{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T08:14:02Z","timestamp":1758874442068,"version":"3.37.3"},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,21]],"date-time":"2021-01-21T00:00:00Z","timestamp":1611187200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,21]],"date-time":"2021-01-21T00:00:00Z","timestamp":1611187200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s42979-020-00423-5","type":"journal-article","created":{"date-parts":[[2021,1,21]],"date-time":"2021-01-21T13:09:10Z","timestamp":1611234550000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["On Sensor Security in the Era of IoT and CPS"],"prefix":"10.1007","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2849-7197","authenticated-orcid":false,"given":"Max","family":"Panoff","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5686-5666","authenticated-orcid":false,"given":"Raj Gautam","family":"Dutta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3075-982X","authenticated-orcid":false,"given":"Yaodan","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1027-6708","authenticated-orcid":false,"given":"Kaichen","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8791-0597","authenticated-orcid":false,"given":"Yier","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,21]]},"reference":[{"key":"423_CR1","doi-asserted-by":"crossref","unstructured":"Abdullah H, Garcia W, Peeters C, Traynor P, Butler KR, Wilson J. Practical hidden voice attacks against speech and speaker recognition systems. 2019. arXiv preprint arXiv:1904.05734.","DOI":"10.14722\/ndss.2019.23362"},{"key":"423_CR2","doi-asserted-by":"crossref","unstructured":"Aggarwal A, Kunta S, Verma PK. A proposed communications infrastructure for the smart grid. In: 2010 innovative smart grid technologies (ISGT). IEEE 2010. pp. 1\u20135.","DOI":"10.1109\/ISGT.2010.5434764"},{"issue":"2","key":"423_CR3","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MCE.2019.2953740","volume":"9","author":"T Alladi","year":"2020","unstructured":"Alladi T, Chamola V, Sikdar B, Choo KR. Consumer iot: security vulnerability case studies and solutions. IEEE Consum Electron Mag. 2020;9(2):17\u201325. https:\/\/doi.org\/10.1109\/MCE.2019.2953740.","journal-title":"IEEE Consum Electron Mag"},{"key":"423_CR4","unstructured":"Beavers I. Intelligence at the edge part 1: the edge node. 2017. https:\/\/www.analog.com\/en\/technical-articles\/intelligence-at-the-edge-part-1-the-edge-node.html#. Accessed 28 Nov 2020."},{"key":"423_CR5","unstructured":"Beavers I. Intelligence at the edge part 2: reduced time to insight. 2017. https:\/\/www.analog.com\/en\/technical-articles\/intelligence-at-the-edge-part-2-reduced-time-to-insight.html. Accessed 28 Nov 2020."},{"key":"423_CR6","unstructured":"Beavers I, MacLean E. Intelligence at the edge part 4: Edge node security. 2018. https:\/\/www.analog.com\/en\/technical-articles\/intelligence-at-the-edge-part-4-edge-node-security.html. Accessed 28 Nov 2020."},{"key":"423_CR7","doi-asserted-by":"crossref","unstructured":"Cao Y, Xiao C, Cyr B, Zhou Y, Park W, Rampazzi S, Chen QA, Fu K, Mao ZM. Adversarial sensor attack on lidar-based perception in autonomous driving. 2019. arXiv preprint arXiv:1907.06826.","DOI":"10.1145\/3319535.3339815"},{"key":"423_CR8","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.automatica.2018.06.010","volume":"95","author":"YH Chang","year":"2018","unstructured":"Chang YH, Hu Q, Tomlin CJ. Secure estimation based kalman filter for cyber-physical systems against sensor attacks. Automatica. 2018;95:399\u2013412.","journal-title":"Automatica"},{"key":"423_CR9","doi-asserted-by":"publisher","unstructured":"Chen B, Yang Z, Huang S, Du X, Cui Z, Bhimani J, Xie X, Mi N. Cyber-physical system enabled nearby traffic flow modelling for autonomous vehicles. In: 2017 IEEE 36th international performance computing and communications conference (IPCCC). 