{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,4]],"date-time":"2026-01-04T02:49:40Z","timestamp":1767494980390},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T00:00:00Z","timestamp":1586304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T00:00:00Z","timestamp":1586304000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11277-020-07289-z","type":"journal-article","created":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T13:03:17Z","timestamp":1586350997000},"page":"1743-1754","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Navigation Message Authentication Based on One-Way Hash Chain to Mitigate Spoofing Attacks for GPS L1"],"prefix":"10.1007","volume":"113","author":[{"given":"Kh.","family":"Ghorbani","sequence":"first","affiliation":[]},{"given":"N.","family":"Orouji","sequence":"additional","affiliation":[]},{"given":"M. R.","family":"Mosavi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,8]]},"reference":[{"key":"7289_CR1","unstructured":"Cappara, G., Wullems, Ch., Sturaro, S., Ceccato, S., Laurenti, N., Pozzobon, O., Ioannides, R. T., & Crisci, M. (2016). Design drivers and new trends for navigation message authentication schemes for GNSS Systems. Inside GNSS."},{"issue":"6","key":"7289_CR2","doi-asserted-by":"publisher","first-page":"1258","DOI":"10.1109\/JPROC.2016.2526658","volume":"104","author":"ML Psiaki","year":"2016","unstructured":"Psiaki, M. L., & Humphreys, T. E. (2016). GNSS spoofing and detection. Proccedings of the IEEE,104(6), 1258\u20131270. https:\/\/doi.org\/10.1109\/JPROC.2016.2526658.","journal-title":"Proccedings of the IEEE"},{"key":"7289_CR3","first-page":"56","volume":"55","author":"TE Humphreys","year":"2008","unstructured":"Humphreys, T. E., Ledvina, B. M., Psiaki, M. L., O\u2019Hanlon, B. W., & Kintner, P. M., Jr. (2008). Assessing the spoofing threat: Development of a portable GPS civilian spoofer. Proceedings of the ION GNSS,55, 56.","journal-title":"Proceedings of the ION GNSS"},{"key":"7289_CR4","doi-asserted-by":"publisher","unstructured":"Haider, Z., & Khalid, S. (2016). Survey on effective GPS spoofing counter measures. In Sixth international conference on innovative computing technology (INTECH), Dublin (pp. 573\u2013577). https:\/\/doi.org\/10.1109\/INTECH.2016.7845038.","DOI":"10.1109\/INTECH.2016.7845038"},{"key":"7289_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2012\/127072","volume":"2012","author":"A Jafarnia-Jahromi","year":"2012","unstructured":"Jafarnia-Jahromi, A., Broumandan, A., Nielsen, J., & Lachapelle, G. (2012). GPS vulnerability to spoofing threats and a review of anti-spoofing techniques. International Journal of Navigation and Observation,2012, 1\u201316. https:\/\/doi.org\/10.1155\/2012\/127072.","journal-title":"International Journal of Navigation and Observation"},{"key":"7289_CR6","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.1109\/JPROC.2016.2535898","volume":"104","author":"RT Ioannides","year":"2016","unstructured":"Ioannides, R. T., Pany, T., & Gibbons, G. (2016). Known vulnerabilities of global navigation satellite systems, status, and potential mitigation techniques. Proceedings of the IEEE,104, 1174\u20131194. https:\/\/doi.org\/10.1109\/JPROC.2016.2535898.","journal-title":"Proceedings of the IEEE"},{"key":"7289_CR7","doi-asserted-by":"publisher","unstructured":"Caparra, G., Wullems, C., & Ioannides, R. T. (2016). An autonomous GNSS anti-spoofing technique. In 8th ESA workshop on satellite navigation technologies and European workshop on GNSS signals and signal processing (NAVITEC).\nhttps:\/\/doi.org\/10.1109\/NAVITEC.2016.7849355.","DOI":"10.1109\/NAVITEC.2016.7849355"},{"key":"7289_CR8","unstructured":"Petovello, M. (2018). What is navigation message authentication. Inside GNSS."},{"key":"7289_CR9","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1016\/j.future.2019.05.053","volume":"100","author":"AA Abd El-Latif","year":"2019","unstructured":"Abd El-Latif, A. A., Abd-El-Atty, B., Venegas-Andraca, S., & Mazurczyk, W. (2019). Efficient quantum-based security protocols for information sharing and data protection in 5G networks. Future Generation Computer Systems,100, 893\u2013990. https:\/\/doi.org\/10.1016\/j.future.2019.05.053.","journal-title":"Future Generation Computer Systems"},{"key":"7289_CR10","doi-asserted-by":"publisher","first-page":"10332","DOI":"10.1109\/ACCESS.2018.2799879","volume":"6","author":"AA Abd El-Latif","year":"2018","unstructured":"Abd El-Latif, A. A., Abd-El-Atty, B., Hossain, M. S., Elmougy, S. E., & Ghoneim, A. (2018). Secure quantum steganography protocol for fog cloud internet of things. IEEE Access: IEEE Journals & Magazines,6, 10332\u201310340. https:\/\/doi.org\/10.1109\/ACCESS.2018.2799879.","journal-title":"IEEE Access: IEEE Journals & Magazines"},{"key":"7289_CR11","unstructured":"Wullems, C., Pozzobon, O., & Kubik, K. (2005). Signal authentication and integrity schemes for next generation global navigation satellite systems. In European Navigation Conference, ENC-GNSS (pp. 1\u201310)."