{"id":"https://openalex.org/W2008455718","doi":"https://doi.org/10.1109/jcn.2012.6292246","title":"Characterization and detection of location spoofing attacks","display_name":"Characterization and detection of location spoofing attacks","publication_year":2012,"publication_date":"2012-08-01","ids":{"openalex":"https://openalex.org/W2008455718","doi":"https://doi.org/10.1109/jcn.2012.6292246","mag":"2008455718"},"language":"en","primary_location":{"id":"doi:10.1109/jcn.2012.6292246","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jcn.2012.6292246","pdf_url":null,"source":{"id":"https://openalex.org/S173102057","display_name":"Journal of Communications and Networks","issn_l":"1229-2370","issn":["1229-2370","1976-5541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications and Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112362641","display_name":"Jeong Heon Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I2250650973","display_name":"Samsung (South Korea)","ror":"https://ror.org/04w3jy968","country_code":"KR","type":"company","lineage":["https://openalex.org/I2250650973"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jeong Heon Lee","raw_affiliation_strings":["Digital Media and Communications (DMC) Research Center, Samsung Electronics, Korea","Digital Media & Commun. (DMC) Res. Center, Samsung Electron., Suwon, South Korea"],"affiliations":[{"raw_affiliation_string":"Digital Media and Communications (DMC) Research Center, Samsung Electronics, Korea","institution_ids":["https://openalex.org/I2250650973"]},{"raw_affiliation_string":"Digital Media & Commun. (DMC) Res. Center, Samsung Electron., Suwon, South Korea","institution_ids":["https://openalex.org/I2250650973"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022349063","display_name":"R. Michael Buehrer","orcid":null},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R. Michael Buehrer","raw_affiliation_strings":["Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA 24061","[Dept. of Electr. & Comput. Eng., Virginia Tech, Blacksburg, VA, USA]"],"affiliations":[{"raw_affiliation_string":"Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, VA 24061","institution_ids":["https://openalex.org/I859038795"]},{"raw_affiliation_string":"[Dept. of Electr. & Comput. Eng., Virginia Tech, Blacksburg, VA, USA]","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5112362641"],"corresponding_institution_ids":["https://openalex.org/I2250650973"],"apc_list":null,"apc_paid":null,"fwci":0.491,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.67397775,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"14","issue":"4","first_page":"396","last_page":"409"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10891","display_name":"Radar Systems and Signal Processing","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12024","display_name":"Ultra-Wideband Communications Technology","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rss","display_name":"RSS","score":0.8877701759338379},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8832908868789673},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8580182790756226},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6063687205314636},{"id":"https://openalex.org/keywords/signal-strength","display_name":"Signal strength","score":0.5512264966964722},{"id":"https://openalex.org/keywords/estimator","display_name":"Estimator","score":0.5221324563026428},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4421156644821167},{"id":"https://openalex.org/keywords/position","display_name":"Position (finance)","score":0.4217832386493683},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.417473703622818},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3538144826889038},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.336894154548645},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.22034966945648193},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.1455364227294922}],"concepts":[{"id":"https://openalex.org/C2385561","wikidata":"https://www.wikidata.org/wiki/Q45432","display_name":"RSS","level":2,"score":0.8877701759338379},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8832908868789673},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8580182790756226},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6063687205314636},{"id":"https://openalex.org/C176808163","wikidata":"https://www.wikidata.org/wiki/Q17105794","display_name":"Signal