{"id":"https://openalex.org/W2886087493","doi":"https://doi.org/10.1109/icufn.2018.8436952","title":"Detecting Selfish Backoff Attack in IEEE 802.15.4 CSMA/CA Using Logistic Classification","display_name":"Detecting Selfish Backoff Attack in IEEE 802.15.4 CSMA/CA Using Logistic Classification","publication_year":2018,"publication_date":"2018-07-01","ids":{"openalex":"https://openalex.org/W2886087493","doi":"https://doi.org/10.1109/icufn.2018.8436952","mag":"2886087493"},"language":"en","primary_location":{"id":"doi:10.1109/icufn.2018.8436952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icufn.2018.8436952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103015771","display_name":"Joongheon Kim","orcid":"https://orcid.org/0000-0002-1794-6076"},"institutions":[{"id":"https://openalex.org/I67900169","display_name":"Chung-Ang University","ror":"https://ror.org/01r024a98","country_code":"KR","type":"education","lineage":["https://openalex.org/I67900169"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Joongheon Kim","raw_affiliation_strings":["Chung-Ang University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Chung-Ang University, Seoul, Korea","institution_ids":["https://openalex.org/I67900169"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065924645","display_name":"Kyeong Seon Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I67900169","display_name":"Chung-Ang University","ror":"https://ror.org/01r024a98","country_code":"KR","type":"education","lineage":["https://openalex.org/I67900169"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Kyeong Seon Kim","raw_affiliation_strings":["Chung-Ang University, Seoul, Korea"],"affiliations":[{"raw_affiliation_string":"Chung-Ang University, Seoul, Korea","institution_ids":["https://openalex.org/I67900169"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103015771"],"corresponding_institution_ids":["https://openalex.org/I67900169"],"apc_list":null,"apc_paid":null,"fwci":0.7381,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.744957,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"26","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exponential-backoff","display_name":"Exponential backoff","score":0.9332999587059021},{"id":"https://openalex.org/keywords/carrier-sense-multiple-access-with-collision-avoidance","display_name":"Carrier sense multiple access with collision avoidance","score":0.8081785440444946},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7920360565185547},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7667529582977295},{"id":"https://openalex.org/keywords/distributed-coordination-function","display_name":"Distributed coordination function","score":0.7642760276794434},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.648787796497345},{"id":"https://openalex.org/keywords/ieee-802.15","display_name":"IEEE 802.15","score":0.6220231056213379},{"id":"https://openalex.org/keywords/ieee-802.11","display_name":"IEEE 802.11","score":0.5673224329948425},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5011675357818604},{"id":"https://openalex.org/keywords/inter-access-point-protocol","display_name":"Inter-Access Point Protocol","score":0.463522732257843},{"id":"https://openalex.org/keywords/hidden-node-problem","display_name":"Hidden node problem","score":0.4438391327857971},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.43190592527389526},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.42913639545440674},{"id":"https://openalex.org/keywords/ieee-802.11b-1999","display_name":"IEEE 802.11b-1999","score":0.4196881353855133},{"id":"https://openalex.org/keywords/ieee-802.11s","display_name":"IEEE 802.11s","score":0.4174342751502991},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.32437920570373535},{"id":"https://openalex.org/keywords/wi-fi","display_name":"Wi-Fi","score":0.2571324408054352},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.1995193362236023},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.09529384970664978},{"id":"https://openalex.org/keywords/wi-fi-array","display_name":"Wi-Fi array","score":0.0642559826374054}],"concepts":[{"id":"https://openalex.org/C30777684","wikidata":"https://www.wikidata.org/wiki/Q1417920","display_name":"Exponential