{"id":"https://openalex.org/W2946217016","doi":"https://doi.org/10.1145/3317549.3323406","title":"Physical layer plausibility checks for misbehavior detection in V2X networks","display_name":"Physical layer plausibility checks for misbehavior detection in V2X networks","publication_year":2019,"publication_date":"2019-05-15","ids":{"openalex":"https://openalex.org/W2946217016","doi":"https://doi.org/10.1145/3317549.3323406","mag":"2946217016"},"language":"en","primary_location":{"id":"doi:10.1145/3317549.3323406","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3317549.3323406","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009497912","display_name":"Steven So","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Steven So","raw_affiliation_strings":["Boston University"],"affiliations":[{"raw_affiliation_string":"Boston University","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103533806","display_name":"Jonathan Petit","orcid":"https://orcid.org/0000-0002-8644-1442"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jonathan Petit","raw_affiliation_strings":["OnBoard Security"],"affiliations":[{"raw_affiliation_string":"OnBoard Security","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011231717","display_name":"David Starobinski","orcid":"https://orcid.org/0000-0002-8071-3865"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"David Starobinski","raw_affiliation_strings":["Boston University"],"affiliations":[{"raw_affiliation_string":"Boston University","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5009497912"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.5988,"has_fulltext":false,"cited_by_count":75,"citation_normalized_percentile":{"value":0.9534735,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"84","last_page":"93"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10370","display_name":"Traffic and Road Safety","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.8411240577697754},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8306523561477661},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.6978538632392883},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.6684845089912415},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6226744651794434},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.4696480631828308},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3729957640171051},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33729350566864014},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3206444978713989},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3185216188430786},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11376515030860901},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.08039748668670654}],"concepts":[{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.8411240577697754},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8306523561477661},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.6978538632392883},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.6684845089912415},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6226744651794434},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.4696480631828308},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3729957640171051},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33729350566864014},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3206444978713989},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3185216188430786},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11376515030860901},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.08039748668670654},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3317549.3323406","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3317549.3323406","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W74935252","https://openalex.org/W1501401335","https://openalex.org/W1969799745","https://openalex.org/W2039208164","https://openalex.org/W2060108923","https://openalex.org/W2062789233","https://openalex.org/W2085685015","https://openalex.org/W2115629149","https://openalex.org/W2135840460","https://openalex.org/W2142809161","https://openalex.org/W2328056838","https://openalex.org/W2752671358","https://openalex.org/W2776458791","https://openalex.org/W2786191750","https://openalex.org/W2792291478","https://openalex.org/W2797476701","https://openalex.org/W2910871229","https://openalex.org/W2964314709"],"related_works":["https://openalex.org/W2188559950","https://openalex.org/W2998478967","https://openalex.org/W2989910292","https://openalex.org/W2123299109","https://openalex.org/W3128793638","https://openalex.org/W2021230337","https://openalex.org/W4401097268","https://openalex.org/W4391805690","https://openalex.org/W4283217267","https://openalex.org/W2209485861"],"abstract_inverted_index":{"Location":[0],"spoofing":[1,27],"is":[2,100],"a":[3,148],"proven":[4],"and":[5,18,88,147],"powerful":[6],"attack":[7],"against":[8],"Vehicle-to-everything":[9],"(V2X)":[10],"communication":[11],"systems":[12],"that":[13,29,47,95,128],"can":[14,30,81],"cause":[15],"traffic":[16],"congestion":[17],"other":[19],"safety":[20,57],"hazards.":[21],"Recent":[22],"work":[23],"also":[24,74],"demonstrates":[25],"practical":[26],"attacks":[28],"circumvent":[31],"application":[32,164],"layer":[33,44,133],"sanity":[34],"checks.":[35],"In":[36],"this":[37],"paper,":[38],"we":[39,116],"propose":[40],"three":[41,138],"novel":[42],"physical":[43,132],"plausibility":[45,61,109,134],"checks":[46,62,80,110],"leverage":[48],"the":[49,70,93,96,105,112,119,129,137,163],"received":[50],"signal":[51],"strength":[52],"indicator":[53],"(RSSI)":[54],"of":[55,98,107,124,145,150],"basic":[56],"messages":[58],"(BSMs).":[59],"These":[60,79],"have":[63],"multi-step":[64],"mechanisms":[65],"to":[66,75],"improve":[67],"not":[68,90],"only":[69],"detection":[71,143,159],"rate,":[72],"but":[73],"decrease":[76],"false":[77],"positives.":[78],"be":[82],"run":[83],"independently":[84],"by":[85],"each":[86],"vehicle":[87],"do":[89],"rely":[91],"on":[92],"assumption":[94],"majority":[97],"vehicles":[99],"honest.":[101],"We":[102,126],"comprehensively":[103],"evaluate":[104],"performance":[106],"these":[108],"using":[111],"VeReMi":[113],"dataset":[114],"(which":[115],"enhance":[117],"along":[118],"way)":[120],"for":[121],"several":[122],"types":[123],"attacks.":[125],"show":[127],"best":[130],"performing":[131],"check":[135],"among":[136],"considered":[139],"achieves":[140],"an":[141],"overall":[142],"rate":[144],"83.73%":[146],"precision":[149],"95.91%,":[151],"far":[152],"outperforming":[153],"recently":[154],"proposed":[155],"machine":[156],"learning-based":[157],"misbehavior":[158],"methods":[160],"operating":[161],"at":[162],"layer.":[165]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":20},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
