{"id":"https://openalex.org/W4404914800","doi":"https://doi.org/10.1109/apcc62576.2024.10767950","title":"Spoofing Attack Detection Method by Estimating Transmitting Device on 10BASE-T1S","display_name":"Spoofing Attack Detection Method by Estimating Transmitting Device on 10BASE-T1S","publication_year":2024,"publication_date":"2024-11-05","ids":{"openalex":"https://openalex.org/W4404914800","doi":"https://doi.org/10.1109/apcc62576.2024.10767950"},"language":"en","primary_location":{"id":"doi:10.1109/apcc62576.2024.10767950","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apcc62576.2024.10767950","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 29th Asia Pacific Conference on Communications (APCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085299878","display_name":"Kazuki Iehira","orcid":null},"institutions":[{"id":"https://openalex.org/I168356945","display_name":"Kyoto Sangyo University","ror":"https://ror.org/05t70xh16","country_code":"JP","type":"education","lineage":["https://openalex.org/I168356945"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Kazuki Iehira","raw_affiliation_strings":["Kyoto Sangyo University,Division of Frontier Informatics,Kyoto,Japan"],"affiliations":[{"raw_affiliation_string":"Kyoto Sangyo University,Division of Frontier Informatics,Kyoto,Japan","institution_ids":["https://openalex.org/I168356945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014154262","display_name":"Hiroyuki Inoue","orcid":"https://orcid.org/0000-0003-4308-9343"},"institutions":[{"id":"https://openalex.org/I168356945","display_name":"Kyoto Sangyo University","ror":"https://ror.org/05t70xh16","country_code":"JP","type":"education","lineage":["https://openalex.org/I168356945"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroyuki Inoue","raw_affiliation_strings":["Kyoto Sangyo University,Faculty of Information Science and Engineering,Kyoto,Japan"],"affiliations":[{"raw_affiliation_string":"Kyoto Sangyo University,Faculty of Information Science and Engineering,Kyoto,Japan","institution_ids":["https://openalex.org/I168356945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5085299878"],"corresponding_institution_ids":["https://openalex.org/I168356945"],"apc_list":null,"apc_paid":null,"fwci":0.3735,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.60298763,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"511","last_page":"514"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8375999927520752,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8375999927520752,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6475598812103271},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6059452295303345},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18304547667503357}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6475598812103271},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6059452295303345},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18304547667503357}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apcc62576.2024.10767950","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apcc62576.2024.10767950","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 29th Asia Pacific Conference on Communications (APCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2116520617","https://openalex.org/W2545810962","https://openalex.org/W2792310067","https://openalex.org/W3015718279","https://openalex.org/W3127604390","https://openalex.org/W4293057679"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2188559950","https://openalex.org/W2998478967","https://openalex.org/W2989910292","https://openalex.org/W3128793638","https://openalex.org/W2123299109","https://openalex.org/W2021230337","https://openalex.org/W4401097268"],"abstract_inverted_index":{"In":[0,43,117],"recent":[1],"years,":[2],"the":[3,15,32,45,54,67,82,141,146,180,185],"introduction":[4],"of":[5,18,34,70,148,159],"advanced":[6],"driver":[7],"assistance":[8],"systems":[9],"in":[10,168],"automobiles":[11],"has":[12,23,57],"significantly":[13],"increased":[14],"communication":[16,41],"volume":[17],"in-vehicle":[19,71],"networks.":[20,72],"Automotive":[21],"Ethernet":[22,52],"been":[24,58,104],"introduced":[25],"to":[26,80,92],"solve":[27],"this":[28,118],"problem,":[29],"which":[30,48,153],"enabling":[31],"application":[33],"security":[35],"protocols":[36],"and":[37,98,109,188],"providing":[38],"substantial":[39],"high":[40],"capacity.":[42],"particular,":[44],"10BASE-T1S":[46,101,112],"protocol,":[47],"is":[49,113,154],"compatible":[50],"with":[51],"at":[53,66],"MAC":[55],"layer,":[56],"specified":[59],"for":[60,64,111,124],"bus":[61],"networks":[62,130],"designed":[63],"use":[65],"end":[68],"point":[69],"However,":[73],"like":[74],"Ethernet,":[75],"10BASE-T1S,":[76],"lacks":[77],"a":[78,86,114,122,155,169],"mechanism":[79,158],"authenticate":[81],"transmitting":[83,186],"device":[84,187],"as":[85],"standard":[87],"feature,":[88],"making":[89],"it":[90],"vulnerable":[91],"spoofing":[93,126,137,190],"attacks.":[94,191],"Currently,":[95],"threat":[96],"analysis":[97],"countermeasures":[99,110],"against":[100],"have":[102],"not":[103],"reported.":[105],"Therefore,":[106],"studying":[107],"threats":[108],"critical":[115],"task.":[116],"study,":[119],"we":[120],"propose":[121],"method":[123,135,182],"detecting":[125],"attacks":[127,138],"on":[128,145],"busbased":[129],"using":[131,164,174],"10BASE-T1S.":[132,160,175],"The":[133,176],"proposed":[134,181],"detects":[136],"by":[139],"monitoring":[140],"transmission":[142],"timing,":[143],"focusing":[144],"characteristics":[147],"physical-layer":[149],"collision":[150,156],"avoidance":[151,157],"(PLCA),":[152],"Evaluations":[161],"were":[162],"conducted":[163],"reception":[165],"records":[166],"obtained":[167],"minimally":[170],"configured":[171],"actual":[172],"environment":[173],"results":[177],"show":[178],"that":[179],"can":[183],"estimate":[184],"detect":[189]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