2017. p. 1\u20136. https:\/\/doi.org\/10.1109\/PCCC.2017.8280498.","DOI":"10.1109\/PCCC.2017.8280498"},{"key":"423_CR10","unstructured":"Chen Y. Devil\u2019s whisper: a general approach for physical adversarial attacks against commercial black-box speech recognition devices. In: 29th USENIX security symposium (USENIX Security 20). USENIX Association, Boston, MA; 2020. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/chen-yuxuan. Accessed 15 Dec 2020."},{"key":"423_CR11","doi-asserted-by":"publisher","unstructured":"Cheng CH, Chen CY, Chen JD, Pan DK, Ting KT, Lin FY. 3D pulsed chaos lidar system. Opt Express. 2018;26(9):12230\u201312241. https:\/\/doi.org\/10.1364\/OE.26.012230. http:\/\/www.opticsexpress.org\/abstract.cfm?URI=oe-26-9-12230.","DOI":"10.1364\/OE.26.012230"},{"key":"423_CR12","unstructured":"Davidson D, Wu H, Jellinek R, Singh V, Ristenpart T. Controlling uavs with sensor input spoofing attacks. In: 10th USENIX workshop on offensive technologies (WOOT 16). USENIX Association, Austin, TX; 2016. https:\/\/www.usenix.org\/conference\/woot16\/workshop-program\/presentation\/davidson. Accessed 15 Dec 2020."},{"key":"423_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2020.3019762","author":"A Degada","year":"2020","unstructured":"Degada A, Thapliyal H. An integrated trng-puf architecture based on photovoltaic solar cells. IEEE Consum Electron Mag. 2020;. https:\/\/doi.org\/10.1109\/MCE.2020.3019762.","journal-title":"IEEE Consum Electron Mag"},{"key":"423_CR14","doi-asserted-by":"publisher","unstructured":"Dutta RG, Yu F, Zhang T, Hu Y, Jin Y. Security for safety: a path toward building trusted autonomous vehicles. In: Proceedings of the international conference on computer-aided design, ICCAD \u201918; 2018. ACM, New York, p. 92:1\u201392:6. https:\/\/doi.org\/10.1145\/3240765.3243496.","DOI":"10.1145\/3240765.3243496"},{"key":"423_CR15","doi-asserted-by":"publisher","unstructured":"Dutta RG, Zhang T, Jin Y. Resilient distributed filter for state estimation of cyber-physical systems under attack. In: 2019 American Control Conference (ACC); 2019. p. 5141\u20135147. https:\/\/doi.org\/10.23919\/ACC.2019.8815298.","DOI":"10.23919\/ACC.2019.8815298"},{"key":"423_CR16","unstructured":"Foundation NS. National science foundation\u2014where discoveries begin; 2019. https:\/\/www.nsf.gov\/news\/special_reports\/cyber-physical\/. Accessed 15 Dec 2020."},{"key":"423_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2952858","author":"I Giechaskiel","year":"2019","unstructured":"Giechaskiel I, Rasmussen KB. Taxonomy and challenges of out-of-band signal injection attacks and defenses. IEEE Commun Surv Tutor. 2019;. https:\/\/doi.org\/10.1109\/COMST.2019.2952858.","journal-title":"IEEE Commun Surv Tutor"},{"issue":"4","key":"423_CR18","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/MDAT.2017.2709310","volume":"34","author":"J Giraldo","year":"2017","unstructured":"Giraldo J, Sarkar E, Cardenas AA, Maniatakos M, Kantarcioglu M. Security and privacy in cyber-physical systems: a survey of surveys. IEEE Des Test. 2017;34(4):7\u201317.","journal-title":"IEEE Des Test"},{"key":"423_CR19","unstructured":"Goward D. Mass gps spoofing attack in black sea? 2017. https:\/\/www.maritime-executive.com\/editorials\/mass-gps-spoofing-attack-in-black-sea. Accessed 28 Nov 2020."},{"key":"423_CR20","doi-asserted-by":"crossref","unstructured":"Guajardo J, Kumar SS, Schrijen GJ, Tuyls P. Fpga intrinsic pufs and their use for ip protection. In: International workshop on cryptographic hardware and embedded systems; 2007. Springer, p. 63\u201380.","DOI":"10.1007\/978-3-540-74735-2_5"},{"key":"423_CR21","doi-asserted-by":"publisher","first-page":"82721","DOI":"10.1109\/ACCESS.2019.2924045","volume":"7","author":"V Hassija","year":"2019","unstructured":"Hassija V, Chamola V, Saxena V, Jain D, Goyal P, Sikdar B. A survey on iot security: application areas, security threats, and solution architectures. IEEE Access. 