{"id":"https://openalex.org/W4286374021","doi":"https://doi.org/10.1109/tifs.2022.3170276","title":"Towards Spoofing Resistant Next Generation IoT Networks","display_name":"Towards Spoofing Resistant Next Generation IoT Networks","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4286374021","doi":"https://doi.org/10.1109/tifs.2022.3170276"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2022.3170276","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3170276","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Towards_Spoofing_Resistant_Next_Generation_IoT_Networks/20598420","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050394662","display_name":"Mohammad Reza Nosouhi","orcid":"https://orcid.org/0000-0001-6959-0975"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Mohammad Reza Nosouhi","raw_affiliation_strings":["Centre for Cyber Security Research and Innovation, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Cyber Security Research and Innovation, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017825429","display_name":"Keshav Sood","orcid":"https://orcid.org/0000-0002-2127-1438"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Keshav Sood","raw_affiliation_strings":["Centre for Cyber Security Research and Innovation, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Cyber Security Research and Innovation, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058516861","display_name":"Marthie Grobler","orcid":"https://orcid.org/0000-0001-6933-0145"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Marthie Grobler","raw_affiliation_strings":["CSIRO&#x2019;s Data61, Melbourne, VIC, Australia","CSIRO&#x2019"],"affiliations":[{"raw_affiliation_string":"CSIRO&#x2019;s Data61, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]},{"raw_affiliation_string":"CSIRO&#x2019","institution_ids":["https://openalex.org/I1292875679"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077501988","display_name":"Robin Doss","orcid":"https://orcid.org/0000-0001-6143-6850"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Robin Doss","raw_affiliation_strings":["Centre for Cyber Security Research and Innovation, Deakin University, Geelong, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Cyber Security Research and Innovation, Deakin University, Geelong, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5050394662"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":5.1367,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.95937083,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"17","issue":null,"first_page":"1669","last_page":"1683"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10069","display_name":"Antenna Design and Analysis","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8496103286743164},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.787442684173584},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5789950489997864},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.45251160860061646},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4374024271965027},{"id":"https://openalex.org/keywords/ip-address-spoofing","display_name":"IP address spoofing","score":0.4160098433494568},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3515506386756897},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.220632404088974},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.20013079047203064},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1681669056415558}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8496103286743164},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.787442684173584},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5789950489997864},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.45251160860061646},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4374024271965027},{"id":"https://openalex.org/C111814575","wikidata":"https://www.wikidata.org/wiki/Q550893","display_name":"IP address spoofing","level":5,"score":0.4160098433494568},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3515506386756897},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.220632404088974},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.20013079047203064},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1681669056415558},{"id":"https://openalex.org/C147873670","wikidata":"https://www.wikidata.org/wiki/Q11182","display_name":"Network address