{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T22:58:24Z","timestamp":1769554704039,"version":"3.49.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031516290","type":"print"},{"value":"9783031516306","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-51630-6_9","type":"book-chapter","created":{"date-parts":[[2024,2,4]],"date-time":"2024-02-04T16:02:04Z","timestamp":1707062524000},"page":"130-147","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Resilient Range-Only Cooperative Positioning of\u00a0Multiple Smart Unmanned Aerial Systems"],"prefix":"10.1007","author":[{"given":"Yajie","family":"Bao","sequence":"first","affiliation":[]},{"given":"Dan","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Genshe","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Khanh","family":"Pham","sequence":"additional","affiliation":[]},{"given":"Erik","family":"Blasch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,5]]},"reference":[{"key":"9_CR1","unstructured":"Anderson, B.D., Moore, J.B.: Optimal Filtering. Courier Corporation, Chelmsford (2012)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Bahr, A., Leonard, J.J., Martinoli, A.: Dynamic positioning of beacon vehicles for cooperative underwater navigation. In: 2012 IEEE\/RSJ International Conference on Intelligent Robots and Systems, pp. 3760\u20133767. IEEE (2012)","DOI":"10.1109\/IROS.2012.6386168"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Bao, Y., et al.: PID-based automatic gain control for satellite transponder under partial-time partial-band AWGN jamming. In: Sensors and Systems for Space Applications XVI, vol. 12546, pp. 61\u201368. SPIE (2023)","DOI":"10.1117\/12.2681260"},{"issue":"5","key":"9_CR4","doi-asserted-by":"publisher","first-page":"1410","DOI":"10.1109\/TAC.2014.2357135","volume":"60","author":"G Battistelli","year":"2014","unstructured":"Battistelli, G., Chisci, L., Mugnai, G., Farina, A., Graziano, A.: Consensus-based linear and nonlinear filtering. IEEE Trans. Autom. Control 60(5), 1410\u20131415 (2014)","journal-title":"IEEE Trans. Autom. Control"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Blasch, E., et al.: Cyber awareness trends in avionics. In: 2019 IEEE\/AIAA 38th Digital Avionics Systems Conference (DASC), pp. 1\u20138. IEEE (2019)","DOI":"10.1109\/DASC43569.2019.9081646"},{"key":"9_CR6","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/j.ast.2018.12.015","volume":"85","author":"BT Burchett","year":"2019","unstructured":"Burchett, B.T.: Unscented Kalman filters for range-only cooperative localization of swarms of munitions in three-dimensional flight. Aerosp. Sci. Technol. 85, 259\u2013269 (2019)","journal-title":"Aerosp. Sci. Technol."},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"3496","DOI":"10.1109\/TIFS.2021.3083414","volume":"16","author":"M Ceccato","year":"2021","unstructured":"Ceccato, M., Formaggio, F., Laurenti, N., Tomasin, S.: Generalized likelihood ratio test for GNSS spoofing detection in devices with IMU. IEEE Trans. Inf. Forensics Secur. 16, 3496\u20133509 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Chen, N., Chen, Y., Blasch, E., Ling, H., You, Y., Ye, X.: Enabling smart urban surveillance at the edge. In: 2017 IEEE International Conference on Smart Cloud (SmartCloud), pp. 109\u2013119. IEEE (2017)","DOI":"10.1109\/SmartCloud.2017.24"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Cheng, X.J., Xu, J.n., Cao, K.J., Wang, J.: An authenticity verification scheme based on hidden messages for current civilian GPS signals. In: 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, pp. 345\u2013352. IEEE (2009)","DOI":"10.1109\/ICCIT.2009.91"},{"issue":"2","key":"9_CR10","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TAES.2014.130136","volume":"51","author":"J Dunik","year":"2015","unstructured":"Dunik, J., Straka, O., Simandl, M., Blasch, E.: Random-point-based filters: analysis and comparison