2019;7:82721\u201343. https:\/\/doi.org\/10.1109\/ACCESS.2019.2924045.","journal-title":"IEEE Access"},{"key":"423_CR22","unstructured":"Higgins S. Velodyne cuts vlp-16 lidar price to \\$4k; 2019. https:\/\/www.spar3d.com\/news\/lidar\/velodyne-cuts-vlp-16-lidar-price-4k\/. Accessed 15 Dec 2020."},{"key":"423_CR23","unstructured":"Hitaj D, Mancini LV. Have you stolen my model? Evasion attacks against deep neural network watermarking techniques. CoRR. 2018. arXiv:abs\/1809.00615."},{"key":"423_CR24","unstructured":"Ishtiaq\u00a0RRM, Mustafaa H, Travis\u00a0TSO, Xua W, Gruteserb M, Trappeb W, Seskarb I. Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. In: 19th USENIX Security Symposium; 2010. Washington DC, p. 11\u201313."},{"key":"423_CR25","doi-asserted-by":"crossref","unstructured":"Karnouskos S. Cyber-physical systems in the smartgrid. In: 2011 9th IEEE international conference on industrial informatics; 2011. IEEE, p. 20\u201323.","DOI":"10.1109\/INDIN.2011.6034829"},{"issue":"6","key":"423_CR26","first-page":"1361","volume":"14","author":"NY Kim","year":"2018","unstructured":"Kim NY, Rathore S, Ryu JH, Park JH, Park JH. A survey on cyber physical system security for iot: issues, challenges, threats, solutions. J Inf Process Syst. 2018;14(6):1361\u201384.","journal-title":"J Inf Process Syst"},{"key":"423_CR27","unstructured":"Kim T, Kim CH, Rhee J, Fei F, Tu Z, Walkup G, Zhang X, Deng X, Xu D. Rvfuzzer: finding input validation bugs in robotic vehicles through control-guided testing. In: 28th USENIX Security Symposium (USENIX Security 19); 2019. USENIX Association, Santa Clara, CA, p. 425\u201342. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/kim. Accessed 15 Dec 2020."},{"key":"423_CR28","unstructured":"Krok A. Velodyne\u2019s tiny velabit packs a big lidar punch for just \\$100. 2020. https:\/\/www.cnet.com\/roadshow\/news\/velodyne-velabit-small-inexpensive-lidar-ces\/. Accessed 15 Dec 2020."},{"key":"423_CR29","unstructured":"Kumar D, Paccagnella R, Murley P, Hennenfent E, Mason J, Bates A, Bailey M. Skill squatting attacks on amazon alexa. In: 27th USENIX security symposium (USENIX Security 18); 2018. p. 33\u201347."},{"key":"423_CR30","doi-asserted-by":"crossref","unstructured":"Kune DF, Backes J, Clark SS, Kramer D, Reynolds M, Fu K, Kim Y, Xu W. Ghost talk: mitigating emi signal injection attacks against analog sensors. In: 2013 IEEE symposium on security and privacy; 2013. IEEE, p. 145\u2013159.","DOI":"10.1109\/SP.2013.20"},{"key":"423_CR31","unstructured":"Kurakin, A, Goodfellow, I, Bengio, S. Adversarial examples in the physical world. 2016. arXiv preprint arXiv:1607.02533."},{"key":"423_CR32","doi-asserted-by":"crossref","unstructured":"Kwong A, Xu W, Fu K. Hard drive of hearing: disks that eavesdrop with a synthesized microphone. In: 2019 IEEE symposium on security and privacy (SP); 2019. IEEE, p. 125\u2013139.","DOI":"10.1109\/SP.2019.00008"},{"issue":"6","key":"423_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-020-00331-8","volume":"1","author":"C Labrado","year":"2020","unstructured":"Labrado C, Kumar SD, Badhan R, Thapliyal H, Singh V. Exploration of solar cell materials for developing novel pufs in cyber-physical systems. SN Comput Sci. 2020;1(6):1\u201313.","journal-title":"SN Comput Sci"},{"issue":"2","key":"423_CR34","doi-asserted-by":"publisher","first-page":"2770","DOI":"10.1109\/JIOT.2018.2874626","volume":"6","author":"C Labrado","year":"2019","unstructured":"Labrado C, Thapliyal H. Design of a piezoelectric-based physically unclonable function for iot security. IEEE Internet Things J. 2019;6(2):2770\u20137. https:\/\/doi.org\/10.1109\/JIOT.2018.2874626.","journal-title":"IEEE Internet Things J"},{"issue":"18","key":"423_CR35","doi-asserted-by":"publisher","first-page":"3905","DOI":"10.3390\/s19183905","volume":"19","author":"C Labrado","year":"2019","unstructured":"Labrado C, Thapliyal H, Prowell S, Kuruganti T. Use of thermistor temperature sensors for cyber-physical system security. Sensors. 