Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (593)

Search Parameters:
Keywords = spoofing

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 4565 KB  
Article
An Array Antenna-Based Attitude Determination Method for GNSS Spoofing Mitigation in Power System Timing Applications
by Wenxin Jin, Sai Wu, Guangyao Zhang, Ruochen Si, Ling Teng, Wei Chen, Huixia Ding and Chaoyang Zhu
Appl. Sci. 2026, 16(7), 3289; https://doi.org/10.3390/app16073289 (registering DOI) - 28 Mar 2026
Abstract
Accurate GNSS timing is fundamental to Power Time Synchronization Systems (PTSS). However, conventional substation infrastructures remain vulnerable to sophisticated spoofing attacks. In this research, a sensing-assisted array antenna-based spoofing mitigation method is proposed. The proposed architecture operates at the signal front-end and incorporates [...] Read more.
Accurate GNSS timing is fundamental to Power Time Synchronization Systems (PTSS). However, conventional substation infrastructures remain vulnerable to sophisticated spoofing attacks. In this research, a sensing-assisted array antenna-based spoofing mitigation method is proposed. The proposed architecture operates at the signal front-end and incorporates a dedicated spoofing sensing path to estimate the Direction-of-Arrival (DoA) of malicious signals, enabling adaptive null steering while preserving authentic satellite reception. To provide reliable spatial reference for DoA estimation, a unified high-precision attitude determination method is developed for compact 10 cm-scale array antennas under single-frequency and environmental error conditions. The method integrates the Constrained Least-squares AMBiguity Decorrelation Adjustment (C-LAMBDA)-based constrained ambiguity resolution, redundant antenna element-based vertical accuracy enhancement, and iterative refinement to mitigate centimeter-level environmental biases. Semi-simulated experiments demonstrate that the proposed method achieves baseline vector Root Mean Square Errors (RMSE) below 5 mm in horizontal components and approximately 10 mm in vertical components. The resulting attitude accuracies reach 2° in heading, 6° in pitch, and 4° in roll, while eliminating over 80% of systematic environmental phase errors with an average convergence within 6 iterations. These results satisfy the spatial accuracy requirements for effective spoofing suppression and front-end signal purification. Consequently, a robust technical approach is established for enhancing the anti-spoofing capabilities of PTSS without modifying existing infrastructure. Full article
(This article belongs to the Special Issue Advanced GNSS Technologies: Measurement, Analysis, and Applications)
Show Figures

Figure 1

23 pages, 1208 KB  
Article
NeSySwarm-IDS: End-to-End Differentiable Neuro-Symbolic Logic for Privacy-Preserving Intrusion Detection in UAV Swarms
by Gang Yang, Lin Ni, Tao Xia, Qinfang Shi and Jiajian Li
Appl. Sci. 2026, 16(7), 3204; https://doi.org/10.3390/app16073204 - 26 Mar 2026
Viewed by 78
Abstract
Unmanned Aerial Vehicle (UAV) swarms operating in contested environments face a critical “semantic gap” between raw, high-velocity network traffic and high-level mission security constraints, compounded by the risk of privacy leakage during collaborative learning. Existing deep learning (DL)-based Network Intrusion Detection Systems (NIDSs) [...] Read more.
Unmanned Aerial Vehicle (UAV) swarms operating in contested environments face a critical “semantic gap” between raw, high-velocity network traffic and high-level mission security constraints, compounded by the risk of privacy leakage during collaborative learning. Existing deep learning (DL)-based Network Intrusion Detection Systems (NIDSs) suffer from opacity, prohibitive resource consumption, and vulnerability to gradient leakage attacks in federated settings, while traditional rule-based systems fail to handle encrypted payloads and evolving attack patterns. To bridge this gap, we present NeSySwarm-IDS (Neuro-Symbolic Swarm Intrusion Detection System), an end-to-end differentiable neuro-symbolic framework that simultaneously achieves high accuracy, strong privacy guarantees, and built-in interpretability under resource constraints. NeSySwarm-IDS integrates an extremely lightweight 1D convolutional neural network with a differentiable Łukasiewicz fuzzy logic reasoner incorporating attack-specific rules. By aggregating only low-dimensional logic rule weights with calibrated differential privacy noise, we drastically reduce communication overhead while providing (ϵ,δ)-DP guarantees with negligible utility loss. Extensive experiments on the UAV-NIDD dataset and our self-collected dataset demonstrate that NeSySwarm-IDS achieves near-perfect detection accuracy, significantly outperforming traditional machine learning baselines despite using limited training data. A detailed case study on GPS spoofing confirms the interpretability of our approach, providing axiomatic explanations suitable for autonomous mission verification. These results establish that end-to-end neuro-symbolic learning can effectively bridge the semantic gap in UAV swarm security while ensuring privacy and interpretability, offering a practical pathway for deploying trustworthy AI in contested environments. Full article
(This article belongs to the Special Issue Cyberspace Security Technology in Computer Science)
Show Figures

