{"id":"https://openalex.org/W4200039055","doi":"https://doi.org/10.1109/isplc52837.2021.9628606","title":"Network Attack Analysis of an Indoor Power Line Communication Network","display_name":"Network Attack Analysis of an Indoor Power Line Communication Network","publication_year":2021,"publication_date":"2021-10-26","ids":{"openalex":"https://openalex.org/W4200039055","doi":"https://doi.org/10.1109/isplc52837.2021.9628606"},"language":"en","primary_location":{"id":"doi:10.1109/isplc52837.2021.9628606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isplc52837.2021.9628606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Power Line Communications and its Applications (ISPLC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062504170","display_name":"Emmanuel C. Uwaezuoke","orcid":null},"institutions":[{"id":"https://openalex.org/I24027795","display_name":"University of Johannesburg","ror":"https://ror.org/04z6c2n17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I24027795"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Emmanuel C. Uwaezuoke","raw_affiliation_strings":["Department of Electrical & Electronics Engineering Science, Center for Telecommunications, University of Johannesburg, Johannesburg, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Electronics Engineering Science, Center for Telecommunications, University of Johannesburg, Johannesburg, South Africa","institution_ids":["https://openalex.org/I24027795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036607092","display_name":"Theo G. Swart","orcid":"https://orcid.org/0000-0002-1525-7728"},"institutions":[{"id":"https://openalex.org/I24027795","display_name":"University of Johannesburg","ror":"https://ror.org/04z6c2n17","country_code":"ZA","type":"education","lineage":["https://openalex.org/I24027795"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Theo G. Swart","raw_affiliation_strings":["Department of Electrical & Electronics Engineering Science, Center for Telecommunications, University of Johannesburg, Johannesburg, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Electrical & Electronics Engineering Science, Center for Telecommunications, University of Johannesburg, Johannesburg, South Africa","institution_ids":["https://openalex.org/I24027795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5062504170"],"corresponding_institution_ids":["https://openalex.org/I24027795"],"apc_list":null,"apc_paid":null,"fwci":0.3008,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.57617838,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"96","last_page":"101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12146","display_name":"Power Line Communications and Noise","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12146","display_name":"Power Line Communications and Noise","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7460193634033203},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6742161512374878},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.6563515663146973},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6258915066719055},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5964267253875732},{"id":"https://openalex.org/keywords/power-line-communication","display_name":"Power-line communication","score":0.5531734228134155},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.5186814069747925},{"id":"https://openalex.org/keywords/telecommunications-network","display_name":"Telecommunications network","score":0.48675107955932617},{"id":"https://openalex.org/keywords/networking-hardware","display_name":"Networking hardware","score":0.46433910727500916},{"id":"https://openalex.org/keywords/network-service","display_name":"Network service","score":0.43257057666778564},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.4271068871021271},{"id":"https://openalex.org/keywords/network-management-station","display_name":"Network management station","score":0.42316609621047974},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.2386709749698639},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.17373141646385193},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.08576339483261108},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.08050903677940369}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7460193634033203},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6742161512374878},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.6563515663146973},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6258915066719055},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5964267253875732},{"id":"https://openalex.org/C132885549","wikidata":"https://www.wikidata.org/wiki/Q271870","display_name":"Power-line communication","level":3,"score":0.5531734228134155},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.5186814069747925},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.48675107955932617},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.46433910727500916},{"id":"https://openalex.org/C2779618445","wikidata":"https://www.wikidata.org/wiki/Q1640628","display_name":"Network service","level":2,"score":0.43257057666778564},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.4271068871021271},{"id":"https://openalex.org/C16986412","wikidata":"https://www.wikidata.org/wiki/Q918419","display_name":"Network management station","level":3,"score":0.42316609621047974},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.2386709749698639},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.17373141646385193},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.08576339483261108},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.08050903677940369},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isplc52837.2021.9628606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isplc52837.2021.9628606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Symposium on Power Line Communications and its Applications (ISPLC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6499999761581421,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W628907222","https://openalex.org/W1007263414","https://openalex.org/W2066943848","https://openalex.org/W2123117866","https://openalex.org/W2131249468","https://openalex.org/W2313255739","https://openalex.org/W2324201048","https://openalex.org/W2405436498","https://openalex.org/W2492457451","https://openalex.org/W2681651638","https://openalex.org/W2732256184","https://openalex.org/W2947339731"],"related_works":["https://openalex.org/W4386127589","https://openalex.org/W2382493135","https://openalex.org/W2876187414","https://openalex.org/W2150093579","https://openalex.org/W2240325850","https://openalex.org/W2383838401","https://openalex.org/W2765848315","https://openalex.org/W3216929864","https://openalex.org/W1981297807","https://openalex.org/W1594725821"],"abstract_inverted_index":{"The":[0,153],"use":[1],"of":[2,39,50,76,87,125,143],"network":[3,21,34,52,62,78,82,90,97,131,134,151,172,183],"security":[4,53,135,173,178],"mechanisms":[5],"within":[6,179],"communication":[7,28],"networks,":[8,33],"should":[9],"be":[10,57,100,108,117,138,168],"prioritized":[11],"and":[12,45,72,83,104,123,155,166,175],"considered":[13],"more":[14],"in":[15,158],"a":[16,25,88],"small":[17],"office/home":[18],"office":[19],"(SOHO)":[20],"setup":[22,98],"such":[23,36,64],"as":[24,37,65],"power":[26],"line":[27],"(PLC)":[29],"network.":[30],"In":[31],"PLC":[32,66,89,96,130,150,182],"attacks":[35,41,44,47,79,127,147],"denial":[38],"service":[40],"(DOS),":[42],"phishing":[43],"man-in-the-middle":[46],"are":[48,162],"some":[49,142],"the":[51,74,81,95,121,126,129,144,149],"issues":[54],"yet":[55],"to":[56,119,140,170],"critically":[58],"researched":[59],"on":[60,80,128,148],"SOHO":[61],"setups":[63],"networks.":[67],"Therefore,":[68],"this":[69,159],"paper":[70,161],"describes":[71],"analyzes":[73],"possibility":[75,122],"various":[77,111],"data":[84],"link":[85],"layer":[86],"setup.":[91,132,152,184],"To":[92],"achieve":[93],"this,":[94],"will":[99,107,116,137,167],"assessed":[101],"for":[102,163],"vulnerabilities,":[103],"if":[105],"detected,":[106],"exploited":[109],"using":[110],"attack":[112],"techniques.":[113],"Graphical":[114],"charts":[115],"plotted":[118],"represent":[120],"effect":[124],"Finally,":[133],"solutions":[136,156],"provided":[139],"mitigate":[141],"recorded":[145],"possible":[146],"observations":[154],"presented":[157],"research":[160],"educational":[164],"purposes":[165],"helpful":[169],"subsequent":[171],"researchers":[174],"help":[176],"improve":[177],"an":[180],"indoor":[181]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
