- GNSS positioning and interference
- Indoor and Outdoor Localization Technologies
- Inertial Sensor and Navigation
- Digital Media Forensic Detection
- Maritime Navigation and Safety
- Wireless Signal Modulation Classification
- Historical Geography and Cartography
- Human-Automation Interaction and Safety
- Risk and Safety Analysis
- Ionosphere and magnetosphere dynamics
- Cognitive Radio Networks and Spectrum Sensing
- Radar Systems and Signal Processing
- Wireless Communication Networks Research
- Speech and Audio Processing
- Traffic control and management
- User Authentication and Security Systems
- Advanced Steganography and Watermarking Techniques
- Satellite Communication Systems
- RFID technology advancements
- Astronomical Observations and Instrumentation
- Distributed Sensor Networks and Detection Algorithms
- Electrostatic Discharge in Electronics
- 3D Surveying and Cultural Heritage
- Radio Wave Propagation Studies
- Infrastructure Maintenance and Monitoring
University of Ljubljana
2014-2024
Joint Research Centre
2014
The correct identification of smartphones has various applications in the field security or fight against counterfeiting. As level sophistication counterfeit electronics increases, detection procedures must become more accurate but also not destructive for smartphone under testing. Some components are likely to reveal their authenticity even without a physical inspection, since they characterized by hardware fingerprints detectable simply examining data provide. This is case MEMS (Micro...
The berthing of an ultra large ship is always a difficult issue and becomes yet more complex when vessels must be handled in restricted manoeuvring areas limited depth, exposed to forceful crosswind, or strong current, all three. final approaching manoeuvre precise positioning particularly demanding at container terminals where many STS cranes are located along the quay, seriously limiting margin for error process mooring ship, especially nearby bridge wing very edge pier. In order avoid...
This paper presents experimental results obtained during live GNSS jamming tests performed in a road environment. Different detection strategies are considered with specific focus on signal agnostic approaches where no stringent model assumptions made for the detector design. A measurement station of commercial GPS high-sensitivity receiver and an SDR front-end was deployed used to collect measurements presence jamming. The were using three different jammers considering effects introduced by...
This letter addresses the problem of Internet Things (IoT) authentication when cryptographic means are not feasible or they have limited applicability due to constraints in context computing capabilities IoT devices. presents a novel approach for wireless devices using their Radio Frequency (RF) emissions where Convolutional Neural Networks (CNN) combination with Recurrence Plots (RP) applied. In recent years various studies demonstrated that can be authenticated on basis RF because physical...
Understanding the factors that might intentionally influence reception of global navigation satellite system (GNSS) signals can be a challenging topic today. The focus this research is to evaluate vulnerability geodetic GNSS receivers under use low-cost L1/E1 frequency jammer. A suitable area for testing was established in Slovenia. Nine from different manufacturers were consideration study. While positioning, intentional 3-minute jammings performed by jammer located statically at distances...
Summary One of the important functions cognitive radio (CR) technology is spectrum sensing. The implementation an efficient sensing function can be quite challenging because various factors such as multi‐path fading, low signal‐to‐noise ratio communication services to detected and requirement detect analyze signal in a short time. As consequence, it quantitatively assess performance techniques scenarios. This paper investigates different digital processing for context mobile satellite...
We investigate the identification of mobile phones through their built-in magnetometers. These electronic components have started to be widely deployed in mass market recent years, and they can exploited uniquely identify due physical differences, which appear digital output generated by them. This is similar approaches reported literature for other phone, including camera, microphones or RF transmission components. In this paper, performed an inexpensive device made up a platform that...
Jammer localization is usually performed through the deployment of a complex infrastructure where several nodes simultaneously monitor frequency bands to be protected from jamming. In this paper, two alternative approaches for jamming are investigated. They based on Carrier-to-Noise density power ratio (C/N0) measurements and do not require infrastructure. The first approach synthetic array principle which idea that set sensors in different positions space can replaced by single sensor...
