{"id":"https://openalex.org/W4220877892","doi":"https://doi.org/10.1109/tvt.2022.3161006","title":"Game Theoretic Physical Layer Authentication for Spoofing Detection in UAV Communications","display_name":"Game Theoretic Physical Layer Authentication for Spoofing Detection in UAV Communications","publication_year":2022,"publication_date":"2022-03-22","ids":{"openalex":"https://openalex.org/W4220877892","doi":"https://doi.org/10.1109/tvt.2022.3161006"},"language":"en","primary_location":{"id":"doi:10.1109/tvt.2022.3161006","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2022.3161006","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101846955","display_name":"Yi Zhou","orcid":"https://orcid.org/0000-0001-6407-068X"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yi Zhou","raw_affiliation_strings":["Key Lab of Information Coding, and Transmission, Southwest Jiaotong University, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0001-6407-068X","affiliations":[{"raw_affiliation_string":"Key Lab of Information Coding, and Transmission, Southwest Jiaotong University, Chengdu, China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064721659","display_name":"Phee Lep Yeoh","orcid":"https://orcid.org/0000-0002-2516-4226"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"The University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Phee Lep Yeoh","raw_affiliation_strings":["School of Electrical and Information Engineering, University of Sydney, Sydney, NSW, Australia"],"raw_orcid":"https://orcid.org/0000-0002-2516-4226","affiliations":[{"raw_affiliation_string":"School of Electrical and Information Engineering, University of Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059938882","display_name":"Kyeong Jin Kim","orcid":"https://orcid.org/0000-0002-1943-8307"},"institutions":[{"id":"https://openalex.org/I4210159266","display_name":"Mitsubishi Electric (United States)","ror":"https://ror.org/053jnhe44","country_code":"US","type":"company","lineage":["https://openalex.org/I1306287861","https://openalex.org/I4210133125","https://openalex.org/I4210159266"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kyeong Jin Kim","raw_affiliation_strings":["Mitsubishi Electric Research Laboratories, Cambridge, MA, USA"],"raw_orcid":"https://orcid.org/0000-0002-1943-8307","affiliations":[{"raw_affiliation_string":"Mitsubishi Electric Research Laboratories, Cambridge, MA, USA","institution_ids":["https://openalex.org/I4210159266"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064437214","display_name":"Zheng Ma","orcid":"https://orcid.org/0000-0002-0251-1483"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zheng Ma","raw_affiliation_strings":["State Key Laboratory of Rail Transit Engineering Informatization (FSDI), Southwest Jiaotong University, Chengdu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Rail Transit Engineering Informatization (FSDI), Southwest Jiaotong University, Chengdu, China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100448724","display_name":"Yonghui Li","orcid":"https://orcid.org/0000-0001-7702-1123"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"The University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yonghui Li","raw_affiliation_strings":["School of Electrical and Information Engineering, University of Sydney, Sydney, NSW, Australia"],"raw_orcid":"https://orcid.org/0000-0001-7702-1123","affiliations":[{"raw_affiliation_string":"School of Electrical and Information Engineering, University of Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043371405","display_name":"Branka Vucetic","orcid":"https://orcid.org/0000-0002-2700-2001"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"The University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Branka Vucetic","raw_affiliation_strings":["School of Electrical and Information Engineering, University of Sydney, Sydney, NSW, Australia"],"raw_orcid":"https://orcid.org/0000-0002-2700-2001","affiliations":[{"raw_affiliation_string":"School of Electrical and Information Engineering, University of Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101846955"],"corresponding_institution_ids":["https://openalex.org/I4800084"],"apc_list":null,"apc_paid":null,"fwci":21.6733,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.9914749,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"71","issue":"6","first_page":"6750","last_page":"6755"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8195716142654419},{"id":"https://openalex.org/keywords/rss","display_name":"RSS","score":0.7851728200912476},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.7551772594451904},{"id":"https://openalex.org/keywords/constant-false-alarm-rate","display_name":"Constant false alarm rate","score":0.7240304946899414},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.6512892246246338},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.6402233839035034},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6393600702285767},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.5159700512886047},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.502966582775116},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.460050106048584},{"id":"https://openalex.org/keywords/monte-carlo-method","display_name":"Monte Carlo