Figure 1

28 pages, 901 KB  
Article
PrivLocAuth: Enabling Location-Aware Cross-Domain UAV Authentication with Zero-Knowledge Location Privacy
by Shayesta Naziri, Xu Wang, Jian Xu, Christy Jie Liang and Guangsheng Yu
Electronics 2026, 15(6), 1243; https://doi.org/10.3390/electronics15061243 - 17 Mar 2026
Viewed by 228
Abstract
Secure cross-domain UAV authentication is challenging because identity verification alone is insufficient to guarantee safe operation. In many UAV applications, it is equally critical to verify that a UAV is currently located within an authorized geographic region. Existing approaches often expose precise GPS [...] Read more.
Secure cross-domain UAV authentication is challenging because identity verification alone is insufficient to guarantee safe operation. In many UAV applications, it is equally critical to verify that a UAV is currently located within an authorized geographic region. Existing approaches often expose precise GPS coordinates, rely on static identifiers that enable tracking, or fail to guarantee the freshness and authenticity of location evidence. These weaknesses allow replay, location spoofing, and trajectory inference attacks, especially in multi-domain environments. To address these limitations, we propose PrivLocAuth, a zero-knowledge-based cross-domain UAV authentication protocol that enforces geofence restrictions without revealing actual locations. In PrivLocAuth, UAVs encode their current coordinates into fresh Pedersen commitments, which are attested by the home Local Domain Server (LDS) using short-lived Schnorr signatures. Based on these attested commitments, UAVs generate Bulletproof range proofs to demonstrate compliance with cross-domain server-defined geofences. This design ensures that UAVs operate within authorized airspace while preserving strong location privacy. PrivLocAuth further incorporates a lightweight elliptic curve cryptography (ECC) and Schnorr signature-based credential framework that enables unlinkable authentication across-domains, preventing session correlation and identity tracking. Formal security analysis demonstrates resistance to impersonation, replay, geofence-bypass, and linkage attacks. Experimental evaluation shows low computational latency and minimal communication overhead, confirming the protocol’s suitability for resource-constrained UAV platforms operating in dynamic cross-domain environments. Full article
(This article belongs to the Special Issue Security and Privacy in Networks and Multimedia, 2nd Edition)
Show Figures

Figure 1

10 pages, 1881 KB  
Proceeding Paper
Prototyping Galileo Signal Authentication Service: Current Status and Plans
by Ignacio Fernandez-Hernandez, Jon Winkel, Cillian O’Driscoll, Tom Willems, Simon Cancela, Miguel Alejandro Ramirez, Rafael Terris-Gallego, Jose A. Lopez-Salcedo, Gonzalo Seco-Granados, Florian Fuchs, Gianluca Caparra, Daniel Blonski, Beatrice Motella, Aleix Galan and Javier Simon
Eng. Proc. 2026, 126(1), 40; https://doi.org/10.3390/engproc2026126040 - 16 Mar 2026
Viewed by 153
Abstract
The Galileo Signal Authentication Service (SAS) is the next new feature to be offered by Galileo, the European GNSS. Its signal-in-space initial capability is expected already in the next months of 2025, starting with the L3 (Launch 3) Galileo elliptical-orbit satellites. It is [...] Read more.
The Galileo Signal Authentication Service (SAS) is the next new feature to be offered by Galileo, the European GNSS. Its signal-in-space initial capability is expected already in the next months of 2025, starting with the L3 (Launch 3) Galileo elliptical-orbit satellites. It is the first-ever navigation signal authentication feature offered globally and openly. Galileo SAS uses the existing Galileo E6-C signal to be encrypted, in combination with OSNMA (Open Service Navigation Message Authentication), through the so-called semi-assisted authentication concept. In this concept, portions of the E6-C are re-encrypted with OSNMA future keys and published in a server. The concept allows signal authentication openly and for free, and without private key management by users. In exchange, the time between authentications is 30 s, inherited from OSNMA, and it introduces a latency between the E6-C signal reception and its authentication down to a few seconds. This work presents the status of Galileo SAS. It outlines its latest technical definition, already shared in previous publications. It will also present the MMARIO (Message and Measurement Authentication Receiver for Initial Operations) project, developing the first SAS server, receiver and testing platform. The paper also outlines the Galileo SAS plans for the near future, up to the Initial Service Declaration. Full article
(This article belongs to the Proceedings of European Navigation Conference 2025)
Show Figures

