{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:33:47Z","timestamp":1775230427378,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T00:00:00Z","timestamp":1583971200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T00:00:00Z","timestamp":1583971200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s11277-020-07211-7","type":"journal-article","created":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T15:02:46Z","timestamp":1584025366000},"page":"2729-2754","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Capture of UAVs Through GPS Spoofing Using Low-Cost SDR Platforms"],"prefix":"10.1007","volume":"115","author":[{"given":"Jo\u00e3o","family":"Gaspar","sequence":"first","affiliation":[]},{"given":"Renato","family":"Ferreira","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Sebasti\u00e3o","sequence":"additional","affiliation":[]},{"given":"Nuno","family":"Souto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,12]]},"reference":[{"key":"7211_CR1","doi-asserted-by":"crossref","unstructured":"Kratky, M., & Minarik, V. (2017). The non-destructive methods of fight against UAVs. In ICMT 2017\u20146th international conference on military technologies (pp. 690\u2013694).","DOI":"10.1109\/MILTECHS.2017.7988845"},{"key":"7211_CR2","unstructured":"The Guardian. (2016). Eagle-eyed: Dutch police to train birds to take down unauthorised drones | World news | The Guardian. https:\/\/www.theguardian.com\/world\/2016\/feb\/01\/dutch-netherlands-police-birds-unauthorized-drones. Retrieved November 08, 2018."},{"key":"7211_CR3","unstructured":"My Defense. (2018). KNOX Anti-Drone Solution\u2014MyDefence Communication."},{"issue":"4","key":"7211_CR4","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1002\/rob.21513","volume":"31","author":"AJ Kerns","year":"2014","unstructured":"Kerns, A. J., Shepard, D. P., Bhatti, J. A., & Humphreys, T. E. (2014). Unmanned aircraft capture and control via GPS spoofing. Journal of Field Robotics, 31(4), 617\u2013636.","journal-title":"Journal of Field Robotics"},{"key":"7211_CR5","unstructured":"Lin, H., & Qing, Y. (2015). GPS SPOOFING Low-cost GPS simulator."},{"key":"7211_CR6","unstructured":"Shepard, D. P., Bhatti, J. A., Humphreys, T. E. , & Fansler, A. A. (2012). Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. Ion Gnss (pp. 3591\u20133605)."},{"key":"7211_CR7","unstructured":"Humphreys, T. E., Ledvina, B. M., Tech, V., Psiaki, M. L., Hanlon, B. W. O., & Kintner, P. M. (2008). Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Proceedings of the 21st international technical meeting, Satellite Division, Institute of Navigation."},{"key":"7211_CR8","unstructured":"Oxley, A. (2017). Chapter 2 -\u00a0Introduction to GPS (pp. 19\u201338). Kingdom of Bahrain: Kingdom of Bahrain."},{"key":"7211_CR9","unstructured":"Samama, N. (Ed.) (2007). GNSS system descriptions. In Global positioning (pp. 131\u2013161), Wiley."},{"key":"7211_CR10","doi-asserted-by":"crossref","unstructured":"Ferreira, R. (2018). Effective GPS Jamming Techniques for UAVs using low-cost SDR platforms. In 2018 Global Wireless Summit.","DOI":"10.1109\/GWS.2018.8686672"},{"key":"7211_CR11","unstructured":"Samama, N. (Ed.) (2007). Development, deployment, and current status of satellite-based navigation systems. In Global positioning (pp. 57\u201393). Wiley."},{"key":"7211_CR12","volume-title":"Understanding GPS: Principles and applications","author":"ED Kaplan","year":"2006","unstructured":"Kaplan, E. D. (2006). Understanding GPS: Principles and applications (2nd ed.). Norwood: Artech House.","edition":"2"},{"key":"7211_CR13","volume-title":"GNSS interference threats and countermeasures","author":"F Dovis","year":"2015","unstructured":"Dovis, F. (2015). GNSS interference threats and countermeasures. Norwood: Artech House."