strength","level":3,"score":0.5512264966964722},{"id":"https://openalex.org/C185429906","wikidata":"https://www.wikidata.org/wiki/Q1130160","display_name":"Estimator","level":2,"score":0.5221324563026428},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4421156644821167},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.4217832386493683},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.417473703622818},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3538144826889038},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.336894154548645},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.22034966945648193},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.1455364227294922},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jcn.2012.6292246","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jcn.2012.6292246","pdf_url":null,"source":{"id":"https://openalex.org/S173102057","display_name":"Journal of Communications and Networks","issn_l":"1229-2370","issn":["1229-2370","1976-5541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Communications and Networks","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"id":"https://metadata.un.org/sdg/15","display_name":"Life in Land"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W250076511","https://openalex.org/W1508131133","https://openalex.org/W1559557989","https://openalex.org/W1983138649","https://openalex.org/W1983647929","https://openalex.org/W1985070889","https://openalex.org/W1999221939","https://openalex.org/W2023750123","https://openalex.org/W2025299767","https://openalex.org/W2045456727","https://openalex.org/W2056684560","https://openalex.org/W2097587935","https://openalex.org/W2105872772","https://openalex.org/W2109739017","https://openalex.org/W2112280154","https://openalex.org/W2114365263","https://openalex.org/W2120486432","https://openalex.org/W2122646361","https://openalex.org/W2131563109","https://openalex.org/W2137816628","https://openalex.org/W2140452629","https://openalex.org/W2145417574","https://openalex.org/W2157693833","https://openalex.org/W2159796097","https://openalex.org/W2163513242","https://openalex.org/W2163817142","https://openalex.org/W2164947865","https://openalex.org/W2165274895","https://openalex.org/W2165527697","https://openalex.org/W2182534960","https://openalex.org/W2269131354","https://openalex.org/W2790988618","https://openalex.org/W4213217764","https://openalex.org/W6686447602","https://openalex.org/W6748607628"],"related_works":["https://openalex.org/W2162859609","https://openalex.org/W150547863","https://openalex.org/W2022445516","https://openalex.org/W4200318234","https://openalex.org/W2982532306","https://openalex.org/W1891938465","https://openalex.org/W1639914594","https://openalex.org/W4237766728","https://openalex.org/W4253688861","https://openalex.org/W1550605711"],"abstract_inverted_index":{"With":[0],"the":[1,13,29,45,54,60,88,100,119,130,159,181,186,189],"proliferation":[2],"of":[3,15,33,63,90,134,162,178,188],"diverse":[4],"wireless":[5,81],"devices,":[6],"there":[7],"is":[8,75,105,169],"an":[9,138],"increasing":[10,184],"concern":[11],"about":[12],"security":[14,61],"location":[16,34,191],"information":[17,65],"which":[18,39,142,157],"can":[19,110],"be":[20,111,172],"spoofed":[21],"or":[22,125,152],"disrupted":[23],"by":[24,113],"adversaries.":[25],"This":[26],"paper":[27],"investigates":[28],"characterization":[30],"and":[31,58,93,99,136],"detection":[32,140,182],"spoofing":[35],"attacks,":[36,135],"specifically":[37],"those":[38],"are":[40],"attempting":[41],"to":[42,77,171],"falsify":[43],"(degrade)":[44],"position":[46,64,102],"estimate":[47],"through":[48],"signal":[49,71,91],"strength":[50,72,92],"based":[51,66],"attacks.":[52],"Since":[53],"physical-layer":[55],"approach":[56,141],"identifies":[57],"assesses":[59],"risk":[62],"solely":[67],"on":[68,96,146],"using":[69],"received":[70],"(RSS),":[73],"it":[74],"applicable":[76],"nearly":[78],"any":[79],"practical":[80],"network.":[82],"In":[83],"this":[84],"paper,":[85],"we":[86],"characterize":[87],"impact":[89],"beamforming":[94],"attacks":[95,109,179],"range":[97,121],"estimates":[98],"resulting":[101,155],"estimate.":[103],"It":[104],"shown":[106,170],"that":[107,117],"such":[108],"characterized":[112],"a":[114,147],"scaling":[115],"factor":[116],"biases":[118],"individual":[120],"estimators":[122,165],"either":[123],"uniformly":[124],"selectively.":[126],"We":[127],"then":[128],"identify":[129],"more":[131],"severe":[132],"types":[133,177],"develop":[137],"attack":[139],"does":[143],"not":[144],"rely":[145],"priori":[148],"knowledge":[149],"(either":[150],"statistical":[151],"environmental).":[153],"The":[154],"approach,":[156],"exploits":[158],"dissimilar":[160],"behavior":[161],"two":[163],"RSS-based":[164],"when":[166],"under":[167],"attack,":[168],"effective":[173],"at":[174],"detecting":[175],"both":[176],"with":[180,185],"rate":[183],"severity":[187],"induced":[190],"error.":[192]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