},{"key":"7289_CR12","doi-asserted-by":"publisher","unstructured":"Caparra, G., Sturaro, S., Laurenti, N., Wullems, C., & Ioannides, R. T. (2016). A novel navigation message authentication scheme for GNSS open service. ION GNSS+ 2016, Portland, Oregon.\nhttps:\/\/doi.org\/10.33012\/2016.14692.","DOI":"10.33012\/2016.14692"},{"key":"7289_CR13","unstructured":"Curran, J. T., Paonni, M., & Bishop, J. (2014). Securing the open-service: A Candidate navigation message authentication scheme for Galileo E1 OS. In European Navigation Conference, (ENCGNSS), Rotterdam."},{"key":"7289_CR14","doi-asserted-by":"publisher","unstructured":"Kerns, A. J., Wesson, K. D., & Humphreys, T. E. (2014). A blueprint for civil GPS navigation message authentication. In 2014 IEEE\/ION Position, Location and Navigation Symposium (PLANS) (pp. 262\u2013269). https:\/\/doi.org\/10.1109\/PLANS.2014.6851385.","DOI":"10.1109\/PLANS.2014.6851385"},{"key":"7289_CR15","unstructured":"Fernandez-Hernandez, I. (2015). Method and system to optimize the authentication of radio navigation signals. Patent EP14163902."},{"issue":"1","key":"7289_CR16","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1002\/navi.125","volume":"63","author":"I Fernandez-hernandez","year":"2016","unstructured":"Fernandez-hernandez, I., Seco-granados, G., Rodr\u0131guez, I., & Calle, J. D. (2016). A navigation message authentication proposal for the Galileo Open Service. NAVIGATION: Journal of The Institute of Navigation,63(1), 85\u2013102. https:\/\/doi.org\/10.1002\/navi.125.","journal-title":"NAVIGATION: Journal of The Institute of Navigation"},{"key":"7289_CR17","unstructured":"Jonsson, J., & Kaliski, B. (2003). Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC Editor. Retrieved 4 December 2019 from, https:\/\/datatracker.ietf.org\/doc\/rfc3447."},{"key":"7289_CR18","unstructured":"ISO\/IEC 9796\u20132:2010. Information Technology: Security Techniques: Digital Signature Schemes Giving Message Recovery. Part 2: Integer factorization based mechanisms. ISO ISO\/IEC\\char9796-2:2010, International Organization for Standardization, Geneva, Switzerland."},{"key":"7289_CR19","unstructured":"Pointcheval, D., & Vaudenay, S. (1996). On provable security for digital signature algorithms. Technical report."},{"key":"7289_CR20","doi-asserted-by":"publisher","unstructured":"Schnorr, C. P. (1990). Efficient identification and signatures for smart cards. In Proceedings of the 9th annual international cryptology conference on advances in cryptology, CRYPTO \u201989, (London, UK, UK) (pp. 239\u2013252). New York: Springer. https:\/\/doi.org\/10.1007\/BF00196725.","DOI":"10.1007\/BF00196725"},{"key":"7289_CR21","doi-asserted-by":"crossref","unstructured":"Neish, A., Walter, T., & Enge, P. (2018). Parameter selection for the TESLA Keychain. In ION GNSS.","DOI":"10.33012\/2018.15852"},{"key":"7289_CR22","doi-asserted-by":"publisher","unstructured":"Caparra, G., Sturaro, S., Laurenti, N., Wullems, C., & Ioannides, R. T. (2016). A novel navigation message authentication scheme for GNSS Open Service. In ION GNSS, Portland, Oregon.\nhttps:\/\/doi.org\/10.33012\/2016.14692.","DOI":"10.33012\/2016.14692"},{"key":"7289_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/ICL-GNSS.2016.7533685","author":"G Caparra","year":"2016","unstructured":"Caparra, G., Sturaro, S., Laurenti, N., & Wullems, C. (2016). Evaluating the security of one-way key chains in TESLA-based GNSS navigation message authentication schemes. International Conference on Localization and GNSS, ICL-GNSS.. https:\/\/doi.org\/10.1109\/ICL-GNSS.2016.7533685.","journal-title":"International Conference on Localization and GNSS, ICL-GNSS."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07289-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-020-07289-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07289-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,8]],"date-time":"2021-04-08T00:17:24Z","timestamp":1617841044000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-020-07289-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,8]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["7289"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07289-z","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,8]]},"assertion":[{"value":"8 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}