The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Maximum likelihood estimation (MLE) has been used in direct position estimation in the global navigation satellite system (GNSS) receivers. It can be used for anti-spoofing because it utilizes the consistency between different satellites. In the method, how to find the optimal MLE solution is a challenge, because the likelihood function of the MLE is multimodal. In the paper, particle swarm optimization...
GNSS receivers are vulnerable to replay attacks. Main of previous works suppose all visible GNSS satellites' signals are manipulated by repeaters, which launch replay attacks, and a victim GNSS receiver processes spoofing signals but not legitimate signals. However, in navigation confrontation environment, the supposing is quite difficult to meet. To this end, here a more practicable scenario called...
Reversible data hiding has its attractions and possible drawbacks in researches, and it has the potential to extend to digital rights management (DRM) applications. For reversible data hiding, secret information can be hidden into original multimedia content, and the content with hidden data can be transmitted to the receiver. After reception, receiver employs corresponding algorithm to decode the...
A GLONASS signal simulator is a necessity for the research of GLONASS navigation system. This paper presents a high fidelity signal simulator. To achieve the fidelity, six transmission channel errors and earth rotation caused transmission time error are particularly considered in the design and implementation of the signal simulator. This paper also provides comprehensive details of its design and...
Flex Ray is a new communication protocol standard for future automotive applications that provides time determinism, flexibility and fault-tolerance. It consists of a time-triggered Static Segment and an event-triggered Dynamic Segment in a single communication cycle. The scheduling of tasks in the ECU and messages in the Flex Ray bus can affect each other. Design of the task/message scheduling is...
We propose a secure image delivery scheme which can protect privacy of the secret region in sending image. In the scheme, the bits of the chosen secret region are first reversibly embedded into non-protection region. The secret region is then concealed or substituted with other meaningful content by our modified Poisson editing method, in which twice Laplacian operator is used to achieve better seamless...
OSEK/VDX is an important specification in the field of automotive electronics and OSEK COM specifies the data communication behaviors inter-ECU and intra-ECU, but doesn't appoint specific underlying layer. In this paper,OSEK COM is implemented based on CAN bus. We present a model that dynamically generates properly CAN identifier to schedule I-PDUs of OSEK COM and transmit data that is longer than...
Communication plays an important role in modern automotive system architecture. In order to optimize the AUTOSAR intra-ECU communication, an approach based on mapping runnable entities is proposed to reduce task switching, and avoid communication data inconsistency and time delay. Taking into account the various communication behaviors of all runnable entities in the current ECU, we provide six extended...
A construction of authentication codes with arbitration from subspaces of singular pseudo-symplectic geometry over finite field of characteristic 2 is given, the parameters of the code are computed. Assuming that the encoding rules of the transmitter and the receiver are chosen according to a uniform probability distribution, the probabilities of success for different type of deceptions are also computed.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.