{"id":"https://openalex.org/W7117243580","doi":"https://doi.org/10.1109/jiot.2025.3648348","title":"Location Spoofing Attacks and Defense Strategies on Underwater Geo-Opportunistic Routing Networks","display_name":"Location Spoofing Attacks and Defense Strategies on Underwater Geo-Opportunistic Routing Networks","publication_year":2025,"publication_date":"2025-12-25","ids":{"openalex":"https://openalex.org/W7117243580","doi":"https://doi.org/10.1109/jiot.2025.3648348"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3648348","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3648348","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110527766","display_name":"Lin Sun","orcid":"https://orcid.org/0000-0002-2560-9248"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lin Sun","raw_affiliation_strings":["School of Marine Science and Technology, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Marine Science and Technology, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048814538","display_name":"Xiaohong SHEN","orcid":null},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohong Shen","raw_affiliation_strings":["School of Marine Science and Technology, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Marine Science and Technology, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100390952","display_name":"Yuan Liu","orcid":"https://orcid.org/0000-0003-4247-3562"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yuan Liu","raw_affiliation_strings":["Hanjiang National Laboratory, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"Hanjiang National Laboratory, Wuhan, Hubei, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121272766","display_name":"Yifan Yuan","orcid":null},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yifan Yuan","raw_affiliation_strings":["School of Marine Science and Technology, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Marine Science and Technology, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047549654","display_name":"Weiliang Xie","orcid":"https://orcid.org/0009-0007-7346-0947"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiliang Xie","raw_affiliation_strings":["School of Marine Science and Technology, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Marine Science and Technology, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121291224","display_name":"Haiyan Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haiyan Wang","raw_affiliation_strings":["School of Marine Science and Technology, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Marine Science and Technology, Northwestern Polytechnical University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I17145004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5110527766"],"corresponding_institution_ids":["https://openalex.org/I17145004"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.64035835,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"7","first_page":"14308","last_page":"14321"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11192","display_name":"Underwater Vehicles and Communication Systems","score":0.9480000138282776,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11192","display_name":"Underwater Vehicles and Communication Systems","score":0.9480000138282776,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.011599999852478504,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.006800000090152025,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7867000102996826},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.5457000136375427},{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.4593000113964081},{"id":"https://openalex.org/keywords/underwater","display_name":"Underwater","score":0.444599986076355},{"id":"https://openalex.org/keywords/geographic-routing","display_name":"Geographic routing","score":0.4408000111579895},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.43209999799728394},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.42829999327659607},{"id":"https://openalex.org/keywords/forwarder","display_name":"Forwarder","score":0.40230000019073486},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.38449999690055847}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.807699978351593},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7867000102996826},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5759999752044678},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.5457000136375427},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.4593000113964081},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45809999108314514},{"id":"https://openalex.org/C98083399","wikidata":"https://www.wikidata.org/wiki/Q3246517","display_name":"Underwater","level":2,"score":0.444599986076355},{"id":"https://openalex.org/C50558702","wikidata":"https://www.wikidata.org/wiki/Q5535067","display_name":"Geographic