Figure 1

13 pages, 4429 KB  
Article
Notch Bandpass Filter with an Independently Controllable Notch Frequency Based on SSPPs and an Annular Slot DGS
by Jinxiao Yang, Shuang Li, Zhongming Kang, Qihao Zhang and Zhe Chen
Micromachines 2026, 17(3), 340; https://doi.org/10.3390/mi17030340 - 11 Mar 2026
Viewed by 227
Abstract
In this paper, a notch bandpass filter based on spoof surface plasmon polaritons (SSPPs) is presented and systematically analyzed. The bandpass response is realized by a momentum-matched SSPP transition section and two SSPP resonant units. An annular slot defected ground structure (DGS), evolved [...] Read more.
In this paper, a notch bandpass filter based on spoof surface plasmon polaritons (SSPPs) is presented and systematically analyzed. The bandpass response is realized by a momentum-matched SSPP transition section and two SSPP resonant units. An annular slot defected ground structure (DGS), evolved from the conventional dumbbell DGS is etched on the ground plane to introduce an in-band notch. The notch frequency can be controlled independently by the DGS geometric parameters while the passband edges remain nearly unchanged. A prototype is fabricated and measured. The measured results agree well with the simulations. Two passbands are obtained from 0.67 to 3.40 GHz and from 3.67 to 4.77 GHz. The insertion loss is 0.48 dB at 2.00 GHz and 1.11 dB at 4.22 GHz. The return loss on both sides of the notch is better than −10 dB. A notch centered at 3.50 GHz provides −25 dB rejection. The compact structure and the independently controllable notch frequency make the proposed filter suitable for narrowband interference suppression in microwave and millimeter-wave front ends. Full article
(This article belongs to the Special Issue Novel RF Nano- and Microsystems)
Show Figures

Figure 1

17 pages, 3378 KB  
Article
Securing Virtual Reality: Threat Models, Vulnerabilities, and Defense Strategies
by Andrija Bernik, Igor Tomicic and Petra Grd
Virtual Worlds 2026, 5(1), 13; https://doi.org/10.3390/virtualworlds5010013 - 10 Mar 2026
Viewed by 278
Abstract
As virtual reality technologies evolve toward widespread adoption in education, industry, and social communication, their increasing complexity exposes new and often overlooked security challenges. Immersive environments collect continuous multimodal data, including motion tracking, gaze, voice, and biometric indicators that extend far beyond traditional [...] Read more.
As virtual reality technologies evolve toward widespread adoption in education, industry, and social communication, their increasing complexity exposes new and often overlooked security challenges. Immersive environments collect continuous multimodal data, including motion tracking, gaze, voice, and biometric indicators that extend far beyond traditional computing attack surfaces. This paper synthesizes recent research (2023–2025) on cybersecurity, privacy, and behavioral safety in virtual reality (VR) systems, identifies the main vulnerabilities, and proposes a unified defense architecture: the three-layer VR Security Framework (TVR-Sec). Through comparative review and conceptual integration of 31 peer-reviewed studies, three interdependent protection domains emerged: (1) System Integrity, securing hardware, firmware, and network communications against spoofing and malware; (2) User Privacy, ensuring the ethical management of biometric and behavioral data through federated learning and consent-based control; and (3) Socio-Behavioral Safety, addressing harassment, manipulation, and psychological exploitation in shared virtual spaces. The framework situates VR security as a multidimensional adaptive process that combines technical hardening with human-centered defense and ethical design. By aligning cyber–human protections through an AI-driven monitoring and policy engine, TVR-Sec advances a holistic paradigm for securing future immersive ecosystems. Full article
Show Figures

