- Indoor and Outdoor Localization Technologies
- Chemical Synthesis and Analysis
- Antimicrobial Peptides and Activities
- Wireless Signal Modulation Classification
- Wireless Communication Security Techniques
- Lipid Membrane Structure and Behavior
- Carbohydrate Chemistry and Synthesis
- GNSS positioning and interference
- Cryptographic Implementations and Security
- Speech and Audio Processing
- Biochemical and Structural Characterization
- Supramolecular Self-Assembly in Materials
- Molecular spectroscopy and chirality
- Satellite Communication Systems
- Monoclonal and Polyclonal Antibodies Research
- Microbial Natural Products and Biosynthesis
- Inertial Sensor and Navigation
- Target Tracking and Data Fusion in Sensor Networks
- Protein Structure and Dynamics
- RNA and protein synthesis mechanisms
- Protein Hydrolysis and Bioactive Peptides
- Chaos-based Image/Signal Encryption
- Advanced Authentication Protocols Security
- Advanced NMR Techniques and Applications
- Electron Spin Resonance Studies
University of Padua
1996-2022
Centre National de la Recherche Scientifique
1996
Laboratoire de Chimie
1996
Spoofing attacks in global navigation satellite systems (GNSSs) aim at inducing the estimation of a fake position victim receiver. Many devices, including smartphones, are nowadays equipped with both GNSS receiver and an inertial measurement unit (IMU), which also provides location/movement information, while being immune from attacks. We propose spoofing detection technique based on comparison between IMU measurements. The is performed through generalized likelihood ratio test (GLRT),...
Trichogin GA IV, an 11-residue lipopeptaibol blocked at the N-terminus by n-octanoyl group and C-terminus a 1,2-amino alcohol (l-leucinol), extracted from fungus Trichoderma longibrachiatum, exhibits remarkable membrane-modifying properties. We have synthesized trichogin IV several [l-Leu-OMe11] analogs carrying acyl chain of variable length (C2−C8, C10, C12, C14, C16, C18). A succinoylated head-to-head dimer was also prepared. conformational analysis, carried out FTIR absorption, CD, NMR,...
In-region location verification (IRLV) aims at verifying whether a user is inside region of interest (ROI). In wireless networks, IRLV can exploit the features channel between and set trusted access points. practice, feature statistics not available we resort to machine learning (ML) solutions for IRLV. We first show that based on either neural networks (NNs) or support vector machines (SVMs) with typical loss functions are Neyman-Pearson (N-P)-optimal convergence sufficiently complex large...
Spoofing of global-navigation satellite system (GNSS) signals to induce a target position estimate is relevant security threat the navigation drones. However, spoofing multiple drones simultaneously as they move in swarm, without disrupting their formation, complex task. In this paper, we propose transmit from ground, such that fake can be estimated any point an area plane where swarm moving. To end filter satellite-generated GNSS with multidimensional linear filter, and filtered signal...
Nowadays, aerial formations are frequently employed in outdoor scenarios to cooperatively explore and monitor wide areas of interest. In these applications, the vehicles often exposed relevant security vulnerabilities, as, for instance, alteration navigation signals from an attacker with map counterfeiting (if not even hijacking) purposes. this work, we focus on Unmanned Aerial Vehicle (UAV) formation that monitors area, wherein spoofing attacks may occur. Letting UAVs cooperate exploiting...
Today's smartphones widely exploit Global Navigation Satellite System (GNSS) as a positioning source, but the impact of spoofing attacks on these devices has never been extensively investigated. Resource constrained mobile phones are designed to provide position, velocity and time end user even in most challenging environments, where GNSS signal is hardly available first place. This approach pursues usability energy efficiency rather than security, thus leaving exposed potential...
In-region location verification (IRLV) in wireless networks is the problem of deciding if user equipment (UE) transmitting from inside or outside a specific physical region (e.g., safe room). The decision process exploits features channel between UE and set network access points (APs). We propose solution based on machine learning (ML) implemented by neural (NN) trained with (in particular, noisy attenuation values) collected APs for various positions both region. output position (inside...
The availability of signal components easing the acquisition process, supporting fast time retrieval, and providing some navigation data to derive a first position fix within few seconds, is interest for applications targeting accuracies in order meters relying only on broadcast GNSS data. This paper presents Data design concepts being considered context Galileo evolution activities. In particular, discusses how spatial transmission diversity provided by multiple satellites view receiver can...
The spoofing attack is a well known threat for global navigation satellite systems (GNSSs), where malicious entity forges fake GNSS signals in order to trick victim receiver into computing the desired false position and time. Only recent years interest anti-spoofing techniques has been extended mobile-device applications. As location-based services (LBS) are now deeply integrated billions of people's everyday life, security positioning mobile phones become concern. Indeed, it proven that...
In order to combat the spoofing of global navigation satellite system (GNSS) signals, we propose a novel signal authentication method based on information-theoretic security. particular, superimposes an containing secret message corrupted by artificial noise (AN). We impose following properties: The legitimate receiver synchronizes with and stores samples same synchronization. After transmission signal, through separate public asynchronous ground channel (e.g., secure Internet connection)...
Spoofing attacks against global navigation satellite system (GNSS) receivers are a serious threat to secure navigation, also in autonomous driving. Cars typically include, beyond the GNSS receiver, an inertial measurement unit (IMU), whose data can be used detect spoofing attacks. We consider specific attack, with spoofed trajectory that gradually diverges from true trajectory, and we propose detection method based on machine learning. First, feature vector is designed, collecting difference...
The availability of low-complexity signal components, easing the acquisition process and supporting derivation a fast timeto-first-fix, enables reduction energy required to perform first fix by receiver, which is very relevant aspect for most GNSS receivers. This paper discusses time ambiguity resolution based on Quasi-Pilot (QP) design options being considered in context Galileo evolution activities. shows that some QP enable acquisition, retrieval position less than 250 ms urban...
Global navigation satellite systems (GNSS) are widely used in many civil applications to get information on position, velocity and timing (PVT). However, current (such as global positioning system (GPS) Galileo) do not include any feature authenticate the received signal, therefore leaving open possibility from an attacker spoof GNSS signal induce a wrong PVT computation at receiver. In this paper we propose solution based superposition of authentication message (signature) artificial noise...
The GNSS signal received power lies below the thermal noise and a correlation with known spreading sequence is needed in order to recover it. use of for tracking vehicles or goods has incentivized malicious personal privacy devices (PPD) jammers disrupt service. Usually achieve denial service (DoS) by transmission high interfering signals, making it difficult victim receiver correctly track genuine signal. approach traditional jamming attack can be seen as brute-force: disrupts over certain...
Abstract: We synthesized using solution‐phase methods three analogs of [ l ‐Leu 11 ‐OMe] trichogin GA IV, a membrane active synthetic precursor the lipopeptaibol antibiotic in which N‐terminal n ‐octanoyl group and each Aib residues positions 1, 4 8 are replaced by an acetyl lipophilic C α,α ‐disubstituted glycine ‐(αMe)Aun, respectively [partial (αMe)Aun scan]. FT‐IR absorption CD analyses unequivocally show that main three‐dimensional structural features IV preserved analogs. Also, N α ‐...
The ubiquity of global navigation satellite system (GNSS)-based positioning and timing services is often frustrated by the necessity to operate in harsh environments, where carrier-to-noise ratio low, hence, decoding data even tracking an acquired symbol are difficult. We consider possibility improving performance GNSS component trading spreading gain against coding rate. rationale that codes can be seen as a form repetition (at least partially) replaced more robust forms improve robustness...