{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:24:13Z","timestamp":1759332253416,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1007\/s11277-024-11697-w","type":"journal-article","created":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T15:38:35Z","timestamp":1734622715000},"page":"1783-1795","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A GPS Spoofing Signal Detection Method Based on Low Frequency Power Spectrum"],"prefix":"10.1007","volume":"139","author":[{"given":"Guangjie","family":"Li","sequence":"first","affiliation":[]},{"given":"Yue","family":"Peng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7975-8559","authenticated-orcid":false,"given":"Jiajun","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Dandan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Yuanpei","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Yin","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jiancun","family":"Zuo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,19]]},"reference":[{"issue":"5","key":"11697_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MSP.2017.2715898","volume":"34","author":"D Margaria","year":"2017","unstructured":"Margaria, D., Motella, B., Anghileri, M., Floch, J., Fern\u00e1ndez-Hern\u00e1ndez, I., & Paonni, M. (2017). Signal structure-based authentication for civil GNSSs: Recent solutions and perspectives. IEEE Signal Processing Magazine, 34(5), 27\u201337.","journal-title":"IEEE Signal Processing Magazine"},{"issue":"1","key":"11697_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/navi.50","volume":"61","author":"A Jafarnia","year":"2014","unstructured":"Jafarnia, A., Broumandan, A., Nielsen, J., et al. (2014). Pre-despreading authenticity verification for GPS L1 C\/A signals. Navigation, 61(1), 1\u201311.","journal-title":"Navigation"},{"key":"11697_CR3","doi-asserted-by":"publisher","first-page":"110738","DOI":"10.1109\/ACCESS.2020.3002804","volume":"8","author":"J Chen","year":"2020","unstructured":"Chen, J., Xu, Y., Yuan, H., & Yuan, Y. (2020). A new GNSS spoofing detection method using two antennas. IEEE Access, 8, 110738\u2013110747.","journal-title":"IEEE Access"},{"issue":"7","key":"11697_CR4","first-page":"626","volume":"49","author":"ZHANG Guoli","year":"2020","unstructured":"Guoli, Z. H. A. N. G., Jicheng, D. I. N. G., & Yao, Z. H. A. N. G. (2020). Research on repeater deception jamming detection algorithm based on GNSS signal delay characteristics. Radio Engineering, 49(7), 626\u2013630.","journal-title":"Radio Engineering"},{"key":"11697_CR5","first-page":"2875","volume":"4","author":"Vahid Dehghanian","year":"2012","unstructured":"Dehghanian, Vahid, Nielsen, John, Lachapelle, Gerard, et al. (2012). GNSS spoofing detection based on receiver C\/N0 estimates. ION GNSS2012, 4, 2875\u20132884.","journal-title":"ION GNSS2012"},{"key":"11697_CR6","doi-asserted-by":"crossref","unstructured":"Wesson, K. D., Evans, B. L., & Humphreys, T. E. (2013). A combined symmetric difference and power monitoring GNSS anti-spoofing technique[C]. 2013 IEEE Global Conference on Signal and Information Processing. pp.217-220, 2013.","DOI":"10.1109\/GlobalSIP.2013.6736854"},{"key":"11697_CR7","doi-asserted-by":"publisher","first-page":"9459","DOI":"10.1109\/ACCESS.2016.2587322","volume":"4","author":"J Li","year":"2016","unstructured":"Li, J., Zhang, J., Chang, S., & Zhou, M. (2016). Performance evaluation of multimodal detection method for GNSS intermediate spoofing. IEEE Access, 4, 9459\u20139468.","journal-title":"IEEE Access"},{"key":"11697_CR8","doi-asserted-by":"publisher","first-page":"66428","DOI":"10.1109\/ACCESS.2018.2875948","volume":"6","author":"C Sun","year":"2018","unstructured":"Sun, C., Cheong, J. W., Dempster, A. G., Zhao, H., & Feng, W. (2018). GNSS spoofing detection by means of signal quality monitoring (SQM) metric combinations. IEEE Access, 6, 66428\u201366441.","journal-title":"IEEE Access"},{"issue":"3","key":"11697_CR9","doi-asserted-by":"publisher","first-page":"1827","DOI":"10.1007\/s11277-019-06654-x","volume":"109","author":"AR Baziar","year":"2019","unstructured":"Baziar, A. R., Mosavi, M. R., & Moazedi, M. (2019). Spoofing mitigation using double stationary wavelet transform in civil GPS receivers. Wireless Personal Communications, 109(3), 1827\u20131844.","journal-title":"Wireless Personal Communications"},{"key":"11697_CR10","doi-asserted-by":"crossref","unstructured":"Shuli, D., Taotao, Z., & Min, L. A. (2019). GNSS Anti-Spoofing Technology Based on Power Detection[C]. 