{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:51:26Z","timestamp":1767340286244,"version":"3.41.2"},"reference-count":117,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3578891","type":"journal-article","created":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T13:45:54Z","timestamp":1749649554000},"page":"104937-104965","source":"Crossref","is-referenced-by-count":4,"title":["Survey of Navigational Perception Sensors\u2019 Security in Autonomous Vehicles"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2971-2728","authenticated-orcid":false,"given":"Abhijeet","family":"Solanki","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Tennessee Technological University, Cookeville, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4189-3223","authenticated-orcid":false,"given":"Wesam Al","family":"Amiri","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Tennessee Technological University, Cookeville, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5758-7274","authenticated-orcid":false,"given":"Marim","family":"Mahmoud","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Tennessee Technological University, Cookeville, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7557-6334","authenticated-orcid":false,"given":"Blaine","family":"Swieder","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Tennessee Technological University, Cookeville, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0183-8086","authenticated-orcid":false,"given":"Syed Rafay","family":"Hasan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Tennessee Technological University, Cookeville, TN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7330-2152","authenticated-orcid":false,"given":"Terry N.","family":"Guo","sequence":"additional","affiliation":[{"name":"Center for Manufacturing Research, Tennessee Technological University, Cookeville, TN, USA"}]}],"member":"263","reference":[{"issue":"1","key":"ref1","first-page":"24","article-title":"Personality, driving behavior and mental disorders factors as predictors of road traffic accidents based on logistic regression","volume":"42","author":"Alavi","year":"2017","journal-title":"Iranian J. Med. Sci."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2020.105873"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE58730.2023.10288963"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IST64061.2024.10843617"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2023.3265363"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3213843"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon52093.2024.10500196"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3085297"},{"key":"ref9","first-page":"1","article-title":"An experimental study of GPS spoofing and takeover attacks on UAVs","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Sathaye"},{"key":"ref10","first-page":"1527","article-title":"All your GPS are belong to us: Towards stealthy manipulation of road navigation systems","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Zeng"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00076"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1800065"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800156"},{"key":"ref14","first-page":"1","article-title":"You can\u2019t see me: Physical removal attacks on lidar-based autonomous vehicles driving frameworks","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Cao"},{"issue":"8","key":"ref15","first-page":"109","article-title":"Can you trust autonomous vehicles: Contactless attacks against sensors of self-driving vehicle","volume":"24","author":"Yan","year":"2016","journal-title":"Defcon"},{"key":"ref16","first-page":"877","article-title":"Towards robust LiDAR-based perception in autonomous driving: General black-box adversarial sensor attack and countermeasures","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Sun"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179458"},{"key":"ref18","article-title":"Adversarial objects against LiDAR-based autonomous driving systems","author":"Cao","year":"2019","journal-title":"arXiv:1907.05418"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3558482.3590192"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485377"},{"key":"ref21","first-page":"1","article-title":"GhostImage: Remote perception attacks against camera-based image classification systems","volume-title":"Proc. 23rd Int. Symp. Res. Attacks, Intrusions Defenses (RAID)","author":"Man"},{"key":"ref22","first-page":"1","article-title":"Dirty road can attack: Security of deep learning based automated lane centering under physical-world attack","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Sato"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00846"},{"key":"ref24","first-page":"1","article-title":"Fooling detection alone is not enough: Adversarial attack against multiple object tracking","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Jia"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354259"},{"key":"ref26","first-page":"3237","article-title":"Too good to be safe: Tricking lane detection in autonomous driving with crafted perturbations","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Jing"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00080"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref29","first-page":"1","article-title":"Physical adversarial examples for object detectors","volume-title":"Proc. 12th USENIX Workshop Offensive Technol.","author":"Song"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01426"},{"key":"ref31","article-title":"Mitigation of camouflaged adversarial attacks in autonomous vehicles\u2014A case study using CARLA simulator","author":"Romano Martinez","year":"2025","journal-title":"arXiv:2502.05208"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484766"},{"key":"ref33","first-page":"1","article-title":"SLAP: Improving physical adversarial examples with short-lived adversarial perturbations","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Lovisotto"},{"key":"ref34","first-page":"1957","article-title":"Rolling colors: Adversarial laser exploits against traffic light recognition","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Chen"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423359"},{"key":"ref36","first-page":"1","article-title":"DoubleStar: Long-range attack towards depth estimation based obstacle avoidance in autonomous systems","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Zhou"},{"key":"ref37","first-page":"221","article-title":"Controlling UAVs with sensor input spoofing attacks","volume-title":"Proc. 10th USENIX Workshop Offensive Technol.","author":"Davidson"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01580"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISVLSI61997.2024.00152"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196506"},{"key":"ref42","first-page":"881","article-title":"Rocking drones with intentional sound noise on gyroscopic sensors","volume-title":"Proc. 24th USENIX Secur. Symp.","author":"Son"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00091"},{"key":"ref44","first-page":"1545","article-title":"Injected and delivered: Fabricating