{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T14:42:02Z","timestamp":1773412922720,"version":"3.50.1"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679455","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"498-505","source":"Crossref","is-referenced-by-count":1,"title":["Using a Sensor-Health-Aware Resilient Fusion for Localization in the Presence of GPS Spoofing Attacks"],"prefix":"10.1109","author":[{"given":"Samin","family":"Moosavi","sequence":"first","affiliation":[{"name":"Texas A&#x0026;M University,Dept. of Mechanical Engineering"}]},{"given":"Isabel","family":"Moore","sequence":"additional","affiliation":[{"name":"Texas A&#x0026;M University,Dept. of Mechanical Engineering"}]},{"given":"Swaminathan","family":"Gopalswamy","sequence":"additional","affiliation":[{"name":"Texas A&#x0026;M University,Dept. of Mechanical Engineering"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Economic benefits of the global positioning system (gps) final report","author":"Oconnor","year":"2019"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1016\/B978-0-12-416689-9.00012-5","article-title":"Chapter 12 - rfid security","volume-title":"Network and System Security","author":"Rong","year":"2014"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1002\/navi.183","article-title":"Hostile control of ships via false gps signals: Demonstration and detection","volume":"64","author":"Bhatti","year":"2017","journal-title":"Annual of Navigation"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1002\/rob.21513","article-title":"Unmanned aircraft capture and control via gps spoofing","volume":"31","author":"Kerns","year":"2014","journal-title":"Journal of Field Robotics"},{"key":"ref5","first-page":"3591","article-title":"Evaluation of smart grid and civilian uav vulnerability to gps spoofing attacks","volume-title":"Proceedings of the 25th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS 2012)","author":"Shepard","year":"2012"},{"key":"ref6","first-page":"2314","article-title":"Assessing the spoofing threat: Development of a portable gps civilian spoofer","volume-title":"Proceedings of the 21st International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS 2008)","author":"Humphreys","year":"2008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2024.3409677"},{"key":"ref8","first-page":"3129","article-title":"A proposed navigation message authentication implementation for civil gps anti-spoofing","volume-title":"Proceedings of the 24th International Technical Meeting of the Satellite Division of The Institute of Navigation","author":"Wesson"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.33012\/2017.15206"},{"key":"ref10","first-page":"91","article-title":"An assessment of gps spoofing detection via radio power and signal quality monitoring for aviation safety operations","volume-title":"Navigation Conference (ENC)","author":"Miralles","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10291-005-0016-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.33012\/2020.17687"},{"issue":"1","key":"ref13","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1115\/1.3662552","article-title":"A new approach to linear filtering and prediction problems","volume":"82","author":"Kalman","year":"1960","journal-title":"Journal of Basic Engineering"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0764-4442(97)84778-7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1561\/9781680833270"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/vtc2021-fall52928.2021.9625567"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3269029"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2016.7535525"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PLANS53410.2023.10139945"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3371378"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/IECON49645.2022.9968443"},{"issue":"5","key":"ref22","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1016\/j.dcan.2021.09.006","article-title":"Deeppose: Detecting gps spoofing attack via deep recurrent neural network","volume":"8","author":"Jiang","year":"2022","journal-title":"Digital Communications and Networks"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3319514"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3197817"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.33012\/navi.636"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.33012\/2022.18530"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.33012\/2023.19366"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2922982"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1201\/9781420053098.ch14"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/EURONAV.2018.8433227","article-title":"Classification of spoofing attack types","volume-title":"2018 European Navigation Conference (ENC)","author":"van der Merwe","year":"2018"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C57518.2022.00016"},{"key":"ref32","article-title":"Drift with devil: Security of multi-sensor fusion based localization in high-level autonomous driving under gps spoofing (extended version)","volume-title":"USENIX Security Symposium","author":"Shen","year":"2020"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON49873.2020.9342317"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"208","DOI":"10.2514\/2.4242","article-title":"Strapdown inertial navigation integration algorithm design. part 2: Velocity and position algorithms","volume":"21","author":"Savage","year":"1998","journal-title":"Journal of Guidance Control and Dynamics"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2015.7225830"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-2301-7_4"},{"key":"ref37","article-title":"Application of statistical filter theory to the optimal estimation of position and velocity on board a circumlunar vehicle","author":"Smith","year":"1962","journal-title":"National Aeronautics and Space Administration"},{"issue":"1","key":"ref38","first-page":"49","article-title":"On the generalised distance in statistics","volume-title":"Proceedings of the National Institute of Sciences of India","volume":"2","author":"Mahalanobis","year":"1936"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1121\/1.398863"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/9781119018612"},{"key":"ref41","volume-title":"Department of Defense World Geodetic System 1984: Its Definition and Relationships with Local Geodetic Systems","year":"1987"},{"key":"ref42","year":"2024","journal-title":"Inertial navigation primer"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","location":"London, United Kingdom","start":{"date-parts":[[2024,9,2]]},"end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679455.pdf?arnumber=10679455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T18:15:15Z","timestamp":1727892915000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679455\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679455","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}