{"id":"https://openalex.org/W2074040836","doi":"https://doi.org/10.1145/2046707.2046719","title":"On the requirements for successful GPS spoofing attacks","display_name":"On the requirements for successful GPS spoofing attacks","publication_year":2011,"publication_date":"2011-10-17","ids":{"openalex":"https://openalex.org/W2074040836","doi":"https://doi.org/10.1145/2046707.2046719","mag":"2074040836"},"language":"en","primary_location":{"id":"doi:10.1145/2046707.2046719","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2046707.2046719","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM conference on Computer and communications security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073540044","display_name":"Nils Ole Tippenhauer","orcid":"https://orcid.org/0000-0001-8424-2602"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Nils Ole Tippenhauer","raw_affiliation_strings":["ETH Zurich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113870699","display_name":"Christina P\u00f6pper","orcid":null},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Christina P\u00f6pper","raw_affiliation_strings":["ETH Zurich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035426350","display_name":"Kasper Rasmussen","orcid":"https://orcid.org/0000-0002-9471-9985"},"institutions":[{"id":"https://openalex.org/I4210137750","display_name":"UC Irvine Health","ror":"https://ror.org/03fgher32","country_code":"US","type":"healthcare","lineage":["https://openalex.org/I4210137750"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kasper Bonne Rasmussen","raw_affiliation_strings":["UCI, Irvine, CA, USA"],"affiliations":[{"raw_affiliation_string":"UCI, Irvine, CA, USA","institution_ids":["https://openalex.org/I4210137750"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077290467","display_name":"Sr\u0111jan \u010capkun","orcid":"https://orcid.org/0000-0001-5727-3673"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Srdjan Capkun","raw_affiliation_strings":["ETH Zurich, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"ETH Zurich, Zurich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073540044"],"corresponding_institution_ids":["https://openalex.org/I35440088"],"apc_list":null,"apc_paid":null,"fwci":12.6873,"has_fulltext":false,"cited_by_count":491,"citation_normalized_percentile":{"value":0.9894599,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"75","last_page":"86"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10655","display_name":"GNSS positioning and interference","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.9614238739013672},{"id":"https://openalex.org/keywords/global-positioning-system","display_name":"Global Positioning System","score":0.8253908157348633},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7388118505477905},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.6509428024291992},{"id":"https://openalex.org/keywords/gps-signals","display_name":"GPS signals","score":0.5299257636070251},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5298623442649841},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.49989748001098633},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.49967455863952637},{"id":"https://openalex.org/keywords/lock","display_name":"Lock (firearm)","score":0.4873245656490326},{"id":"https://openalex.org/keywords/assisted-gps","display_name":"Assisted GPS","score":0.46782273054122925},{"id":"https://openalex.org/keywords/gnss-applications","display_name":"GNSS applications","score":0.4353737235069275},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4338317811489105},{"id":"https://openalex.org/keywords/gps-disciplined-oscillator","display_name":"GPS disciplined oscillator","score":0.41126859188079834},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.36912453174591064},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.24109899997711182},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10676214098930359},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.06940984725952148}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.9614238739013672},{"id":"https://openalex.org/C60229501","wikidata":"https://www.wikidata.org/wiki/Q18822","display_name":"Global Positioning System","level":2,"score":0.8253908157348633},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7388118505477905},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.6509428024291992},{"id":"https://openalex.org/C12957241","wikidata":"https://www.wikidata.org/wiki/Q15903792","display_name":"GPS signals","level":4,"score":0.5299257636070251},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5298623442649841},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.49989748001098633},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.49967455863952637},{"id":"https://openalex.org/C174839445","wikidata":"https://www.wikidata.org/wiki/Q1134386","display_name":"Lock (firearm)","level":2,"score":0.4873245656490326},{"id":"https://openalex.org/C198613851","wikidata":"https://www.wikidata.org/wiki/Q432394","display_name":"Assisted GPS","level":3,"score":0.46782273054122925},{"id":"https://openalex.org/C14279187","wikidata":"https://www.wikidata.org/wiki/Q5514012","display_name":"GNSS