2019 IEEE 8th Joint International Information Technology and Artificial Intelligence Conference (ITAIC). pp.1134-1137, May.","DOI":"10.1109\/ITAIC.2019.8785690"},{"issue":"6","key":"11697_CR11","doi-asserted-by":"publisher","first-page":"4224","DOI":"10.1109\/TAES.2020.2990149","volume":"56","author":"E Schmidt","year":"2020","unstructured":"Schmidt, E., Gatsis, N., & Akopian, D. (2020). A GPS spoofing detection and classification correlator-based technique using the LASSO. IEEE Transactions on Aerospace and Electronic Systems, 56(6), 4224\u20134237.","journal-title":"IEEE Transactions on Aerospace and Electronic Systems"},{"key":"11697_CR12","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1007\/s11277-021-08244-2","volume":"119","author":"E Shafiee","year":"2021","unstructured":"Shafiee, E., Mosavi, M. R., & Moazedi, M. (2021). A modified imperialist competitive algorithm for spoofing attack detection in single-frequency GPS receivers. Wireless Personal Communications, 119, 919\u2013940.","journal-title":"Wireless Personal Communications"},{"key":"11697_CR13","unstructured":"Wang, L., & Zhang, L. J. (2022). Wu, R.B. GNSS spoofing detection based on power monitoring combined with SQM. Journal of Signaling Process. 1-12."},{"key":"11697_CR14","doi-asserted-by":"crossref","unstructured":"Yang, H., ** R., Xu, W., Che, L., & Zhen, W. (2023). Satellite Navigation Spoofing Interference Detection and Direction Finding Based on Array Antenna. Sensors,23(3), 1604.","DOI":"10.3390\/s23031604"},{"key":"11697_CR15","doi-asserted-by":"crossref","unstructured":"Wu, Z., Zhang, Y., Yang, Y., Liang, C., & Liu, R. (2020). Spoofing and anti-spoofing technologies of global navigation satellite system: A survey. IEEE Access, 1-1.","DOI":"10.1109\/ACCESS.2020.3022294"},{"issue":"6","key":"11697_CR16","first-page":"1159","volume":"49","author":"An Chunlian","year":"2021","unstructured":"Chunlian, An., Guyue, Yang, & Yanju, Yang. (2021). Direction finding method for strong impact noise background based on median filter preprocessing. Chinese Journal of Electronics, 49(6), 1159\u20131166.","journal-title":"Chinese Journal of Electronics"},{"key":"11697_CR17","first-page":"92","volume":"31","author":"LI Chunlin","year":"2011","unstructured":"Chunlin, L. I., & Yong, W. U. (2011). Fast power spectrum estimation method based on FFT and autocorrelation function. Ship Electronic Engineering., 31, 92\u201395.","journal-title":"Ship Electronic Engineering."},{"issue":"1","key":"11697_CR18","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s11277-022-09946-x","volume":"128","author":"G Ananthi","year":"2023","unstructured":"Ananthi, G. (2023). State of charge estimation in electric vehicles using improved strong tracking Kalman filter algorithm. Wireless Personal Communications, 128(1), 147\u2013160.","journal-title":"Wireless Personal Communications"},{"issue":"11","key":"11697_CR19","first-page":"154","volume":"40","author":"YU Zhong","year":"2021","unstructured":"Zhong, Y. U., Yichao, H. U. A. N. G., & Chang, G. U. O. (2021). Application of Kalman filter combined with neural network in MEMS sensors. Transducer and Microsystem Technologies, 40(11), 154\u2013156+160.","journal-title":"Transducer and Microsystem Technologies"},{"issue":"11","key":"11697_CR20","first-page":"66","volume":"45","author":"Guangteng Fan","year":"2020","unstructured":"Fan, Guangteng, Ran, Dechao, Zhang, Fei, & Tuo, Zhouhui. (2020). Mobile terminal spoofing detection method based on power variation. GNSS World of China, 45(11), 66\u201370.","journal-title":"GNSS World of China"},{"issue":"4","key":"11697_CR21","doi-asserted-by":"publisher","first-page":"1427","DOI":"10.1007\/s10291-017-0620-y","volume":"21","author":"Ping Tang","year":"2017","unstructured":"Tang, Ping, Wang, Shuai, Li, Xiangming, & Jiang, Zhike. (2017). A low-complexity algorithm for fast acquisition of weak DSSS signal in high dynamic environment. GPS Solutions, 21(4), 1427\u20131441.","journal-title":"GPS Solutions"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11697-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11697-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11697-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T15:11:50Z","timestamp":1735571510000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11697-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["11697"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11697-w","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"5 December 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}