{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T14:22:28Z","timestamp":1767968548378,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union's Horizon 2020 research and innovation programme","award":["871249 and 830892"],"award-info":[{"award-number":["871249 and 830892"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,17]]},"DOI":"10.1145\/3465481.3470098","type":"proceedings-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T17:57:21Z","timestamp":1629136641000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Location Security under Reference Signals\u2019 Spoofing Attacks: Threat Model and Bounds"],"prefix":"10.1145","author":[{"given":"Stefania","family":"Bartoletti","sequence":"first","affiliation":[{"name":"National Research Council of Italy, IEIIT-CNR\/CNIT, IT"}]},{"given":"Giuseppe","family":"Bianchi","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Roma \"Tor Vergata\" \/CNIT, IT"}]},{"given":"Danilo","family":"Orlando","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi \"Niccol\u00f2 Cusano\", IT"}]},{"given":"Ivan","family":"Palam\u00e0","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Roma \"Tor Vergata\" \/CNIT, IT"}]},{"given":"Nicola","family":"Blefari-Melazzi","sequence":"additional","affiliation":[{"name":"Universit\u00e0 degli Studi di Roma \"Tor Vergata\" \/CNIT, IT"}]}],"member":"320","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"872","article-title":"Study on positioning use cases","volume":"22","author":"GPP.","year":"2018","unstructured":"3GPP. 2018. Study on positioning use cases. Technical Report (TR) 22.872. 3rd Generation Partnership Project (3GPP). Version 16.1.0.","journal-title":"Technical Report (TR)"},{"key":"e_1_3_2_1_2_1","first-page":"855","article-title":"Study on NR positioning support","volume":"38","author":"GPP.","year":"2019","unstructured":"3GPP. 2019. Study on NR positioning support. Technical Report (TR) 38.855. 3rd Generation Partnership Project (3GPP). Version 16.0.0.","journal-title":"Technical Report (TR)"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486039"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2820039"},{"key":"e_1_3_2_1_5_1","volume-title":"Bounds on Error in Signal Parameter Estimation. 22, 3 (March","author":"Bellini Sandro","year":"1974","unstructured":"Sandro Bellini and Guido Tartara. 1974. Bounds on Error in Signal Parameter Estimation. 22, 3 (March 1974), 340\u2013342."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2905854"},{"key":"e_1_3_2_1_7_1","first-page":"2020","article-title":"Location-based Services Market by Component","author":"Gaul Vishwa","year":"2020","unstructured":"Vishwa Gaul. 2020. Location-based Services Market by Component, Technology, Application and Industry Vertical: Global Opportunity Analysis and Industry Forecast, 2020-2027.","journal-title":"Technology, Application and Industry Vertical: Global Opportunity Analysis and Industry Forecast"},{"key":"e_1_3_2_1_8_1","volume-title":"Localization via Ultra-wideband Radios: A Look at Positioning Aspects for Future Sensor Networks. 22, 4 (July","author":"Gezici Sinan","year":"2005","unstructured":"Sinan Gezici, Zhi Tian, Georgios\u00a0B. Giannakis, Hisashi Kobayashi, Andreas\u00a0F. Molisch, H.\u00a0Vincent Poor, and Zafer Sahinoglu. 2005. Localization via Ultra-wideband Radios: A Look at Positioning Aspects for Future Sensor Networks. 22, 4 (July 2005), 70\u201384."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"F. Gustafsson and F. Gunnarsson. 2005. Mobile positioning using wireless networks: possibilities and fundamental limitations based on available wireless network measurements. 22 4 (July 2005) 41\u201353.","DOI":"10.1109\/MSP.2005.1458284"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi7060199"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Elena\u00a0Simona Lohan Anette Al\u00e9n-Savikko Liang Chen Kimmo J\u00e4rvinen Helena Lepp\u00e4koski Heidi Kuusniemi and P\u00e4ivi Korpisaari. 2018. 5G positioning: security and privacy aspects. A Comprehensive Guide to 5G Security(2018) 281\u2013320.","DOI":"10.1002\/9781119293071.ch13"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800533"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3310194"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"S. Roth S. Tomasin M. Maso and A. Sezgin. 2021. Localization Attack by Precoder Feedback Overhearing in 5G Networks and Countermeasures. IEEE Transactions on Wireless Communications (2021) 1\u20131. https:\/\/doi.org\/10.1109\/TWC.2021.3055851","DOI":"10.1109\/TWC.2021.3055851"},{"key":"e_1_3_2_1_15_1","volume-title":"Wireless Attacks on Aircraft Instrument Landing Systems. In 28th USENIX Security Symposium.","author":"Sathaye Harshad","year":"2019","unstructured":"Harshad Sathaye, Domien Schepers, Aanjhan Ranganathan, and Guevara Noubir. 2019. Wireless Attacks on Aircraft Instrument Landing Systems. In 28th USENIX Security Symposium."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2018.2844553"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3032970.3032983"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"J. Ziv and M. Zakai. 1969. Some Lower Bounds on Signal Parameter Estimation. 15 3 (May 1969) 386\u2013391.","DOI":"10.1109\/TIT.1969.1054301"}],"event":{"name":"ARES 2021: The 16th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2021"},"container-title":["Proceedings of the 16th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3470098","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3465481.3470098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:25Z","timestamp":1750191445000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465481.3470098"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":18,"alternative-id":["10.1145\/3465481.3470098","10.1145\/3465481"],"URL":"https:\/\/doi.org\/10.1145\/3465481.3470098","relation":{},"subject":[],"published":{"date-parts":[[2021,8,17]]},"assertion":[{"value":"2021-08-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}