{"id":"https://openalex.org/W4390189444","doi":"https://doi.org/10.1109/milcom58377.2023.10356249","title":"Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield","display_name":"Stealth Spectrum Sensing Data Falsification Attacks Affecting IoT Spectrum Monitors on the Battlefield","publication_year":2023,"publication_date":"2023-10-30","ids":{"openalex":"https://openalex.org/W4390189444","doi":"https://doi.org/10.1109/milcom58377.2023.10356249"},"language":"en","primary_location":{"id":"doi:10.1109/milcom58377.2023.10356249","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom58377.2023.10356249","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068451806","display_name":"Pedro Miguel S\u00e1nchez S\u00e1nchez","orcid":"https://orcid.org/0000-0002-6444-2102"},"institutions":[{"id":"https://openalex.org/I80180929","display_name":"Universidad de Murcia","ror":"https://ror.org/03p3aeb86","country_code":"ES","type":"education","lineage":["https://openalex.org/I80180929"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Pedro Miguel S\u00e1nchez S\u00e1nchez","raw_affiliation_strings":["University of Murcia,Department of Information and Communications Engineering,Murcia,Spain,30100"],"affiliations":[{"raw_affiliation_string":"University of Murcia,Department of Information and Communications Engineering,Murcia,Spain,30100","institution_ids":["https://openalex.org/I80180929"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089156582","display_name":"Enrique Tom\u00e1s Mart\u00ednez Beltr\u00e1n","orcid":"https://orcid.org/0000-0002-5169-2815"},"institutions":[{"id":"https://openalex.org/I80180929","display_name":"Universidad de Murcia","ror":"https://ror.org/03p3aeb86","country_code":"ES","type":"education","lineage":["https://openalex.org/I80180929"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Enrique Tom\u00e1s Mart\u00ednez Beltr\u00e1n","raw_affiliation_strings":["University of Murcia,Department of Information and Communications Engineering,Murcia,Spain,30100"],"affiliations":[{"raw_affiliation_string":"University of Murcia,Department of Information and Communications Engineering,Murcia,Spain,30100","institution_ids":["https://openalex.org/I80180929"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063531116","display_name":"Alberto Huertas Celdr\u00e1n","orcid":"https://orcid.org/0000-0001-7125-1710"},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Alberto Huertas Celdr\u00e1n","raw_affiliation_strings":["University of Zurich UZH,Communication Systems Group (CSG) at the Department of Informatics (IfI),Z&#x00FC;rich,Switzerland,8050"],"affiliations":[{"raw_affiliation_string":"University of Zurich UZH,Communication Systems Group (CSG) at the Department of Informatics (IfI),Z&#x00FC;rich,Switzerland,8050","institution_ids":["https://openalex.org/I202697423"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093577424","display_name":"Robin Wassink","orcid":null},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Robin Wassink","raw_affiliation_strings":["University of Zurich UZH,Communication Systems Group (CSG) at the Department of Informatics (IfI),Z&#x00FC;rich,Switzerland,8050"],"affiliations":[{"raw_affiliation_string":"University of Zurich UZH,Communication Systems Group (CSG) at the Department of Informatics (IfI),Z&#x00FC;rich,Switzerland,8050","institution_ids":["https://openalex.org/I202697423"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070889566","display_name":"G\u00e9r\u00f4me Bovet","orcid":"https://orcid.org/0000-0002-4534-3483"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"G\u00e9r\u00f4me Bovet","raw_affiliation_strings":["Cyber-Defence Campus Within Armasuisse Science &amp; Technology,Thun,Switzerland,3602"],"affiliations":[{"raw_affiliation_string":"Cyber-Defence Campus Within Armasuisse Science &amp; Technology,Thun,Switzerland,3602","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059796926","display_name":"Gregorio Mart\u00ednez P\u00e9rez","orcid":"https://orcid.org/0000-0001-5532-6604"},"institutions":[{"id":"https://openalex.org/I80180929","display_name":"Universidad de Murcia","ror":"https://ror.org/03p3aeb86","country_code":"ES","type":"education","lineage":["https://openalex.org/I80180929"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Gregorio Mart\u00ednez P\u00e9rez","raw_affiliation_strings":["University of Murcia,Department of Information and Communications Engineering,Murcia,Spain,30100"],"affiliations":[{"raw_affiliation_string":"University of Murcia,Department of Information and Communications Engineering,Murcia,Spain,30100","institution_ids":["https://openalex.org/I80180929"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033030418","display_name":"Burkhard Stiller","orcid":"https://orcid.org/0000-0002-7461-7463"},"institutions":[{"id":"https://openalex.org/I202697423","display_name":"University of Zurich","ror":"https://ror.org/02crff812","country_code":"CH","type":"education","lineage":["https://openalex.org/I202697423"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Burkhard Stiller","raw_affiliation_strings":["University of