routing","level":5,"score":0.4408000111579895},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.43209999799728394},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.42829999327659607},{"id":"https://openalex.org/C2781363737","wikidata":"https://www.wikidata.org/wiki/Q616007","display_name":"Forwarder","level":2,"score":0.40230000019073486},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.38449999690055847},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.38190001249313354},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.37279999256134033},{"id":"https://openalex.org/C111814575","wikidata":"https://www.wikidata.org/wiki/Q550893","display_name":"IP address spoofing","level":5,"score":0.3472000062465668},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.3301999866962433},{"id":"https://openalex.org/C169111936","wikidata":"https://www.wikidata.org/wiki/Q424098","display_name":"Underwater acoustic communication","level":3,"score":0.3165999948978424},{"id":"https://openalex.org/C178086212","wikidata":"https://www.wikidata.org/wiki/Q11155","display_name":"Border Gateway Protocol","level":5,"score":0.31520000100135803},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.29840001463890076},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.29750001430511475},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.28519999980926514},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.27619999647140503},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.27239999175071716},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.27160000801086426},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.26809999346733093},{"id":"https://openalex.org/C174809319","wikidata":"https://www.wikidata.org/wiki/Q5973191","display_name":"IP forwarding","level":5,"score":0.2662000060081482},{"id":"https://openalex.org/C60229501","wikidata":"https://www.wikidata.org/wiki/Q18822","display_name":"Global Positioning System","level":2,"score":0.2547999918460846},{"id":"https://openalex.org/C2776650193","wikidata":"https://www.wikidata.org/wiki/Q264661","display_name":"Obstacle","level":2,"score":0.25200000405311584},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2500999867916107}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3648348","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3648348","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Life below water","score":0.663379967212677,"id":"https://metadata.un.org/sdg/14"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Geo-Opportunistic":[0],"Routing":[1],"Networks":[2],"(Geo-OR)":[3],"within":[4,107],"the":[5,15,41,54,78,148,154,165,174,181],"Internet":[6],"of":[7,18,46,80,168,183],"Underwater":[8],"Things":[9],"(IoUT)":[10],"are":[11,111],"crucial":[12],"for":[13],"addressing":[14],"unique":[16],"challenges":[17],"underwater":[19],"communication":[20],"environments.":[21],"By":[22,88],"leveraging":[23],"geographic":[24],"location":[25,130],"data,":[26],"these":[27,189],"networks":[28],"can":[29],"opportunistically":[30],"select":[31],"forwarding":[32],"nodes,":[33],"a":[34,85,129],"strategy":[35,93],"that":[36,147],"proves":[37],"particularly":[38],"effective":[39],"in":[40,50,69,73,84,151],"dynamic":[42],"and":[43,53,103,140,178],"unpredictable":[44],"nature":[45],"IoUT.":[47],"However,":[48],"uncertainty":[49,68],"forwarder":[51],"selection":[52,71],"inability":[55],"to":[56,113,122,135,156,180,187],"verify":[57],"nodes\u2019":[58],"claimed":[59],"positions":[60],"remain":[61],"critical":[62,166],"challenges.":[63],"This":[64,162],"paper":[65],"investigates":[66],"how":[67],"next-hop":[70],"arises":[72],"Geo-OR":[74,152],"when":[75],"viewed":[76],"from":[77],"perspective":[79],"potential":[81],"adversaries":[82],"operating":[83],"non-cooperative":[86],"manner.":[87],"integrating":[89],"an":[90,95],"octree-based":[91],"search":[92],"with":[94],"angle-constrained":[96],"3D":[97],"localization":[98],"algorithm,":[99],"we":[100],"accurately":[101],"identify":[102],"locate":[104],"\u201chot\u201d":[105],"nodes":[106],"Geo-OR.":[108],"Geometric":[109],"methods":[110],"employed":[112],"analyze":[114],"vulnerable":[115,176],"relay":[116],"regions,":[117],"pinpointing":[118],"areas":[119],"especially":[120],"susceptible":[121],"malicious":[123],"attacks.":[124],"Based":[125],"on":[126],"this":[127],"analysis,":[128],"spoofing":[131],"attack":[132],"is":[133],"proposed":[134],"disrupt":[136],"legitimate":[137],"node":[138],"transmissions":[139],"degrade":[141],"network":[142,155],"performance.":[143],"Simulation":[144],"results":[145],"reveal":[146],"inherent":[149],"uncertainties":[150],"expose":[153],"significant":[157],"vulnerabilities,":[158],"severely":[159],"compromising":[160],"throughput.":[161],"study":[163],"highlights":[164],"weaknesses":[167],"Geo-OR,":[169],"offering":[170],"valuable":[171],"insights":[172],"into":[173],"most":[175],"regions":[177],"contributing":[179],"design":[182],"targeted":[184],"defense":[185],"strategies":[186],"mitigate":[188],"risks.":[190]},"counts_by_year":[],"updated_date":"2026-03-26T06:05:38.182114","created_date":"2025-12-25T00:00:00"}