method","score":0.4331305921077728},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.36770832538604736},{"id":"https://openalex.org/keywords/simulation","display_name":"Simulation","score":0.340190589427948},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3070825934410095},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23760566115379333},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2205137014389038},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19748875498771667},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16304224729537964},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15964925289154053},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.15570804476737976},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.11972498893737793}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8195716142654419},{"id":"https://openalex.org/C2385561","wikidata":"https://www.wikidata.org/wiki/Q45432","display_name":"RSS","level":2,"score":0.7851728200912476},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.7551772594451904},{"id":"https://openalex.org/C77052588","wikidata":"https://www.wikidata.org/wiki/Q644307","display_name":"Constant false alarm rate","level":2,"score":0.7240304946899414},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.6512892246246338},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.6402233839035034},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6393600702285767},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.5159700512886047},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.502966582775116},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.460050106048584},{"id":"https://openalex.org/C19499675","wikidata":"https://www.wikidata.org/wiki/Q232207","display_name":"Monte Carlo method","level":2,"score":0.4331305921077728},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.36770832538604736},{"id":"https://openalex.org/C44154836","wikidata":"https://www.wikidata.org/wiki/Q45045","display_name":"Simulation","level":1,"score":0.340190589427948},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3070825934410095},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23760566115379333},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2205137014389038},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19748875498771667},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16304224729537964},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15964925289154053},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.15570804476737976},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.11972498893737793},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tvt.2022.3161006","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tvt.2022.3161006","pdf_url":null,"source":{"id":"https://openalex.org/S10936095","display_name":"IEEE Transactions on Vehicular Technology","issn_l":"0018-9545","issn":["0018-9545","1939-9359"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Vehicular Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1642136810","display_name":null,"funder_award_id":"2022NSFSC0887","funder_id":"https://openalex.org/F4320329861","funder_display_name":"Natural Science Foundation of Sichuan Province"},{"id":"https://openalex.org/G3744087091","display_name":null,"funder_award_id":"2682021ZTPY117","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G6423048396","display_name":null,"funder_award_id":"2682022CX020","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320329861","display_name":"Natural Science Foundation of Sichuan Province","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1988456768","https://openalex.org/W2137816628","https://openalex.org/W2536203477","https://openalex.org/W2577677465","https://openalex.org/W2740735586","https://openalex.org/W2768437671","https://openalex.org/W2803652442","https://openalex.org/W2890006332","https://openalex.org/W2911909845","https://openalex.org/W2964093908","https://openalex.org/W2964279222","https://openalex.org/W2981262799","https://openalex.org/W3103250346","https://openalex.org/W3106659200","https://openalex.org/W3156111371","https://openalex.org/W3210896474"],"related_works":["https://openalex.org/W426968574","https://openalex.org/W2365639220","https://openalex.org/W4283217267","https://openalex.org/W2209485861","https://openalex.org/W1983393909","https://openalex.org/W2040150569","https://openalex.org/W2468095590","https://openalex.org/W2132174924","https://openalex.org/W1911540634","https://openalex.org/W2013909972"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,46],"propose":[4],"a":[5,35,39,64],"game":[6,67],"theoretic":[7],"framework":[8],"for":[9,57,99,113],"secure":[10],"physical":[11],"layer":[12],"authentication":[13],"(PLA)":[14],"by":[15],"applying":[16],"the":[17,26,49,58,69,78,91,100,114,125,129,139],"spatial":[18],"correlations":[19],"of":[20],"received":[21],"signal":[22],"strength":[23],"(RSS)":[24],"in":[25,138],"air-to-ground":[27],"channels":[28],"between":[29,128],"an":[30],"unmanned":[31],"aerial":[32],"vehicle":[33],"(UAV),":[34],"legitimate":[36],"transmitter,":[37],"and":[38,53,95,118,135],"spoofer.":[40],"Based":[41],"on":[42],"our":[43,110],"hypothesis":[44],"model,":[45],"first":[47],"derive":[48,90],"false":[50,115],"alarm":[51,116],"rate":[52,56,117],"miss":[54,119],"detection":[55,75,120,130],"UAV":[59,70,136],"receiver.":[60],"We":[61,89],"then":[62],"formulate":[63],"zero-sum":[65],"PLA":[66,102],"where":[68],"receiver":[71],"selects":[72,80],"its":[73,81,96],"RSS":[74],"threshold":[76],"while":[77],"spoofer":[79],"attack":[82,133],"probability":[83,134],"to":[84],"maximize":[85],"their":[86],"respective":[87],"utilities.":[88],"Nash":[92],"equilibrium":[93],"(NE)":[94],"existence":[97],"condition":[98],"proposed":[101],"game.":[103],"Monte":[104],"Carlo":[105],"simulation":[106],"results":[107,123],"accurately":[108],"verify":[109],"analytical":[111],"expressions":[112],"rate.":[121],"Numerical":[122],"highlight":[124],"complex":[126],"interplay":[127],"threshold,":[131],"spoofing":[132],"altitude":[137],"derived":[140],"NE.":[141]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