Figure 1

9 pages, 2913 KB  
Proceeding Paper
Towards Safe Localisation for Railways: Results from the EGNSS MATE Project
by Andreas Wenz, Michael Roth, Paulo Mendes, Roman Ehrler, Andreas Bomonti, Nikolas Dütsch, Camille Parra, Toms Dorins, Alice Martin, Judith Heusel and Keivan Kiyanfar
Eng. Proc. 2026, 126(1), 36; https://doi.org/10.3390/engproc2026126036 - 6 Mar 2026
Viewed by 273
Abstract
Safe train positioning is a key technology to make rail transportation more efficient and cost-effective. Within the EGNSS MATE project, the project partners SBB, DLR, and IABG researched the use of European Global Satellite Navigation Systems for this application. The main contributions are [...] Read more.
Safe train positioning is a key technology to make rail transportation more efficient and cost-effective. Within the EGNSS MATE project, the project partners SBB, DLR, and IABG researched the use of European Global Satellite Navigation Systems for this application. The main contributions are the development of a novel map-based sensor fusion algorithm, the development of a test catalogue for jamming and spoofing cyberthreats, and the collection of a large and rich dataset for testing and validation. The dataset includes over 200 h of sensor data and ground truth data, covering most of the Swiss normal gauge network. In addition, tests were conducted to assess the impact of jamming and spoofing attacks. Results show promising performance of the algorithms on most of the lines, excluding some long tunnels and sections with heavy multipath. The findings of the project results will help to introduce safe train positioning into ETCS by boosting development and standardisation efforts. Full article
(This article belongs to the Proceedings of European Navigation Conference 2025)
Show Figures

Figure 1

25 pages, 2314 KB  
Article
CAN-FD ECU Authentication Using Voltage-Characteristic Hardware Fingerprints
by Yang Yang, Rukang Zhou, Jiabao Yu and Yanjun Ding
Electronics 2026, 15(5), 1094; https://doi.org/10.3390/electronics15051094 - 5 Mar 2026
Viewed by 311
Abstract
As a next-generation serial communication protocol employed in automotive electronics and industrial control domains, Controller Area Network with Flexible Data-Rate (CAN-FD) enhances communication efficiency via the introduction of a dual-rate transmission mechanism, yet it still inherits the security vulnerabilities of traditional CAN networks. [...] Read more.
As a next-generation serial communication protocol employed in automotive electronics and industrial control domains, Controller Area Network with Flexible Data-Rate (CAN-FD) enhances communication efficiency via the introduction of a dual-rate transmission mechanism, yet it still inherits the security vulnerabilities of traditional CAN networks. To enhance the security of node identity authentication in CAN-FD networks—a critical prerequisite for secure communication—we present an electronic control unit (ECU) authentication scheme that utilizes voltage hardware fingerprints (VHFs) as the core identity credential. Specifically, a single frame of data is utilized to integrate the control field’s voltage characteristics and data field’s edges, forming stable and distinguishable hardware fingerprints. We also analyze the VHF offset characteristics under typical spoofing attacks and wire-tapping attacks, and then propose a lightweight vehicle intrusion detection system (VIDS) scheme to identify attack scenarios and locate the compromised ECU in CAN-FD networks. Lastly, we conducted research on and discussed other VHF-influencing factors and put forward detailed specific solutions. Attack tests are conducted under four representative scenarios, namely substitution attack, masquerade attack, injection attack, and wire-tapping attack. The findings reveal that our scheme can not only accurately distinguish between various CAN-FD nodes but also identify specific attack types in real time. In detail, a single-frame node recognition rate exceeding 99% is achieved in approximately 2 ms, and in experiments covering multiple attack scenarios on this six-node prototype system, 100% recognition accuracy for attack types is realized in approximately 500 ms. Full article
Show Figures

