{"id":"https://openalex.org/W2819211778","doi":"https://doi.org/10.1109/infcomw.2018.8406976","title":"Traffic-driven intrusion detection for massive MTC towards 5G networks","display_name":"Traffic-driven intrusion detection for massive MTC towards 5G networks","publication_year":2018,"publication_date":"2018-04-01","ids":{"openalex":"https://openalex.org/W2819211778","doi":"https://doi.org/10.1109/infcomw.2018.8406976","mag":"2819211778"},"language":"en","primary_location":{"id":"doi:10.1109/infcomw.2018.8406976","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcomw.2018.8406976","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016391927","display_name":"Nan Lu","orcid":"https://orcid.org/0000-0003-2818-2355"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Nan Lu","raw_affiliation_strings":["Department of Information and Communications Engineering, Xi'an Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communications Engineering, Xi'an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054096196","display_name":"Qinghe Du","orcid":"https://orcid.org/0000-0002-4992-9166"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinghe Du","raw_affiliation_strings":["Department of Information and Communications Engineering, Xi'an Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communications Engineering, Xi'an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100318682","display_name":"Li Sun","orcid":"https://orcid.org/0000-0002-9471-0235"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li Sun","raw_affiliation_strings":["National Simulation Education Center for Communications and Information Systems, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"National Simulation Education Center for Communications and Information Systems, Shaanxi, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060549116","display_name":"Pinyi Ren","orcid":"https://orcid.org/0000-0002-0147-3673"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Pinyi Ren","raw_affiliation_strings":["National Simulation Education Center for Communications and Information Systems, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"National Simulation Education Center for Communications and Information Systems, Shaanxi, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5016391927"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.3863,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.62511919,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2018","issue":null,"first_page":"426","last_page":"431"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8352842330932617},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6563550233840942},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6302769780158997},{"id":"https://openalex.org/keywords/low-latency","display_name":"Low latency (capital markets)","score":0.5311284065246582},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5049191117286682},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4795762896537781},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.45218297839164734},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4162081778049469},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4117630422115326},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3512413203716278},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3243511915206909},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08217701315879822}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8352842330932617},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6563550233840942},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6302769780158997},{"id":"https://openalex.org/C46637626","wikidata":"https://www.wikidata.org/wiki/Q6693015","display_name":"Low latency (capital markets)","level":2,"score":0.5311284065246582},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5049191117286682},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4795762896537781},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.45218297839164734},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4162081778049469},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4117630422115326},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3512413203716278},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3243511915206909},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08217701315879822},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infcomw.2018.8406976","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infcomw.2018.8406976","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1520886658","https://openalex.org/W1579369571","https://openalex.org/W1585896951","https://openalex.org/W1587327301","https://openalex.org/W1981853451","https://openalex.org/W2093862750","https://openalex.org/W2207495662","https://openalex.org/W2342932645","https://openalex.org/W2345131788","https://openalex.org/W2508317201","https://openalex.org/W2581087633","https://openalex.org/W2785942601","https://openalex.org/W2951269911","https://openalex.org/W6635032958"],"related_works":["https://openalex.org/W2061466315","https://openalex.org/W2376886931","https://openalex.org/W1992118813","https://openalex.org/W2010561419","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W1977863481","https://openalex.org/W2384741105","https://openalex.org/W3157271777","https://openalex.org/W2377372927"],"abstract_inverted_index":{"Massive":[0],"machine":[1],"type":[2],"communications":[3],"(MTC)":[4],"have":[5,59],"been":[6,60],"proposed":[7],"to":[8,33,165],"be":[9],"one":[10],"of":[11,22,75,108,117,134,142,191],"the":[12,20,34,39,51,63,73,105,115,132,179,186,192,195,200],"major":[13],"scenarios":[14],"in":[15,189],"5G":[16],"networks,":[17],"which":[18,135],"play":[19],"role":[21],"supporting":[23],"future":[24],"IoT":[25],"towards":[26],"ubiquitous":[27],"information":[28],"acquisition":[29],"and":[30,67,80,92,94,113,150],"exchange.":[31],"Due":[32],"requirement":[35,40],"on":[36,41,86,147],"low-cost":[37],"devices,":[38],"anti-intrusion":[42],"security":[43,53,56,83],"calls":[44],"for":[45,120],"dedicated":[46],"research":[47],"efforts.":[48],"To":[49],"meet":[50],"MTC":[52,122],"requirements,":[54],"some":[55],"enhancement":[57],"techniques":[58],"proposed,":[61],"i.e.,":[62],"evolved":[64],"packet":[65],"system-authentication":[66],"key":[68],"agreement":[69],"(EPS-AKA).":[70],"However,":[71],"with":[72,182],"growth":[74],"malicious":[76],"devices's":[77],"computing":[78],"capability":[79],"attack":[81],"ability,":[82],"protocol":[84],"applied":[85],"high":[87,183],"layer":[88],"faces":[89],"more":[90],"threats":[91],"challenges,":[93],"even":[95],"become":[96],"much":[97],"less":[98],"effective.":[99],"In":[100],"this":[101],"paper,":[102],"we":[103,125],"take":[104],"essential":[106],"nature":[107],"traffic":[109,143],"characteristics":[110],"into":[111],"consideration":[112],"establish":[114],"framework":[116],"intrusion":[118,129],"detection":[119,130,196,201],"massive":[121],"networks.":[123],"Then,":[124],"propose":[126],"a":[127],"traffic-driven":[128],"scheme,":[131],"innovations":[133],"contain":[136],"two":[137],"folds:":[138],"1)":[139],"effective":[140],"estimation":[141],"arrival":[144,180],"process":[145,181],"based":[146],"Markovian":[148],"chain":[149],"air-interface":[151],"access":[152],"statuses;":[153],"2)":[154],"low-latency":[155],"yet":[156],"accurate":[157],"decision":[158],"criterion.":[159],"We":[160],"also":[161,199],"conduct":[162],"abundant":[163],"simulations":[164],"evaluate":[166],"our":[167,174],"scheme's":[168],"performances.":[169],"Simulation":[170],"results":[171],"demonstrate":[172],"that":[173],"scheme":[175],"can":[176],"well":[177],"track":[178],"accuracy,":[184],"outperforming":[185],"baseline":[187],"schemes":[188],"terms":[190],"not":[193],"only":[194],"probability":[197],"but":[198],"time.":[202]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
