{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T17:56:06Z","timestamp":1770486966800,"version":"3.49.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,3,11]],"date-time":"2015-03-11T00:00:00Z","timestamp":1426032000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1007\/s11277-015-2497-9","type":"journal-article","created":{"date-parts":[[2015,3,10]],"date-time":"2015-03-10T14:14:37Z","timestamp":1425996877000},"page":"1955-1970","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Analysis of Single Frequency GPS Receiver Under Delay and Combining Spoofing Algorithm"],"prefix":"10.1007","volume":"83","author":[{"given":"A. R.","family":"Baziar","sequence":"first","affiliation":[]},{"given":"M.","family":"Moazedi","sequence":"additional","affiliation":[]},{"given":"M. R.","family":"Mosavi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,11]]},"reference":[{"key":"2497_CR1","volume-title":"Practical cryptography","author":"N Ferguson","year":"2003","unstructured":"Ferguson, N., & Schneier, B. (2003). Practical cryptography. New York: Wiley."},{"key":"2497_CR2","doi-asserted-by":"crossref","unstructured":"Mosavi, M. R. (2006) \u201cFrequency domain modeling of GPS positioning errors\u201d, Proceedings of the 8 th International Conference on Signal Processing, Vol. 4, (pp. 1\u20134).","DOI":"10.1109\/ICOSP.2006.345986"},{"key":"2497_CR3","first-page":"22","volume-title":"GPS spoofing countermeasures","author":"JS Warner","year":"2003","unstructured":"Warner, J. S., & Johnston, R. G. (2003). GPS spoofing countermeasures (Vol. 10, pp. 22\u201330). Los Alamos National Laboratory: Vulnerability Assessment Team."},{"issue":"2","key":"2497_CR4","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s10291-005-0011-7","volume":"10","author":"MR Mosavi","year":"2006","unstructured":"Mosavi, M. R. (2006). Comparing DGPS corrections prediction using neural network, fuzzy neural network and Kalman filter. Journal of GPS Solutions, 10(2), 97\u2013107.","journal-title":"Journal of GPS Solutions"},{"issue":"3","key":"2497_CR5","doi-asserted-by":"crossref","first-page":"2295","DOI":"10.1007\/s11277-012-0936-4","volume":"71","author":"MR Mosavi","year":"2013","unstructured":"Mosavi, M. R., & EmamGholipour, I. (2013). De-noising of GPS receivers positioning data using wavelet transform and bilateral filtering. Journal of Wireless Personal Communications, 71(3), 2295\u20132312.","journal-title":"Journal of Wireless Personal Communications"},{"issue":"4","key":"2497_CR6","doi-asserted-by":"crossref","first-page":"2563","DOI":"10.1007\/s11277-013-1166-0","volume":"72","author":"MR Mosavi","year":"2013","unstructured":"Mosavi, M. R., Azad, M. S., & EmamGholipour, I. (2013). Position estimation in single-frequency GPS receivers using Kalman filter with pseudo-range and carrier phase measurements. Journal of Wireless Personal Communications, 72(4), 2563\u20132576.","journal-title":"Journal of Wireless Personal Communications"},{"issue":"2","key":"2497_CR7","doi-asserted-by":"crossref","first-page":"925","DOI":"10.1007\/s11277-013-1398-z","volume":"75","author":"MR Mosavi","year":"2014","unstructured":"Mosavi, M. R., Nabavi, H., & Nakhaei, A. (2014). Neural technologies for precise timing in electric power systems with a single-frequency GPS receiver. Journal of Wireless Personal Communications, 75(2), 925\u2013941.","journal-title":"Journal of Wireless Personal Communications"},{"key":"2497_CR8","doi-asserted-by":"crossref","unstructured":"Cheng, X. J., Cao, K. J., Xu, J. N., & Li, B. (2009) \u201cAnalysis on forgery patterns for GPS civil spoofing signals\u201d, Proceedings of the 4 th International Conference on Computer Sciences and Convergence Information Technology, (pp. 353\u2013356).","DOI":"10.1109\/ICCIT.2009.88"},{"key":"2497_CR9","unstructured":"Warner, J. S. & Johnston, R. G. (2002) \u201cA simple demonstration that the global positioning system (GPS) is vulnerable to spoofing\u201d. Journal of Security Administration, 25, 19\u201328."},{"key":"2497_CR10","doi-asserted-by":"crossref","unstructured":"Tippenhauer, N. O., Popper, C., Rasmussen K. B., & Capkun S. (2011) \u201cOn the requirements for successful GPS spoofing attacks\u201d, Proceedings of the 18 th ACM Conference on Computer and Communications Security, (pp. 75\u201386).","DOI":"10.1145\/2046707.2046719"},{"key":"2497_CR11","doi-asserted-by":"crossref","unstructured":"Nighswander, T., Ledvina, B. Diamond, J. Brumley, R., & Brumley, D. (2012). GPS software attacks. In Proceedings of the 2012 ACM conference on Computer and communications networks-security and protection (pp. 450\u2013461).","DOI":"10.1145\/2382196.2382245"},{"key":"2497_CR12","unstructured":"Ledvina, B. M., Bencze, W. J., Galusha, B. & Miller, I. (2012) \u201cAn in-line anti-spoofing device for legacy civil GPS receivers\u201d, Proceedings of the 23 rd International Technical Meeting of the Satellite Division of The Institute of Navigation, (pp. 689\u2013712)."