2019;19(18):3905. https:\/\/doi.org\/10.3390\/s19183905.","journal-title":"Sensors"},{"key":"423_CR36","unstructured":"Li J, Schmidt FR, Kolter JZ. Adversarial camera stickers: A physical camera attack on deep learning classifier. In: Proceedings of the 36th international conference on machine learning; 2019."},{"key":"423_CR37","doi-asserted-by":"publisher","first-page":"991","DOI":"10.1109\/JSTQE.2004.83596","volume":"10","author":"F Lin","year":"2004","unstructured":"Lin F, Liu J. Chaotic lidar. IEEE J Sel Top Quantum Electron. 2004;10:991\u20137. https:\/\/doi.org\/10.1109\/JSTQE.2004.83596.","journal-title":"IEEE J Sel Top Quantum Electron"},{"key":"423_CR38","unstructured":"Martin JR. Literacy in science: learning to handle text as technology. Writing science: literacy and discursive power; 1993. p. 166\u2013202."},{"key":"423_CR39","unstructured":"Martin JR. Technicality and abstraction: language for the creation of specialized texts. Writing science: literacy and discursive power; 1993. p. 203\u2013220."},{"key":"423_CR40","unstructured":"Metzen JH, Genewein T, Fischer V, Bischoff B. On detecting adversarial perturbations. In: 5th international conference on learning representations, ICLR 2017, Toulon, France, April 24\u201326, 2017, conference track proceedings. OpenReview.net. 2017. https:\/\/openreview.net\/forum?id=SJzCSf9xg. Accessed 15 Dec 2020."},{"issue":"3","key":"423_CR41","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/MDAT.2016.2544845","volume":"33","author":"D Mukhopadhyay","year":"2016","unstructured":"Mukhopadhyay D. Pufs as promising tools for security in internet of things. IEEE Des Test. 2016;33(3):103\u201315.","journal-title":"IEEE Des Test"},{"key":"423_CR42","doi-asserted-by":"crossref","unstructured":"Oligeri G, Sciancalepore S, Ibrahim OA, Di\u00a0Pietro R. Drive me not: Gps spoofing detection via cellular network. In: WiSec \u201919 proceedings of the 12th conference on security and privacy in wireless and mobile networks; 2019.","DOI":"10.1145\/3317549.3319719"},{"key":"423_CR43","unstructured":"Park Y, Son Y, Shin H, Kim D, Kim Y. This ain\u2019t your dose: sensor spoofing attack on medical infusion pump. In: 10th USENIX workshop on offensive technologies (WOOT 16); 2016. USENIX Association, Austin, TX. https:\/\/www.usenix.org\/conference\/woot16\/workshop-program\/presentation\/park. Accessed 15 Dec 2020."},{"key":"423_CR44","first-page":"2015","volume":"11","author":"J Petit","year":"2015","unstructured":"Petit J, Stottelaar B, Feiri M, Kargl F. Remote attacks on automated vehicles sensors: experiments on camera and lidar. Black Hat Eur. 2015;11:2015.","journal-title":"Black Hat Eur"},{"key":"423_CR45","unstructured":"Samsung: Family hub refrigerator. 2019. https:\/\/www.samsung.com\/us\/explore\/family-hub-refrigerator\/overview\/. Accessed 15 Dec 2020."},{"key":"423_CR46","doi-asserted-by":"crossref","unstructured":"Sathaye H, Schepers D, Ranganathan A, Noubir G. Wireless attacks on aircraft instrument landing systems. In: 28th USENIX security symposium; 2019. USENIX Association.","DOI":"10.1145\/3317549.3326298"},{"issue":"3","key":"423_CR47","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.ijcip.2012.09.003","volume":"5","author":"DP Shepard","year":"2012","unstructured":"Shepard DP, Humphreys TE, Fansler AA. Evaluation of the vulnerability of phasor measurement units to gps spoofing attacks. Int J Crit Infrastruct Protect. 