Abstract Radio‐frequency fingerprinting is a technique for the authentication and identification of wireless devices using their intrinsic physical features an analysis digitized signal collected during transmission. The based on fact that unique generate discriminating in transmitted signal, which can then be analyzed signal‐processing machine‐learning algorithms. Deep learning more specifically convolutional neural networks (CNNs) have been successfully applied to problem radio‐frequency...
This paper is intended to give an overview of the experiments evaluate cognitive load officer on watch (OOW) during a collision avoidance maneuver in full-mission simulator. The main goal investigate possibilities recording biometric parameters OOW simulated maneuver. Potentially dangerous navigation errors known as human erroneous action (HEA) are induced by excessive load. Despite modern navigational aids ship’s bridge, investigators maritime incidents typically link reason for at sea with...
Recent studies have investigated the use of inertial measurement units to detect and report presence road irregularities on surface thus improve safety maintenance transportation infrastructure. The results from literature show that it is possible various in identify type irregularity with good accuracy using statistical features. This article addresses specific called features (RSF) focuses identification RSF instances themselves rather than identification, which leads a more challenging...
Jamming is becoming a serious threat to various users of global navigation satellite systems (GNSS). Therefore, live monitoring tests are required estimate the sensitivity range GNSS receivers under jamming. This study analyses response some mass-market and professional-grade intentional interferences based on different 3D jammer positions. First, vertical jamming was investigated, followed by horizontal experiment where were placed at three locations while moving within triangular area. The...
A risk assessment of GNSS PNT service degradation is essential for the establishment quality services (QoS) GNSS-enabled applications. Space weather, geomagnetic and ionospheric conditions were found to be prime class positioning performance causes. In this paper, we address problem provision insight risks deployment GNSS-based applications with a long-term analysis GPS accuracy its effects on air, maritime, Location-Based Services (LBS) in tropical regions. We assembled large database...
The purpose of this study is to analyse data from the marine pilots' bio-sensor readings determine how experience affects their biometrical response during port approach. experiences play a significant role in participant's decision-making process and correlate with repetitions. Through repetitions experimental task, participants gain experience, which correlates response, e.g., heart rate, electrodermal activity, etc. After exposing two experience-distinct groups same simulated...
Smartphones now dominate the Global Navigation Satellite System (GNSS) devices capable of collecting raw data. However, they also offer valuable research opportunities in intentional jamming, which has become a serious threat to GNSS. have potential locate jammers, but their robustness and sensitivity range need be investigated first. In this study, response smartphones with dual-frequency, multi-constellation reception capability, namely, Xiaomi Mi8, 11T, Samsung Galaxy S20, Huawei P40,...
Robust autonomous driving, as long it relies on satellite-based positioning, requires carrier-phase-based algorithms, among other types of data sources, to obtain precise and true positions, which is also primarily for the use GNSS geodetic receivers, but increasingly mass-market devices. The experiment was conducted under line-of-sight conditions a straight road during period no traffic. receivers were positioned roof car travelling at low speed in presence static jammer, while kinematic...
Maritime studies, encompassing a range of disciplines, increasingly rely on advanced data analytics, particularly in the context navigation. As technology advances, statistical averaging large datasets has become critical component these analyses. However, recent studies have highlighted discrepancies between predictions and observable realities, especially high-stress environments like port approach procedures conducted by marine pilots. This study analyzed physiological responses recorded...
The technological progress on the digital processing has an impact approach to detection and localization of electromagnetic sources. In this technical report, we present a monitoring system detect mobile satellite terminals in open sea. is based high gain antennas amplifiers correlation known spectrum responses. can be implemented using low-cost component it deployed patrolling boats. prototype improved vessels coast guard or navy, which have responsibility patrol sea for illegal immigrants...
Cybersecurity in the automotive sector is becoming increasingly important as modern vehicles can be exposed to cybersecurity threats and regulatory fraud. Sensor identification authentication an function vehicle life cycle. This paper proposes alternative or complementary approach cryptographic techniques based on physical properties of Hall sensor, which commonly used odometers motion sensors. The application different signal processing algorithms experimental dataset 12 sensors was...