},{"key":"7211_CR14","unstructured":"Ledvina, B. M., Bencze, W. J., Galusha, B., Miller, I. (2010). An in-line anti-spoofing device for legacy civil GPS receivers. In Proceedings of the 2010 international technical meeting of the institute of navigation (pp. 689\u2013712), San Diego, CA."},{"issue":"6","key":"7211_CR15","doi-asserted-by":"publisher","first-page":"1258","DOI":"10.1109\/JPROC.2016.2526658","volume":"104","author":"ML Psiaki","year":"2016","unstructured":"Psiaki, M. L., & Humphreys, T. E. (2016). GNSS spoofing and detection. Proceedings of the IEEE, 104(6), 1258\u20131270.","journal-title":"Proceedings of the IEEE"},{"key":"7211_CR16","unstructured":"Kuhn, M. G. (2005). An asymmetric security mechanism for navigation signals, In International workshop on information hiding IH (Vol. 3200, pp. 239\u2013252)."},{"key":"7211_CR17","unstructured":"Lite, L., & Specifications, T. (2016). able of contents lidar lite v3 operation manual and technical specifications wiring harness, pp. 1\u201314."},{"key":"7211_CR18","unstructured":"Ave, B., Number, D., & Date, R. (2012) MPU-6000 and MPU-6050 product specification, Vol. 1, No. 408."},{"key":"7211_CR19","unstructured":"Ecopack, E. F., Lsm, T., Lsm, T., & Lsm, T. (2012) 3D accelerometer and 3D magnetometer module, no. June, pp. 1\u201354."},{"key":"7211_CR20","unstructured":"u-blox, \u201cMAX-7 series | u-blox.\u201d. https:\/\/www.u-blox.com\/en\/product\/max-7-series. Retrieved July 30, 2018."},{"key":"7211_CR21","unstructured":"David, Dr., & Williams, R. (2017). Earth fact sheet, NASA. https:\/\/nssdc.gsfc.nasa.gov\/planetary\/factsheet\/earthfact.html. Retrieved August 01, 2018."},{"key":"7211_CR22","unstructured":"Veness, C. (2017). Calculate distance and bearing between two Latitude\/Longitude points using haversine formula in JavaScript. MIT License. https:\/\/www.movable-type.co.uk\/scripts\/latlong.html. Retrieved September 21, 2018."},{"key":"7211_CR23","unstructured":"bladeRF Naund, \u201cbladeRF x40 | Nuand -.\u201d. https:\/\/www.nuand.com\/blog\/product\/bladerf-x40\/. Retrieved July 31, 2018."},{"key":"7211_CR24","unstructured":"Nuand (2017). \u201cbladeRF Power Consumption\u201d. https:\/\/github.com\/Nuand\/bladeRF\/wiki\/bladeRF-Power-Consumption. Retrieved September 18, 2018."},{"key":"7211_CR25","unstructured":"Dale DePriest, \u201cNMEA data\u201d. https:\/\/www.gpsinformation.org\/dale\/nmea.htm. Retrieved September 17, 2018."},{"issue":"2","key":"7211_CR26","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1017\/S0373463312000471","volume":"66","author":"B Park","year":"2016","unstructured":"Park, B., Lee, J., Kim, Y., Yun, H., & Kee, C. (2016). DGPS enhancement to GPS NMEA output data: DGPS by correction projection to position-domain. The Journal of Navigation, 66(2), 249\u2013264.","journal-title":"The Journal of Navigation"},{"key":"7211_CR27","unstructured":"Page, G. P. S. C. (2011). GPS\u2014NMEA sentence information. http:\/\/home.mira.net\/~gnb\/gps\/nmea.html. Retrieved May 18, 2018."},{"key":"7211_CR28","unstructured":"GPS Test\u2014Apps no Google Play. https:\/\/play.google.com\/store\/apps\/details?id=com.chartcross.gpstest&hl=pt_BR. Retrieved August 30, 2018."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07211-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-020-07211-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07211-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T00:20:23Z","timestamp":1615508423000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-020-07211-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,12]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["7211"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07211-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,12]]},"assertion":[{"value":"12 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}