Research Article

Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems

Figure 5

Spatial analysis of injected trajectories.
(a) Trajectory 1
(b) Trajectory 2
(c) Trajectory 3