{"id":"https://openalex.org/W2137816628","doi":"https://doi.org/10.1109/tvt.2010.2044904","title":"Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks","display_name":"Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks","publication_year":2010,"publication_date":"2010-03-09","ids":{"openalex":"https://openalex.org/W2137816628","doi":"https://doi.org/10.1109/tvt.2010.2044904","mag":"2137816628"},"language":"en","primary_location":{"id":"doi:10.1109/tvt.2010.2044904","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2010.2044904","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100394750","display_name":"Yingying Chen","orcid":"https://orcid.org/0000-0002-3994-766X"},"institutions":[{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yingying Chen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, NJ, USA","Dept. of Electr. & Comput. Eng., Stevens Inst. of Technol., Hoboken, NJ, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Stevens Inst. of Technol., Hoboken, NJ, USA#TAB#","institution_ids":["https://openalex.org/I108468826"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068383847","display_name":"Jie Yang","orcid":"https://orcid.org/0000-0002-8244-2181"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]},{"id":"https://openalex.org/I108468826","display_name":"Stevens Institute of Technology","ror":"https://ror.org/02z43xh36","country_code":"US","type":"education","lineage":["https://openalex.org/I108468826"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jie Yang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, NJ, USA","Dept. of Electr. & Comput. Eng., Rutgers, State Univ. of New Jersey, Piscataway, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Stevens Institute of Technology, Hoboken, NJ, USA","institution_ids":["https://openalex.org/I108468826"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Rutgers, State Univ. of New Jersey, Piscataway, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078633885","display_name":"Wade Trappe","orcid":"https://orcid.org/0000-0002-0635-9458"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wade Trappe","raw_affiliation_strings":["Wireless Information Network Laboratory and the Department of Electrical and Computer Engineering, Rutgers, State University of New Jersey, Piscataway, NJ, USA","Dept. of Electr. & Comput. Eng., Rutgers, State Univ. of New Jersey, Piscataway, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Wireless Information Network Laboratory and the Department of Electrical and Computer Engineering, Rutgers, State University of New Jersey, Piscataway, NJ, USA","institution_ids":["https://openalex.org/I102322142"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Rutgers, State Univ. of New Jersey, Piscataway, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067817607","display_name":"Richard P. Martin","orcid":"https://orcid.org/0000-0001-9290-3984"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Richard P. Martin","raw_affiliation_strings":["Wireless Information Network Laboratory and the Department of Electrical and Computer Engineering, Rutgers, State University of New Jersey, Piscataway, NJ, USA","Dept. of Comput. Sci. Rutgers, State Univ. of New Jersey, Piscataway, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Wireless Information Network Laboratory and the Department of Electrical and Computer Engineering, Rutgers, State University of New Jersey, Piscataway, NJ, USA","institution_ids":["https://openalex.org/I102322142"]},{"raw_affiliation_string":"Dept. of Comput. Sci. Rutgers, State Univ. of New Jersey, Piscataway, NJ, USA","institution_ids":["https://openalex.org/I102322142"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100394750"],"corresponding_institution_ids":["https://openalex.org/I108468826"],"apc_list":null,"apc_paid":null,"fwci":5.882,"has_fulltext":false,"cited_by_count":213,"citation_normalized_percentile":{"value":0.96446086,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"59","issue":"5","first_page":"2418","last_page":"2434"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9848999977111816,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8513505458831787},{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.7654942274093628},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6838264465332031},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5872817039489746},{"id":"https://openalex.org/keywords/rss","display_name":"RSS","score":0.5532259941101074},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5489320755004883},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5275297164916992},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5188673734664917},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5153883695602417},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4838823080062866},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.434101402759552},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.40553218126296997},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16778409481048584},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10534408688545227}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8513505458831787},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.7654942274093628},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6838264465332031},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5872817039489746},{"id":"https://openalex.org/C2385561","wikidata":"https://www.wikidata.org/wiki/Q45432","display_name":"RSS","level":2,"score":0.5532259941101074},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5489320755004883},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5275297164916992},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5188673734664917},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5153883695602417},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4838823080062866},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.434101402759552},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.40553218126296997},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16778409481048584},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10534408688545227},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tvt.2010.2044904","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2010.2044904","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.386.5721","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.386.5721","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://personal.stevens.edu/~ychen6/papers/Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks.pdf","raw_type":"text"},{"id":"pmh:oai:alma.01RUT_INST:11685435510004646","is_oa":false,"landing_page_url":"https://scholarship.libraries.rutgers.edu/esploro/outputs/journalArticle/Detecting-and-Localizing-Identity-Based-Attacks-in/991031758514204646","pdf_url":null,"source":{"id":"https://openalex.org/S4210197018","display_name":"View","issn_l":"2688-268X","issn":["2688-268X","2688-3988"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Sustainable