in target tracking. IEEE Trans. Aerosp. Electron. Syst. 51(2), 1403\u20131421 (2015)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Flury, M., Poturalski, M., Papadimitratos, P., Hubaux, J.P., Le Boudec, J.Y.: Effectiveness of distance-decreasing attacks against impulse radio ranging. In: Proceedings of the Third ACM Conference on Wireless Network Security, pp. 117\u2013128 (2010)","DOI":"10.1145\/1741866.1741887"},{"key":"9_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ast.2021.106647","volume":"112","author":"B Gong","year":"2021","unstructured":"Gong, B., Wang, S., Hao, M., Guan, X., Li, S.: Range-based collaborative relative navigation for multiple unmanned aerial vehicles using consensus extended kalman filter. Aerosp. Sci. Technol. 112, 106647 (2021)","journal-title":"Aerosp. Sci. Technol."},{"issue":"6","key":"9_CR13","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.1109\/JPROC.2016.2535898","volume":"104","author":"RT Ioannides","year":"2016","unstructured":"Ioannides, R.T., Pany, T., Gibbons, G.: Known vulnerabilities of global navigation satellite systems, status, and potential mitigation techniques. Proc. IEEE 104(6), 1174\u20131194 (2016)","journal-title":"Proc. IEEE"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Kassas, Z.M., Closas, P., Gross, J.: Navigation systems panel report navigation systems for autonomous and semi-autonomous vehicles: current trends and future challenges. IEEE Aerosp. Electron. Syst. Mag. 34(5) (2019)","DOI":"10.1109\/MAES.2019.2906971"},{"issue":"7","key":"9_CR15","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MAES.2022.3154110","volume":"37","author":"ZM Kassas","year":"2022","unstructured":"Kassas, Z.M., Khalife, J., Abdallah, A.A., Lee, C.: I am not afraid of the Gps jammer: resilient navigation via signals of opportunity in GPS-denied environments. IEEE Aerosp. Electron. Syst. Mag. 37(7), 4\u201319 (2022)","journal-title":"IEEE Aerosp. Electron. Syst. Mag."},{"issue":"13","key":"9_CR16","doi-asserted-by":"publisher","first-page":"5167","DOI":"10.1109\/JSEN.2019.2902178","volume":"19","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Li, S., Fu, Q., Liu, Z., Zhou, Q.: Analysis of Kalman filter innovation-based GNSS spoofing detection method for INS\/GNSS integrated navigation system. IEEE Sens. J. 19(13), 5167\u20135178 (2019)","journal-title":"IEEE Sens. J."},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Papalia, A., Thumma, N., Leonard, J.: Prioritized planning for cooperative range-only localization in multi-robot networks. In: 2022 International Conference on Robotics and Automation (ICRA), pp. 10753\u201310759. IEEE (2022)","DOI":"10.1109\/ICRA46639.2022.9812315"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Poturalski, M., Flury, M., Papadimitratos, P., Hubaux, J.P., Le Boudec, J.Y.: The cicada attack: degradation and denial of service in IR ranging. In: 2010 IEEE International Conference on Ultra-Wideband, vol. 2, pp. 1\u20134. IEEE (2010)","DOI":"10.1109\/ICUWB.2010.5616900"},{"issue":"6","key":"9_CR19","doi-asserted-by":"publisher","first-page":"1258","DOI":"10.1109\/JPROC.2016.2526658","volume":"104","author":"ML Psiaki","year":"2016","unstructured":"Psiaki, M.L., Humphreys, T.E.: GNSS spoofing and detection. Proc. IEEE 104(6), 1258\u20131270 (2016)","journal-title":"Proc. IEEE"},{"key":"9_CR20","unstructured":"Sathaye, H., Strohmeier, M., Lenders, V., Ranganathan, A.: An experimental study of GPS spoofing and takeover attacks on UAVs. