{"id":"https://openalex.org/W2110221314","doi":"https://doi.org/10.1109/tifs.2009.2026454","title":"Channel-Based Detection of Sybil Attacks in Wireless Networks","display_name":"Channel-Based Detection of Sybil Attacks in Wireless Networks","publication_year":2009,"publication_date":"2009-07-07","ids":{"openalex":"https://openalex.org/W2110221314","doi":"https://doi.org/10.1109/tifs.2009.2026454","mag":"2110221314"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2009.2026454","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2009.2026454","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068976123","display_name":"Liang Xiao","orcid":"https://orcid.org/0000-0003-2402-611X"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liang Xiao","raw_affiliation_strings":["Department of Communication Engineering, Xiamen University, Fujian, China","Dept. of Commun. Eng., Xiamen Univ., Xiamen, , China"],"affiliations":[{"raw_affiliation_string":"Department of Communication Engineering, Xiamen University, Fujian, China","institution_ids":["https://openalex.org/I191208505"]},{"raw_affiliation_string":"Dept. of Commun. Eng., Xiamen Univ., Xiamen, , China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109270796","display_name":"L.J. Greenstein","orcid":null},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"L.J. Greenstein","raw_affiliation_strings":["WINLAB, Department of Electrical and Computer Engineering, Rutgers University, North Brunswick, NJ, USA","WINLAB, Department of Electrical and Computer Engineering, Rutgers University, North Brunswick, NJ"],"affiliations":[{"raw_affiliation_string":"WINLAB, Department of Electrical and Computer Engineering, Rutgers University, North Brunswick, NJ, USA","institution_ids":["https://openalex.org/I102322142"]},{"raw_affiliation_string":"WINLAB, Department of Electrical and Computer Engineering, Rutgers University, North Brunswick, NJ","institution_ids":["https://openalex.org/I102322142"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055303802","display_name":"Narayan B. Mandayam","orcid":"https://orcid.org/0000-0001-5744-0814"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"N.B. Mandayam","raw_affiliation_strings":["WINLAB, Department of Electrical and Computer Engineering, Rutgers University, North Brunswick, NJ, USA","WINLAB, Department of Electrical and Computer Engineering, Rutgers University, North Brunswick, NJ"],"affiliations":[{"raw_affiliation_string":"WINLAB, Department of Electrical and Computer Engineering, Rutgers University, North Brunswick, NJ, USA","institution_ids":["https://openalex.org/I102322142"]},{"raw_affiliation_string":"WINLAB, Department of Electrical and Computer Engineering, Rutgers University, North Brunswick, NJ","institution_ids":["https://openalex.org/I102322142"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078633885","display_name":"Wade Trappe","orcid":"https://orcid.org/0000-0002-0635-9458"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"W. Trappe","raw_affiliation_strings":["WINLAB, Department of Electrical and Computer Engineering, Rutgers University, North Brunswick, NJ, USA","WINLAB, Department of Electrical and Computer Engineering, Rutgers University, North Brunswick, NJ"],"affiliations":[{"raw_affiliation_string":"WINLAB, Department of Electrical and Computer Engineering, Rutgers University, North Brunswick, NJ, USA","institution_ids":["https://openalex.org/I102322142"]},{"raw_affiliation_string":"WINLAB, Department of Electrical and Computer Engineering, Rutgers University, North Brunswick, NJ","institution_ids":["https://openalex.org/I102322142"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5068976123"],"corresponding_institution_ids":["https://openalex.org/I191208505"],"apc_list":null,"apc_paid":null,"fwci":5.8008,"has_fulltext":false,"cited_by_count":158,"citation_normalized_percentile":{"value":0.96314677,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"4","issue":"3","first_page":"492","last_page":"503"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12024","display_name":"Ultra-Wideband Communications Technology","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.805198609828949},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6348161697387695},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6031589508056641},{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.5552364587783813},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5189570784568787},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4620811939239502},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4592040181159973},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4505957067012787},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.44826069474220276},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.42593634128570557},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.19783219695091248}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.805198609828949},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6348161697387695},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6031589508056641},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.5552364587783813},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5189570784568787},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4620811939239502},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4592040181159973},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4505957067012787},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.44826069474220276},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.42593634128570557},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.19783219695091248},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2009.2026454","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2009.2026454","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.299.1583","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.299.1583","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.winlab.rutgers.edu/~narayan/PAPERS/Sybil.