{"id":"https://openalex.org/W2913284297","doi":"https://doi.org/10.1109/lcn.2018.8638064","title":"Together We are Strong: Securing Industrial Wireless Networks with Overhearing Nodes","display_name":"Together We are Strong: Securing Industrial Wireless Networks with Overhearing Nodes","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2913284297","doi":"https://doi.org/10.1109/lcn.2018.8638064","mag":"2913284297"},"language":"en","primary_location":{"id":"doi:10.1109/lcn.2018.8638064","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2018.8638064","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 43rd Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002192658","display_name":"Sebastian Henningsen","orcid":null},"institutions":[{"id":"https://openalex.org/I39343248","display_name":"Humboldt-Universit\u00e4t zu Berlin","ror":"https://ror.org/01hcx6992","country_code":"DE","type":"education","lineage":["https://openalex.org/I39343248"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Sebastian Henningsen","raw_affiliation_strings":["Humboldt-Universit\u00e4t zu Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Humboldt-Universit\u00e4t zu Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I39343248"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018104951","display_name":"Lucas Mann","orcid":"https://orcid.org/0000-0001-7837-2849"},"institutions":[{"id":"https://openalex.org/I39343248","display_name":"Humboldt-Universit\u00e4t zu Berlin","ror":"https://ror.org/01hcx6992","country_code":"DE","type":"education","lineage":["https://openalex.org/I39343248"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Lucas Mann","raw_affiliation_strings":["Humboldt-Universit\u00e4t zu Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Humboldt-Universit\u00e4t zu Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I39343248"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010345880","display_name":"Stefan Dietzel","orcid":"https://orcid.org/0000-0002-4192-0327"},"institutions":[{"id":"https://openalex.org/I39343248","display_name":"Humboldt-Universit\u00e4t zu Berlin","ror":"https://ror.org/01hcx6992","country_code":"DE","type":"education","lineage":["https://openalex.org/I39343248"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Stefan Dietzel","raw_affiliation_strings":["Humboldt-Universit\u00e4t zu Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Humboldt-Universit\u00e4t zu Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I39343248"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049715028","display_name":"Bj\u00f6rn Scheuermann","orcid":"https://orcid.org/0000-0002-1133-1775"},"institutions":[{"id":"https://openalex.org/I39343248","display_name":"Humboldt-Universit\u00e4t zu Berlin","ror":"https://ror.org/01hcx6992","country_code":"DE","type":"education","lineage":["https://openalex.org/I39343248"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Bjorn Scheuermann","raw_affiliation_strings":["Humboldt-Universit\u00e4t zu Berlin, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Humboldt-Universit\u00e4t zu Berlin, Berlin, Germany","institution_ids":["https://openalex.org/I39343248"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5002192658"],"corresponding_institution_ids":["https://openalex.org/I39343248"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20794371,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"99","issue":null,"first_page":"259","last_page":"262"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8198312520980835},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.762085497379303},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7324299812316895},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.7259407043457031},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.6538904905319214},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6242968440055847},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5621086359024048},{"id":"https://openalex.org/keywords/physical-security","display_name":"Physical security","score":0.4757106900215149},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.4402029812335968},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4350746273994446},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3367066979408264},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3319254219532013},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10773614048957825},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09022563695907593}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8198312520980835},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.762085497379303},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7324299812316895},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.7259407043457031},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.6538904905319214},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6242968440055847},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5621086359024048},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.4757106900215149},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.4402029812335968},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4350746273994446},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3367066979408264},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3319254219532013},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10773614048957825},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09022563695907593},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcn.2018.8638064","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2018.8638064","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 43rd Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1551333318","https://openalex.org/W1966276228","https://openalex.org/W2029693536","https://openalex.org/W2089695767","https://openalex.org/W2113475664","https://openalex.org/W2123541927","https://openalex.org/W2126087831","https://openalex.org/W2128521639","https://openalex.org/W2132047492","https://openalex.org/W2155899844","https://openalex.org/W2317127693","https://openalex.org/W2511157130","https://openalex.org/W2718817472","https://openalex.org/W2734521510","https://openalex.org/W2784313159","https://openalex.org/W3137092842","https://openalex.org/W6678832241","https://openalex.org/W6740052750"],"related_works":["https://openalex.org/W4320018150","https://openalex.org/W4239582170","https://openalex.org/W2918664383","https://openalex.org/W106056076","https://openalex.org/W4320855730","https://openalex.org/W2135200719","https://openalex.org/W1870509456","https://openalex.org/W4384615748","https://openalex.org/W4287854872","https://openalex.org/W1481299995"],"abstract_inverted_index":{"Recent":[0],"works":[1],"have":[2],"shown":[3],"that":[4,34,99],"the":[5,21,83,109],"wireless":[6,58,66],"link":[7],"between":[8],"two":[9],"nodes":[10,43,61,103],"is":[11,38,53],"neither":[12],"a":[13,73],"shared":[14],"secret":[15],"nor":[16],"unforgeable":[17],"by":[18],"an":[19],"adversary-questioning":[20],"effectiveness":[22],"of":[23,47,85],"many":[24],"physical":[25,35,75],"layer":[26,36,76],"security":[27,37],"mechanisms.":[28],"In":[29],"this":[30],"work,":[31],"we":[32,71,90],"argue":[33],"still":[39],"valuable":[40],"when":[41],"multiple":[42,86],"combine":[44],"their":[45],"measurements":[46],"overheard":[48],"adversarial":[49],"transmissions.":[50],"This":[51],"assumption":[52],"applicable":[54],"to,":[55],"e.g.,":[56],"industrial":[57],"networks,":[59],"where":[60],"are":[62,68,104],"spatially":[63],"close":[64],"and":[65],"links":[67],"unique.":[69],"First,":[70],"design":[72],"novel":[74],"adversary":[77],"detection":[78,110],"algorithm":[79,93],"particularly":[80],"suited":[81],"for":[82],"scenario":[84],"sensing":[87],"nodes.":[88],"Second,":[89],"evaluate":[91],"our":[92],"with":[94],"real-world":[95],"measurements,":[96],"which":[97],"show":[98],"already":[100],"four":[101],"detecting":[102],"sufficient":[105],"to":[106],"significantly":[107],"increase":[108],"performance.":[111]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