},{"key":"2497_CR13","unstructured":"Montgomery, P. Y., Humphreys, T. E., & Ledvina, B. M. (2009) \u201cReceiver-autonomous spoofing detection: Experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer\u201d, Institute of International Technical Meeting of the Institute of Navigation, (pp. 1\u20137)."},{"key":"2497_CR14","doi-asserted-by":"crossref","unstructured":"Jahromi, A. J., Broumandan, A., Nielsen, J., & Lachapelle, G. (2012) \u201cGPS vulnerability to spoofing threats and a review of anti-spoofing techniques\u201d. International Journal of Navigation and Observation, 2012, 1\u201316.","DOI":"10.1155\/2012\/127072"},{"key":"2497_CR15","unstructured":"Humphreys, T. E., Ledvina, B. M., Psiaki, M. L., O\u2019Hanlon, B. W., & Kintner, P. M. (2008) \u201cAssessing the spoofing threat: Development of a portable GPS civilian spoofer\u201d, Proceedings of the 21 st International Technical Meeting of the Satellite Division of The Institute of Navigation, (pp. 2314\u20132325)."},{"key":"2497_CR16","doi-asserted-by":"crossref","unstructured":"Papadimitratos, P., & Jovanovic, A. (2008). GNSS-based positioning: Attacks and countermeasures. IEEE Military Communications Conference, 1\u20138.","DOI":"10.1109\/MILCOM.2008.4753512"},{"key":"2497_CR17","unstructured":"Jahromi, A. J., Lin, T., Broumandan, A., Nielsen, J., & Lachapelle, G. (2012) \u201cDetection and mitigation of spoofing attacks on a vector-based tracking GPS receiver\u201d, International Technical Meeting of The Institute of Navigation, (pp. 3\u20138)."},{"key":"2497_CR18","unstructured":"Nielsen, J., Broumandan A., & Lachapelle, G. (2010). Spoofing detection and mitigation with a moving handheld receiver. GPS World Magazine, 21(9), 27\u201333."},{"issue":"4","key":"2497_CR19","doi-asserted-by":"crossref","first-page":"1208","DOI":"10.1109\/7.722708","volume":"34","author":"NA White","year":"1998","unstructured":"White, N. A., Maybeck, P. S., & DeVilbiss, S. L. (1998). Detection of interference\/jamming and spoofing in a DCPS-aided inertial system. IEEE Transactions on Aerospace and Electronic Systems, 34(4), 1208\u20131217.","journal-title":"IEEE Transactions on Aerospace and Electronic Systems"},{"issue":"9","key":"2497_CR20","first-page":"27","volume":"21","author":"DP Shepard","year":"2010","unstructured":"Shepard, D. P., & Humphrey, T. E. (2010). Characterization of receiver response to spoofing attacks. GPS World, 21(9), 27\u201333.","journal-title":"GPS World"},{"issue":"4","key":"2497_CR21","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1002\/sat.1012","volume":"30","author":"AJ Jahromi","year":"2012","unstructured":"Jahromi, A. J., Broumandan, A., Nielsen, J., & Lachapelle, G. (2012). GPS spoofer countermeasure effectiveness based on signal strength, noise power and C\/No observables. International Journal of Satellite Communications and Networking, 30(4), 181\u2013191.","journal-title":"International Journal of Satellite Communications and Networking"},{"key":"2497_CR22","unstructured":"Wen, H., Huang, P. Y. R., Dyer, J., Archinal A., & Fagan, J., \u201cCountermeasures for GPS signal spoofing\u201d, Proceedings of the 18 th International Technical Meeting of the Satellite Division of The Institute of Navigation, (pp. 1285\u20131290)."},{"key":"2497_CR23","doi-asserted-by":"crossref","unstructured":"Cavaleri, A., Motella, B., Pini M., & Fantino, M. (2012) \u201cDetection of Spoofed GPS signals at code and carrier tracking level\u201d, Proceedings of the 5 th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing, (pp. 1\u20136).","DOI":"10.1109\/NAVITEC.2010.5708016"},{"issue":"7","key":"2497_CR24","first-page":"14","volume":"18","author":"L Scott","year":"2007","unstructured":"Scott, L. (2007). Location assurance. GPS World, 18(7), 14\u201318.","journal-title":"GPS World"},{"key":"2497_CR25","unstructured":"Humphreys, T. E., Psiaki, M. L., Kintner, P. M., & Ledvina, B. M., (2006) \u201cGNSS receiver implementation on a DSP: Status, challenges and prospects\u201d, Proceedings of the 19 th International Technical Meeting of the Satellite Division of The Institute of Navigation, (pp. 1\u201313)."},{"key":"2497_CR26","volume-title":"A software-defined GPS and Galileo receiver: A Single-frequency approach","author":"K Borre","year":"2007","unstructured":"Borre, K., Akos, D. M., Bertelsen, N., Rinder, P., & Jensen, S. H. (2007). A software-defined GPS and Galileo receiver: A Single-frequency approach. Boston: Birkh\u00e4user."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2497-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2497-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2497-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T20:46:38Z","timestamp":1747773998000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2497-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,11]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["2497"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2497-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,11]]}}}