{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:41:29Z","timestamp":1743064889288,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":39,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461479147"},{"type":"electronic","value":"9781461479154"}],"license":[{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-7915-4_11","type":"book-chapter","created":{"date-parts":[[2013,9,12]],"date-time":"2013-09-12T08:10:18Z","timestamp":1378973418000},"page":"267-286","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Security of Embedded Location Systems"],"prefix":"10.1007","author":[{"given":"G. P.","family":"Hancke","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2013,9,13]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"C.A. Patterson, R.R. Muntz and C.M. Pancake. \u2018Challenges in Location-Aware Computing\u2019. IEEE Pervasive Computing, Vol. 2, No. 2, pp 80\u201389, June 2003.","DOI":"10.1109\/MPRV.2003.1203757"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"A. Boukerche, H.A.B. Oliveira, E.F. Nakamura and A.A.F. Loureiro. \u2018Secure Localization Algorithms for Wireless Sensor Networks\u2019. IEEE Communications Magazine, Vol. 46, No. 4, pp 96\u2013101, April 2008.","DOI":"10.1109\/MCOM.2008.4481347"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"A.I.G-T. Ferreres, B.R. Alvarez and A.R. Garnacho. \u2018Gauranteeing the Authenticity of Location Information\u2019. IEEE Pervasive Computing, Vol. 7, No. 3, pp 72\u201379, July 2008.","DOI":"10.1109\/MPRV.2008.49"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Y. Zhou, Y. Fang and Y. Zhang. \u2018Securing Wireless Sensor Networks: a Survey\u2019. IEEE Communications Surveys & Tutorials, Vol. 10, No. 3, pp 6\u201328, September 2008.","DOI":"10.1109\/COMST.2008.4625802"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"X. Chen, K. Makki, K. Yen and N. Pissinou. \u2018Sensor Network Security: A Survey\u2019. IEEE Communications Surveys & Tutorials, Vol. 11, No. 2, pp 52\u201373, 2009.","DOI":"10.1109\/SURV.2009.090205"},{"key":"11_CR6","unstructured":"ISO\/IEC 24730. Information technology - Real-time locating systems (RTLS)."},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"N.O. Tippenhauer, K.B. Rasmussen, C. Popper and S. \u010capkun. \u2018Attacks on Public WLAN-based Positioning Systems\u2019. Proceedings of ACM\/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys), 2009.","DOI":"10.1145\/1555816.1555820"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"G.P. Hancke, K. Mayes, and K. Markantonakis. \u2018Confidence in Smart Token Proximity: Relay Attacks Revisited\u2019. Elsevier Computers & Security, June 2009.","DOI":"10.1016\/j.cose.2009.06.001"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Y. Desmedt, C. Goutier and S. Bengio. \u2018Special Uses and Abuses of the Fiat-Shamir Passport Protocol\u2019. Advances in Cryptology (CRYPTO), Springer-Verlag LNCS 293, pp. 21, 1987.","DOI":"10.1007\/3-540-48184-2_3"},{"key":"11_CR10","unstructured":"Y.C. Hu, A. Perrig and D.B. Johnson. \u2018Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks\u2019. Proceedings of INFOCOM, pp. 1976\u20131986, April 2003."},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"G.P. Hancke and M.G. Kuhn. \u2018Attacks on \u201cTime-of-Flight\u201d Distance Bounding Channels\u2019. Proceedings of First ACM Conference on Wireless, Network Security (WISEC\u201908), pp. 194\u2013202, March 2008.","DOI":"10.1145\/1352533.1352566"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"J. Clulow, G.P. Hancke, M.G. Kuhn, T. Moore. \u2018So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks\u2019. European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS), Springer-Verlag LNCS 4357, pp. 83\u201397, September 2006.","DOI":"10.1007\/11964254_9"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"S. Brands and D. Chaum. \u2018Distance Bounding Protocols\u2019. Proceedings of Advances in Cryptology (EUROCYPT \u201993), Springer-Verlag LNCS 765, pp 344\u2013359, May 1993.","DOI":"10.1007\/3-540-48285-7_30"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"S. \u010capkun and J-P. Hubaux. \u2018Secure Positioning in Wireless Networks\u2019. IEEE Journal of Selected Areas in Communications, Vol. 24, No. 2, pp. 221\u2013232, February 2006.","DOI":"10.1109\/JSAC.2005.861380"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"A. Harter, A. Hopper, P. Steggles, A. Ward and Paul Webster. \u2018The Anatomy of a Context-Aware Application\u2019. Proceedings of Fifth Annual ACM\/IEEE International Conference on Mobile Computing and Networking, MOBICOM\u201999, pp. 59\u201368, August 1999.","DOI":"10.1145\/313451.313476"},{"key":"11_CR16","unstructured":"Z. Li, W. Trappe, Y. Zhang and B. Nath., \u2018Robust Statistical Methods for Securing Wireless Localization in Sensor Networks\u2019. Proceedings of the International Symposium on Information Processing in Sensor Networks, 2005."