{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T03:02:13Z","timestamp":1763348533498,"version":"3.37.3"},"reference-count":74,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1109\/tits.2023.3264453","type":"journal-article","created":{"date-parts":[[2023,4,14]],"date-time":"2023-04-14T17:32:17Z","timestamp":1681493537000},"page":"6748-6763","source":"Crossref","is-referenced-by-count":9,"title":["Survey of Air, Sea, and Road Vehicles Research for Motion Control Security"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8041-0947","authenticated-orcid":false,"given":"Oliver","family":"P\u00f6llny","sequence":"first","affiliation":[{"name":"Research and Development, Mercedes-Benz, B&#x00F6;blingen, AG, Germany"}]},{"given":"Albert","family":"Held","sequence":"additional","affiliation":[{"name":"Research and Development, Mercedes-Benz, Sindelfingen, AG, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3800-8369","authenticated-orcid":false,"given":"Frank","family":"Kargl","sequence":"additional","affiliation":[{"name":"Department of Distributed Systems, Ulm University, Ulm, Germany"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.42"},{"article-title":"Mitigation of the effects of high levels of high-frequency noise on MEMS gyroscopes","year":"2013","author":"soobramaney","key":"ref57"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433205"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406948"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS.2013.6549509"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747946"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-015-0284-1"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CYCON.2016.7529437"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00026"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.6.2.128-142"},{"key":"ref11","first-page":"1545","article-title":"Injected and delivered: Fabricating implicit control over actuation systems by spoofing inertial sensors","author":"tu","year":"2018","journal-title":"Proc 27th USENIX Secur Symp (USENIX Security)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MetroAeroSpace.2019.8869636"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2070772"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/UT.2007.370772"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2006.1706852"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2162209"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"ref18","first-page":"81","article-title":"A critical analysis of security vulnerabilities and countermeasures in a smart ship system","author":"bothur","year":"2017","journal-title":"Proc 15th Austral Inf Secur Manag Conf"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.005"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2011.6096958"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2017.7995787"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3390\/s20041110"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.12.006"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2020.3042087"},{"key":"ref42","first-page":"931","article-title":"Drift with devil: Security of multi-sensor fusion based localization in high-level autonomous driving under GPS spoofing","author":"shen","year":"2020","journal-title":"Proc 29th USENIX Secur Symp (USENIX Security)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2021-Spring51267.2021.9448756"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00037"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.5220\/0008165400250033"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2013.18"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1115\/IMECE2007-42108"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813679"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIE.2007.4374812"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/navi.183"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40349-1_4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.23919\/ECC.2001.7075920"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IV47402.2020.9304808"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2016.7795600"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2017.7927214"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/navi.65"},{"key":"ref37","first-page":"1527","article-title":"All your GPS are belong to us: Towards stealthy manipulation of road navigation systems","author":"zeng","year":"2018","journal-title":"Proc 27th USENIX Secur Symp (USENIX Security)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3451039"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/AUV.2010.5779659"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2015.7152425"},{"journal-title":"Uniform Provisions Concerning the Approval of Vehicles With Regards to Software Update and Software Updates Management System","year":"2021","key":"ref74"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/RAST.2013.6581320"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1177\/1548512915575803"},{"key":"ref2","first-page":"881","article-title":"Rocking drones with intentional sound noise on gyroscopic sensors","author":"son","year":"2015","journal-title":"Proc 24th USENIX Secur Symp (USENIX Security)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00001"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973753"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3319719"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2016.7502663"},{"key":"ref70","first-page":"392","article-title":"Galileo commercial service from the early definition to the early proof-of-concept","author":"calle","year":"2014","journal-title":"Proc 27th Int Tech Meeting Satell Division Inst Navigat (ION GNSS)"},{"journal-title":"Uniform provisions concerning the approval of vehicles with regards to cyber security and cyber security management system","year":"2021","key":"ref73"},{"journal-title":"Road vehicles&#x2014;Cybersecurity engineering","first-page":"81","year":"2021","key":"ref72"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1600073WC"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.23919\/ENC48637.2020.9317336"},{"key":"ref23","first-page":"1","article-title":"Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing","author":"humphreys","year":"2012"},{"key":"ref67","first-page":"2828","article-title":"Securing GNSS: An end-to-end feasibility analysis for the Galileo open-service","author":"curran","year":"2014","journal-title":"Proc 27th Int Tech Meeting Satell Division Inst Navigat (ION GNSS)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/VLSID.2018.97"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21513"},{"key":"ref69","first-page":"39","article-title":"The Galileo commercial service: Current status and prospects","author":"fern\u00e1ndez-hern\u00e1ndez","year":"2014","journal-title":"Proc Eur Navigat Conf"},{"key":"ref20","first-page":"1","article-title":"Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study","volume":"10","author":"rouf","year":"2010","journal-title":"Proc Usenix Secur Symp"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CIST.2016.7805006"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54737-9_66"},{"key":"ref22","first-page":"2608","article-title":"Characterization of receiver response to a spoofing attacks","author":"shepard","year":"2011","journal-title":"Proc 24th Int Tech Meeting Satell Division Inst Navigat (ION GNSS)"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1002\/navi.125"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046719"},{"key":"ref65","first-page":"81","article-title":"A review of security threats of unmanned aerial vehicles and mitigation steps","volume":"6","author":"sathyamoorthy","year":"2015","journal-title":"J Defence Security"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CGNCC.2016.7828918"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664257"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2008.4526556"},{"key":"ref60","first-page":"2314","article-title":"Assessing the spoofing threat: Development of a portable GPS civilian spoofer","author":"humphreys","year":"2008","journal-title":"Proc 21st Int Tech Meeting Satell Division Inst Navigat (ION GNSS)"},{"key":"ref62","first-page":"6097","article-title":"Detection of GPS spoofing based on UAV model estimation","author":"zou","year":"2016","journal-title":"Proc IEEE Ind Electron Soc Annu Conf (IECON)"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357656"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979\/10175858\/10102701.pdf?arnumber=10102701","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T17:41:08Z","timestamp":1690825268000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10102701\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":74,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tits.2023.3264453","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"type":"print","value":"1524-9050"},{"type":"electronic","value":"1558-0016"}],"subject":[],"published":{"date-parts":[[2023,7]]}}}