backoff","level":4,"score":0.9332999587059021},{"id":"https://openalex.org/C59229178","wikidata":"https://www.wikidata.org/wiki/Q944633","display_name":"Carrier sense multiple access with collision avoidance","level":4,"score":0.8081785440444946},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7920360565185547},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7667529582977295},{"id":"https://openalex.org/C115338102","wikidata":"https://www.wikidata.org/wiki/Q1229557","display_name":"Distributed coordination function","level":5,"score":0.7642760276794434},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.648787796497345},{"id":"https://openalex.org/C2780407094","wikidata":"https://www.wikidata.org/wiki/Q3267095","display_name":"IEEE 802.15","level":3,"score":0.6220231056213379},{"id":"https://openalex.org/C185298936","wikidata":"https://www.wikidata.org/wiki/Q193228","display_name":"IEEE 802.11","level":4,"score":0.5673224329948425},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5011675357818604},{"id":"https://openalex.org/C84035377","wikidata":"https://www.wikidata.org/wiki/Q492197","display_name":"Inter-Access Point Protocol","level":5,"score":0.463522732257843},{"id":"https://openalex.org/C156738730","wikidata":"https://www.wikidata.org/wiki/Q2565413","display_name":"Hidden node problem","level":5,"score":0.4438391327857971},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.43190592527389526},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.42913639545440674},{"id":"https://openalex.org/C52644739","wikidata":"https://www.wikidata.org/wiki/Q2747387","display_name":"IEEE 802.11b-1999","level":5,"score":0.4196881353855133},{"id":"https://openalex.org/C31533079","wikidata":"https://www.wikidata.org/wiki/Q180122","display_name":"IEEE 802.11s","level":5,"score":0.4174342751502991},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.32437920570373535},{"id":"https://openalex.org/C508800617","wikidata":"https://www.wikidata.org/wiki/Q29643","display_name":"Wi-Fi","level":4,"score":0.2571324408054352},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.1995193362236023},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.09529384970664978},{"id":"https://openalex.org/C152153834","wikidata":"https://www.wikidata.org/wiki/Q1339878","display_name":"Wi-Fi array","level":4,"score":0.0642559826374054},{"id":"https://openalex.org/C31548570","wikidata":"https://www.wikidata.org/wiki/Q6453712","display_name":"Wireless mesh network","level":4,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icufn.2018.8436952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icufn.2018.8436952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2034259495","https://openalex.org/W2162598825"],"related_works":["https://openalex.org/W2106968138","https://openalex.org/W1995106787","https://openalex.org/W2054185742","https://openalex.org/W2116222864","https://openalex.org/W2849484697","https://openalex.org/W2085350877","https://openalex.org/W1971851193","https://openalex.org/W2096821430","https://openalex.org/W2006863738","https://openalex.org/W2089127220"],"abstract_inverted_index":{"This":[0,63,75],"paper":[1,76],"discussed":[2],"about":[3],"the":[4,18,53,57,66,78,81,85,89],"detection":[5],"of":[6,70,80],"random":[7],"access":[8,20,30],"attack":[9],"in":[10],"IEEE":[11,16,40,60,72],"802.15.4":[12,41,61,73],"wireless":[13],"networks.":[14],"In":[15],"802.15.4,":[17],"medium":[19],"control":[21],"mechanism":[22],"is":[23],"designed":[24],"based":[25],"on":[26],"carrier":[27],"sensing":[28],"multiple":[29],"with":[31,35],"collision":[32],"avoidance":[33],"(CSMA/CA)":[34],"exponential":[36],"backoff.":[37],"When":[38],"an":[39],"device":[42],"has":[43],"very":[44],"small":[45],"backoff,":[46],"it":[47],"takes":[48],"higher":[49],"priority":[50],"to":[51,56],"get":[52],"channel":[54],"compared":[55],"other":[58],"conventional":[59],"devices.":[62,74],"obviously":[64],"degrades":[65],"network":[67],"throughput":[68],"performance":[69],"normal":[71],"presents":[77],"analysis":[79],"impacts":[82],"and":[83],"proposes":[84],"method":[86],"for":[87],"detecting":[88],"malicious":[90],"selfish":[91],"backoff":[92],"attacker":[93],"via":[94],"logistic":[95],"classification.":[96]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
