{"id":"https://openalex.org/W4391341354","doi":"https://doi.org/10.1109/access.2024.3359680","title":"A Replay Attack Against ISAC Based on OFDM","display_name":"A Replay Attack Against ISAC Based on OFDM","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4391341354","doi":"https://doi.org/10.1109/access.2024.3359680"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3359680","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3359680","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10416823.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10416823.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059473832","display_name":"Georgios Chrysanidis","orcid":"https://orcid.org/0009-0000-4113-7976"},"institutions":[{"id":"https://openalex.org/I145722265","display_name":"University of Thessaly","ror":"https://ror.org/04v4g9h31","country_code":"GR","type":"education","lineage":["https://openalex.org/I145722265"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Georgios Chrysanidis","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Thessaly, Volos, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Thessaly, Volos, Greece","institution_ids":["https://openalex.org/I145722265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100720129","display_name":"Yanwei Liu","orcid":"https://orcid.org/0000-0002-0626-1901"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanwei Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008803219","display_name":"Antonios Argyriou","orcid":"https://orcid.org/0000-0002-2510-3124"},"institutions":[{"id":"https://openalex.org/I145722265","display_name":"University of Thessaly","ror":"https://ror.org/04v4g9h31","country_code":"GR","type":"education","lineage":["https://openalex.org/I145722265"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Antonios Argyriou","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Thessaly, Volos, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Thessaly, Volos, Greece","institution_ids":["https://openalex.org/I145722265"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5059473832"],"corresponding_institution_ids":["https://openalex.org/I145722265"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":6.0384,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.95231596,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"12","issue":null,"first_page":"20998","last_page":"21003"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10891","display_name":"Radar Systems and Signal Processing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10891","display_name":"Radar Systems and Signal Processing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/orthogonal-frequency-division-multiplexing","display_name":"Orthogonal frequency-division multiplexing","score":0.9186272621154785},{"id":"https://openalex.org/keywords/preamble","display_name":"Preamble","score":0.8593026995658875},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7869714498519897},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6399272680282593},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.507817804813385},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4677942395210266},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.46390554308891296},{"id":"https://openalex.org/keywords/radar","display_name":"Radar","score":0.41891002655029297},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3342738151550293},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.33228862285614014},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3008948266506195},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.08810442686080933}],"concepts":[{"id":"https://openalex.org/C40409654","wikidata":"https://www.wikidata.org/wiki/Q375889","display_name":"Orthogonal frequency-division multiplexing","level":3,"score":0.9186272621154785},{"id":"https://openalex.org/C2780691134","wikidata":"https://www.wikidata.org/wiki/Q1129448","display_name":"Preamble","level":3,"score":0.8593026995658875},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7869714498519897},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6399272680282593},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.507817804813385},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4677942395210266},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.46390554308891296},{"id":"https://openalex.org/C554190296","wikidata":"https://www.wikidata.org/wiki/Q47528","display_name":"Radar","level":2,"score":0.41891002655029297},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3342738151550293},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.33228862285614014},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3008948266506195},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.08810442686080933},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3359680","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3359680","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10416823.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c4ceec25e3bf4ae2ab1c8e831eb16d2a","is_oa":true,"landing_page_url":"https://doaj.org/article/c4ceec25e3bf4ae2ab1c8e831eb16d2a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 20998-21003 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3359680","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2024.3359680","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10416823.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320318628","display_name":"Hellenic Academic Libraries Link","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4391341354.pdf","grobid_xml":"https://content.openalex.org/works/W4391341354.grobid-xml"},"referenced_works_count":18,"referenced_works":["https://openalex.org/W595851582","https://openalex.org/W1983301216","https://openalex.org/W2096985797","https://openalex.org/W2143332543","https://openalex.org/W2590141315","https://openalex.org/W2791688381","https://openalex.org/W2803807991","https://openalex.org/W2889158043","https://openalex.org/W2904052998","https://openalex.org/W3092213674","https://openalex.org/W3112914885","https://openalex.org/W3211270128","https://openalex.org/W3216480070","https://openalex.org/W4221160259","https://openalex.org/W4225386312","https://openalex.org/W4375798908","https://openalex.org/W4381745395","https://openalex.org/W6756913404"],"related_works":["https://openalex.org/W2104421608","https://openalex.org/W2037642822","https://openalex.org/W2120825387","https://openalex.org/W2133436142","https://openalex.org/W2048138943","https://openalex.org/W2056657278","https://openalex.org/W2794664665","https://openalex.org/W3007059209","https://openalex.org/W4220832730","https://openalex.org/W1688416049"],"abstract_inverted_index":{"This":[0,75],"paper":[1],"presents":[2],"a":[3,59,126,149],"replay":[4],"attack":[5,30,105],"that":[6,17,38,64,133],"can":[7,138],"compromise":[8],"the":[9,42,45,51,73,78,81,92,96,101,108],"functionality":[10],"of":[11,72,80,103,115,148],"joint":[12],"radar":[13],"communication":[14],"(JRC)":[15],"systems":[16],"use":[18],"orthogonal":[19],"frequency":[20,60],"division":[21],"multiplexing":[22],"(OFDM)":[23],"by":[24],"creating":[25],"ghost":[26,89],"target":[27],"signatures.":[28],"The":[29],"is":[31],"particularly":[32],"dangerous":[33],"in":[34,91,125],"connected":[35],"autonomous":[36,150],"vehicles":[37],"deploy":[39],"JRC.":[40],"When":[41],"attacker":[43],"detects":[44],"OFDM":[46,70,82,118,137],"JRC":[47,97,119,134],"transmission":[48],"it":[49,143],"retransmits":[50],"same":[52],"frame":[53],"(preamble":[54],"and":[55,61,68,86,121,142],"data)":[56],"but":[57],"with":[58],"phase":[62],"shift":[63],"varies":[65],"across":[66],"subcarriers":[67],"successive":[69],"symbols":[71],"preamble.":[74],"technique":[76],"exploits":[77],"operation":[79],"RADAR":[83],"receiver":[84],"algorithm":[85],"generates":[87],"additional":[88],"targets":[90],"Range-Doppler":[93,109],"response":[94,110],"at":[95],"system.":[98,129],"To":[99],"evaluate":[100],"impact":[102],"this":[104],"we":[106],"calculate":[107],"for":[111],"different":[112,122],"system":[113,120,152],"configurations":[114],"an":[116],"802.11-based":[117],"spoofing":[123],"strategies":[124],"representative":[127],"vehicular":[128,151],"Our":[130],"results":[131],"show":[132],"based":[135],"on":[136],"easily":[139],"be":[140],"spoofed":[141],"may":[144],"lead":[145],"to":[146,153],"inability":[147],"operate":[154],"safely.":[155]},"counts_by_year":[{"year":2025,"cited_by_count":8}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