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 3503\u20133520 (2022)"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Shen, D., Chen, G., Cruz, J.B., Blasch, E.: A game theoretic data fusion aided path planning approach for cooperative UAV ISR. In: 2008 IEEE Aerospace Conference, pp. 1\u20139. IEEE (2008)","DOI":"10.1109\/AERO.2008.4526563"},{"key":"9_CR22","unstructured":"Singh, M.: Securing distance measurement against physical layer attacks. Ph.D. thesis, ETH Zurich (2021)"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Wang, S., Dekorsy, A.: Distributed consensus-based extended Kalman filtering: a Bayesian perspective. In: 2019 27th European Signal Processing Conference (EUSIPCO), pp. 1\u20135. IEEE (2019)","DOI":"10.23919\/EUSIPCO.2019.8902553"},{"key":"9_CR24","unstructured":"Wen, H., Huang, P.Y.R., Dyer, J., Archinal, A., Fagan, J.: Countermeasures for GPS signal spoofing. In: Proceedings of the 18th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2005), pp. 1285\u20131290 (2005)"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Wesson, K., Rothlisberger, M., Humphreys, T.: Practical cryptographic civil GPS signal authentication. NAVIGATION: J. Inst. Navig. 59(3), 177\u2013193 (2012)","DOI":"10.1002\/navi.14"},{"key":"9_CR26","unstructured":"Wesson, K.D., Rothlisberger, M.P., Humphreys, T.E.: A proposed navigation message authentication implementation for civil gps anti-spoofing. In: Proceedings of the 24th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2011), pp. 3129\u20133140 (2011)"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Xu, R., Chen, Y., Blasch, E., Aved, A., Chen, G., Shen, D.: Hybrid blockchain-enabled secure microservices fabric for decentralized multi-domain avionics systems. In: Sensors and Systems for Space Applications XIII, vol. 11422, pp. 150\u2013164. SPIE (2020)","DOI":"10.1117\/12.2559036"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Xu, R., Nikouei, S.Y., Chen, Y., Blasch, E., Aved, A.: Blendmas: a blockchain-enabled decentralized microservices architecture for smart public safety. In: 2019 IEEE International Conference on Blockchain (Blockchain), pp. 564\u2013571. IEEE (2019)","DOI":"10.1109\/Blockchain.2019.00082"},{"issue":"12","key":"9_CR29","doi-asserted-by":"publisher","first-page":"421","DOI":"10.3390\/drones6120421","volume":"6","author":"R Xu","year":"2022","unstructured":"Xu, R., Wei, S., Chen, Y., Chen, G., Pham, K.: Lightman: a lightweight microchained fabric for assurance-and resilience-oriented urban air mobility networks. Drones 6(12), 421 (2022)","journal-title":"Drones"},{"issue":"3","key":"9_CR30","doi-asserted-by":"publisher","first-page":"1637","DOI":"10.1109\/TAES.2013.6558009","volume":"49","author":"C Yang","year":"2013","unstructured":"Yang, C., Kaplan, L., Blasch, E., Bakich, M.: Optimal placement of heterogeneous sensors for targets with Gaussian priors. IEEE Trans. Aerosp. Electron. Syst. 49(3), 1637\u20131653 (2013)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"issue":"3","key":"9_CR31","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1016\/j.cja.2014.04.028","volume":"27","author":"H Yang","year":"2014","unstructured":"Yang, H., Huang, R., Wang, X., Deng, J., Chen, R.: EBAA: an efficient broadcast authentication scheme for ads-b communication based on IBS-MR. Chin. J. Aeronaut. 27(3), 688\u2013696 (2014)","journal-title":"Chin. J. Aeronaut."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Cyber-Physical Systems and Smart Vehicles"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-51630-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,4]],"date-time":"2024-02-04T16:03:39Z","timestamp":1707062619000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-51630-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031516290","9783031516306"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-51630-6_9","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"5 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SmartSP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chicago, IL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"smartsp2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/smartsp.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,67","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,22","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}