{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T12:31:09Z","timestamp":1762086669459,"version":"build-2065373602"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T00:00:00Z","timestamp":1672704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,3]]},"DOI":"10.1109\/comsnets56262.2023.10041419","type":"proceedings-article","created":{"date-parts":[[2023,2,23]],"date-time":"2023-02-23T22:46:06Z","timestamp":1677192366000},"page":"498-504","source":"Crossref","is-referenced-by-count":7,"title":["Invited Paper: Challenges and Opportunities in Enabling Secure 5G Positioning"],"prefix":"10.1109","author":[{"given":"Aneet Kumar","family":"Dutta","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security,Saarbrucken,Germany"}]},{"given":"Mridula","family":"Singh","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security,Saarbrucken,Germany"}]}],"member":"263","reference":[{"volume-title":"5G - GPP 38.855; Technical Specification Group Radio Access Network; Study on NR positioning support","year":"2022","key":"ref1"},{"volume-title":"5G; study on scenarios and requirements for next generation access technologies","key":"ref2"},{"volume-title":"Indoor Location Accuracy Timeline and Live Call Data Reporting Template","year":"2022","key":"ref3"},{"volume-title":"Proof of Concept of Hybrid 5G-NR\/GNSS Positioning with AD-HOC Overlay","year":"2021","key":"ref4"},{"volume-title":"Wi-fi aware \u2014 wi-fi alliance","year":"2020","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/icnc57223.2023.10074426"},{"article-title":"Keep your enemies close: Distance bounding against smartcard relay attacks","volume-title":"16th USENIX Security Symposium (USENIX Security 07)","author":"Drimer","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.011.2100091"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_14"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388944"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11063-019-10073-1"},{"article-title":"Ltrack: Stealthy tracking of mobile phones in lte","volume-title":"Proceedings of the 31st USENIX Security Symposium, pages 1291 \u2014 1306. Advanced Computing Systems Association, 2022. 31st USENIX Security Symposium (USENIX Security 22)","author":"Kotuliak","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890072"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00010"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0001.2200001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WPNC47567.2019.8970186"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00068"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-020-00252-5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753512"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.56"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185453"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653712"},{"key":"ref24","first-page":"931","article-title":"Drift with devil: Security of Multi-Sensor fusion based localization in High-Level autonomous driving under GPS spoofing","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Shen"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2005.1542879"},{"key":"ref26","first-page":"73","article-title":"UWB-ED: Distance enlargement attack detection in Ultra-Wideband","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Singh"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23109"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23151"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2014.6813957"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3032970.3032983"}],"event":{"name":"2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS)","start":{"date-parts":[[2023,1,3]]},"location":"Bangalore, India","end":{"date-parts":[[2023,1,8]]}},"container-title":["2023 15th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10041243\/10041245\/10041419.pdf?arnumber=10041419","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T13:31:47Z","timestamp":1707831107000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10041419\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,3]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/comsnets56262.2023.10041419","relation":{},"subject":[],"published":{"date-parts":[[2023,1,3]]}}}