{"id":"https://openalex.org/W4288062102","doi":"https://doi.org/10.1109/twc.2022.3192225","title":"Innovative Attack Detection Solutions for Wireless Networks With Application to Location Security","display_name":"Innovative Attack Detection Solutions for Wireless Networks With Application to Location Security","publication_year":2022,"publication_date":"2022-07-26","ids":{"openalex":"https://openalex.org/W4288062102","doi":"https://doi.org/10.1109/twc.2022.3192225"},"language":"en","primary_location":{"id":"doi:10.1109/twc.2022.3192225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/twc.2022.3192225","pdf_url":null,"source":{"id":"https://openalex.org/S63459445","display_name":"IEEE Transactions on Wireless Communications","issn_l":"1536-1276","issn":["1536-1276","1558-2248"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Wireless Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044520390","display_name":"Danilo Orlando","orcid":"https://orcid.org/0000-0001-8630-8505"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Danilo Orlando","raw_affiliation_strings":["Universit&#x00E0; degli Studi &#x201C;Niccol&#x00F2; Cusano&#x201D;, Roma, Italy"],"affiliations":[{"raw_affiliation_string":"Universit&#x00E0; degli Studi &#x201C;Niccol&#x00F2; Cusano&#x201D;, Roma, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073709764","display_name":"Stefania Bartoletti","orcid":"https://orcid.org/0000-0003-1428-9776"},"institutions":[{"id":"https://openalex.org/I4210100607","display_name":"Institute of Electronics, Computer and Telecommunication Engineering","ror":"https://ror.org/00n4jbh84","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210100607","https://openalex.org/I4210155236"]},{"id":"https://openalex.org/I4210155236","display_name":"National Research Council","ror":"https://ror.org/04zaypm56","country_code":"IT","type":"funder","lineage":["https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Stefania Bartoletti","raw_affiliation_strings":["National Research Council of Italy, CNRIEIIT, CNIT, Bologna, Italy"],"affiliations":[{"raw_affiliation_string":"National Research Council of Italy, CNRIEIIT, CNIT, Bologna, Italy","institution_ids":["https://openalex.org/I4210155236","https://openalex.org/I4210100607"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025702435","display_name":"Ivan Palam\u00e0","orcid":"https://orcid.org/0000-0002-7001-7743"},"institutions":[{"id":"https://openalex.org/I116067653","display_name":"University of Rome Tor Vergata","ror":"https://ror.org/02p77k626","country_code":"IT","type":"education","lineage":["https://openalex.org/I116067653"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Ivan Palama","raw_affiliation_strings":["Department of Electronic Engineering, CNIT&#x2013;University of Roma Tor Vergata, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, CNIT&#x2013;University of Roma Tor Vergata, Rome, Italy","institution_ids":["https://openalex.org/I116067653"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007176500","display_name":"Giuseppe Bianchi","orcid":"https://orcid.org/0000-0001-7277-7423"},"institutions":[{"id":"https://openalex.org/I116067653","display_name":"University of Rome Tor Vergata","ror":"https://ror.org/02p77k626","country_code":"IT","type":"education","lineage":["https://openalex.org/I116067653"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giuseppe Bianchi","raw_affiliation_strings":["Department of Electronic Engineering, CNIT&#x2013;University of Roma Tor Vergata, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, CNIT&#x2013;University of Roma Tor Vergata, Rome, Italy","institution_ids":["https://openalex.org/I116067653"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084149953","display_name":"Nicola Bl\u00e9fari-Melazzi","orcid":"https://orcid.org/0000-0001-6245-5543"},"institutions":[{"id":"https://openalex.org/I116067653","display_name":"University of Rome Tor Vergata","ror":"https://ror.org/02p77k626","country_code":"IT","type":"education","lineage":["https://openalex.org/I116067653"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Nicola Blefari Melazzi","raw_affiliation_strings":["Department of Electronic Engineering, CNIT&#x2013;University of Roma Tor Vergata, Rome, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Electronic Engineering, CNIT&#x2013;University of Roma Tor Vergata, Rome, Italy","institution_ids":["https://openalex.org/I116067653"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5044520390"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.1893,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.77572747,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"22","issue":"1","first_page":"205","last_page":"219"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10891","display_name":"Radar Systems and Signal Processing","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8227461576461792},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.7283520102500916},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5814405083656311},{"id":"https://openalex.org/keywords/software-defined-radio","display_name":"Software-defined radio","score":0.5723890066146851},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5253046154975891},{"id":"https://openalex.org/keywords/universal-software-radio-peripheral","display_name":"Universal Software Radio Peripheral","score":0.5212907791137695},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5172258615493774},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.47745469212532043},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4574020504951477},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4483899474143982},{"id":"https://openalex.org/keywords/novelty","display_name":"Novelty","score":0.43626880645751953},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3773479461669922},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.18588757514953613}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8227461576461792},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.7283520102500916},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5814405083656311},{"id":"https://openalex.org/C171115542","wikidata":"https://www.wikidata.org/wiki/Q1331892","display_name":"Software-defined radio","level":2,"score":0.5723890066146851},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5253046154975891},{"id":"https://openalex.org/C192220659","wikidata":"https://www.wikidata.org/wiki/Q1245659","display_name":"Universal