{"id":"https://openalex.org/W3025821080","doi":"https://doi.org/10.1109/drcn48652.2020.1570610618","title":"Formal Modeling and Analysis of Multi-Rogue Backoff Manipulation Attacks in Unlicensed Networks","display_name":"Formal Modeling and Analysis of Multi-Rogue Backoff Manipulation Attacks in Unlicensed Networks","publication_year":2020,"publication_date":"2020-03-01","ids":{"openalex":"https://openalex.org/W3025821080","doi":"https://doi.org/10.1109/drcn48652.2020.1570610618","mag":"3025821080"},"language":"en","primary_location":{"id":"doi:10.1109/drcn48652.2020.1570610618","is_oa":false,"landing_page_url":"https://doi.org/10.1109/drcn48652.2020.1570610618","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003613223","display_name":"Jordi Navarrette","orcid":null},"institutions":[{"id":"https://openalex.org/I174216632","display_name":"City University of New York","ror":"https://ror.org/00453a208","country_code":"US","type":"education","lineage":["https://openalex.org/I174216632"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jordi Navarrette","raw_affiliation_strings":["City University of New York"],"affiliations":[{"raw_affiliation_string":"City University of New York","institution_ids":["https://openalex.org/I174216632"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071314730","display_name":"Subash Shankar","orcid":null},"institutions":[{"id":"https://openalex.org/I174216632","display_name":"City University of New York","ror":"https://ror.org/00453a208","country_code":"US","type":"education","lineage":["https://openalex.org/I174216632"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Subash Shankar","raw_affiliation_strings":["City University of New York"],"affiliations":[{"raw_affiliation_string":"City University of New York","institution_ids":["https://openalex.org/I174216632"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100718556","display_name":"Xiaojie Zhang","orcid":"https://orcid.org/0009-0005-6576-1876"},"institutions":[{"id":"https://openalex.org/I174216632","display_name":"City University of New York","ror":"https://ror.org/00453a208","country_code":"US","type":"education","lineage":["https://openalex.org/I174216632"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojie Zhang","raw_affiliation_strings":["City University of New York"],"affiliations":[{"raw_affiliation_string":"City University of New York","institution_ids":["https://openalex.org/I174216632"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015917097","display_name":"Saptarshi Debroy","orcid":"https://orcid.org/0000-0002-4783-119X"},"institutions":[{"id":"https://openalex.org/I174216632","display_name":"City University of New York","ror":"https://ror.org/00453a208","country_code":"US","type":"education","lineage":["https://openalex.org/I174216632"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Saptarshi Debroy","raw_affiliation_strings":["City University of New York"],"affiliations":[{"raw_affiliation_string":"City University of New York","institution_ids":["https://openalex.org/I174216632"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5003613223"],"corresponding_institution_ids":["https://openalex.org/I174216632"],"apc_list":null,"apc_paid":null,"fwci":0.1542,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.49712972,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"15","issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7526057362556458},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6891442537307739},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5410100817680359},{"id":"https://openalex.org/keywords/timer","display_name":"Timer","score":0.4614490568637848},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.4129943251609802},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36346927285194397},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.30978846549987793},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.18204021453857422}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7526057362556458},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6891442537307739},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5410100817680359},{"id":"https://openalex.org/C2776633867","wikidata":"https://www.wikidata.org/wiki/Q186612","display_name":"Timer","level":3,"score":0.4614490568637848},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.4129943251609802},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36346927285194397},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.30978846549987793},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.18204021453857422},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/drcn48652.2020.1570610618","is_oa":false,"landing_page_url":"https://doi.org/10.1109/drcn48652.2020.1570610618","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 