{"id":"https://openalex.org/W4385078864","doi":"https://doi.org/10.1109/iwcmc58020.2023.10182412","title":"NFC-IDS: An Intrusion Detection System Based on RF Signals for NFC Security","display_name":"NFC-IDS: An Intrusion Detection System Based on RF Signals for NFC Security","publication_year":2023,"publication_date":"2023-06-19","ids":{"openalex":"https://openalex.org/W4385078864","doi":"https://doi.org/10.1109/iwcmc58020.2023.10182412"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc58020.2023.10182412","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwcmc58020.2023.10182412","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100929897","display_name":"Yuwei Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuwei Yang","raw_affiliation_strings":["Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,Shaanxi,China,710072"],"affiliations":[{"raw_affiliation_string":"Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,Shaanxi,China,710072","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063504839","display_name":"Yijie Xun","orcid":"https://orcid.org/0000-0002-5540-2651"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yijie Xun","raw_affiliation_strings":["Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,Shaanxi,China,710072"],"affiliations":[{"raw_affiliation_string":"Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,Shaanxi,China,710072","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111012663","display_name":"Yumeng Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yumeng Yan","raw_affiliation_strings":["Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,Shaanxi,China,710072"],"affiliations":[{"raw_affiliation_string":"Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,Shaanxi,China,710072","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108050448","display_name":"Jiajia Liu","orcid":"https://orcid.org/0000-0003-4273-8866"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiajia Liu","raw_affiliation_strings":["Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,Shaanxi,China,710072"],"affiliations":[{"raw_affiliation_string":"Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,Shaanxi,China,710072","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113127783","display_name":"Ziteng Jin","orcid":null},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziteng Jin","raw_affiliation_strings":["Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,Shaanxi,China,710072"],"affiliations":[{"raw_affiliation_string":"Northwestern Polytechnical University,School of Cybersecurity,Xi&#x2019;an,Shaanxi,China,710072","institution_ids":["https://openalex.org/I17145004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100929897"],"corresponding_institution_ids":["https://openalex.org/I17145004"],"apc_list":null,"apc_paid":null,"fwci":0.4779,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.66997641,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"12","issue":null,"first_page":"494","last_page":"499"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7295767664909363},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5955067873001099},{"id":"https://openalex.org/keywords/radio-frequency","display_name":"Radio frequency","score":0.4862748384475708},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45045310258865356},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1849987804889679}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7295767664909363},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5955067873001099},{"id":"https://openalex.org/C74064498","wikidata":"https://www.wikidata.org/wiki/Q3396184","display_name":"Radio frequency","level":2,"score":0.4862748384475708},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45045310258865356},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1849987804889679}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc58020.2023.10182412","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/iwcmc58020.2023.10182412","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2101234009","https://openalex.org/W2147063679","https://openalex.org/W2297761255","https://openalex.org/W2332825519","https://openalex.org/W2543174859","https://openalex.org/W2793654063","https://openalex.org/W2991726628","https://openalex.org/W3048190588","https://openalex.org/W3092516916","https://openalex.org/W3144440823","https://openalex.org/W3168560243","https://openalex.org/W3175817563","https://openalex.org/W4246811954","https://openalex.org/W4315926975","https://openalex.org/W6675354045","https://openalex.org/W6729108404","https://openalex.org/W6781930830"],"related_works":["https://openalex.org/W2373866020","https://openalex.org/W2351252967","https://openalex.org/W589165813","https://openalex.org/W2388271354","https://openalex.org/W2377933504","https://openalex.org/W2347970476","https://openalex.org/W2371474181","https://openalex.org/W2374211671","https://openalex.org/W1537992138","https://openalex.org/W2363279488"],"abstract_inverted_index":{"The":[0,106,172],"near":[1],"field":[2],"communication":[3,103],"(NFC),":[4],"as":[5],"one":[6],"of":[7,36,47,66,92,104,108],"the":[8,25,34,45,63,90,98,114,141,147],"most":[9,149],"widely":[10],"used":[11,194],"radio":[12,130],"frequency":[13,131],"identification":[14],"(RFID)":[15],"technologies,":[16],"has":[17,185],"been":[18],"applied":[19],"to":[20,23,30,58,61,79,145,169,195],"intelligent":[21,51],"devices":[22,117],"replace":[24],"traditional":[26],"key,":[27],"bringing":[28],"convenience":[29],"people\u2019s":[31],"lives.":[32],"While":[33],"appearance":[35],"NFC":[37,64,73,116,135,183],"keys":[38],"facilitates":[39],"users\u2019":[40],"lifestyles,":[41],"it":[42,54],"also":[43],"increases":[44],"risk":[46],"being":[48],"stolen":[49],"for":[50,134],"devices.":[52,105],"So,":[53],"is":[55,95],"urgently":[56],"needed":[57],"take":[59],"action":[60],"protect":[62],"security":[65],"equipment.":[67],"There":[68],"are":[69],"abundant":[70],"researches":[71],"on":[72,129,175],"security,":[74,136],"which":[75,191],"can":[76,111,192],"be":[77,193],"divided":[78],"protocols":[80,93],"authentication":[81,94],"and":[82,101,156,164,201],"data":[83,109],"analysis":[84,110],"two":[85,176],"main":[86],"defense":[87],"methods.":[88],"However,":[89],"way":[91,107],"limited":[96],"by":[97],"space":[99],"available":[100],"real-time":[102],"not":[112],"identify":[113],"malicious":[115],"from":[118,153],"outside.":[119],"Thus,":[120],"we":[121],"propose":[122],"an":[123],"intrusion":[124],"detection":[125],"system":[126],"(IDS)":[127],"based":[128],"(RF)":[132],"signals":[133,155],"called":[137],"NFC-IDS.":[138],"We":[139],"use":[140],"random":[142,158],"forests":[143],"algorithm":[144],"select":[146],"four":[148],"important":[150],"feature":[151],"extracted":[152],"RF":[154],"compare":[157],"forests,":[159],"support":[160],"vector":[161],"machine":[162],"(SVM),":[163],"k-Nearest":[165],"Neighbor":[166],"(k-NN)":[167],"algorithms":[168],"detect":[170,196],"intrusions.":[171],"experimental":[173],"results":[174],"real":[177],"electric":[178],"motorcycles":[179],"show":[180],"that":[181],"every":[182],"device":[184],"its":[186],"unique":[187],"physical":[188],"signal":[189],"characteristics,":[190],"intrusions":[197],"with":[198],"high":[199],"accuracy":[200],"robustness.":[202]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
