The new algorithm can prevent cyber-attacks on GPS devices
Scientists have developed a new algorithm that can help detect and prevent cyberattacks on GPS-enabled devices in real time.
This algorithm was developed by researchers at the University of Texas at San Antonio (UTSA) in the US, which can help mitigate the impact of fake GPS attacks on the grid and the technologies that depend on GPS Nikolaos Gatsis from UTSA said: "The toxic agents are capable of breaking the device's understanding of time and location by emitting signals that pretend to be GPS signals."
Gatsis, a researcher on the work published in IEEE Transactions on Electronics, said: "This can be harmful to many different technology sectors." The US grid is an example, it depends on GPS to provide time stamps for measurements at power stations across the country. Although reliable, researchers at laboratories around the world have shown that this system could be exploited by cyberattacks, disrupting data about the time and location of Connection systems.
David Akopian of UTSA said: "In general, network attackers can replicate GPS signals, to display the wrong time or location. This can cause all kinds of vandalism. It sends people. wrong location or make the data time useless.This new algorithm can be applied to mobile phones or computers as easily as a new application, capable of identifying false GPS signals and against an attack when it happens ".
The main focus of researchers is to prevent attacks on the US grid, but this algorithm is applied to a number of different devices. Ahmad F Taha from UTSA said: "When self-driving cars move forward, it is important that we ensure the safety of our GPS signals because of appropriating the position of a car The driver will cause many incalculable consequences.
See more:
- What is IP spoofing? And what is a denial of service (DoS) attack?
- 10 most effective antivirus software for Windows 2018
- 7 ways to protect your web browser from network attacks
You should read it
- What you need to know about an information security analyst
- Awareness and experience - the most important factor in every network security process
- Alarming statistics on the situation of network security in our country in the first half of 2019
- The cybersecurity tools that every business should know
- Will 5G make us more vulnerable to cyber attacks?
- More than 1.7 billion cyber attacks in 2013
- The basic steps in dealing with network security issues that you need to understand
- Information security test has the answer P3
- Multiple choice questions about network security implementation have P2 answers
- Red alert on computer viruses in Vietnam
- Network security challenges in 2014
- Vietnamnet network crashes: What is anticipated
Maybe you are interested
How to create fake location, fake GPS on iPhone - Choose any location
9 ways to fix GPS on Android that doesn't work
7 best free Android apps to fake GPS
How to fix 'Please Wait for the GPSVC' loop error
What is A-GPS positioning technology? What is the effect of A-GPS? A-GPS On which device?
Top 5 Fake GPS Apps on Android