{"id":"https://openalex.org/W3193246853","doi":"https://doi.org/10.3390/jcp1030023","title":"RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach","display_name":"RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach","publication_year":2021,"publication_date":"2021-08-12","ids":{"openalex":"https://openalex.org/W3193246853","doi":"https://doi.org/10.3390/jcp1030023","mag":"3193246853"},"language":"en","primary_location":{"id":"doi:10.3390/jcp1030023","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1030023","pdf_url":"https://www.mdpi.com/2624-800X/1/3/23/pdf?version=1628757101","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/1/3/23/pdf?version=1628757101","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088000739","display_name":"Pooria Madani","orcid":"https://orcid.org/0000-0002-4474-8817"},"institutions":[{"id":"https://openalex.org/I192455969","display_name":"York University","ror":"https://ror.org/05fq50484","country_code":"CA","type":"education","lineage":["https://openalex.org/I192455969"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Pooria Madani","raw_affiliation_strings":["Electrical Engineering and Computer Science, York University, Toronto, ON M3J 1P3, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering and Computer Science, York University, Toronto, ON M3J 1P3, Canada","institution_ids":["https://openalex.org/I192455969"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079596413","display_name":"Natalija Vlajic","orcid":"https://orcid.org/0000-0001-9921-0128"},"institutions":[{"id":"https://openalex.org/I192455969","display_name":"York University","ror":"https://ror.org/05fq50484","country_code":"CA","type":"education","lineage":["https://openalex.org/I192455969"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Natalija Vlajic","raw_affiliation_strings":["Electrical Engineering and Computer Science, York University, Toronto, ON M3J 1P3, Canada"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering and Computer Science, York University, Toronto, ON M3J 1P3, Canada","institution_ids":["https://openalex.org/I192455969"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088000739"],"corresponding_institution_ids":["https://openalex.org/I192455969"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":0.9518,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.80162902,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"1","issue":"3","first_page":"453","last_page":"469"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.789528489112854},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7625043392181396},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.74397212266922},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.6680779457092285},{"id":"https://openalex.org/keywords/subnetwork","display_name":"Subnetwork","score":0.605880081653595},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4809700548648834},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4773026704788208},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4674661457538605},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.44807082414627075},{"id":"https://openalex.org/keywords/mac-address","display_name":"MAC address","score":0.41481178998947144},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40900710225105286},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3548480272293091},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3484879434108734},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17478960752487183}],"concepts":[{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.789528489112854},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7625043392181396},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.74397212266922},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.6680779457092285},{"id":"https://openalex.org/C2780186347","wikidata":"https://www.wikidata.org/wiki/Q11414","display_name":"Subnetwork","level":2,"score":0.605880081653595},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4809700548648834},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4773026704788208},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4674661457538605},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.44807082414627075},{"id":"https://openalex.org/C2777321455","wikidata":"https://www.wikidata.org/wiki/Q20484","display_name":"MAC