implicit control over actuation systems by spoofing inertial sensors","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Tu"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2906165"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800477"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2867917"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616661"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3076287"},{"key":"ref50","first-page":"1","article-title":"Security analysis of camera-LiDAR fusion against black-box attacks on autonomous vehicles","volume-title":"Proc. 31st USENIX Secur. Symp.","author":"Hallyburton"},{"key":"ref51","first-page":"931","article-title":"Drift with devil: Security of multi-sensor fusion based localization in high-level autonomous driving under GPS spoofing","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Shen"},{"key":"ref52","first-page":"1","article-title":"Fusion is not enough: Single modal attack on fusion models for 3D object detection","volume-title":"Proc. The 12th Int. Conf. Learn. Represent.","author":"Cheng"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2018.8612054"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2023-Spring57618.2023.10200857"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3319514"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Fall52928.2021.9625567"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3269029"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIC63015.2025.10849307"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/UBMK63289.2024.10773593"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2018.97"},{"volume-title":"Dji Phantom 4 Pro","year":"2025","key":"ref61"},{"volume-title":"Labsat3 Gps Simulato","year":"2025","key":"ref62"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICCA62789.2024.10591887"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00780"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00498"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01498"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3103441"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3503161.3548171"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3338508.3359567"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179371"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3418038"},{"key":"ref72","article-title":"Fusion is not enough: Single modal attacks on fusion models for 3D object detection","author":"Cheng","year":"2023","journal-title":"arXiv:2304.14614"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3151880"},{"volume-title":"Nyc Taxi & Limousine Commission Trip Record Data","year":"2025","key":"ref74"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913491297"},{"key":"ref76","article-title":"A commute in data: The comma2k19 dataset","author":"Schafer","year":"2018","journal-title":"arXiv:1812.05752"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2013.6706807"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_17"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1002\/navi.14"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00012"},{"key":"ref81","first-page":"1","article-title":"Realization of RF distance bounding","volume-title":"Proc. 19th USENIX Conf. Secur.","author":"Rasmussen"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.20"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440942"},{"key":"ref84","first-page":"124","article-title":"Receiver-autonomous spoofing detection: Experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer","volume-title":"Proc. Int. Tech. Meeting Inst. Navigat.","author":"Montgomery"},{"key":"ref85","first-page":"2949","article-title":"GNSS spoofing detection using high-frequency antenna motion and carrier-phase data","volume-title":"Proc. 26th Int. Tech. Meeting Satell. Division Inst. Navigat.","author":"Psiaki"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415722"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48285-7_30"},{"volume-title":"ADS-R and TIS-B Now in PowerFLARM","year":"2025","key":"ref88"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973763"},{"key":"ref90","first-page":"1","article-title":"Using directional antennas to prevent wormhole attacks","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp. (NDSS)","author":"Hu"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973753"},{"key":"ref92","first-page":"1942","article-title":"The GPS assimilator: A method for upgrading existing GPS user equipment to improve accuracy, robustness, and resistance to spoofing","volume-title":"Proc. 23rd Int. Tech. Meeting Satell. Division Inst. Navigat. (ION GNSS)","author":"Humphreys"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC45102.2020.9294422"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3197817"},{"key":"ref95","article-title":"Experimental validation of sensor fusion-based GNSS spoofing attack detection framework for autonomous vehicles","author":"Dasgupta","year":"2024","journal-title":"arXiv:2401.01304"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.3390\/app13095735"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/SPW54247.2022.9833890"},{"key":"ref98","article-title":"ADoPT: LiDAR spoofing attack detection based on point-level temporal consistency","author":"Cho","year":"2023","journal-title":"arXiv:2310.14504"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/VNC61989.2024.10576017"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00030"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3334257"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2023-Spring57618.2023.10200555"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORS56945.2023.10324990"},{"key":"ref104","article-title":"GPS-IDS: An anomaly-based GPS spoofing attack detection framework for autonomous vehicles","author":"Abrar","year":"2024","journal-title":"arXiv:2405.08359"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/SECON52354.2021.9491590"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/AITEST52744.2021.00030"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2022.3155724"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/I2CT45611.2019.9033734"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/IV55156.2024.10588623"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01164"},{"volume-title":"Apollo","year":"2017","author":"Inc","key":"ref111"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01298"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00086"},{"volume-title":"GM Cruise Snaps Up Solid-State LiDAR Pioneer Strobe Inc","year":"2025","author":"Harris","key":"ref114"},{"volume-title":"Autoware.AI","year":"2025","key":"ref115"},{"volume-title":"UST-20LX","year":"2025","key":"ref116"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.230997"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11030565.pdf?arnumber=11030565","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T17:44:09Z","timestamp":1752515049000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11030565\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":117,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3578891","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}