{"id":"https://openalex.org/W2972141770","doi":"https://doi.org/10.1109/ccoms.2019.8821711","title":"Vulnerabilities in IoT Devices with Software-Defined Radio","display_name":"Vulnerabilities in IoT Devices with Software-Defined Radio","publication_year":2019,"publication_date":"2019-02-01","ids":{"openalex":"https://openalex.org/W2972141770","doi":"https://doi.org/10.1109/ccoms.2019.8821711","mag":"2972141770"},"language":"en","primary_location":{"id":"doi:10.1109/ccoms.2019.8821711","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccoms.2019.8821711","pdf_url":null,"source":{"id":"https://openalex.org/S4306498485","display_name":"2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024061356","display_name":"Phan Duy Hung","orcid":"https://orcid.org/0000-0002-6033-6484"},"institutions":[{"id":"https://openalex.org/I109689652","display_name":"FPT University","ror":"https://ror.org/03esj4g97","country_code":"VN","type":"education","lineage":["https://openalex.org/I109689652"]}],"countries":["VN"],"is_corresponding":true,"raw_author_name":"Phan Duy Hung","raw_affiliation_strings":["FPT University Hanoi, Vietnam"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"FPT University Hanoi, Vietnam","institution_ids":["https://openalex.org/I109689652"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072661511","display_name":"Bui Trong Vinh","orcid":"https://orcid.org/0000-0001-9247-4737"},"institutions":[{"id":"https://openalex.org/I109689652","display_name":"FPT University","ror":"https://ror.org/03esj4g97","country_code":"VN","type":"education","lineage":["https://openalex.org/I109689652"]}],"countries":["VN"],"is_corresponding":false,"raw_author_name":"Bui Trong Vinh","raw_affiliation_strings":["FPT University Hanoi, Vietnam"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"FPT University Hanoi, Vietnam","institution_ids":["https://openalex.org/I109689652"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5024061356"],"corresponding_institution_ids":["https://openalex.org/I109689652"],"apc_list":null,"apc_paid":null,"fwci":3.4248,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.94329184,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"664","last_page":"668"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12801","display_name":"Bluetooth and Wireless Communication Technologies","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6990281343460083},{"id":"https://openalex.org/keywords/software-defined-radio","display_name":"Software-defined radio","score":0.6700193881988525},{"id":"https://openalex.org/keywords/bluetooth","display_name":"Bluetooth","score":0.6482861042022705},{"id":"https://openalex.org/keywords/universal-software-radio-peripheral","display_name":"Universal Software Radio Peripheral","score":0.5669703483581543},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.562056303024292},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5455928444862366},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5353897213935852},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5023593902587891},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4706527292728424},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4497980773448944},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.4240194857120514},{"id":"https://openalex.org/keywords/frequency-hopping-spread-spectrum","display_name":"Frequency-hopping spread spectrum","score":0.41205018758773804},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3085364103317261}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6990281343460083},{"id":"https://openalex.org/C171115542","wikidata":"https://www.wikidata.org/wiki/Q1331892","display_name":"Software-defined radio","level":2,"score":0.6700193881988525},{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.6482861042022705},{"id":"https://openalex.org/C192220659","wikidata":"https://www.wikidata.org/wiki/Q1245659","display_name":"Universal Software Radio Peripheral","level":3,"score":0.5669703483581543},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.562056303024292},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5455928444862366},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5353897213935852},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5023593902587891},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4706527292728424},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4497980773448944},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.4240194857120514},{"id":"https://openalex.org/C122962297","wikidata":"https://www.wikidata.org/wiki/Q1136013","display_name":"Frequency-hopping spread spectrum","level":2,"score":0.41205018758773804},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3085364103317261},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccoms.2019.8821711","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccoms.2019.8821711","pdf_url":null,"source":{"id":"https://openalex.org/S4306498485","display_name":"2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1984314727","https://openalex.org/W1985062260","https://openalex.org/W2000053617","https://openalex.org/W2040534054","https://openalex.org/W2061326045","https://openalex.org/W2085056026","https://openalex.org/W2768898913","https://openalex.org/W2805207455","https://openalex.org/W2810054921","https://openalex.org/W4236999330"],"related_works":["https://openalex.org/W4251089492","https://openalex.org/W2993899695","https://openalex.org/W2886621694","https://openalex.org/W2540432762","https://openalex.org/W2127011572","https://openalex.org/W1622326982","https://openalex.org/W2354005007","https://openalex.org/W2768292150","https://openalex.org/W208897493","https://openalex.org/W2341878357"],"abstract_inverted_index":{"Advances":[0],"in":[1,111,130,148],"networking":[2],"and":[3,13,32,57,91,143,156],"semiconductor":[4],"technologies,":[5],"along":[6],"with":[7],"the":[8,19,22,39,109,112,122,139,149,154,181],"ever-widening":[9],"grid":[10],"of":[11,21,24,38,42,50,59,74,88,114,162,183],"interconnected":[12],"computationally":[14],"capable":[15],"products":[16],"have":[17,164],"promoted":[18],"development":[20,28],"Internet":[23],"Things":[25],"(IoT).":[26],"This":[27,119,171],"naturally":[29],"poses":[30],"more":[31,33],"complex":[34],"security":[35,110],"challenges.":[36],"One":[37],"key":[40],"attributes":[41],"IoT":[43,131,151],"is":[44,62,67],"that":[45,184],"it":[46],"makes":[47],"heavy":[48],"use":[49],"wireless":[51,150],"communications":[52],"to":[53,64,94,127,167,179],"allow":[54],"for":[55],"mobility":[56],"ease":[58],"installation.":[60],"It":[61],"important":[63],"note":[65],"this":[66],"not":[68],"just":[69],"Wi-Fi,":[70],"but":[71],"all":[72],"manner":[73],"other":[75],"Radio":[76,125],"Frequency":[77],"(RF)":[78],"protocols:":[79],"Bluetooth,":[80],"BTLE,":[81],"ZigBee,":[82],"Z-Wave,":[83],"etc.":[84],"The":[85],"increasing":[86],"ubiquity":[87],"such":[89,169],"devices":[90,132],"networks":[92],"promises":[93],"make":[95],"life":[96],"easier":[97],"(smart":[98],"locks,":[99],"smart":[100,102],"bulb,":[101],"home":[103],"appliances...),":[104],"however":[105],"manufacturers":[106],"often":[107],"overlook":[108],"implementation":[113],"these":[115],"RF":[116,136,145],"communication":[117],"systems.":[118],"paper":[120],"uses":[121],"Software":[123],"Defined":[124],"(SDR)":[126],"study":[128,172],"vulnerabilities":[129],"using":[133],"an":[134,175],"unknown":[135],"protocol":[137],"as":[138],"analyzing":[140],"frequency,":[141],"demodulation":[142],"decoding":[144],"signals":[146],"used":[147],"devices,":[152],"jamming":[153],"target":[155],"replaying":[157],"radio":[158],"packets.":[159],"A":[160],"number":[161],"schemes":[163],"been":[165],"proposed":[166],"mitigate":[168],"attacks.":[170],"also":[173],"provides":[174],"empirical":[176],"environment":[177],"sufficient":[178],"prove":[180],"exploit":[182],"vulnerabilities.":[185]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4}],"updated_date":"2026-05-05T08:41:31.759640","created_date":"2025-10-10T00:00:00"}