address","level":2,"score":0.41481178998947144},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40900710225105286},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3548480272293091},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3484879434108734},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17478960752487183},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/jcp1030023","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1030023","pdf_url":"https://www.mdpi.com/2624-800X/1/3/23/pdf?version=1628757101","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f11e57ddd39c418290462f8cfc80d1a9","is_oa":true,"landing_page_url":"https://doaj.org/article/f11e57ddd39c418290462f8cfc80d1a9","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 1, Iss 3, Pp 453-469 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/jcp1030023","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1030023","pdf_url":"https://www.mdpi.com/2624-800X/1/3/23/pdf?version=1628757101","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3193246853.pdf","grobid_xml":"https://content.openalex.org/works/W3193246853.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W133617167","https://openalex.org/W1551333318","https://openalex.org/W1894414046","https://openalex.org/W2016301057","https://openalex.org/W2026089663","https://openalex.org/W2101866211","https://openalex.org/W2132047492","https://openalex.org/W2136032111","https://openalex.org/W2142411122","https://openalex.org/W2151773168","https://openalex.org/W2155899844","https://openalex.org/W2263743041","https://openalex.org/W2335999708","https://openalex.org/W2753526808","https://openalex.org/W2798248638","https://openalex.org/W2889474184","https://openalex.org/W2912290085","https://openalex.org/W2941918278","https://openalex.org/W3096717384","https://openalex.org/W6682371931","https://openalex.org/W6692927045"],"related_works":["https://openalex.org/W2253673607","https://openalex.org/W4220855953","https://openalex.org/W2064724281","https://openalex.org/W4280534995","https://openalex.org/W1997099533","https://openalex.org/W2101856154","https://openalex.org/W2361101593","https://openalex.org/W2186628863","https://openalex.org/W3005591082","https://openalex.org/W2887623817"],"abstract_inverted_index":{"In":[0],"some":[1,214],"wireless":[2,155],"networks":[3,117],"Received":[4],"Signal":[5],"Strength":[6],"Indicator":[7],"(RSSI)":[8],"based":[9,185],"device":[10,90,156],"profiling":[11,48,91,188],"may":[12],"be":[13,28,71],"the":[14,35,39,44,74,86,140,207,220,246],"only":[15],"viable":[16],"approach":[17,180,212,232],"to":[18,34,80,124,164,181,237,240],"combating":[19],"MAC-layer":[20,54,182],"spoofing":[21,55,183],"attacks,":[22],"while":[23],"in":[24,73,92,114,139,146,219,245,248],"others":[25],"it":[26],"can":[27],"used":[29],"as":[30,49,134],"a":[31,50,154,158,178,226,234],"valuable":[32],"complement":[33],"existing":[36],"defenses.":[37],"Unfortunately,":[38],"previous":[40,141],"research":[41],"works":[42],"on":[43,186],"use":[45,87],"of":[46,52,64,88,102,153,197,210],"RSSI-based":[47,89,151],"means":[51],"detecting":[53],"attacks":[56],"are":[57,108,129],"largely":[58],"theoretical":[59],"and":[60,67,84,105,251],"thus":[61],"fall":[62],"short":[63],"providing":[65],"insights":[66],"result":[68],"that":[69,113,145,225],"could":[70],"applied":[72],"real":[75],"world.":[76],"Our":[77],"work":[78,104],"aims":[79],"fill":[81],"this":[82,106,211],"gap":[83],"examine":[85],"dynamic":[93,115],"real-world":[94,116,203,227],"environments/networks":[95],"with":[96,118,242],"moving":[97,119],"objects.":[98],"The":[99],"main":[100],"contributions":[101],"our":[103,231],"paper":[107],"two-fold.":[109],"First,":[110],"we":[111,176,205,223],"demonstrate":[112,224],"objects,":[120],"RSSI":[121,187],"readings":[122],"corresponding":[123],"one":[125],"fixed":[126],"transmitting":[127],"node":[128],"neither":[130],"stationary":[131],"nor":[132],"i.i.d.,":[133],"generally":[135],"has":[136,233],"been":[137],"assumed":[138],"literature.":[142,221],"This":[143],"implies":[144],"such":[147],"networks,":[148],"building":[149],"an":[150,249],"profile":[152],"using":[157,189,230],"single":[159],"statistical/ML":[160],"model":[161],"is":[162],"likely":[163],"yield":[165],"inaccurate":[166],"results":[167],"and,":[168],"consequently,":[169],"suboptimal":[170],"detection":[171,184],"performance":[172,208],"against":[173],"adversaries.":[174],"Second,":[175],"propose":[177],"novel":[179],"multi-model":[190],"Long":[191],"Short-Term":[192],"Memory":[193],"(LSTM)":[194],"autoencoder\u2014a":[195],"form":[196],"deep":[198],"recurrent":[199],"neural":[200],"network.":[201],"Through":[202],"experimentation":[204],"prove":[206],"superiority":[209],"over":[213],"other":[215],"solutions":[216],"previously":[217],"proposed":[218],"Furthermore,":[222],"defense":[228],"system":[229],"built-in":[235],"ability":[236],"self-adjust":[238],"(i.e.,":[239],"deal":[241],"unpredictable":[243],"changes":[244],"environment)":[247],"automated":[250],"adaptive":[252],"manner.":[253]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