},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"L. Lazos and R. Poovendran. \u2018SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks\u2019 Proceedings of the 3rd ACM workshop on Wireless, Security, pp. 21\u201330, 2004.","DOI":"10.1145\/1023646.1023650"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"L. Lazos and R. Poovendran, \u2018Hirloc: High-Resolution Robust Localization for Wireless Sensor Networks\u2019. IEEE Journal on Selected Areas of, Communication, Vol. 24, No., pp. 233246. February 2006.","DOI":"10.1109\/JSAC.2005.861381"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"A. Alkassar, C. Stuble and A. Sadeghi. \u2018Secure Object Identification: or Solving the Chess Grandmaster Problem\u2019. Proceedings of New Security Paradigms, Workshop, pp. 77\u201385, 2003.","DOI":"10.1145\/986655.986668"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"K.B. Rasmussen and S. \u010capkun. \u2018Implications of Radio Fingerprinting on the Security of Sensor Networks\u2019. Proceedings of IEEE SecureComm, 2007.","DOI":"10.1109\/SECCOM.2007.4550352"},{"key":"11_CR21","unstructured":"B. Danev, T.S. Heydt-Benjamin and Srdjan Capkun. \u2018Physical-layer Identification of RFID Devices\u2019, Proceedings of USENIX Security Symposium, 2009."},{"key":"11_CR22","unstructured":"B. Danev and S. Capkun. \u2018Transient-based Identification of Wireless Sensor Nodes\u2019. Proceedings of the ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN), 2009."},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"G. DeJean and D. Kirovski. \u2018RF-DNA: Radio-Frequency Certificates of Authenticity\u2019. Proceedings of International Workshop Cryptographic Hardware and Embedded Systems (CHES 2007), Springer-Verlag LNCS 4727, pp. 346\u2013363, September 2007.","DOI":"10.1007\/978-3-540-74735-2_24"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"M.G. Kuhn. \u2018An Asymmetric Security Mechanism for Navigation Signals\u2019. 6th Information Hiding Workshop, Springer-Verlag LNCS 3200, pp 239\u2013252, May 2004.","DOI":"10.1007\/978-3-540-30114-1_17"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. \u010capkun and J-P Hubaux. \u2018Secure Neighborhood Discovery: A Fundamental Element for Mobile Ad Hoc Networking\u2019. IEEE Communications Magazine, February 2008.","DOI":"10.1109\/MCOM.2008.4473095"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"N.O. Tippenhauer and S. Capkun. \u2018ID-based Secure Distance Bounding and Localization\u2019. Proceedings of European Symposium on Research in Computer Security (ESORICS), 2009.","DOI":"10.1007\/978-3-642-04444-1_38"},{"key":"11_CR27","unstructured":"G.P. Hancke and M.G. Kuhn. \u2018An RFID Distance Bounding Protocol\u2019. Proceedings of IEEE\/CreateNet SecureComm, pp. 67\u201373, September 2005."},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"J. Reid, J.M.G Nieto, T. Tang and B. Senadji. \u2018Detecting Relay Attacks with Timing-Based Protocols\u2019. Proceeding 2nd ACM Symposium on Information, Computer and Communications, Security, pp. 204\u2013213, March 2007.","DOI":"10.1145\/1229285.1229314"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"D. Singel\u00e9e, B. Preneel. \u2018Distance Bounding in Noisy Environments\u2019. European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS), Springer-Verlag LNCS 4572, pp. 101\u2013115, 2007.","DOI":"10.1007\/978-3-540-73275-4_8"},{"key":"11_CR30","unstructured":"Drone Hijacking? Thats Just the Start of GPS Troubles. Wired.com, July 2012. http:\/\/www.wired.com\/dangerroom\/2012\/07\/drone-hijacking\/all\/"},{"key":"11_CR31","unstructured":"Vulneribility Assessment of the Transportation Infrastructure Relying on the Global Positioning System. John A. Volpe National Transportation Systems Center, 2001."},{"key":"11_CR32","unstructured":"Global Navigation Space Systems: Reliance and Vulnerabilities, Royal Academy of Engineering, March 2011."},{"key":"11_CR33","unstructured":"GNU Radio http:\/\/gnuradio.org"},{"key":"11_CR34","unstructured":"Ettus http:\/\/www.ettus.com"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"N.O. Tippenhauer, C. Popper, K.B. Rasmussen and S. Capkun. \u2018On the Requirements for Successful GPS Spoofing Attacks\u2019. Proceedings of ACM Communication and Computer Security (CCS), October 2011.","DOI":"10.1145\/2046707.2046719"},{"key":"11_CR36","unstructured":"T.E. Humphreys, B.M. Ledvina, M.L. Psiaki, B.W. O\u2019Hanlon and P.M. Kintner. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer. Proceedings of GNSS Conference, September 2008."},{"key":"11_CR37","unstructured":"Military jamming of GPS in Scotland suspended. BBC, October 2011. http:\/\/www.bbc.co.uk\/news\/uk-scotland-highlands-islands-15242835"},{"key":"11_CR38","unstructured":"GPS Jamming: No Jam Tomorrow. The Economist, March 2011."},{"key":"11_CR39","unstructured":"Galileo System Overview, European Space Agency. http:\/\/www.esa.int\/esaNA\/galileo.html"}],"container-title":["Secure Smart Embedded Devices, Platforms and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-7915-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T16:30:57Z","timestamp":1676651457000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-7915-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,13]]},"ISBN":["9781461479147","9781461479154"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-7915-4_11","relation":{},"subject":[],"published":{"date-parts":[[2013,9,13]]},"assertion":[{"value":"13 September 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}