Figure 1

24 pages, 4572 KB  
Article
Mitigating Machine-in-the-Loop Drone Attacks on Satellite Links via Atmospheric Scintillation Analysis
by Rajnish Kumar and Shlomi Arnon
Electronics 2026, 15(5), 1076; https://doi.org/10.3390/electronics15051076 - 4 Mar 2026
Viewed by 289
Abstract
The emergence of quantum computing poses a significant threat to the security of traditional encryption methods employed in satellite communication. To mitigate this vulnerability and enhance cybersecurity in the next generation of communication systems, a novel physical-layer solution is presented. This approach centers [...] Read more.
The emergence of quantum computing poses a significant threat to the security of traditional encryption methods employed in satellite communication. To mitigate this vulnerability and enhance cybersecurity in the next generation of communication systems, a novel physical-layer solution is presented. This approach centers on enhancing satellite link security through the analysis of stochastic atmospheric scintillation, facilitated by machine learning (ML). The proposed method safeguards ground stations against Machine-in-the-Middle (MITM) attacks perpetrated from aerial platforms (AP) such as drones or Unmanned Aerial Vehicles (UAVs). The underlying principle leverages the distinct statistical parameters inherent to received signals. These parameters are contingent upon the specific propagation channel, which is influenced by rapid tropospheric scintillation. As signals from legitimate satellites and malicious drones traverse separate spatial paths within the dynamic atmosphere, they exhibit demonstrably divergent scintillation statistics. Wavelet filtering is employed to extract these statistics from the incoming signal. The extracted data is subsequently processed through an ML algorithm, enabling the differentiation between satellite signals and potential spoofing signals emanating from drones. Extensive simulations have been conducted, illustrating the efficacy and robustness of the proposed architecture, consistently achieving an authentication rate exceeding 98% across diverse scenarios. Additionally, experimental results obtained from measurement data collected from Nilesat and Eutelsat satellites at a ground station in Israel provide empirical validation for this innovative approach. Full article
Show Figures

Figure 1

31 pages, 1065 KB  
Review
Survey on Biometric Authentication for Decentralized Identity Management: Trends, Challenges, and Future Directions
by Imen Rjab and Layth Sliman
Future Internet 2026, 18(3), 126; https://doi.org/10.3390/fi18030126 - 2 Mar 2026
Viewed by 788
Abstract
Decentralized Identity (DID) systems aim to restore user control over digital identities by minimizing reliance on centralized authorities. However, ensuring secure identity management in distributed environments remains a significant challenge. Biometric authentication offers a compelling solution by leveraging unique, non-transferable human traits to [...] Read more.
Decentralized Identity (DID) systems aim to restore user control over digital identities by minimizing reliance on centralized authorities. However, ensuring secure identity management in distributed environments remains a significant challenge. Biometric authentication offers a compelling solution by leveraging unique, non-transferable human traits to enhance security and usability compared to traditional methods such as passwords or tokens. Integrating biometrics into DID frameworks represents an important step toward privacy-preserving, user-centric identity verification aligned with the principles of decentralization. Despite growing interest in both biometrics and DIDs, their integration remains largely underexplored in the literature, with hardly any survey providing a systematic analysis of this convergence. This work addresses this gap by presenting a comprehensive review of biometric-enabled DID systems, examining their architectures, potential, and limitations. It emphasizes the role of multimodal biometrics in enhancing accuracy, inclusiveness, and resistance to spoofing, while highlighting key challenges related to data immutability, privacy preservation, interoperability, and regulatory compliance. Overall, this survey establishes a structured foundation for future research on secure, scalable, and privacy-preserving biometric-enabled decentralized identity frameworks. Full article
Show Figures

