{"id":"https://openalex.org/W4392158720","doi":"https://doi.org/10.1109/globecom54140.2023.10437837","title":"Preemptive DoS attacks on Time Sensitive Networks","display_name":"Preemptive DoS attacks on Time Sensitive Networks","publication_year":2023,"publication_date":"2023-12-04","ids":{"openalex":"https://openalex.org/W4392158720","doi":"https://doi.org/10.1109/globecom54140.2023.10437837"},"language":"en","primary_location":{"id":"doi:10.1109/globecom54140.2023.10437837","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/globecom54140.2023.10437837","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2023 - 2023 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014520833","display_name":"Nuref\u015fan Sertba\u015f B\u00fclb\u00fcl","orcid":null},"institutions":[{"id":"https://openalex.org/I159176309","display_name":"Universit\u00e4t Hamburg","ror":"https://ror.org/00g30e956","country_code":"DE","type":"education","lineage":["https://openalex.org/I159176309"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Nuref\u015fan Sertba\u015f B\u00fclb\u00fcl","raw_affiliation_strings":["Universit&#x00E4;t Hamburg,Department of Informatics,Germany"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E4;t Hamburg,Department of Informatics,Germany","institution_ids":["https://openalex.org/I159176309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033270363","display_name":"Mathias Fischer","orcid":"https://orcid.org/0000-0002-6254-8288"},"institutions":[{"id":"https://openalex.org/I159176309","display_name":"Universit\u00e4t Hamburg","ror":"https://ror.org/00g30e956","country_code":"DE","type":"education","lineage":["https://openalex.org/I159176309"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Mathias Fischer","raw_affiliation_strings":["Universit&#x00E4;t Hamburg,Department of Informatics,Germany"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E4;t Hamburg,Department of Informatics,Germany","institution_ids":["https://openalex.org/I159176309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5014520833"],"corresponding_institution_ids":["https://openalex.org/I159176309"],"apc_list":null,"apc_paid":null,"fwci":0.4024,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64736766,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"4289","last_page":"4294"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12216","display_name":"Network Time Synchronization Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12216","display_name":"Network Time Synchronization Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13248","display_name":"Healthcare Technology and Patient Monitoring","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/2746","display_name":"Surgery"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6689491271972656},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5456838607788086},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4652232825756073}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6689491271972656},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5456838607788086},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4652232825756073}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/globecom54140.2023.10437837","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/globecom54140.2023.10437837","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2023 - 2023 IEEE Global Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Climate action","id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2077824690","https://openalex.org/W2095708088","https://openalex.org/W2552186203","https://openalex.org/W2727589021","https://openalex.org/W2946499629","https://openalex.org/W2979041243","https://openalex.org/W3017297860","https://openalex.org/W3035396665","https://openalex.org/W3092309335","https://openalex.org/W3121898851","https://openalex.org/W4248902601","https://openalex.org/W4253751631"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Time-sensitive":[0],"networking":[1],"(TSN)":[2],"is":[3,20,144],"a":[4,96,132],"promising":[5],"technology":[6],"for":[7],"real-time":[8],"communication":[9],"in":[10,108,150],"industrial":[11],"and":[12,72,86,111,152],"automotive":[13],"networks.":[14],"One":[15],"of":[16,31,38,46,56,66,82,140],"its":[17],"key":[18],"features":[19],"frame":[21,48],"preemption,":[22],"which":[23,60],"allows":[24],"high-priority":[25,39],"traffic":[26],"to":[27,54,102,122,146,155],"interrupt":[28],"the":[29,36,43,80,104,109,138],"transmission":[30],"low-priority":[32],"traffic,":[33],"thereby":[34],"reducing":[35],"delay":[37],"critical":[40],"traffic.":[41,142],"However,":[42],"deterministic":[44],"nature":[45],"TSN":[47,91,124,141,151],"preemption":[49,105],"also":[50],"makes":[51],"it":[52],"vulnerable":[53],"denial":[55],"service":[57,67],"(DoS)":[58],"attacks,":[59],"can":[61,100,118,135],"severely":[62],"impact":[63,89],"flow":[64],"quality":[65],"(QoS)":[68],"by":[69],"increasing":[70],"delays":[71],"packet":[73],"loss.":[74],"In":[75],"this":[76,120,148],"paper,":[77],"we":[78],"introduce":[79],"concept":[81],"preemptive":[83,157],"DoS":[84,158],"attacks":[85,159],"evaluate":[87],"their":[88],"on":[90],"QoS":[92,139],"performance.":[93],"We":[94],"describe":[95],"strategy":[97],"that":[98,130],"attackers":[99],"use":[101,119],"estimate":[103],"scheme":[106],"configured":[107],"switch":[110],"then":[112],"demonstrate":[113],"how":[114],"an":[115],"active":[116],"attacker":[117,134],"information":[121],"degrade":[123],"QoS.":[125],"Our":[126],"simulation":[127],"results":[128],"indicate":[129],"even":[131],"single":[133],"significantly":[136],"deteriorate":[137],"It":[143],"important":[145],"address":[147],"vulnerability":[149],"develop":[153],"countermeasures":[154],"prevent":[156],"from":[160],"occurring.":[161]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