cities and communities","id":"https://metadata.un.org/sdg/11","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":64,"referenced_works":["https://openalex.org/W595252221","https://openalex.org/W1490911773","https://openalex.org/W1520914943","https://openalex.org/W1526747343","https://openalex.org/W1551333318","https://openalex.org/W1554944419","https://openalex.org/W1608826770","https://openalex.org/W1658748398","https://openalex.org/W1979154650","https://openalex.org/W1982366917","https://openalex.org/W1987366715","https://openalex.org/W1988543519","https://openalex.org/W2002054891","https://openalex.org/W2077254915","https://openalex.org/W2093830013","https://openalex.org/W2094204865","https://openalex.org/W2100456966","https://openalex.org/W2100796177","https://openalex.org/W2103902040","https://openalex.org/W2104782624","https://openalex.org/W2112737587","https://openalex.org/W2112989186","https://openalex.org/W2114579022","https://openalex.org/W2116269350","https://openalex.org/W2116662625","https://openalex.org/W2116790923","https://openalex.org/W2126087831","https://openalex.org/W2132047492","https://openalex.org/W2136755117","https://openalex.org/W2138518497","https://openalex.org/W2140372921","https://openalex.org/W2142411122","https://openalex.org/W2143243918","https://openalex.org/W2147016173","https://openalex.org/W2150887819","https://openalex.org/W2155899844","https://openalex.org/W2158421323","https://openalex.org/W2159405390","https://openalex.org/W2163326674","https://openalex.org/W2165491783","https://openalex.org/W2165527697","https://openalex.org/W2166792099","https://openalex.org/W2170102584","https://openalex.org/W2171033594","https://openalex.org/W2172053965","https://openalex.org/W2184704543","https://openalex.org/W2313299119","https://openalex.org/W2587162452","https://openalex.org/W2610335499","https://openalex.org/W2775693717","https://openalex.org/W2801179766","https://openalex.org/W3211513184","https://openalex.org/W4240955015","https://openalex.org/W4247914586","https://openalex.org/W4285719527","https://openalex.org/W4300223101","https://openalex.org/W6629488238","https://openalex.org/W6630973029","https://openalex.org/W6631457543","https://openalex.org/W6636959011","https://openalex.org/W6677034200","https://openalex.org/W6681076384","https://openalex.org/W6683357393","https://openalex.org/W6684183790"],"related_works":["https://openalex.org/W426968574","https://openalex.org/W2365639220","https://openalex.org/W2382520895","https://openalex.org/W2393709043","https://openalex.org/W2080567403","https://openalex.org/W2539387137","https://openalex.org/W2010734409","https://openalex.org/W4387799680","https://openalex.org/W4308237908","https://openalex.org/W2040717328"],"abstract_inverted_index":{"Wireless":[0],"networks":[1],"are":[2],"vulnerable":[3],"to":[4,133,222],"identity-based":[5,109,225],"attacks,":[6,11],"including":[7],"spoofing":[8,59],"and":[9,45,60,209,233,255],"Sybil":[10,61],"which":[12,153],"allows":[13],"for":[14,56,106],"many":[15],"other":[16],"forms":[17],"of":[18,26,68,82,97,108,125,159,167,242,245,253],"attacks":[19,62,110,226],"on":[20],"the":[21,24,65,79,103,113,123,135,157,160,165,168,181,187,243,246,250,256],"networks.":[22],"Although":[23],"identity":[25],"a":[27,54,73,94,148,229,234],"node":[28],"can":[29,154,170],"be":[30,171],"verified":[31],"through":[32,195],"cryptographic":[33],"authentication,":[34],"authentication":[35],"is":[36,119,220],"not":[37],"always":[38],"possible,":[39],"because":[40],"it":[41,219],"requires":[42],"key":[43],"management":[44],"additional":[46],"infrastructural":[47],"overhead.":[48],"In":[49],"this":[50],"paper,":[51],"we":[52,142],"propose":[53,72],"method":[55],"detecting":[57],"both":[58,203,228],"by":[63,111],"using":[64,112,173,202],"same":[66,182],"set":[67],"techniques.":[69],"We":[70,91,100,138,162,190],"first":[71],"generalized":[74],"attack-detection":[75],"model":[76],"that":[77,127,164,218],"utilizes":[78],"spatial":[80,251],"correlation":[81,252],"received":[83],"signal":[84],"strength":[85],"(RSS)":[86],"inherited":[87],"from":[88],"wireless":[89,224],"nodes.":[90],"further":[92,139,191],"provide":[93],"theoretical":[95],"analysis":[96],"our":[98,144,193],"approach.":[99],"then":[101],"derive":[102],"test":[104],"statistics":[105],"detection":[107,136,231],"K-means":[114],"algorithm.":[115],"Our":[116,215],"attack":[117,134,145,247,257],"detector":[118,146,248],"robust":[120],"when":[121],"handling":[122],"situations":[124],"attackers":[126,169],"use":[128],"different":[129],"transmission":[130],"power":[131],"levels":[132],"scheme.":[137],"describe":[140],"how":[141],"integrated":[143],"into":[147],"real-time":[149],"indoor":[150],"localization":[151,178],"system,":[152],"also":[155],"localize":[156],"positions":[158,166],"attackers.":[161],"show":[163,217],"localized":[172],"either":[174],"area-":[175],"or":[176],"point-based":[177],"algorithms":[179],"with":[180,227],"relative":[183],"errors":[184],"as":[185],"in":[186,197],"normal":[188],"case.":[189],"evaluated":[192],"methods":[194],"experimentation":[196],"two":[198],"real":[199],"office":[200],"buildings":[201],"an":[204,210],"IEEE":[205,211],"802.11":[206],"(WiFi)":[207],"network":[208],"802.15.4":[212],"(ZigBee)":[213],"network.":[214],"results":[216],"possible":[221],"detect":[223],"high":[230],"rate":[232],"low":[235],"false-positive":[236],"rate,":[237],"thereby":[238],"providing":[239],"strong":[240],"evidence":[241],"effectiveness":[244],"utilizing":[249],"RSS":[254],"localizer.":[258]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":16},{"year":2019,"cited_by_count":27},{"year":2018,"cited_by_count":29},{"year":2017,"cited_by_count":17},{"year":2016,"cited_by_count":17},{"year":2015,"cited_by_count":16},{"year":2014,"cited_by_count":17},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":11}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
