{"id":"https://openalex.org/W4387883784","doi":"https://doi.org/10.1109/iccworkshops57953.2023.10283613","title":"Comparative Study of Machine Learning Techniques for Detecting GPS Spoofing Attacks on Mission Critical Military IoT Devices","display_name":"Comparative Study of Machine Learning Techniques for Detecting GPS Spoofing Attacks on Mission Critical Military IoT Devices","publication_year":2023,"publication_date":"2023-05-28","ids":{"openalex":"https://openalex.org/W4387883784","doi":"https://doi.org/10.1109/iccworkshops57953.2023.10283613"},"language":"en","primary_location":{"id":"doi:10.1109/iccworkshops57953.2023.10283613","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccworkshops57953.2023.10283613","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076112103","display_name":"Hassan El Alami","orcid":"https://orcid.org/0000-0003-1403-5688"},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hassan El Alami","raw_affiliation_strings":["Howard University,Washington, DC,USA","Howard University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"Howard University,Washington, DC,USA","institution_ids":["https://openalex.org/I137853757"]},{"raw_affiliation_string":"Howard University, Washington, DC, USA","institution_ids":["https://openalex.org/I137853757"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112729341","display_name":"Kendal Hall","orcid":null},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kendal Hall","raw_affiliation_strings":["Howard University,Washington, DC,USA","Howard University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"Howard University,Washington, DC,USA","institution_ids":["https://openalex.org/I137853757"]},{"raw_affiliation_string":"Howard University, Washington, DC, USA","institution_ids":["https://openalex.org/I137853757"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046343080","display_name":"Danda B. Rawat","orcid":"https://orcid.org/0000-0003-3638-3464"},"institutions":[{"id":"https://openalex.org/I137853757","display_name":"Howard University","ror":"https://ror.org/05gt1vc06","country_code":"US","type":"education","lineage":["https://openalex.org/I137853757"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Danda B. Rawat","raw_affiliation_strings":["Howard University,Washington, DC,USA","Howard University, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"Howard University,Washington, DC,USA","institution_ids":["https://openalex.org/I137853757"]},{"raw_affiliation_string":"Howard University, Washington, DC, USA","institution_ids":["https://openalex.org/I137853757"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5076112103"],"corresponding_institution_ids":["https://openalex.org/I137853757"],"apc_list":null,"apc_paid":null,"fwci":0.8741,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.79210685,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"512","last_page":"517"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9523000121116638,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9523000121116638,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9368000030517578,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9358999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.9511274099349976},{"id":"https://openalex.org/keywords/global-positioning-system","display_name":"Global Positioning System","score":0.8106294870376587},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7966290712356567},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7151289582252502},{"id":"https://openalex.org/keywords/python","display_name":"Python (programming language)","score":0.6174240708351135},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.48261603713035583},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.423290878534317},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4003724455833435},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34739571809768677},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.33611440658569336},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10597279667854309}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.9511274099349976},{"id":"https://openalex.org/C60229501","wikidata":"https://www.wikidata.org/wiki/Q18822","display_name":"Global Positioning System","level":2,"score":0.8106294870376587},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7966290712356567},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7151289582252502},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.6174240708351135},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.48261603713035583},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.423290878534317},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4003724455833435},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34739571809768677},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.33611440658569336},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10597279667854309},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccworkshops57953.2023.10283613","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccworkshops57953.2023.10283613","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4114661379","display_name":null,"funder_award_id":"W911NF-20-2-0277","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"}],"funders":[{"id":"https://openalex.org/F4320307764","display_name":"Microsoft","ror":"https://ror.org/00d0nc645"},{"id":"https://openalex.org/F4320313488","display_name":"Howard University","ror":"https://ror.org/05gt1vc06"},{"id":"https://openalex.org/F4320338295","display_name":"Army Research Laboratory","ror":"https://ror.org/011hc8f90"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W2018083409","https://openalex.org/W2097275045","https://openalex.org/W2110238111","https://openalex.org/W2184623332","https://openalex.org/W2498770676","https://openalex.org/W2743265561","https://openalex.org/W2896655724","https://openalex.org/W2910371451","https://openalex.org/W2919486271","https://openalex.org/W2955125114","https://openalex.org/W3003774898","https://openalex.org/W3021365829","https://openalex.org/W3096032994","https://openalex.org/W3119367492","https://openalex.org/W3153882221","https://openalex.org/W3160611354","https://openalex.org/W3197053988","https://openalex.org/W3208446707","https://openalex.org/W4226049234","https://openalex.org/W4283214238","https://openalex.org/W4289597961","https://openalex.org/W4309616586","https://openalex.org/W4312583892","https://openalex.org/W4313445295","https://openalex.org/W4313477498","https://openalex.org/W4313638694","https://openalex.org/W4313908985","https://openalex.org/W6686322440","https://openalex.org/W6810809479"],"related_works":["https://openalex.org/W2998478967","https://openalex.org/W2188559950","https://openalex.org/W2989910292","https://openalex.org/W3128793638","https://openalex.org/W2607818178","https://openalex.org/W2123299109","https://openalex.org/W2021230337","https://openalex.org/W3153057489","https://openalex.org/W2895823926","https://openalex.org/W2945504560"],"abstract_inverted_index":{"In":[0],"military":[1,42],"Internet":[2],"of":[3,69,75,91,107],"Things":[4],"(IoT)":[5],"devices,":[6],"which":[7],"rely":[8],"on":[9,30,41,65,98,127],"accurate":[10],"GPS":[11,20,38,52,70],"information":[12],"for":[13,36,123],"navigation,":[14],"communication,":[15],"and":[16,87,94,110,132],"other":[17,100],"critical":[18],"functions,":[19],"spoofing":[21,39,71,125],"has":[22,33],"become":[23],"a":[24,50,66],"growing":[25],"threat.":[26],"A":[27],"method":[28],"based":[29],"artificial":[31],"intelligence":[32],"been":[34],"proposed":[35],"detecting":[37,124],"attacks":[40,126],"IoT":[43,128],"devices.":[44],"Using":[45],"Python":[46],"programming,":[47],"we":[48,114],"built":[49],"synthetic":[51,67,118],"dataset":[53,68],"to":[54],"address":[55],"this":[56],"issue.":[57],"We":[58],"evaluated":[59],"the":[60,99],"selected":[61],"machine":[62],"learning":[63],"models":[64],"attacks.":[72],"The":[73],"results":[74,104],"our":[76],"work":[77],"indicate":[78],"that":[79,117],"LightXGBoost":[80],"outperforms":[81],"traditional":[82],"algorithms,":[83],"such":[84],"as":[85],"SVM":[86],"KNN,":[88],"in":[89,105],"terms":[90,106],"accuracy,":[92],"precision,":[93],"F1":[95],"Score.":[96],"XGBoost,":[97],"hand,":[101],"provides":[102],"good":[103],"detection":[108],"time":[109],"memory":[111],"consumption.":[112],"Additionally,":[113],"have":[115],"demonstrated":[116],"datasets":[119],"can":[120],"be":[121],"useful":[122],"devices":[129],"using":[130],"XGBoost":[131],"LightXGBoost.":[133]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
