{"id":"https://openalex.org/W2026427577","doi":"https://doi.org/10.1109/noms.2014.6838252","title":"Tracking spoofed locations in crowdsourced vehicular applications","display_name":"Tracking spoofed locations in crowdsourced vehicular applications","publication_year":2014,"publication_date":"2014-05-01","ids":{"openalex":"https://openalex.org/W2026427577","doi":"https://doi.org/10.1109/noms.2014.6838252","mag":"2026427577"},"language":"en","primary_location":{"id":"doi:10.1109/noms.2014.6838252","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms.2014.6838252","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Network Operations and Management Symposium (NOMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://inria.hal.science/hal-01086974","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084857626","display_name":"Lautaro Dolberg","orcid":null},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Lautaro Dolberg","raw_affiliation_strings":["Reliability and Trust, University of Luxembourg Interdisciplinary Centre for Security","University of Luxembourg Interdisciplinary Centre for Security, Reliability and Trust Luxembourg"],"affiliations":[{"raw_affiliation_string":"Reliability and Trust, University of Luxembourg Interdisciplinary Centre for Security","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"University of Luxembourg Interdisciplinary Centre for Security, Reliability and Trust Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108084701","display_name":"Jerome Francis","orcid":null},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Jerome Francis","raw_affiliation_strings":["University of Luxembourg Interdisciplinary Centre for Security, Reliability and Trust Luxembourg"],"affiliations":[{"raw_affiliation_string":"University of Luxembourg Interdisciplinary Centre for Security, Reliability and Trust Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009071576","display_name":"Thomas Engel","orcid":"https://orcid.org/0000-0002-7374-3927"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Thomas Engel","raw_affiliation_strings":["Reliability and Trust, University of Luxembourg Interdisciplinary Centre for Security","University of Luxembourg Interdisciplinary Centre for Security, Reliability and Trust Luxembourg"],"affiliations":[{"raw_affiliation_string":"Reliability and Trust, University of Luxembourg Interdisciplinary Centre for Security","institution_ids":["https://openalex.org/I186903577"]},{"raw_affiliation_string":"University of Luxembourg Interdisciplinary Centre for Security, Reliability and Trust Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084857626"],"corresponding_institution_ids":["https://openalex.org/I186903577"],"apc_list":null,"apc_paid":null,"fwci":0.2128,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.59012249,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8602632284164429},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7341291904449463},{"id":"https://openalex.org/keywords/position","display_name":"Position (finance)","score":0.5881921052932739},{"id":"https://openalex.org/keywords/tracking","display_name":"Tracking (education)","score":0.46053504943847656},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4425506293773651},{"id":"https://openalex.org/keywords/vehicle-tracking-system","display_name":"Vehicle tracking system","score":0.4408310055732727},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43750593066215515},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.41297584772109985},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40583616495132446},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.38948166370391846},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3287295401096344},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32145896553993225},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15358981490135193},{"id":"https://openalex.org/keywords/kalman-filter","display_name":"Kalman filter","score":0.09689697623252869}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8602632284164429},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7341291904449463},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.5881921052932739},{"id":"https://openalex.org/C2775936607","wikidata":"https://www.wikidata.org/wiki/Q466845","display_name":"Tracking (education)","level":2,"score":0.46053504943847656},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4425506293773651},{"id":"https://openalex.org/C84119951","wikidata":"https://www.wikidata.org/wiki/Q3498530","display_name":"Vehicle tracking system","level":3,"score":0.4408310055732727},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43750593066215515},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.41297584772109985},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40583616495132446},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.38948166370391846},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3287295401096344},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32145896553993225},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15358981490135193},{"id":"https://openalex.org/C157286648","wikidata":"https://www.wikidata.org/wiki/Q846780","display_name":"Kalman filter","level":2,"score":0.09689697623252869},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/noms.2014.6838252","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms.2014.6838252","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE Network Operations and Management Symposium (NOMS)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-01086974v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01086974","pdf_url":null,"source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6838252&tag=1","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-01086974v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01086974","pdf_url":null,"source":null,"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6838252&tag=1","raw_type":"Conference papers"},"sustainable_development_goals":[{"score":0.6499999761581421,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W24067677","https://openalex.org/W1916464331","https://openalex.org/W1969799745","https://openalex.org/W1982002312","https://openalex.org/W2000707514","https://openalex.org/W2001675624","https://openalex.org/W2002508561","https://openalex.org/W2005828260","https://openalex.org/W2016995838","https://openalex.org/W2039208164","https://openalex.org/W2058681739","https://openalex.org/W2059528890","https://openalex.org/W2062070591","https://openalex.org/W2068691410","https://openalex.org/W2080807290","https://openalex.org/W2094256917","https://openalex.org/W2103460805","https://openalex.org/W2108864208","https://openalex.org/W2112004167","https://openalex.org/W2122429976","https://openalex.org/W2127616029","https://openalex.org/W2128269064","https://openalex.org/W2129971170","https://openalex.org/W2145867557","https://openalex.org/W2147510259","https://openalex.org/W2150778805","https://openalex.org/W2158647132","https://openalex.org/W2161829622","https://openalex.org/W2164947865","https://openalex.org/W2167930752","https://openalex.org/W3140914175","https://openalex.org/W6600981286","https://openalex.org/W6639965902","https://openalex.org/W6682768533"],"related_works":["https://openalex.org/W2188559950","https://openalex.org/W2989910292","https://openalex.org/W2998478967","https://openalex.org/W3128793638","https://openalex.org/W2123299109","https://openalex.org/W2021230337","https://openalex.org/W4401097268","https://openalex.org/W2607818178","https://openalex.org/W2379834692","https://openalex.org/W2058830477"],"abstract_inverted_index":{"Position":[0],"information":[1,10,89],"is":[2,28],"essential":[3],"for":[4,16,54],"many":[5],"vehicular":[6],"applications":[7],"like":[8],"traffic":[9],"and":[11,56],"route":[12],"planning":[13],"but":[14],"also":[15],"enabling":[17],"vital":[18],"network":[19],"routing":[20],"services.":[21],"However,":[22],"the":[23,26,71,80],"accuracy":[24],"of":[25,31,70,87],"latter":[27],"highly":[29],"dependent":[30],"a":[32,51],"precise":[33],"location":[34,58,88],"service":[35],"which":[36,95],"might":[37],"be":[38],"altered":[39],"by":[40],"attackers":[41],"forging":[42],"falsified":[43],"position":[44,64],"data.":[45],"In":[46],"this":[47],"paper,":[48],"we":[49],"propose":[50],"new":[52],"method":[53],"tracking":[55],"removing":[57],"spoofing":[59],"anomalies":[60],"in":[61],"large":[62],"scale":[63],"based":[65],"services":[66],"assuming":[67],"neither":[68],"control":[69],"communication":[72],"infrastructure":[73],"or":[74],"additional":[75],"hardware":[76],"nor":[77],"software":[78],"at":[79],"client":[81],"side.":[82],"Our":[83],"system":[84],"uses":[85],"aggregation":[86],"to":[90],"compute":[91],"relevant":[92],"stability":[93],"metrics":[94],"may":[96],"reveal":[97],"anomalous":[98],"events.":[99]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-28T08:17:26.163206","created_date":"2025-10-10T00:00:00"}
