{"id":"https://openalex.org/W2155899844","doi":"https://doi.org/10.1145/1161289.1161298","title":"Detecting identity-based attacks in wireless networks using signalprints","display_name":"Detecting identity-based attacks in wireless networks using signalprints","publication_year":2006,"publication_date":"2006-09-28","ids":{"openalex":"https://openalex.org/W2155899844","doi":"https://doi.org/10.1145/1161289.1161298","mag":"2155899844"},"language":"en","primary_location":{"id":"doi:10.1145/1161289.1161298","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1161289.1161298","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM workshop on Wireless security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079225258","display_name":"Daniel B. Faria","orcid":null},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Daniel B. Faria","raw_affiliation_strings":["Stanford University"],"affiliations":[{"raw_affiliation_string":"Stanford University","institution_ids":["https://openalex.org/I97018004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032416534","display_name":"David R. Cheriton","orcid":null},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David R. Cheriton","raw_affiliation_strings":["Stanford University"],"affiliations":[{"raw_affiliation_string":"Stanford University","institution_ids":["https://openalex.org/I97018004"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5079225258"],"corresponding_institution_ids":["https://openalex.org/I97018004"],"apc_list":null,"apc_paid":null,"fwci":21.8278,"has_fulltext":false,"cited_by_count":304,"citation_normalized_percentile":{"value":0.99699314,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"43","last_page":"52"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.8461474180221558},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7918176054954529},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7691711783409119},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7100722193717957},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5630419850349426},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5416082143783569},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.48066842555999756},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.47565218806266785},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.45166635513305664},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.42715564370155334},{"id":"https://openalex.org/keywords/ieee-802.11","display_name":"IEEE 802.11","score":0.4127351939678192},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4107424318790436},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12384578585624695},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.06800392270088196}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.8461474180221558},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7918176054954529},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7691711783409119},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7100722193717957},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5630419850349426},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5416082143783569},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.48066842555999756},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.47565218806266785},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.45166635513305664},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.42715564370155334},{"id":"https://openalex.org/C185298936","wikidata":"https://www.wikidata.org/wiki/Q193228","display_name":"IEEE 802.11","level":4,"score":0.4127351939678192},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4107424318790436},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12384578585624695},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.06800392270088196},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1161289.1161298","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1161289.1161298","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th ACM workshop on Wireless security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6899999976158142}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W120660591","https://openalex.org/W127475754","https://openalex.org/W1526747343","https://openalex.org/W1551333318","https://openalex.org/W1608826770","https://openalex.org/W1675137049","https://openalex.org/W1976671856","https://openalex.org/W1999604371","https://openalex.org/W2000093279","https://openalex.org/W2001298596","https://openalex.org/W2031081839","https://openalex.org/W2044931626","https://openalex.org/W2051376734","https://openalex.org/W2102449144","https://openalex.org/W2118151299","https://openalex.org/W2142136129","https://openalex.org/W2144765142","https://openalex.org/W2145417574","https://openalex.org/W2170102584","https://openalex.org/W2394489512","https://openalex.org/W6637158563","https://openalex.org/W6650024609","https://openalex.org/W6658265608"],"related_works":["https://openalex.org/W2883256816","https://openalex.org/W2171408034","https://openalex.org/W3003320923","https://openalex.org/W2106140982","https://openalex.org/W2152313554","https://openalex.org/W2064303750","https://openalex.org/W4285042611","https://openalex.org/W1509300825","https://openalex.org/W3092582874","https://openalex.org/W2151234995"],"abstract_inverted_index":{"Wireless":[0],"networks":[1,37],"are":[2,54,119],"vulnerable":[3,43],"to":[4,17,24,41,44,148],"many":[5],"identity-based":[6,164],"attacks":[7,46,165],"in":[8,34,111,133],"which":[9],"a":[10,20,62,72,112,160],"malicious":[11],"device":[12,64],"uses":[13],"forged":[14],"MAC":[15,90],"addresses":[16,91],"masquerade":[18],"as":[19,83,100],"specific":[21],"client":[22],"or":[23,92],"create":[25],"multiple":[26],"illegitimate":[27],"identities.":[28],"For":[29],"example,":[30],"several":[31],"link-layer":[32],"services":[33],"IEEE":[35],"802.11":[36],"have":[38,99],"been":[39],"shown":[40],"be":[42,66],"such":[45],"even":[47],"when":[48],"802.11i/1X":[49],"and":[50],"other":[51,93],"security":[52],"mechanisms":[53],"deployed.":[55],"In":[56],"this":[57],"paper":[58],"we":[59,115],"show":[60,86],"that":[61,117],"transmitting":[63],"can":[65],"robustly":[67,149],"identified":[68],"by":[69,79],"its":[70],"signalprint,":[71],"tuple":[73],"of":[74,126,154,159,163],"signal":[75],"strength":[76],"values":[77,130],"reported":[78],"access":[80],"points":[81],"acting":[82],"sensors.":[84],"We":[85],"that,":[87],"different":[88],"from":[89],"packet":[94,155],"contents,":[95,156],"attackers":[96],"do":[97],"not":[98],"much":[101],"control":[102],"regarding":[103],"the":[104,123,144],"signalprints":[105,118],"they":[106],"produce.":[107],"Moreover,":[108],"using":[109],"measurements":[110],"testbed":[113],"network,":[114],"demonstrate":[116],"strongly":[120],"correlated":[121],"with":[122,128,140,166],"physical":[124],"location":[125],"clients,":[127],"similar":[129],"found":[131],"mostly":[132],"close":[134],"proximity.":[135],"By":[136],"tagging":[137],"suspicious":[138],"packets":[139],"their":[141],"corresponding":[142],"signalprints,":[143],"network":[145],"is":[146],"able":[147],"identify":[150],"each":[151],"transmitter":[152],"independently":[153],"allowing":[157],"detection":[158],"large":[161],"class":[162],"high":[167],"probability.":[168]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":17},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":17},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":14},{"year":2015,"cited_by_count":23},{"year":2014,"cited_by_count":41},{"year":2013,"cited_by_count":21},{"year":2012,"cited_by_count":14}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
