{"id":3616,"date":"2025-09-20T23:35:13","date_gmt":"2025-09-20T23:35:13","guid":{"rendered":"https:\/\/172-234-197-23.ip.linodeusercontent.com\/?page_id=3616"},"modified":"2025-09-20T23:35:13","modified_gmt":"2025-09-20T23:35:13","slug":"spoofing-and-jamming-resilience-for-rf-driven-ar-alerts","status":"publish","type":"page","link":"https:\/\/neurosphere-2.tail52f848.ts.net\/wordpress\/?page_id=3616","title":{"rendered":"Spoofing and Jamming Resilience for RF-Driven AR Alerts"},"content":{"rendered":"\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/neurosphere-2.tail52f848.ts.net\/wordpress\/wp-content\/uploads\/2025\/09\/Spoofing_and_Jamming_Resilience_for_RF\u2011Driven_AR_Alerts-Ben-Gilbert-725-Grand-Ave-Bacliff-TX-77518.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Spoofing_and_Jamming_Resilience_for_RF\u2011Driven_AR_Alerts Ben Gilbert 725 Grand Ave Bacliff TX 77518.\"><\/object><a id=\"wp-block-file--media-296959fd-b53d-4408-9418-1ac80f75c475\" href=\"https:\/\/neurosphere-2.tail52f848.ts.net\/wordpress\/wp-content\/uploads\/2025\/09\/Spoofing_and_Jamming_Resilience_for_RF\u2011Driven_AR_Alerts-Ben-Gilbert-725-Grand-Ave-Bacliff-TX-77518.pdf\">Spoofing_and_Jamming_Resilience_for_RF\u2011Driven_AR_Alerts Ben Gilbert 725 Grand Ave Bacliff TX 77518<\/a><a href=\"https:\/\/neurosphere-2.tail52f848.ts.net\/wordpress\/wp-content\/uploads\/2025\/09\/Spoofing_and_Jamming_Resilience_for_RF\u2011Driven_AR_Alerts-Ben-Gilbert-725-Grand-Ave-Bacliff-TX-77518.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-296959fd-b53d-4408-9418-1ac80f75c475\">Download<\/a><\/div>\n\n\n\n<p class=\"wp-block-paragraph\">Augmented reality systems that rely on radiofrequency (RF) sensing must withstand adversarial attacks. An<br>attacker may jam the channel to block alerts or spoof RF<br>signatures to trigger false critical alarms. Today\u2019s RF-to-AR<br>pipelines lack systematic mechanisms to evaluate and harden<br>against such threats. Inspired by red-team methodologies, we<br>present a framework for generating adversarial traces and<br>evaluating spoofing\/jamming resilience. We contribute three components: (1) adversarial trace generators that inject jammed<br>and spoofed RF events into standardised traces; (2) detection<br>algorithms that analyse RF metrics (noise floor, channel variance)<br>and cryptographic tags to identify attacks; and (3) mitigation<br>strategies including channel hopping and majority-vote consensus<br>to maintain situational awareness. Our experiments show that the<br>proposed defences detect 92% of jamming events and 88% of<br>spoofed alerts within 100 ms, reducing false critical alerts by<br>40%. The framework emphasises reproducibility: adversarial<br>traces, metrics and scripts are packaged in OpenBench-AR<br>format [1], capturing data, code and process [2].<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Augmented reality systems that rely on radiofrequency (RF) sensing must withstand adversarial attacks. Anattacker may jam the channel to block alerts or spoof RFsignatures to trigger false critical alarms. Today\u2019s RF-to-ARpipelines lack systematic mechanisms to evaluate and hardenagainst such threats. Inspired by red-team methodologies, wepresent a framework for generating adversarial traces andevaluating spoofing\/jamming resilience. We&hellip;&nbsp;<\/p>\n","protected":false},"author":2,"featured_media":3563,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-3616","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/neurosphere-2.tail52f848.ts.net\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/3616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/neurosphere-2.tail52f848.ts.net\/wordpress\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/neurosphere-2.tail52f848.ts.net\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/neurosphere-2.tail52f848.ts.net\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/neurosphere-2.tail52f848.ts.net\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3616"}],"version-history":[{"count":0,"href":"https:\/\/neurosphere-2.tail52f848.ts.net\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/3616\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/neurosphere-2.tail52f848.ts.net\/wordpress\/index.php?rest_route=\/wp\/v2\/media\/3563"}],"wp:attachment":[{"href":"https:\/\/neurosphere-2.tail52f848.ts.net\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}