{"id":"https://openalex.org/W2919917402","doi":"https://doi.org/10.1109/infocom.2019.8737567","title":"Nascent: Tackling Caller-ID Spoofing in 4G Networks via Efficient Network-Assisted Validation","display_name":"Nascent: Tackling Caller-ID Spoofing in 4G Networks via Efficient Network-Assisted Validation","publication_year":2019,"publication_date":"2019-04-01","ids":{"openalex":"https://openalex.org/W2919917402","doi":"https://doi.org/10.1109/infocom.2019.8737567","mag":"2919917402"},"language":"en","primary_location":{"id":"doi:10.1109/infocom.2019.8737567","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2019.8737567","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046302331","display_name":"Amit Sheoran","orcid":"https://orcid.org/0000-0001-9194-6376"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Amit Sheoran","raw_affiliation_strings":["Department of Computer Science, Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014376333","display_name":"Sonia Fahmy","orcid":"https://orcid.org/0000-0003-2870-7166"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sonia Fahmy","raw_affiliation_strings":["Department of Computer Science, Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059605898","display_name":"Chunyi Peng","orcid":"https://orcid.org/0000-0003-2945-4981"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chunyi Peng","raw_affiliation_strings":["Department of Computer Science, Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052007552","display_name":"Navin Modi","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Navin Modi","raw_affiliation_strings":["Department of Computer Science, Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046302331"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.28,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.63484517,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"676","last_page":"684"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.9041985273361206},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8381707668304443},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.687041163444519},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5962104797363281},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5352950692176819},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.517581582069397},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.42471814155578613},{"id":"https://openalex.org/keywords/voice-over-ip","display_name":"Voice over IP","score":0.42455852031707764},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4191194176673889},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34546661376953125},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1524893045425415},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.11519983410835266},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.08697563409805298}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.9041985273361206},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8381707668304443},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.687041163444519},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5962104797363281},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5352950692176819},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.517581582069397},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.42471814155578613},{"id":"https://openalex.org/C171246234","wikidata":"https://www.wikidata.org/wiki/Q81945","display_name":"Voice over IP","level":3,"score":0.42455852031707764},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4191194176673889},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34546661376953125},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1524893045425415},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.11519983410835266},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.08697563409805298},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom.2019.8737567","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2019.8737567","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5899999737739563,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1968072545","https://openalex.org/W1982219705","https://openalex.org/W2010579408","https://openalex.org/W2056270499","https://openalex.org/W2132391275","https://openalex.org/W2159342279","https://openalex.org/W2214189736","https://openalex.org/W2267859501","https://openalex.org/W2275260933","https://openalex.org/W2421166805","https://openalex.org/W2464657188","https://openalex.org/W2602424816","https://openalex.org/W2752511791","https://openalex.org/W2766754441","https://openalex.org/W2896255269","https://openalex.org/W4230379769","https://openalex.org/W6717616333","https://openalex.org/W6744029567"],"related_works":["https://openalex.org/W2188559950","https://openalex.org/W2989910292","https://openalex.org/W2998478967","https://openalex.org/W3128793638","https://openalex.org/W2123299109","https://openalex.org/W2084179496","https://openalex.org/W2021230337","https://openalex.org/W4401097268","https://openalex.org/W4387799680","https://openalex.org/W4308237908"],"abstract_inverted_index":{"Caller-ID":[0],"spoofing":[1,34],"deceives":[2],"the":[3,20,62,98,108,129,137,146,176],"callee":[4],"into":[5],"believing":[6],"a":[7],"call":[8,102,119],"is":[9,35,41,113],"originating":[10],"from":[11],"another":[12],"user.":[13],"Spoofing":[14],"has":[15],"been":[16],"strategically":[17],"used":[18,100],"in":[19,42,61,159],"now-pervasive":[21],"telephone":[22],"fraud,":[23],"causing":[24],"substantial":[25],"monetary":[26],"loss":[27],"and":[28,54,72,118,131,152,161],"sensitive":[29],"data":[30,133],"leakage.":[31],"Unfortunately,":[32],"caller-ID":[33,86,99],"feasible":[36],"even":[37],"when":[38],"user":[39],"authentication":[40,132],"place.":[43],"State-of-the-art":[44],"solutions":[45],"either":[46],"exhibit":[47],"high":[48],"overhead":[49,173],"or":[50],"require":[51],"extensive":[52],"upgrades,":[53],"thus":[55],"are":[56],"unlikely":[57],"to":[58,82,96,145,175],"be":[59],"deployed":[60],"near":[63],"future.":[64],"In":[65],"this":[66],"paper,":[67],"we":[68,89],"seek":[69],"an":[70],"effective":[71],"efficient":[73],"solution":[74],"for":[75],"4G":[76,148],"(and":[77,84],"conceptually":[78],"5G)":[79],"carrier":[80],"networks":[81],"detect":[83],"block)":[85],"spoofing.":[87],"Specifically,":[88],"propose":[90],"Nascent,":[91],"Network-assisted":[92],"caller":[93],"ID":[94],"authentication,":[95],"validate":[97],"during":[101],"setup":[103],"which":[104],"may":[105],"not":[106],"match":[107],"previously-authenticated":[109],"ID.":[110],"Nascent":[111,139,158,170],"functionality":[112],"split":[114],"between":[115,128],"data-plane":[116],"gateways":[117],"control":[120],"session":[121],"functions.":[122],"By":[123],"leveraging":[124],"existing":[125,147],"communication":[126],"interfaces":[127],"two":[130],"already":[134],"available":[135],"at":[136],"gateways,":[138],"only":[140],"requires":[141],"small,":[142],"standard-compatible":[143],"patches":[144],"infrastructure.":[149],"We":[150,167],"prototype":[151],"experimentally":[153],"evaluate":[154],"three":[155],"variants":[156],"of":[157],"traditional":[160],"Network":[162],"Functions":[163],"Virtualization":[164],"(NFV)":[165],"deployments.":[166],"demonstrate":[168],"that":[169],"significantly":[171],"reduces":[172],"compared":[174],"state-of-the-art,":[177],"without":[178],"sacrificing":[179],"effectiveness.":[180]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