Graphical abstract

22 pages, 1675 KB  
Article
HybridNER: A Multi-Model Ensemble Framework for Robust Named Entity Recognition—From General Domains to Adversarial GNSS Scenarios
by Yixuan Liu, Jing Zhang, Ruipeng Luan and Xuewen Yu
Sensors 2026, 26(5), 1553; https://doi.org/10.3390/s26051553 - 2 Mar 2026
Viewed by 276
Abstract
Named entity recognition (NER), a core task in natural language processing (NLP), remains constrained by heavy reliance on annotated data, limited cross domain generalization, and difficulty in recognizing name entities out of vocabulary entities. In specialized domains such as analysis of Global Navigation [...] Read more.
Named entity recognition (NER), a core task in natural language processing (NLP), remains constrained by heavy reliance on annotated data, limited cross domain generalization, and difficulty in recognizing name entities out of vocabulary entities. In specialized domains such as analysis of Global Navigation Satellite System (GNSS) countermeasures, including anti-jamming and anti-spoofing, where datasets are small and domain knowledge is scarce, existing models exhibit marked performance degradation. To address these challenges, we propose HybridNER, a framework that integrates locally trained span-based models with large language models (LLMs). The approach employs a span prediction metasystem that first fuses outputs from multiple base learners by computing span to label compatibility scores and assigns an uncertainty estimate to each candidate entity. Entities with uncertainty above a preset threshold are then routed to an LLM for a second stage classification, and the final decision integrates both sources to realize complementary strengths. Experiments on multiple general purpose and domain specific datasets show that HybridNER achieves higher precision, recall, and F1 than traditional ensemble methods such as majority voting and weighted voting, with especially pronounced gains in specialized domains, thereby improving the robustness and generalization of NER. Full article
Show Figures

Figure 1

32 pages, 1232 KB  
Article
Lightweight AI-Based Attack Detection for LED VLC in Multi-Channel Airborne Radar Systems
by Vadim A. Nenashev, Vladimir P. Kuzmenko, Svetlana S. Dymkova and Oleg V. Varlamov
Future Internet 2026, 18(3), 124; https://doi.org/10.3390/fi18030124 - 28 Feb 2026
Viewed by 319
Abstract
Compact multi-channel airborne radar stations increasingly rely on an LED-based visible light communication (VLC) service link under radio-frequency spectrum restrictions and strict end-to-end delay constraints. Despite the directional nature of optical links, the VLC channel remains vulnerable to active optical interference and signal [...] Read more.
Compact multi-channel airborne radar stations increasingly rely on an LED-based visible light communication (VLC) service link under radio-frequency spectrum restrictions and strict end-to-end delay constraints. Despite the directional nature of optical links, the VLC channel remains vulnerable to active optical interference and signal injection; furthermore, when an AI-enabled integrity monitor is embedded into the receiver, the AI decision layer becomes a direct target of evasion and online poisoning. This paper proposes a lightweight, interpretable AI-based attack detection architecture in which a Poisson photon-counting observation model is used to form physically consistent features over the preamble and control-sequence interval, while the final decision is produced by an AI ensemble combining a monotonic logistic detector and a one-class detector. The considered threat profile includes sustained illumination and synchronized flashes (jamming/blinding), spoofing via false preambles, replay of recorded fragments, and online data poisoning during self-calibration. The adequacy of solutions is assessed using the detection probability PD (ensemble: PD ≥ 0.90 for DC-jamming mean-count increment ΔλDC ≈ 7.56, pulsed-interference mean-count increment Δλpulse ≈ 12.89, and spoofing signal-scaling factor α ≈ 1.02), the false-alarm probability PFA = 0.045, and the per-packet end-to-end latency (bounded by the observation-window duration LΔT = 20 μs, where window length L = 20 and interval duration ΔT = 1 μs), which confirms real-time CPU operation without GPU acceleration. Full article
(This article belongs to the Special Issue Securing Artificial Intelligence Against Attacks)
Show Figures