Zurich UZH,Communication Systems Group (CSG) at the Department of Informatics (IfI),Z&#x00FC;rich,Switzerland,8050"],"affiliations":[{"raw_affiliation_string":"University of Zurich UZH,Communication Systems Group (CSG) at the Department of Informatics (IfI),Z&#x00FC;rich,Switzerland,8050","institution_ids":["https://openalex.org/I202697423"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5068451806"],"corresponding_institution_ids":["https://openalex.org/I80180929"],"apc_list":null,"apc_paid":null,"fwci":0.8025,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.74871454,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"673","last_page":"678"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6649578809738159},{"id":"https://openalex.org/keywords/battlefield","display_name":"Battlefield","score":0.6421752572059631},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.572611927986145},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5615510940551758},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4608902335166931},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4379411041736603},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.415256142616272},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3502727150917053},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.24378269910812378}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6649578809738159},{"id":"https://openalex.org/C2779669469","wikidata":"https://www.wikidata.org/wiki/Q4895508","display_name":"Battlefield","level":2,"score":0.6421752572059631},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.572611927986145},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5615510940551758},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4608902335166931},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4379411041736603},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.415256142616272},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3502727150917053},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.24378269910812378},{"id":"https://openalex.org/C195244886","wikidata":"https://www.wikidata.org/wiki/Q41493","display_name":"Ancient history","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom58377.2023.10356249","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom58377.2023.10356249","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2083045369","https://openalex.org/W2605049359","https://openalex.org/W2765171093","https://openalex.org/W2908495014","https://openalex.org/W2923495901","https://openalex.org/W2963471098","https://openalex.org/W2971893958","https://openalex.org/W3011200047","https://openalex.org/W3163853394","https://openalex.org/W3187420981","https://openalex.org/W4294811297","https://openalex.org/W4312959482","https://openalex.org/W4323338613"],"related_works":["https://openalex.org/W1984179778","https://openalex.org/W2363573290","https://openalex.org/W2387459700","https://openalex.org/W4388150944","https://openalex.org/W2362261179","https://openalex.org/W2383940993","https://openalex.org/W2354389285","https://openalex.org/W2387678935","https://openalex.org/W3159926017","https://openalex.org/W301880915"],"abstract_inverted_index":{"Resource-constrained":[0],"spectrum":[1,13,89],"sensors":[2,71],"from":[3,117],"the":[4,11,39,44,92,101,118,122,145,149],"Internet":[5],"of":[6,96,148],"Battlefield":[7],"Things":[8],"(IoBT)":[9],"monitor":[10],"frequency":[12],"to":[14,31],"communicate":[15],"over":[16],"unoccupied":[17],"bands,":[18],"intercept":[19],"enemy":[20],"transmissions,":[21],"or":[22],"decode":[23],"valuable":[24],"information.":[25],"However,":[26,64],"they":[27],"are":[28],"also":[29],"susceptible":[30],"Spectrum":[32],"Sensing":[33],"Data":[34],"Falsification":[35],"(SSDF)":[36],"attacks":[37,66,86,125],"manipulating":[38],"sensing":[40],"data":[41,90],"and":[42,52,82],"impacting":[43],"previous":[45],"services.":[46],"Detection":[47],"systems":[48,110],"based":[49],"on":[50,70],"fingerprinting":[51],"machine":[53],"learning":[54],"have":[55,73],"shown":[56],"promising":[57],"performance":[58],"while":[59],"detecting":[60,144],"existing":[61],"SSDF":[62,85,124],"attacks.":[63,150],"novel":[65],"reducing":[67],"their":[68,127],"impact":[69],"behaviors":[72],"not":[74],"been":[75],"analyzed":[76],"yet.":[77],"Thus,":[78],"this":[79,130],"work":[80],"redesigns":[81],"reimplements":[83],"seven":[84],"by":[87],"modifying":[88],"in":[91,100],"sensor":[93],"memory":[94],"instead":[95],"at":[97],"later":[98],"stages":[99],"file":[102],"system.":[103],"Several":[104],"experiments":[105],"with":[106],"current":[107],"intelligent":[108],"detection":[109,133],"demonstrated":[111],"that":[112],"more":[113],"effort":[114],"is":[115],"needed":[116],"defensive":[119],"perspective":[120],"since":[121],"new":[123,146],"evade":[126],"detection.":[128],"In":[129],"sense,":[131],"literature-based":[132],"methods":[134],"achieve":[135],"less":[136],"than":[137],"a":[138],"0.50":[139],"True":[140],"Positive":[141],"Rate":[142],"when":[143],"implementations":[147]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