2012;5(3):146\u201353. https:\/\/doi.org\/10.1016\/j.ijcip.2012.09.003.","journal-title":"Int J Crit Infrastruct Protect"},{"key":"423_CR48","doi-asserted-by":"crossref","unstructured":"Shin H, Kim D, Kwon Y, Kim Y. Illusion and dazzle: adversarial optical channel exploits against lidars for automotive applications. In: International conference on cryptographic hardware and embedded systems; 2017. Springer, p. 445\u2013467.","DOI":"10.1007\/978-3-319-66787-4_22"},{"key":"423_CR49","doi-asserted-by":"crossref","unstructured":"Shoukry Y, Martin P, Tabuada P, Srivastava M. Non-invasive spoofing attacks for anti-lock braking systems. In: International workshop on cryptographic hardware and embedded systems, 2013. Springer, p. 55\u201372.","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"423_CR50","doi-asserted-by":"publisher","unstructured":"Singh M, Rajan MA, Shivraj VL, Balamuralidhar P. Secure mqtt for internet of things (iot). In: 2015 fifth international conference on communication systems and network technologies, 2015. p. 746\u2013751. https:\/\/doi.org\/10.1109\/CSNT.2015.16.","DOI":"10.1109\/CSNT.2015.16"},{"key":"423_CR51","doi-asserted-by":"crossref","unstructured":"Sitawarin C, Wagner D. Minimum-norm adversarial examples on knn and knn-based models; 2020. arXiv preprint arXiv:2003.06559.","DOI":"10.1109\/SPW50608.2020.00023"},{"key":"423_CR52","unstructured":"Son Y, Shin H, Kim D, Park Y, Noh J, Choi K, Choi J, Kim Y. Rocking drones with intentional sound noise on gyroscopic sensors. In: 24th USENIX Security Symposium (USENIX Security 15); 2015. p. 881\u201396."},{"key":"423_CR53","unstructured":"Soobramaney P. Mitigation of the effects of high levels of high-frequency noise on mems gyroscopes. Ph.D. thesis, Auburn University 2013."},{"key":"423_CR54","unstructured":"Sugawara T, Cyr B, Rampazzi S, Genkin D, Fu K. Light commands: laser-based audio injection attacks on voice-controllable systems. In: 29th USENIX Security Symposium (USENIX Security 20); 2020. USENIX Association, p. 2631\u201348. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/sugawara. Accessed 15 Dec 2020."},{"issue":"6","key":"423_CR55","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MCE.2019.2928066","volume":"8","author":"H Thapliyal","year":"2019","unstructured":"Thapliyal H, Mohanty SP, Prowell S. Emerging paradigms in vehicular cybersecurity. IEEE Consum Electron Mag. 2019;8(6):81\u20133. https:\/\/doi.org\/10.1109\/MCE.2019.2928066.","journal-title":"IEEE Consum Electron Mag"},{"key":"423_CR56","unstructured":"Thompson KD. Cyber-physical systems; 2019. https:\/\/www.nist.gov\/el\/cyber-physical-systems. Accessed 15 Dec 2020."},{"key":"423_CR57","unstructured":"Tram\u00e8r F, Kurakin A, Papernot N, Goodfellow I, Boneh D, McDaniel P. Ensemble adversarial training: attacks and defenses; 2017. arXiv preprint arXiv:1705.07204."},{"key":"423_CR58","doi-asserted-by":"crossref","unstructured":"Trippel T, Weisse O, Xu W, Honeyman P, Fu K. Walnut: waging doubt on the integrity of mems accelerometers with acoustic injection attacks. In: 2017 IEEE European symposium on security and privacy (EuroS&P); 2017. IEEE, p. 3\u201318.","DOI":"10.1109\/EuroSP.2017.42"},{"key":"423_CR59","doi-asserted-by":"publisher","unstructured":"Tu Y, Rampazzi S, Hao B, Rodriguez A, Fu K, Hei X. Trick or heat? manipulating critical temperature-based control systems using rectification attacks. In: CCS \u201919 Proceedings of the 2019 ACM SIGSAC conference on computer and communications security; 2019. https:\/\/doi.org\/10.1145\/3319535.3354195.","DOI":"10.1145\/3319535.3354195"},{"key":"423_CR60","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/745834","author":"D Um","year":"2010","unstructured":"Um D. Massive sensor array fault tolerance: tolerance mechanism and fault injection for validation. J Robot. 2010;. https:\/\/doi.org\/10.1155\/2010\/745834.","journal-title":"J Robot"},{"key":"423_CR61","doi-asserted-by":"crossref","unstructured":"Wang Y, Chao W, Garg D, Hariharan B, Campbell M, Weinberger KQ. Pseudo-lidar from visual depth estimation: Bridging the gap in 3d object detection for autonomous driving. CoRR. 2018. arXiv:abs\/1812.07179.","DOI":"10.1109\/CVPR.2019.00864"},{"issue":"4","key":"423_CR62","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.jeap.2008.10.004","volume":"7","author":"R Woodward-Kron","year":"2008","unstructured":"Woodward-Kron R. More than just jargon\u2014the nature and role of specialist language in learning disciplinary knowledge. J English Acad Purp. 2008;7(4):234\u201349. https:\/\/doi.org\/10.1016\/j.jeap.2008.10.004.","journal-title":"J English Acad Purp"},{"key":"423_CR63","unstructured":"Woody C. The navy\u2019s 4th accident this year is stirring concerns about hackers targeting us warships; 2017. https:\/\/www.businessinsider.com\/hacking-and-gps-spoofing-involved-in-navy-accidents-2017-8. Accessed 28 Nov 2020."