{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:01:42Z","timestamp":1770739302190,"version":"3.49.0"},"reference-count":84,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"University of Bristol, a public university in the United Kingdom"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Commun."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tcomm.2025.3644474","type":"journal-article","created":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T18:38:15Z","timestamp":1765823895000},"page":"2564-2579","source":"Crossref","is-referenced-by-count":0,"title":["Timestamp Manipulation-Based GPS Spoofing Attacks on the MAVLink 2.0 Protocol for UAV Communication: An Empirical Study"],"prefix":"10.1109","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7867-4863","authenticated-orcid":false,"given":"Zack","family":"Colton","sequence":"first","affiliation":[{"name":"Bristol Cyber Security Group, School of Computer Science, University of Bristol, Bristol, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7723-3932","authenticated-orcid":false,"given":"Alma","family":"Oracevic","sequence":"additional","affiliation":[{"name":"Bristol Cyber Security Group, School of Computer Science, University of Bristol, Bristol, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1433-8809","authenticated-orcid":false,"given":"Selma","family":"Dilek","sequence":"additional","affiliation":[{"name":"Bristol Cyber Security Group, School of Computer Science, University of Bristol, Bristol, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.32560\/rk.2019.1.13"},{"key":"ref2","volume-title":"Unmanned Aerial Vehicles and the National Airspace System","author":"Government","year":"2006"},{"key":"ref3","volume-title":"A Not-so-Short History of Unmanned Aerial Vehicles (UAV)","author":"Daly","year":"2021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1590\/jatm.v13.1233"},{"key":"ref5","volume-title":"Drones by the Numbers (as of 3\/1\/2025)","year":"2025"},{"key":"ref6","volume-title":"Reaper UAV Mod 45150084","author":"Morris","year":"2009"},{"key":"ref7","volume-title":"DJI Phantom 3 Advanced UAV","author":"Halicki","year":"2015"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/10106049.2024.2413547"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/s21062057"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100218"},{"key":"ref11","volume-title":"Registering a Drone or Model Aircraft","year":"2025"},{"key":"ref12","volume-title":"Recreational Flyers & Community-Based Organizations","year":"2025"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1017\/S0373463311000506"},{"key":"ref14","first-page":"2314","article-title":"Assessing the spoofing threat: Development of a portable GPS civilian spoofer","volume-title":"Proc. 21st Int. Techn. Meeting Satellite Div. Inst. Navig. (ION GNSS)","author":"Humphreys"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"ref16","first-page":"19","article-title":"A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing","volume":"25","author":"Warner","year":"2002","journal-title":"J. Secur. Admin."},{"key":"ref17","volume-title":"New Warning as \u2019Spike\u2019 in GPS Spoofing Attacks Hit Passenger Planes-Fasten Your Seatbelts","author":"Doffman","year":"2024"},{"key":"ref18","volume-title":"\u2019Pull Up! Pull Up!\u2019 Who is Messing With GPS Signals Used By Passenger Planes\u2014And Why?","author":"Drummond","year":"2025"},{"key":"ref19","volume-title":"Plane GPS Systems are Under Sustained Attack\u2014Is the Solution a New Atomic Clock?","author":"Ghosh","year":"2025"},{"key":"ref20","volume-title":"Unclouding Aviation Security: The Growing Threat of GPS Spoofing\u2014Spire: Global Data and Analytics","author":"James","year":"2024"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109626"},{"key":"ref22","volume-title":"Secure By Default","year":"2018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766667"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1151414.1151417"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2601927"},{"key":"ref26","volume-title":"CVE-2020-10283 Detail","year":"2020"},{"key":"ref27","volume-title":"CVE-2020-10281 Detail","year":"2020"},{"key":"ref28","volume-title":"CVE-2020-10282 Detail","year":"2020"},{"key":"ref29","volume-title":"Some Proposals for Mavlink 2\u2014Google Docs","author":"Tridgell","year":"2015"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SECCMW.2005.1588322"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy55231.2022.9927895"},{"key":"ref32","volume-title":"Qgroundcontrol\u2014Drone Control","year":"2025"},{"key":"ref33","volume-title":"Mavproxy Documentation","year":"2025"},{"key":"ref34","volume-title":"Px4 Development Kit-x500 V2","year":"2025"},{"key":"ref35","volume-title":"Pixhawk 6C Flight Controller | Px4 User Guide","year":"2025"},{"key":"ref36","volume-title":"Ardupilot