{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T11:13:52Z","timestamp":1758280432379,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031714696"},{"type":"electronic","value":"9783031714702"}],"license":[{"start":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T00:00:00Z","timestamp":1731456000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T00:00:00Z","timestamp":1731456000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-71470-2_12","type":"book-chapter","created":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T17:10:15Z","timestamp":1731431415000},"page":"139-150","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secure Motion Verification for\u00a0High Altitude Platforms with\u00a0a\u00a0Hybrid AOA-TDOA-FDOA Scheme"],"prefix":"10.1007","author":[{"given":"Yuanyuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Miao","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,13]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Baker, R., Martinovic, I.: Secure location verification with a mobile receiver. In: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, pp. 35\u201346. New York, USA (Oct 2016)","DOI":"10.1145\/2994487.2994497"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Cong, L., Zhuang, W.: Hybrid TDOA\/AOA mobile user location for wideband CDMA cellular systems. IEEE Trans. Wireless Commun. 1(3), 439\u2013447 (2002)","DOI":"10.1109\/TWC.2002.800542"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Gupta, P., Kar, S.: Music and improved music algorithm to estimate direction of arrival. In: 2015 International Conference on Communications and Signal Processing, p. 0757\u20130761. Melmaruvathur, India (Nov 2015)","DOI":"10.1109\/ICCSP.2015.7322593"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Jafarnia Jahromi, A., Broumandan, A., Nielsen, J., Lachapelle, G.: GPS spoofer countermeasure effectiveness based on signal strength, noise power, and C\/N0 measurements. Int. J. Satell. Commun. Network. 30(4), 181\u2013191 (2012)","DOI":"10.1002\/sat.1012"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Li, T., Sun, Q., Li, J.: A research on the applicability of ADS-B data links in near space environment. In: 2012 International Conference on Connected Vehicles and Expo. pp.\u00a01\u20135. Beijing, China (May 2013)","DOI":"10.1109\/ICCVE.2012.9"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Nie, W., Han, Z.C., et al.: UAV detection and localization based on multi-dimensional signal features. IEEE Sens. J. 22(6), 5150\u20135162 (2022)","DOI":"10.1109\/JSEN.2021.3105229"},{"key":"12_CR7","unstructured":"Ranganathan, A.: The levenberg-marquardt algorithm. Tutoral on LM algorithm 11(1), 101\u2013110 (2004)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the 2nd ACM Workshop on Wireless Security, pp. 1\u201310. San Diego, CA, USA (Sept 2003)","DOI":"10.1145\/941311.941313"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Sch\u00e4fer, M., Lenders, V., Schmitt, J.: Secure track verification. In: 2015 IEEE Symposium on Security and Privacy, pp. 199\u2013213. San Jose, CA, USA (May 2015)","DOI":"10.1109\/SP.2015.20"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Sch\u00e4fer, M., Leu, P., Lenders, V., Schmitt, J.: Secure motion verification using the doppler effect. In: Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 135\u2013145. Darmstadt, Germany (Jul 2016)","DOI":"10.1145\/2939918.2939920"},{"key":"12_CR11","unstructured":"Stone, M., Anderson, J.: Advances in primary-radar technology. The Lincoln Laboratory J. 2(3), 363\u2013380 (1989)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Sun, M., Man, Y., Li, M., Gerdes, R.: SVM: secure vehicle motion verification with a single wireless receiver. In: Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 65\u201376. Linz, Austria (Jul 2020)","DOI":"10.1145\/3395351.3399348"},{"key":"12_CR13","unstructured":"Tsujii, T., Wang, J., et\u00a0al.: A technique for precise positioning of high altitude platforms system (HAPS) using a GPS ground reference network. In: Proceedings of the 14th International Technical Meeting of the Satellite Division of The Institute of Navigation, pp. 1017\u20131026. Salt Lake, UT (Sept 2001)"}],"container-title":["Lecture Notes in Computer Science","Wireless Artificial Intelligent Computing Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-71470-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T18:07:54Z","timestamp":1731434874000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-71470-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,13]]},"ISBN":["9783031714696","9783031714702"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-71470-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,13]]},"assertion":[{"value":"13 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Artificial Intelligent Computing Systems and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qingdao","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}