},{"key":"423_CR64","doi-asserted-by":"crossref","unstructured":"Xiang C, Qi CR, Li B. Generating 3d adversarial point clouds. In: The IEEE conference on computer vision and pattern recognition (CVPR); 2019.","DOI":"10.1109\/CVPR.2019.00935"},{"key":"423_CR65","unstructured":"Xiao Q, Chen Y, Shen C, Chen Y, Li K. Seeing is not believing: Camouflage attacks on image scaling algorithms. In: 28th USENIX Security Symposium (USENIX Security 19); 2019. USENIX Association, Santa Clara, CA, p. 443\u2013460. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/xiao."},{"key":"423_CR66","doi-asserted-by":"crossref","unstructured":"Yang B. Study on security of wireless sensor network based on zigbee standard. In: 2009 international conference on computational intelligence and security, vol.\u00a02; 2009. IEEE, p. 426\u2013430.","DOI":"10.1109\/CIS.2009.208"},{"issue":"6","key":"423_CR67","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/s00502-018-0635-2","volume":"135","author":"HW Yoo","year":"2018","unstructured":"Yoo HW, Druml N, Brunner D, Schwarzl C, Thurner T, Hennecke M, Schitter G. Mems-based lidar for autonomous driving. e & i Elektrotechnik und Informationstechnik. 2018;135(6):408\u201315. https:\/\/doi.org\/10.1007\/s00502-018-0635-2.","journal-title":"e & i Elektrotechnik und Informationstechnik"},{"key":"423_CR68","unstructured":"Yuan X, Chen Y, Zhao Y, Long Y, Liu X, Chen K, Zhang S, Huang H, Wang X, Gunter CA. Commandersong: a systematic approach for practical adversarial voice recognition. In: 27th USENIX security symposium (USENIX Security 18); 2018. p. 49\u201364."},{"key":"423_CR69","doi-asserted-by":"crossref","unstructured":"Zhang G, Yan C, Ji X, Zhang T, Zhang T, Xu W. Dolphinattack: inaudible voice commands. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security; 2017. ACM, p. 103\u2013117.","DOI":"10.1145\/3133956.3134052"},{"key":"423_CR70","doi-asserted-by":"crossref","unstructured":"Zhang Y, Rasmussen K. Detection of electromagnetic interference attacks on sensor systems. In: IEEE Symposium on Security and Privacy; 2020.","DOI":"10.1109\/SP40000.2020.00001"},{"issue":"1","key":"423_CR71","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/TSG.2012.2227342","volume":"4","author":"Z Zhang","year":"2013","unstructured":"Zhang Z, Gong S, Dimitrovski AD, Li H. Time synchronization attack in smart grid: impact and analysis. IEEE Trans Smart Grid. 2013;4(1):87\u201398. https:\/\/doi.org\/10.1109\/TSG.2012.2227342.","journal-title":"IEEE Trans Smart Grid"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-020-00423-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42979-020-00423-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-020-00423-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,9]],"date-time":"2021-02-09T21:27:39Z","timestamp":1612906059000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42979-020-00423-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,21]]},"references-count":71,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["423"],"URL":"https:\/\/doi.org\/10.1007\/s42979-020-00423-5","relation":{},"ISSN":["2662-995X","2661-8907"],"issn-type":[{"type":"print","value":"2662-995X"},{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2021,1,21]]},"assertion":[{"value":"5 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standard"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"51"}}