{"id":"https://openalex.org/W7091268700","doi":"https://doi.org/10.1109/cns66487.2025.11195027","title":"Securing OFDM-Based ISAC Systems Against Sensing Attacks","display_name":"Securing OFDM-Based ISAC Systems Against Sensing Attacks","publication_year":2025,"publication_date":"2025-09-08","ids":{"openalex":"https://openalex.org/W7091268700","doi":"https://doi.org/10.1109/cns66487.2025.11195027"},"language":"en","primary_location":{"id":"doi:10.1109/cns66487.2025.11195027","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns66487.2025.11195027","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jingcheng Li","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jingcheng Li","raw_affiliation_strings":["University of Arizona,Department of Electrical and Computer Engineering"],"affiliations":[{"raw_affiliation_string":"University of Arizona,Department of Electrical and Computer Engineering","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Loukas Lazos","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Loukas Lazos","raw_affiliation_strings":["University of Arizona,Department of Electrical and Computer Engineering"],"affiliations":[{"raw_affiliation_string":"University of Arizona,Department of Electrical and Computer Engineering","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":null,"display_name":"Ming Li","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ming Li","raw_affiliation_strings":["University of Arizona,Department of Electrical and Computer Engineering"],"affiliations":[{"raw_affiliation_string":"University of Arizona,Department of Electrical and Computer Engineering","institution_ids":["https://openalex.org/I138006243"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I138006243"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.54710411,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12566","display_name":"Nitrogen and Sulfur Effects on Brassica","score":0.7023000121116638,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T12566","display_name":"Nitrogen and Sulfur Effects on Brassica","score":0.7023000121116638,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T12113","display_name":"Growth and nutrition in plants","score":0.040800001472234726,"subfield":{"id":"https://openalex.org/subfields/1110","display_name":"Plant Science"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T12407","display_name":"Plant Growth Enhancement Techniques","score":0.039500001817941666,"subfield":{"id":"https://openalex.org/subfields/1110","display_name":"Plant Science"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7821000218391418},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6116999983787537},{"id":"https://openalex.org/keywords/orthogonal-frequency-division-multiplexing","display_name":"Orthogonal frequency-division multiplexing","score":0.5509999990463257},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45719999074935913},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.42820000648498535},{"id":"https://openalex.org/keywords/waveform","display_name":"Waveform","score":0.37389999628067017}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7821000218391418},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7171000242233276},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6116999983787537},{"id":"https://openalex.org/C40409654","wikidata":"https://www.wikidata.org/wiki/Q375889","display_name":"Orthogonal frequency-division multiplexing","level":3,"score":0.5509999990463257},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45719999074935913},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.42820000648498535},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40959998965263367},{"id":"https://openalex.org/C197424946","wikidata":"https://www.wikidata.org/wiki/Q1165717","display_name":"Waveform","level":3,"score":0.37389999628067017},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.36559998989105225},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.36489999294281006},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.3465000092983246},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3287000060081482},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2874000072479248},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.27900001406669617},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.27399998903274536},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2612999975681305},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.259799987077713},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2531000077724457}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns66487.2025.11195027","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns66487.2025.11195027","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1969991351","https://openalex.org/W2590141315","https://openalex.org/W2769776241","https://openalex.org/W2963638596","https://openalex.org/W2974511635","https://openalex.org/W2989375160","https://openalex.org/W3024101484","https://openalex.org/W3155535021","https://openalex.org/W4223477331","https://openalex.org/W4225716276","https://openalex.org/W4289713099","https://openalex.org/W4312466007","https://openalex.org/W4379983385","https://openalex.org/W4381745362","https://openalex.org/W4381745395","https://openalex.org/W4386133990","https://openalex.org/W4391341354","https://openalex.org/W4392904908","https://openalex.org/W4401357255","https://openalex.org/W4401990779","https://openalex.org/W4403183475","https://openalex.org/W4406158128"],"related_works":[],"abstract_inverted_index":{"Integrated":[0],"communications":[1],"and":[2,23,74,85,142,156,177],"sensing":[3,31,37,46,61,79,112,175],"(ISAC)":[4],"has":[5],"emerged":[6],"as":[7,39],"a":[8,127,163],"core":[9],"capability":[10],"in":[11,19,48,162],"next-generation":[12],"wireless":[13],"networks":[14],"(NextG),":[15],"providing":[16],"numerous":[17],"advantages":[18],"spectral":[20],"efficiency,":[21],"performance,":[22],"hardware":[24],"cost.":[25],"However,":[26],"using":[27],"communication":[28],"waveforms":[29,41],"for":[30],"leaves":[32],"ISAC":[33,58,172],"systems":[34,59],"vulnerable":[35,81],"to":[36,68,82,125],"attacks,":[38,113,176],"such":[40],"are":[42,99,147],"not":[43],"designed":[44],"with":[45,149],"security":[47,56,135,155],"mind.":[49],"In":[50],"this":[51],"paper,":[52],"we":[53,114],"investigate":[54],"the":[55,91,94,104,121,134,137,154,171,174,178],"of":[57,93,107,136,159],"against":[60],"attacks.":[62],"We":[63,72,132,152],"focus":[64],"on":[65],"OFDM":[66,108],"due":[67],"its":[69],"widespread":[70],"adoption.":[71],"theoretically":[73],"experimentally":[75],"demonstrate":[76,143],"that":[77,88,119,144],"OFDM-based":[78],"is":[80],"target":[83,129],"spoofing":[84],"elimination":[86],"attacks":[87,98],"can":[89],"alter":[90],"perception":[92],"physical":[95],"environment.":[96],"Such":[97],"launched":[100],"online":[101,145],"by":[102,169],"exploiting":[103],"known":[105],"structure":[106],"waveforms.":[109],"To":[110],"counter":[111],"design":[115],"waveform":[116],"randomization":[117],"methods":[118,161],"exploit":[120],"flexible":[122],"5G/NextG":[123],"numerology":[124],"implement":[126],"moving":[128],"defense":[130],"strategy.":[131],"analyze":[133],"proposed":[138,179],"attack":[139],"detection":[140],"method":[141],"attackers":[146],"detected":[148],"high":[150],"probability.":[151],"validate":[153],"communication/sensing":[157],"performance":[158],"our":[160],"28":[164],"GHz":[165],"mm":[166],"Wave":[167],"testbed":[168],"implementing":[170],"functionality,":[173],"countermeasures.":[180]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-16T00:00:00"}