Developer Documentation Site","year":"2025"},{"key":"ref37","volume-title":"Sik Telemetry Radio V3","year":"2025"},{"key":"ref38","volume-title":"M10 GPs Module","year":"2025"},{"key":"ref39","volume-title":"GPS: The Global Positioning System","author":"Government","year":"2025"},{"key":"ref40","volume-title":"What is Galileo?","year":"2025"},{"key":"ref41","volume-title":"About Glonass","year":"2025"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/9781119458449.ch6"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24217"},{"key":"ref44","volume-title":"Arsdk Protocols Specification","year":"2015"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2924410"},{"key":"ref46","volume-title":"Packet Serialization Guide","year":"2025"},{"key":"ref47","volume-title":"Message Signing (Authentication)","year":"2025"},{"key":"ref48","volume-title":"Mavlink Packet Signing Proposal","author":"Tridgell","year":"2015"},{"key":"ref49","volume-title":"Timestamp Handling in Mavlink Message Signing","year":"2025"},{"key":"ref50","first-page":"804","article-title":"A comprehensive study on cyber security in unmanned aerial vehicles","volume-title":"Proc. 10th Int. Conf. Comput. Sustain. Global Develop. (INDIACom)","author":"Sanghavi"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2023.3318226"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3429111"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM62286.2024.10656843"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICoDT262145.2024.10740195"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/FIT57066.2022.00047"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2863237"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/IAI53119.2021.9619330"},{"key":"ref58","volume-title":"Mission Planner User Documentation","year":"2025"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346845"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2019.8755016"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TSP49548.2020.9163444"},{"key":"ref62","volume-title":"GPS Network Timing Integrity","author":"Airst","year":"2010"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Fall49728.2020.9348584"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSST60641.2023.10414239"},{"key":"ref65","volume-title":"Securing the Mavlink Communication Protocol for Unmanned Aircraft Systems Technical Report #CSSE 1402","author":"Butcher","year":"2014"},{"key":"ref66","volume-title":"Mavlink2 Signing for Copter","year":"2025"},{"key":"ref67","volume-title":"Mavlink App: Add Signing Support","year":"2025"},{"key":"ref68","volume-title":"Gazebo Simulator","year":"2025"},{"key":"ref69","volume-title":"Using Sitl With Gazebo","year":"2025"},{"key":"ref70","volume-title":"GPS Input\u2014Mavproxy Documentation","year":"2025"},{"key":"ref71","volume-title":"Wireshark","year":"2025"},{"key":"ref72","volume-title":"Parsing Mavlink in Wireshark","year":"2025"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.3390\/s22020655"},{"key":"ref74","volume-title":"Ardupilot\/Pymavlink: Python Mavlink Interface and Utilities","year":"2025"},{"key":"ref75","volume-title":"Simulation on Hardware","year":"2025"},{"key":"ref76","volume-title":"Ardupilot\/Build.md at Master Ardupilot\/Ardupilot","year":"2025"},{"key":"ref77","volume-title":"Stm32h743\/753 Arm Cortex-m7 Microcontrollers","year":"2025"},{"key":"ref78","volume-title":"Complete Parameter List\u2014Full Parameter List of Copter Latest V4.7.0 Dev","year":"2025"},{"key":"ref79","volume-title":"Flight Controllers\u2014FPV Flight Controllers, F411, F405, F722, F765, H743","year":"2025"},{"key":"ref80","volume-title":"Mavlink-Time-Spoofing: Experimental Scripts and Artifacts","author":"Colton","year":"2025"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8446"},{"key":"ref82","volume-title":"Time Synchronization Protocol V2","year":"2025"},{"issue":"8","key":"ref83","doi-asserted-by":"crossref","first-page":"583","DOI":"10.3390\/drones9080583","article-title":"Secure communication in drone networks: A comprehensive survey of lightweight encryption and key management techniques","volume":"9","author":"Sarkar","year":"2025","journal-title":"Drones"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3703625"}],"container-title":["IEEE Transactions on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/26\/11320979\/11300838.pdf?arnumber=11300838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T21:04:52Z","timestamp":1770671092000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11300838\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":84,"URL":"https:\/\/doi.org\/10.1109\/tcomm.2025.3644474","relation":{},"ISSN":["0090-6778","1558-0857"],"issn-type":[{"value":"0090-6778","type":"print"},{"value":"1558-0857","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}