applications","level":3,"score":0.4353737235069275},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4338317811489105},{"id":"https://openalex.org/C80624579","wikidata":"https://www.wikidata.org/wiki/Q867290","display_name":"GPS disciplined oscillator","level":5,"score":0.41126859188079834},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36912453174591064},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.24109899997711182},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10676214098930359},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.06940984725952148},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/2046707.2046719","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2046707.2046719","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM conference on Computer and communications security","raw_type":"proceedings-article"},{"id":"pmh:oai:ora.ox.ac.uk:uuid:32ceadd4-cade-4f62-b75f-30d394f4bfc8","is_oa":false,"landing_page_url":"https://ora.ox.ac.uk/objects/uuid:32ceadd4-cade-4f62-b75f-30d394f4bfc8","pdf_url":null,"source":{"id":"https://openalex.org/S4306402636","display_name":"Oxford University Research Archive (ORA) (University of Oxford)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I40120149","host_organization_name":"University of Oxford","host_organization_lineage":["https://openalex.org/I40120149"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Department of Computer Science","raw_type":"Conference item"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5699999928474426}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1533298133","https://openalex.org/W1543653153","https://openalex.org/W1550817798","https://openalex.org/W1684424876","https://openalex.org/W2009950372","https://openalex.org/W2024197819","https://openalex.org/W2029693536","https://openalex.org/W2105044760","https://openalex.org/W2111689038","https://openalex.org/W2127785555","https://openalex.org/W2140266441","https://openalex.org/W2163330330","https://openalex.org/W2260014999","https://openalex.org/W2354005007","https://openalex.org/W2399901560","https://openalex.org/W2545985241","https://openalex.org/W2566510693","https://openalex.org/W2588687753","https://openalex.org/W2965720098"],"related_works":["https://openalex.org/W2598630260","https://openalex.org/W2249797904","https://openalex.org/W4207073992","https://openalex.org/W2185124781","https://openalex.org/W2393491537","https://openalex.org/W1974846654","https://openalex.org/W2611063214","https://openalex.org/W3007717396","https://openalex.org/W3037592474","https://openalex.org/W2955556953"],"abstract_inverted_index":{"An":[0],"increasing":[1],"number":[2,105],"of":[3,62,106,130,143,173,180],"wireless":[4],"applications":[5],"rely":[6],"on":[7,58,158],"GPS":[8,18,30,55,68,161,166],"signals":[9,19,90,153,184],"for":[10,53,101,186],"localization,":[11],"navigation,":[12],"and":[13,60,80,175],"time":[14],"synchronization.":[15],"However,":[16],"civilian":[17,65,165],"are":[20,73],"known":[21],"to":[22,25,87,93,112,121,159],"be":[23,110],"susceptible":[24],"spoofing":[26,56,127,183],"attacks":[27,57],"which":[28,78,82,148],"make":[29],"receivers":[31,107,131],"in":[32,75,91,147],"range":[33],"believe":[34],"that":[35,103],"they":[36],"reside":[37],"at":[38],"locations":[39,79,125],"different":[40],"than":[41],"their":[42,134],"real":[43],"physical":[44],"locations.":[45],"In":[46,70,136],"this":[47],"paper,":[48],"we":[49,72,138,169],"investigate":[50,139],"the":[51,84,96,117,140,177,181],"requirements":[52],"successful":[54],"individuals":[59],"groups":[61],"victims":[63],"with":[64,81],"or":[66],"military":[67],"receivers.":[69,97],"particular,":[71],"interested":[74],"identifying":[76],"from":[77],"precision":[83,179],"attacker":[85,118],"needs":[86],"generate":[88],"its":[89],"order":[92],"successfully":[94],"spoof":[95],"We":[98],"will":[99],"show,":[100],"example,":[102],"any":[104],"can":[108],"easily":[109],"spoofed":[111,152],"one":[113],"arbitrary":[114],"location;":[115],"however,":[116],"is":[119],"restricted":[120],"only":[122],"few":[123],"transmission":[124],"when":[126],"a":[128,144,149,164,171],"group":[129],"while":[132],"preserving":[133],"constellation.":[135],"addition,":[137],"practical":[141],"aspects":[142],"satellite-lock":[145,188],"takeover,":[146],"victim":[150],"receives":[151],"after":[154],"first":[155],"being":[156],"locked":[157],"legitimate":[160],"signals.":[162],"Using":[163],"signal":[167],"generator,":[168],"perform":[170],"set":[172],"experiments":[174],"find":[176],"minimal":[178],"attacker's":[182],"required":[185],"covert":[187],"takeover.":[189]},"counts_by_year":[{"year":2026,"cited_by_count":7},{"year":2025,"cited_by_count":43},{"year":2024,"cited_by_count":36},{"year":2023,"cited_by_count":61},{"year":2022,"cited_by_count":44},{"year":2021,"cited_by_count":44},{"year":2020,"cited_by_count":51},{"year":2019,"cited_by_count":42},{"year":2018,"cited_by_count":45},{"year":2017,"cited_by_count":26},{"year":2016,"cited_by_count":21},{"year":2015,"cited_by_count":24},{"year":2014,"cited_by_count":20},{"year":2013,"cited_by_count":18},{"year":2012,"cited_by_count":9}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
