA said: "In general, network attackers can replicate GPS signals, to display the wrong time or location. This can cause all kinds of vandalism. It sends people. wrong location or make the data time useless.This new algorithm can be applied to mobile phones or computers as easily as a new application, capable of identifying false GPS signals and against an attack when it happens ".
The main focus of researchers is to prevent attacks on the US grid, but this algorithm is applied to a number of different devices. Ahmad F Taha from UTSA said: "When self-driving cars move forward, it is important that we ensure the safety of our GPS signals because of appropriating the position of a car The driver will cause many incalculable consequences.
See more:
- What is IP spoofing? And what is a denial of service (DoS) attack?
- 10 most effective antivirus software for Windows 2018
- 7 ways to protect your web browser from network attacks
You should read it
- Alarming statistics on the situation of network security in our country in the first half of 2019
- The cybersecurity tools that every business should know
- Will 5G make us more vulnerable to cyber attacks?
- More than 1.7 billion cyber attacks in 2013
- The basic steps in dealing with network security issues that you need to understand
- Information security test has the answer P3
- Multiple choice questions about network security implementation have P2 answers
- Red alert on computer viruses in Vietnam
May be interested
- 7 categories to prevent denial of service attacksdenial of service (ddos) attacks will always be the top threat to systems around the world. technically, we can only hope that attackers use tools and have a poor understanding of protocols to be able to
- What can organizations do to protect themselves from cyber attacks?the devastation, the losses of billions of dollars are caused by cyber attacks that are increasingly expanding around the world in terms of scale, manner and extent of danger.
- Microsoft successfully prevented nearly 71 billion cyber attacks in 2021according to microsoft's internal statistics, in 2021, the company has successfully prevented and neutralized nearly 71 billion cyber attacks.
- Hackers attacked hundreds of universities to gain access to library datacobalt dickens is one of the world's most sought after hacker groups.
- Most cyber attacks focused on these 3 TCP ports onlysmall and medium-sized businesses can fully protect themselves from most cyber attacks by increasing defenses against ports that are most often targeted by malicious actors.
- Common types of cyber attacks target seniorscybercrime targeting the elderly is a major problem worldwide. there are many reasons for this group to fall victim to online fraud. the majority of the elderly access technology era slower than young people
- 'Scoring' tool to prevent network attacks for freecyradar internet security check tool is a tool to support users to assess the ability to prevent computer network attacks currently issued by cyradar, fpt's security startup free of charge during the safety day event. vietnam information 2018 on november 30 in hanoi.
- What is Hyperjacking? How to Prevent Hyperjacking Attackshyperjacking is a sophisticated type of cyber attack where a bad actor takes control of the hypervisor, the component that manages the virtual environment in a computer system.
- Binary Search algorithm (Binary Search)binany search is a fast search algorithm with runtime complexity of Ο (log n). the algorithm of binary search works based on the principle of division and rule (divide and conquer). in order for this algorithm to work correctly, the data set should be in sorted form.
- What is algorithm?algorithms (also known as algorithms - english is algorithms) is a finite set of instructions to be executed in a certain order to get the desired result. in general, the algorithm is independent of programming languages, ie an algorithm can be deployed in many different programming languages.