The new algorithm can prevent cyber-attacks on GPS devices

Scientists have developed a new algorithm that can help detect and prevent cyberattacks on GPS-enabled devices in real time.

Scientists have developed a new algorithm that can help detect and prevent cyberattacks on GPS-enabled devices in real time.

This algorithm was developed by researchers at the University of Texas at San Antonio (UTSA) in the US, which can help mitigate the impact of fake GPS attacks on the grid and the technologies that depend on GPS Nikolaos Gatsis from UTSA said: "The toxic agents are capable of breaking the device's understanding of time and location by emitting signals that pretend to be GPS signals."

The new algorithm can prevent cyber-attacks on GPS devices Picture 1The new algorithm can prevent cyber-attacks on GPS devices Picture 1

Gatsis, a researcher on the work published in IEEE Transactions on Electronics, said: "This can be harmful to many different technology sectors." The US grid is an example, it depends on GPS to provide time stamps for measurements at power stations across the country. Although reliable, researchers at laboratories around the world have shown that this system could be exploited by cyberattacks, disrupting data about the time and location of Connection systems.

David Akopian of UTSA said: "In general, network attackers can replicate GPS signals, to display the wrong time or location. This can cause all kinds of vandalism. It sends people. wrong location or make the data time useless.This new algorithm can be applied to mobile phones or computers as easily as a new application, capable of identifying false GPS signals and against an attack when it happens ".

The main focus of researchers is to prevent attacks on the US grid, but this algorithm is applied to a number of different devices. Ahmad F Taha from UTSA said: "When self-driving cars move forward, it is important that we ensure the safety of our GPS signals because of appropriating the position of a car The driver will cause many incalculable consequences.

See more:

  1. What is IP spoofing? And what is a denial of service (DoS) attack?
  2. 10 most effective antivirus software for Windows 2018
  3. 7 ways to protect your web browser from network attacks
4 ★ | 1 Vote