{"id":"https://openalex.org/W4226383437","doi":"https://doi.org/10.1145/3507657.3528557","title":"Towards Security-Optimized Placement of ADS-B Sensors","display_name":"Towards Security-Optimized Placement of ADS-B Sensors","publication_year":2022,"publication_date":"2022-05-07","ids":{"openalex":"https://openalex.org/W4226383437","doi":"https://doi.org/10.1145/3507657.3528557"},"language":"en","primary_location":{"id":"doi:10.1145/3507657.3528557","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3507657.3528557","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2204.01994","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009435268","display_name":"Ala\u2019 Darabseh","orcid":"https://orcid.org/0000-0002-7904-9995"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ala' Darabseh","raw_affiliation_strings":["New York University Abu Dhabi, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113870699","display_name":"Christina P\u00f6pper","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Christina P\u00f6pper","raw_affiliation_strings":["New York University Abu Dhabi, Abu Dhabi, UAE"],"affiliations":[{"raw_affiliation_string":"New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5009435268"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.2969,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.90833209,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"39","last_page":"44"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12158","display_name":"Guidance and Control Systems","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.690432071685791},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6757556200027466},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6212694048881531},{"id":"https://openalex.org/keywords/jamming","display_name":"Jamming","score":0.5162386894226074},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.44078660011291504},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.37206482887268066},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2598673105239868}],"concepts":[{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.690432071685791},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6757556200027466},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6212694048881531},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.5162386894226074},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.44078660011291504},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.37206482887268066},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2598673105239868},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3507657.3528557","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3507657.3528557","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2204.01994","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2204.01994","pdf_url":"https://arxiv.org/pdf/2204.01994","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2204.01994","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2204.01994","pdf_url":"https://arxiv.org/pdf/2204.01994","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2008499862","https://openalex.org/W2055991985","https://openalex.org/W2090297307","https://openalex.org/W2110524419","https://openalex.org/W2144186280","https://openalex.org/W2773943334","https://openalex.org/W3044485086","https://openalex.org/W3076768548","https://openalex.org/W3110240444","https://openalex.org/W4226383437","https://openalex.org/W4243683928","https://openalex.org/W4253565363"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4200319726","https://openalex.org/W4229499248","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W2987774938","https://openalex.org/W1984793747","https://openalex.org/W2079312091","https://openalex.org/W2057601146"],"abstract_inverted_index":{"Automatic":[0],"Dependent":[1],"Surveillance":[2],"Broadcast":[3],"(ADS-B)":[4],"sensors":[5,78,139,157],"deployed":[6],"on":[7],"the":[8,73,85,136,146,169],"ground":[9],"are":[10],"central":[11],"to":[12,80,96,122,163,171],"observing":[13],"aerial":[14],"movements":[15],"of":[16,25,76,90,98,138,149,156],"aircraft.":[17],"Their":[18],"unsystematic":[19,74],"placement,":[20],"however,":[21],"results":[22,133],"in":[23,28,35,100,144],"over-densification":[24],"sensor":[26,33,39,56,102,109],"coverage":[27,34,40,110],"some":[29],"areas":[30],"and":[31,46,87,126,167],"insufficient":[32],"other":[36],"areas.":[37,66],"ADS-B":[38,77,101,108],"has":[41],"so":[42],"far":[43],"been":[44],"recognized":[45],"analyzed":[47],"as":[48,111],"an":[49],"availability":[50],"problem;":[51],"it":[52],"was":[53],"tackled":[54],"by":[55,151],"placement":[57,75,130],"optimization":[58,120],"techniques":[59,121],"that":[60,72],"aim":[61],"for":[62],"covering":[63],"large":[64],"enough":[65],"In":[67,104],"this":[68,124],"paper,":[69],"we":[70,106],"demonstrate":[71],"leads":[79],"a":[81,112,141,153,159],"security":[82,114],"problem,":[83],"since":[84],"realization":[86],"possible":[88],"deployment":[89],"protective":[91],"mechanisms":[92],"is":[93],"closely":[94],"linked":[95],"aspects":[97],"redundancy":[99],"coverage.":[103],"particular,":[105],"model":[107],"multi-dimensional":[113],"problem.":[115],"We":[116],"then":[117],"use":[118],"multi-objective":[119],"tackle":[123],"problem":[125],"derive":[127],"security-optimized":[128],"near-optimal":[129],"solutions.":[131],"Our":[132],"show":[134],"how":[135],"location":[137,165],"play":[140],"significant":[142],"role":[143],"reducing":[145,168],"success":[147],"rate":[148],"attackers":[150],"providing":[152],"sufficient":[154],"number":[155],"within":[158],"specific":[160],"geographical":[161],"area":[162],"verify":[164],"claims":[166],"exposure":[170],"jamming":[172],"attacks.":[173]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