Figure 1

35 pages, 13595 KB  
Review
A Comprehensive Survey on 5G RedCap: Technologies, Security Vulnerabilities, and Attack Vectors
by Pavan Raja I, Kurunandan Jain, Hari N. N, Sethu Subramanian N and Prabhakar Krishnan
Future Internet 2026, 18(3), 118; https://doi.org/10.3390/fi18030118 - 27 Feb 2026
Viewed by 720
Abstract
While 5G addresses extreme performance tiers, 3GPP Releases 17 and 18 RedCap fill critical mid-tier performance gaps for diverse applications like industrial sensors and consumer wearables. The existing academic literature remains fragmented, focusing on isolated metrics rather than a holistic synthesis. There is [...] Read more.
While 5G addresses extreme performance tiers, 3GPP Releases 17 and 18 RedCap fill critical mid-tier performance gaps for diverse applications like industrial sensors and consumer wearables. The existing academic literature remains fragmented, focusing on isolated metrics rather than a holistic synthesis. There is a significant need to integrate technical specifications with empirical industry data. This survey systematically reviews Release 17/18 specifications, integrating literature from 2021 to 2025. We consolidate academic simulations and industry empirical reports to facilitate a rigorous comparative analysis across critical performance indicators. Findings evaluate complexity reduction via bandwidth limitation, antenna reduction, and HD-FDD. We provide a comprehensive security threat matrix, mapping vulnerabilities like RACH spoofing and paging suppression to countermeasures. RedCap cannot match eMBB throughput or NB-IoT’s battery life. Consequently, legacy LPWA remains more suitable for simple, decade-long sensing tasks. This work contributes a novel use-case taxonomy and a security analysis. This study provides practitioners with actionable insights into complexity trade-offs and network security risks. Future research should prioritize AI-driven management and “zero-maintenance” IoT through advanced power-saving innovations. Full article
(This article belongs to the Special Issue Cybersecurity in the Age of AI, IoT, and Edge Computing)
Show Figures

Graphical abstract

10 pages, 2301 KB  
Proceeding Paper
Development of a Star Classifier for Optimal Geopositioning Purposes Using a Star-Sighting Device
by Guillaume Rance and Philippe Élie
Eng. Proc. 2026, 126(1), 31; https://doi.org/10.3390/engproc2026126031 - 25 Feb 2026
Viewed by 220
Abstract
In environments where Global Navigation Satellite Systems are denied, a common solution to estimate one’s position on the Earth is to use stars as inertial references, as was done centuries ago by navigators using a sextant. Nowadays, sextants have been replaced by star-sighting [...] Read more.
In environments where Global Navigation Satellite Systems are denied, a common solution to estimate one’s position on the Earth is to use stars as inertial references, as was done centuries ago by navigators using a sextant. Nowadays, sextants have been replaced by star-sighting devices, composed of inertial sensors, precise clocks, and one or more star sensors, combining the short-term precision of inertial navigation techniques and the long-term precision of celestial ones. In this context, this paper aims at developing a star classifier for geopositioning purposes, i.e., a way to discriminate stars in the sky so that an observer can choose the stars that would provide the most precise estimate of their position regarding the sighting performances of the device used (sensor definition, precision of the inertial sensor, etc.). The star classifier proposed in this paper is based on differential calculations and spherical trigonometry, and leads to closed-form expressions that are easily embeddable to evaluate the potential of a star. These closed-form expressions are then validated on an experimental setup. Full article
(This article belongs to the Proceedings of European Navigation Conference 2025)
Show Figures

Figure 1

9 pages, 1335 KB  
Proceeding Paper
Demonstrating the Broadcast of Authenticated AIS Messages Using VDES While Retaining Backwards Compatibility
by Gareth Wimpenny, Nikolaos Vastardis, Jan Šafář and Chris Hargreaves
Eng. Proc. 2026, 126(1), 27; https://doi.org/10.3390/engproc2026126027 - 25 Feb 2026
Viewed by 305
Abstract
The spoofing of Automatic Identification System (AIS) messages presents a hazard to safe maritime navigation. To prevent such spoofing, we present an authentication system based on Public Key Cryptography (PKC) that is both fully open source and backwards compatible with mariners’ existing use [...] Read more.
The spoofing of Automatic Identification System (AIS) messages presents a hazard to safe maritime navigation. To prevent such spoofing, we present an authentication system based on Public Key Cryptography (PKC) that is both fully open source and backwards compatible with mariners’ existing use of the AIS. Using this, we have successfully demonstrated the ‘live’, over-the-air broadcast of authenticated AIS messages in a busy radio environment. The technique used is an improvement upon earlier work in that digital signatures are carried using the terrestrial VHF Data Exchange (VDE-TER) component of the VHF Data Exchange System (VDES). This prevents additional channel loading on the AIS and offers greater flexibility. Full article
(This article belongs to the Proceedings of European Navigation Conference 2025)
Show Figures

Figure 1

Back to TopTop