16th International Conference on the Design of Reliable Communication Networks DRCN 2020","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1526747343","https://openalex.org/W1603153151","https://openalex.org/W1862398452","https://openalex.org/W1969391580","https://openalex.org/W2003774202","https://openalex.org/W2062187478","https://openalex.org/W2080233827","https://openalex.org/W2089719995","https://openalex.org/W2114543235","https://openalex.org/W2137013587","https://openalex.org/W2143281937","https://openalex.org/W2144284297","https://openalex.org/W2144369278","https://openalex.org/W2150189860","https://openalex.org/W2156787055","https://openalex.org/W2342915358","https://openalex.org/W2613915375","https://openalex.org/W2740090334","https://openalex.org/W2792816008","https://openalex.org/W2912904668","https://openalex.org/W2918879627","https://openalex.org/W3103242541","https://openalex.org/W6631457543","https://openalex.org/W6697072640"],"related_works":["https://openalex.org/W2356824902","https://openalex.org/W4290792893","https://openalex.org/W2130966263","https://openalex.org/W1972485639","https://openalex.org/W2121898229","https://openalex.org/W2354251926","https://openalex.org/W2065267619","https://openalex.org/W2182802920","https://openalex.org/W4378805844","https://openalex.org/W2805781746"],"abstract_inverted_index":{"Security":[0],"vulnerabilities":[1],"that":[2,139,169],"are":[3],"unique":[4],"to":[5,31,104],"unlicensed":[6],"(secondary)":[7],"networks":[8,61,225],"have":[9],"been":[10],"well":[11],"studied":[12],"in":[13,37,58,72,183],"literature.":[14],"However,":[15],"the":[16,63,98,127,142,147,184,194],"nature":[17],"and":[18,50,96,167,177,226],"impact":[19],"of":[20,52,102,110,134,164,173,181,191,198,203,218,223,229],"traditional":[21],"wireless":[22,60],"network":[23,70,100],"threats,":[24],"such":[25],"as":[26],"backoff":[27,54,137,188],"manipulation":[28,55],"when":[29],"applied":[30],"secondary":[32,59,69,99,107,125,148,224],"networks,":[33],"require":[34],"further":[35],"investigation":[36],"particular":[38,200],"for":[39,120,170,178],"multiple":[40],"rogue":[41,106,201],"station":[42],"scenarios.":[43],"In":[44],"this":[45,211],"paper,":[46],"we":[47],"perform":[48],"modeling":[49],"analysis":[51,155],"multi-rogue":[53],"attack":[56],"strategies":[57],"using":[62,156],"PRISM":[64,73,157],"probabilistic":[65],"model":[66,88,158],"checker.":[67],"Our":[68],"implementation":[71],"includes":[74],"scenarios":[75],"where:":[76],"a)":[77],"sub-band":[78],"(channel)":[79],"occupancy":[80],"by":[81,146],"licensed":[82],"(primary)":[83],"nodes":[84],"follows":[85],"an":[86],"ON-OFF":[87],"with":[89,113],"parameters":[90,166,176],"derived":[91],"from":[92,141,210],"real":[93],"measurement":[94],"data":[95],"b)":[97],"consists":[101],"up":[103],"three":[105],"stations":[108],"out":[109,130],"eight":[111],"total":[112],"all":[114,161],"following":[115],"CSMA/CA":[116],"like":[117],"contention":[118],"process":[119,144],"channel":[121,195],"access.":[122],"Unlike":[123,150],"honest":[124],"stations,":[126],"rogues":[128,182],"carry":[129],"a":[131,136,186,199],"backoff-manipulation":[132],"strategy":[133],"selecting":[135],"timer":[138],"deviates":[140],"backoff-selection":[143],"mandated":[145],"network.":[149],"simulation":[151],"based":[152],"analysis,":[153],"our":[154],"checker":[159],"considers":[160],"possible":[162],"combinations":[163],"system":[165],"proves":[168],"any":[171,179],"set":[172],"primary":[174],"ONOFF":[175],"density":[180],"network,":[185],"fixed":[187],"selection":[189,206],"(instead":[190],"random)":[192],"maximizes":[193],"access":[196,220,232],"probability":[197],"irrespective":[202],"other":[204],"rogues'":[205],"strategy.":[207],"The":[208],"results":[209],"work":[212],"will":[213],"help":[214],"generate":[215],"deeper":[216],"understanding":[217],"medium":[219],"threat":[221],"landscape":[222],"foster":[227],"design":[228],"more":[230],"resilient":[231],"control":[233],"strategies.":[234]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