translation","level":4,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tifs.2022.3170276","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2022.3170276","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30168459","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20598420","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Towards_Spoofing_Resistant_Next_Generation_IoT_Networks/20598420","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20598420","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Towards_Spoofing_Resistant_Next_Generation_IoT_Networks/20598420","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W1733425272","https://openalex.org/W1978762830","https://openalex.org/W1982494235","https://openalex.org/W2157457404","https://openalex.org/W2157646602","https://openalex.org/W2295120647","https://openalex.org/W2344173564","https://openalex.org/W2399237939","https://openalex.org/W2402043120","https://openalex.org/W2483596847","https://openalex.org/W2523343773","https://openalex.org/W2586459757","https://openalex.org/W2592430333","https://openalex.org/W2606332932","https://openalex.org/W2608523105","https://openalex.org/W2626006124","https://openalex.org/W2737360477","https://openalex.org/W2758408537","https://openalex.org/W2761800654","https://openalex.org/W2769332881","https://openalex.org/W2790284307","https://openalex.org/W2790867418","https://openalex.org/W2791256362","https://openalex.org/W2796047239","https://openalex.org/W2805481311","https://openalex.org/W2887249653","https://openalex.org/W2891108782","https://openalex.org/W2892077825","https://openalex.org/W2898104747","https://openalex.org/W2907833908","https://openalex.org/W2924367567","https://openalex.org/W2947767399","https://openalex.org/W2957915633","https://openalex.org/W2963580435","https://openalex.org/W2963910109","https://openalex.org/W2964345771","https://openalex.org/W2968774960","https://openalex.org/W2969551335","https://openalex.org/W2971805149","https://openalex.org/W2976507801","https://openalex.org/W2980594903","https://openalex.org/W2981587265","https://openalex.org/W2988324817","https://openalex.org/W3004171232","https://openalex.org/W3011667710","https://openalex.org/W3034006490","https://openalex.org/W3034172893","https://openalex.org/W3047322466","https://openalex.org/W3098503018","https://openalex.org/W3105281589","https://openalex.org/W3154415946","https://openalex.org/W4239878620"],"related_works":["https://openalex.org/W1978185930","https://openalex.org/W2360631891","https://openalex.org/W1976066853","https://openalex.org/W2383832810","https://openalex.org/W2342553505","https://openalex.org/W4312366226","https://openalex.org/W2051979939","https://openalex.org/W2089278933","https://openalex.org/W2348219379","https://openalex.org/W2361101593"],"abstract_inverted_index":{"The":[0],"potential":[1],"vulnerability":[2],"to":[3,47,95,98,158,219,230],"wireless":[4,85],"spoofing":[5,86],"attacks":[6,87],"is":[7,93,199],"still":[8],"a":[9,54,77,128],"critical":[10],"concern":[11],"for":[12,43,53,81,162,182],"Next":[13],"Generation":[14],"Internet":[15],"of":[16,57,68,84,102,165,245,252],"Things":[17],"(NGIoT)":[18],"networks":[19,45],"which":[20,40,248],"may":[21,31],"result":[22],"in":[23,26,72,88,106,202,242],"catastrophic":[24],"consequences":[25],"mission&#x2013;critical":[27],"applications.":[28],"Conventional":[29],"solutions":[30],"impose":[32],"additional":[33],"signal":[34,216],"processing,":[35],"protocol,":[36],"and":[37,50,75,155,206],"latency":[38],"overheads":[39,218],"are":[41,125,178],"inappropriate":[42],"NGIoT":[44,89],"designed":[46],"provide":[48],"high&#x2013;speed":[49],"low&#x2013;latency":[51],"connections":[52],"large":[55],"number":[56],"resource&#x2013;constrained":[58],"IoT":[59,115,233],"devices.":[60,108],"In":[61,109,235],"this":[62],"paper,":[63],"we":[64,238],"utilize":[65],"the":[66,82,99,119,133,147,151,159,163,186,194,220,223,231,243,250,253],"uniqueness":[67,92],"beam":[69,123,148,187,195],"pattern":[70],"features":[71,124,149],"mmWave&#x2013;enabled":[73,107,114],"devices":[74,116,247],"propose":[76],"scalable":[78],"security":[79],"mechanism":[80,197,225],"detection":[83,164,244],"networks.":[90],"This":[91],"proven":[94],"exist":[96],"due":[97],"non&#x2013;ideal":[100],"manufacturing":[101],"antenna":[103],"arrays":[104],"used":[105],"our":[110,169,236],"approach,":[111],"when":[112],"legitimate":[113],"enrol":[117],"into":[118],"network,":[120],"their":[121],"unique":[122],"learned":[126],"by":[127],"learning":[129,170],"model":[130,171],"developed":[131],"at":[132],"network":[134,140,160],"server.":[135],"Then,":[136],"during":[137],"data":[138],"transmission,":[139],"base":[141],"stations":[142],"(gNBs)/Access":[143],"Points":[144],"(APs)":[145],"measure":[146],"from":[150],"received":[152],"RF":[153],"signals":[154],"send":[156],"them":[157],"server":[161],"anomalies.":[166],"We":[167],"develop":[168],"based":[172],"on":[173],"Deep":[174],"Autoencoders":[175],"(DAEs)":[176],"that":[177,198],"an":[179],"effective":[180],"tool":[181],"anomaly":[183],"detection.":[184],"Fortunately,":[185],"feature":[188,210],"extraction":[189,211],"can":[190],"be":[191],"performed":[192],"using":[193],"searching":[196],"already":[200],"provided":[201],"mmWave":[203],"standards":[204],"(5G&#x2013;NR":[205],"IEEE":[207],"802.11ad).":[208],"Thus,":[209],"does":[212],"not":[213],"introduce":[214],"any":[215],"processing":[217],"system.":[221],"Moreover,":[222],"proposed":[224,254],"imposes":[226],"zero":[227],"computation/communication":[228],"overhead":[229],"resource&#x2014;constrained":[232],"nodes.":[234],"experiments,":[237],"reached":[239],"98.6&#x0025;":[240],"accuracy":[241],"illegitimate":[246],"confirms":[249],"effectiveness":[251],"approach.":[255]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