Software Radio Peripheral","level":3,"score":0.5212907791137695},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5172258615493774},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.47745469212532043},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4574020504951477},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4483899474143982},{"id":"https://openalex.org/C2778738651","wikidata":"https://www.wikidata.org/wiki/Q16546687","display_name":"Novelty","level":2,"score":0.43626880645751953},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3773479461669922},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.18588757514953613},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C27206212","wikidata":"https://www.wikidata.org/wiki/Q34178","display_name":"Theology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/twc.2022.3192225","is_oa":false,"landing_page_url":"https://doi.org/10.1109/twc.2022.3192225","pdf_url":null,"source":{"id":"https://openalex.org/S63459445","display_name":"IEEE Transactions on Wireless Communications","issn_l":"1536-1276","issn":["1536-1276","1558-2248"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Wireless Communications","raw_type":"journal-article"},{"id":"pmh:oai:arpi.unipi.it:11568/1272478","is_oa":false,"landing_page_url":"https://hdl.handle.net/11568/1272478","pdf_url":null,"source":{"id":"https://openalex.org/S4377196265","display_name":"CINECA IRIS Institutial research information system (University of Pisa)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I108290504","host_organization_name":"University of Pisa","host_organization_lineage":["https://openalex.org/I108290504"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:art.torvergata.it:2108/313482","is_oa":false,"landing_page_url":"https://hdl.handle.net/2108/313482","pdf_url":null,"source":{"id":"https://openalex.org/S4306400993","display_name":"Cineca Institutional Research Information System (Tor Vergata University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I116067653","host_organization_name":"University of Rome Tor Vergata","host_organization_lineage":["https://openalex.org/I116067653"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W653761051","https://openalex.org/W1572298868","https://openalex.org/W1814500939","https://openalex.org/W1963813343","https://openalex.org/W1987441901","https://openalex.org/W1988642664","https://openalex.org/W1992397565","https://openalex.org/W2007666360","https://openalex.org/W2044535354","https://openalex.org/W2049969841","https://openalex.org/W2054877413","https://openalex.org/W2056078831","https://openalex.org/W2065876440","https://openalex.org/W2142411122","https://openalex.org/W2159456857","https://openalex.org/W2183080147","https://openalex.org/W2337120071","https://openalex.org/W2344173564","https://openalex.org/W2513293839","https://openalex.org/W2517020940","https://openalex.org/W2591126410","https://openalex.org/W2592873583","https://openalex.org/W2751870338","https://openalex.org/W2783156170","https://openalex.org/W2792636363","https://openalex.org/W2906890170","https://openalex.org/W2909693411","https://openalex.org/W2932741641","https://openalex.org/W2946045894","https://openalex.org/W2962983518","https://openalex.org/W2963061006","https://openalex.org/W2963927175","https://openalex.org/W2964169624","https://openalex.org/W2979061401","https://openalex.org/W2981830252","https://openalex.org/W2988884236","https://openalex.org/W3004396924","https://openalex.org/W3011312868","https://openalex.org/W3090323027","https://openalex.org/W3107650027","https://openalex.org/W3166175801","https://openalex.org/W3200521553","https://openalex.org/W3209967401","https://openalex.org/W4205565670","https://openalex.org/W4242664287","https://openalex.org/W4245050668","https://openalex.org/W6684225176","https://openalex.org/W6725823166"],"related_works":["https://openalex.org/W4251089492","https://openalex.org/W2993899695","https://openalex.org/W2886621694","https://openalex.org/W2540432762","https://openalex.org/W2127011572","https://openalex.org/W1622326982","https://openalex.org/W2354005007","https://openalex.org/W208897493","https://openalex.org/W117117353","https://openalex.org/W2048387591"],"abstract_inverted_index":{"Modern":[0],"wireless":[1],"communication":[2],"networks":[3],"are":[4,13],"threatened":[5],"by":[6,92],"new":[7],"generations":[8],"of":[9,36,50,94,111,116,155],"radio":[10,32],"hackers.":[11],"These":[12],"skilled":[14],"attackers":[15],"equipped":[16],"with":[17,161],"low-cost":[18],"software":[19],"radios,":[20],"suitably":[21],"instrumented":[22],"so":[23],"as":[24],"to":[25,40,58,68,82,146],"monitor,":[26],"degrade,":[27],"or":[28,71],"even":[29],"alter":[30],"the":[31,46,60,75,83,89,95,107,138,153,156],"signals.":[33],"The":[34,102,114,149],"aim":[35,67],"this":[37,78,112,131],"paper":[38],"is":[39,57],"devise":[41],"innovative":[42],"detection":[43],"architectures":[44],"against":[45],"most":[47],"common":[48],"classes":[49],"threats:":[51],"broadband":[52],"noise":[53],"jammers,":[54],"whose":[55],"goal":[56],"reduce":[59],"signal-to-noise":[61],"ratio,":[62],"and":[63,87,142],"spoofing/meaconing":[64],"attacks,":[65],"which":[66],"inject":[69],"false":[70],"incorrect":[72],"information":[73],"into":[74],"receiver.":[76],"To":[77,130],"end,":[79,132],"we":[80,133],"resort":[81],"hypothesis":[84],"testing":[85],"theory":[86],"solve":[88],"associated":[90],"problems":[91],"means":[93],"GLRT":[96],"possibly":[97],"accounting":[98],"for":[99,126],"penalty":[100],"terms.":[101],"resulting":[103],"decision":[104],"schemes":[105],"represent":[106],"main":[108],"technical":[109],"novelty":[110],"work.":[113],"analysis":[115],"their":[117],"performance":[118],"focuses":[119],"on":[120],"a":[121],"location":[122],"security":[123],"case":[124],"study":[125],"4G/5G":[127],"cellular":[128,139],"networks.":[129],"leverage":[134],"measurement":[135],"models":[136],"from":[137],"localization":[140],"literature":[141],"generate":[143],"data":[144],"according":[145],"these":[147],"models.":[148],"numerical":[150],"results":[151],"show":[152],"effectiveness":[154],"proposed":[157],"approaches":[158],"in":[159],"comparison":[160],"suitable":[162],"counterparts.":[163]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