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Sustainable cities and communities","score":0.8299999833106995,"id":"https://metadata.un.org/sdg/11"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W293279915","https://openalex.org/W1520914943","https://openalex.org/W1526747343","https://openalex.org/W1551333318","https://openalex.org/W1596939795","https://openalex.org/W1894693606","https://openalex.org/W1971971880","https://openalex.org/W1982366917","https://openalex.org/W2048402311","https://openalex.org/W2063270819","https://openalex.org/W2071043548","https://openalex.org/W2103388834","https://openalex.org/W2115735006","https://openalex.org/W2117984332","https://openalex.org/W2120062331","https://openalex.org/W2123541927","https://openalex.org/W2128381560","https://openalex.org/W2134347889","https://openalex.org/W2136032111","https://openalex.org/W2137940221","https://openalex.org/W2140257761","https://openalex.org/W2142411122","https://openalex.org/W2143536181","https://openalex.org/W2145417574","https://openalex.org/W2146080444","https://openalex.org/W2147318132","https://openalex.org/W2155899844","https://openalex.org/W2165491783","https://openalex.org/W2313299119","https://openalex.org/W2798333393","https://openalex.org/W2801179766","https://openalex.org/W4248676392","https://openalex.org/W4300223101","https://openalex.org/W6610586359","https://openalex.org/W6631457543","https://openalex.org/W6677374569","https://openalex.org/W6681151506"],"related_works":["https://openalex.org/W3017138616","https://openalex.org/W2763821861","https://openalex.org/W3121588233","https://openalex.org/W4385483253","https://openalex.org/W2602139996","https://openalex.org/W1589054649","https://openalex.org/W2785477058","https://openalex.org/W2072849576","https://openalex.org/W2162431978","https://openalex.org/W1970483394"],"abstract_inverted_index":{"Due":[0],"to":[1,14,40,69],"the":[2,6,45,88,175,180],"broadcast":[3],"nature":[4],"of":[5,26,48,119,148,156,160,164,169,183,195,202],"wireless":[7,9,78],"medium,":[8],"networks":[10],"are":[11,186],"especially":[12],"vulnerable":[13],"Sybil":[15,42,71,121,165,184],"attacks,":[16,43],"where":[17],"a":[18,23,66,127,135,199],"malicious":[19],"node":[20],"illegitimately":[21],"claims":[22],"large":[24],"number":[25,155,159,163,168],"identities":[27],"and":[28,61,76,83,131,167,179,198],"thus":[29],"depletes":[30],"system":[31,149,200],"resources.":[32],"We":[33,64],"propose":[34],"an":[35],"enhanced":[36],"physical-layer":[37,108],"authentication":[38],"scheme":[39],"detect":[41,70],"exploiting":[44],"spatial":[46],"variability":[47],"radio":[49],"channels":[50],"in":[51,59],"environments":[52],"with":[53,99,106,190],"rich":[54],"scattering,":[55],"as":[56,81],"is":[57,123],"typical":[58,140],"indoor":[60,141],"urban":[62],"environments.":[63,142],"build":[65],"hypothesis":[67],"test":[68],"clients":[72],"for":[73,139],"both":[74,126,174],"wideband":[75],"narrowband":[77],"systems,":[79],"such":[80],"WiFi":[82],"WiMax":[84],"systems.":[85],"Based":[86],"on":[87],"existing":[89],"channel":[90,157],"estimation":[91],"mechanisms,":[92],"our":[93,120],"method":[94],"can":[95],"be":[96],"easily":[97],"implemented":[98],"low":[100],"overhead,":[101],"either":[102],"independently":[103],"or":[104],"combined":[105],"other":[107],"security":[109],"methods,":[110],"e.g.,":[111],"<i":[112],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[113],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">spoofing</i>":[114],"attack":[115],"detection.":[116],"The":[117],"performance":[118],"detector":[122],"verified,":[124],"via":[125],"propagation":[128],"modeling":[129],"software":[130],"field":[132],"measurements":[133],"using":[134],"vector":[136],"network":[137],"analyzer,":[138],"Our":[143],"evaluation":[144],"examines":[145],"numerous":[146],"combinations":[147],"parameters,":[150],"including":[151],"bandwidth,":[152],"signal":[153],"power,":[154],"estimates,":[158],"total":[161],"clients,":[162,166],"access":[170],"points.":[171],"For":[172],"instance,":[173],"false":[176],"alarm":[177],"rate":[178,182],"miss":[181],"attacks":[185],"usually":[187],"below":[188],"0.01,":[189],"three":[191],"tones,":[192],"pilot":[193],"power":[194],"10":[196],"mW,":[197],"bandwidth":[201],"20":[203],"MHz.":[204]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":16},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":15},{"year":2018,"cited_by_count":12},{"year":2017,"cited_by_count":11},{"year":2016,"cited_by_count":11},{"year":2015,"cited_by_count":10},{"year":2014,"cited_by_count":13},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":6}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
