{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T06:47:34Z","timestamp":1744958854584,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030786083"},{"type":"electronic","value":"9783030786090"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-78609-0_1","type":"book-chapter","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T23:38:40Z","timestamp":1625787520000},"page":"3-13","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Research on Spoofing Jamming of Integrated Navigation System on UAV"],"prefix":"10.1007","author":[{"given":"Zeying","family":"Wang","sequence":"first","affiliation":[]},{"given":"Haiquan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ning","family":"Cao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,9]]},"reference":[{"key":"1_CR1","unstructured":"Lin, R.Z.: Research on integrated navigation of UAV based on inertial\/GPS\/optical flow. Ph.D. dissertation, Xian University (2018)"},{"key":"1_CR2","unstructured":"Qu, Y.J.: Research on INS\/GNSS\/VISUAL integrated navigation technology for small UAVS. Ph.D. dissertation, Harbin Institute of Technology (2020)"},{"issue":"01","key":"1_CR3","first-page":"33","volume":"26","author":"JJ Tang","year":"2018","unstructured":"Tang, J.J., Hu, W., Liu, X.S., et al.: Unmanned aerial vehicle integrated navigation system based on SINS\/ADS\/MCP. J. Chin. Inertial Technol. 26(01), 33\u201338 (2018)","journal-title":"J. Chin. Inertial Technol."},{"key":"1_CR4","unstructured":"Dong, W.: Research on attitude estimation and path planning algorithm for multi-UAV based on GPS\/INS combination. Ph.D. dissertation, Yanshan University (2017)"},{"key":"1_CR5","unstructured":"Liu, M.: UAV integrated navigation system under GPS failure. J. Univ. Jinan (Sci. Tech.) 29(02), 129\u2013132 (2015)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Jeong, S., Sin, C.S.: GNSS interference signal generation scenario for GNSS interference verification platform. In: International Conference on Control, Automation and Systems, pp. 1363\u20131365 (2015)","DOI":"10.1109\/ICCAS.2015.7364851"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Jeong, S., Kim, T., Kim, J.: Spoofing detection test of GPS signal interference mitigation equipment. In: International Conference on ICT Convergence, pp. 625\u2013651 (2014)","DOI":"10.1109\/ICTC.2014.6983243"},{"key":"1_CR8","first-page":"16","volume":"08","author":"J Zhang","year":"2019","unstructured":"Zhang, J., Li, R.W., Cui, K.T.: Analysis on the influence of UAV control means and UAV radio countermeasure equipment on air traffic control operation of Civil Aviation. China Radio 08, 16\u201318 (2019)","journal-title":"China Radio"},{"issue":"04","key":"1_CR9","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1002\/rob.21513","volume":"31","author":"AJ Kerns","year":"2014","unstructured":"Kerns, A.J., Shepa, D.P., Bhatti, J.A., et al.: Unmanned aircraft capture and control via GPS Spoofing. J. Field Robot. 31(04), 617\u2013636 (2014)","journal-title":"J. Field Robot."},{"key":"1_CR10","unstructured":"Zhao, Y.: Research on jamming countermeasure technology of civil small UAV. Technol. Manag. (12), 55 (2018)"},{"key":"1_CR11","doi-asserted-by":"publisher","unstructured":"Ma, C., Yang, J., Chen, J.Y., et al.: Path following identification of unmanned aerial vehicles for navigation spoofing and its application. ISA Transactions (2020). https:\/\/doi.org\/10.1016\/j.isatra","DOI":"10.1016\/j.isatra"},{"issue":"02","key":"1_CR12","first-page":"141","volume":"21","author":"Q Liao","year":"2020","unstructured":"Liao, Q., Hao, J.M., Zheng, N.E., et al.: Research on GPS navigation interference method based on trajectory deception. J. Inf. Eng. Univ. 21(02), 141\u2013145 (2020)","journal-title":"J. Inf. Eng. Univ."},{"key":"1_CR13","unstructured":"Li, C.: Research on GPS deception jamming in UAV navigation system. Ph.D. dissertation, Nanjing University of Aeronautics and Astronautics (2017)"},{"issue":"11","key":"1_CR14","first-page":"212","volume":"41","author":"WY Wang","year":"2020","unstructured":"Wang, W.Y., Chen, C.: Method of trapping UAV equipped with GPS\/INS integrated navigation system. J. Ordnance Equipment Eng. 41(11), 212\u2013217 (2020)","journal-title":"J. Ordnance Equipment Eng."},{"issue":"03","key":"1_CR15","first-page":"68","volume":"34","author":"Y Fan","year":"2012","unstructured":"Fan, Y., Quan, C.: Combined application of GPS and inertial navigation system. Manuf. Autom. 34(03), 68\u201369 (2012)","journal-title":"Manuf. Autom."},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Cheng, X., Cao, K., Xu, J., et al.: Analysis on forgery patterns for GPS civil spoofing signals. In: 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, Seoul (2009)","DOI":"10.1109\/ICCIT.2009.88"},{"issue":"08","key":"1_CR17","first-page":"2405","volume":"33","author":"L He","year":"2016","unstructured":"He, L., Li, W., Guo, C.J.: Generative spoofing research. Comput. Appl. Res. 33(08), 2405\u20132408 (2016)","journal-title":"Comput. Appl. Res."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Larcom, J.A., Liu, H.: Modeling and characterization of GPS spoofing. In: 2013 IEEE International Conference on Technologies for Homeland Security, Waltham, MA (2013)","DOI":"10.1109\/THS.2013.6699094"},{"issue":"03","key":"1_CR19","first-page":"420","volume":"49","author":"C Li","year":"2017","unstructured":"Li, C., Wang, X.D.: Jamming technology of unmanned aerial vehicle GPS\/INS composite navigation system based on trajectory deception. J. Nanjing Univ. Aeronaut. Astronaut. 49(03), 420\u2013427 (2017)","journal-title":"J. Nanjing Univ. Aeronaut. Astronaut."},{"key":"1_CR20","unstructured":"Huang, L., L\u00fc, Z.C., Wang, F.X.: Spoofing pattern research on GNSS receivers. J. Astronaut. 7 (2012)"},{"key":"1_CR21","unstructured":"Xu, F.X.: Design and implementation of vector tracking loop for satellite navigation receiver. Ph.D. dissertation, Harbin Engineering University, Harbin (2017)"},{"key":"1_CR22","unstructured":"Yuan, C.: Research on anti-jamming technology applied on the GPS software. Ph.D. dissertation, Nanjing University of Aeronautics and Astronautics (2014)"},{"key":"1_CR23","unstructured":"Wang, H.Y., Yao, Z.C., Fan, Z.L., Zheng, T.: Experiment study of spoofing jamming on GPS receiver. Fire Command Control (07), 44\u201350 (2016)"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-78609-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T23:50:28Z","timestamp":1625788228000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-78609-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030786083","9783030786090"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-78609-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"9 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}