{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T04:55:02Z","timestamp":1746075302333,"version":"3.37.3"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3160047","type":"journal-article","created":{"date-parts":[[2022,3,16]],"date-time":"2022-03-16T19:38:47Z","timestamp":1647459527000},"page":"42014-42028","source":"Crossref","is-referenced-by-count":3,"title":["GNSS Spoofing Detection and Mitigation in Multireceiver Configuration via Tracklets and Spoofer Localization"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9677-506X","authenticated-orcid":false,"given":"Bethi","family":"Pardhasaradhi","sequence":"first","affiliation":[]},{"given":"Gunnery","family":"Srinath","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4633-9371","authenticated-orcid":false,"given":"G. S.","family":"Vandana","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9168-2753","authenticated-orcid":false,"given":"Pathipati","family":"Srihari","sequence":"additional","affiliation":[]},{"given":"P.","family":"Aparna","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.2514\/4.866388"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s19183993"},{"issue":"2","key":"ref3","first-page":"19","article-title":"A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing","volume":"25","author":"Warner","year":"2002","journal-title":"J. Secur. Admin."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.33012\/2020.17713"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2897166"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1049\/iet-spr.2016.0646"},{"key":"ref7","first-page":"3335","article-title":"Robust spoofing detection and mitigation based on direction of arrival estimation","volume-title":"Proc. 28th Int. Tech. Meeting Satell. Division Inst. Navigat. (ION GNSS)","author":"Appel"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2015.7178560"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s16101771"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2845365"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3099968"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.33012\/2017.15338"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/PLANS.2012.6236915"},{"key":"ref14","first-page":"1684","article-title":"Antenna characterization for UAV based GPS jammer localization","volume-title":"Proc. 28th Int. Tech. Meeting Satell. Division Inst. Navigat. (ION GNSS)","author":"Perkins"},{"key":"ref15","first-page":"70","article-title":"In car GNSS jammer localization using vehicular ad-hoc network","volume":"11","author":"Fontanella","year":"2013","journal-title":"Inside GNSS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2896262"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2020.2974034"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3055158"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3031576"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON49873.2020.9342317"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON49873.2020.9342285"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1117\/12.292746"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1117\/12.478532"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2012.6237594"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/0471221279"},{"key":"ref28","volume-title":"Fundamentals of Statistical Signal Processing: Estimation Theory","volume":"I","author":"Kay","year":"1993"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON49873.2020.9342459"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/9781118104750.ch2"},{"key":"ref31","first-page":"1233","article-title":"A low-complexity GPS anti-spoofing method using a multi-antenna array","volume-title":"Proc. 25th Int. Tech. meeting Satell. Division Inst. Navigat. (ION GNSS)","author":"Daneshmand"},{"key":"ref32","volume-title":"Tracking and Data Fusion","volume":"11","author":"Bar-Shalom","year":"2011"},{"issue":"2","key":"ref33","first-page":"19","article-title":"A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing","volume":"25","author":"Warner","year":"2002","journal-title":"J. Secur. Admin."},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2017.2765258"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09736986.pdf?arnumber=9736986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T00:02:16Z","timestamp":1705536136000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9736986\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3160047","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2022]]}}}