{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:54:52Z","timestamp":1751608492661,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030630942"},{"type":"electronic","value":"9783030630959"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63095-9_10","type":"book-chapter","created":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T08:07:25Z","timestamp":1607674045000},"page":"188-207","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["PEDR: A Novel Evil Twin Attack Detection Scheme Based on Phase Error Drift Range"],"prefix":"10.1007","author":[{"given":"Jiahui","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qian","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Ruobing","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Haipeng","family":"Qu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,12]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"101618","DOI":"10.1016\/j.cose.2019.101618","volume":"88","author":"Q Lu","year":"2020","unstructured":"Lu, Q., Jiang, R., Ouyang, Y., et al.: BiRe: a client-side bi-directional SYN reflection mechanism against multi-model evil twin attacks. Comput. Secur. 88, 101618 (2020)","journal-title":"Comput. Secur."},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"van Rijswijk-Deij, R., Sperotto, A., Pras, A.: DNSSEC and its potential for DDoS attacks: a comprehensive measurement study. In: Proceedings of the 2014 Conference on Internet Measurement Conference, pp. 449\u2013460 (2014)","DOI":"10.1145\/2663716.2663731"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Lu, Q., Qu, H., Ouyang, Y., et al.: SLFAT: client-side evil twin detection approach based on arrival time of special length frames. Secur. Communi. Netw. 2019 (2019)","DOI":"10.1155\/2019\/2718741"},{"key":"10_CR4","unstructured":"Marlinspike, M.: More tricks for defeating SSL in practice. Black Hat USA (2009)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Brik, V., Banerjee, S., Gruteser, M., et al.: Wireless device identification with radiometric signatures. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pp. 116\u2013127 (2008)","DOI":"10.1145\/1409944.1409959"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Nguyen, N.T., Zheng, G., Han, Z., et al.: Device fingerprinting to enhance wireless security using nonparametric Bayesian method. In: 2011 Proceedings IEEE INFOCOM, pp. 1404\u20131412. IEEE (2011)","DOI":"10.1109\/INFCOM.2011.5934926"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Wei, W., Jaiswal, S., Kurose, J.F., et al.: Identifying 802.11 traffic from passive measurements using iterative Bayesian inference. In: INFOCOM (2006)","DOI":"10.1109\/INFOCOM.2006.291"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Arackaparambil, C., Bratus, S., Shubina, A., et al.: On the reliability of wireless fingerprinting using clock skews. In: Proceedings of the Third ACM Conference on Wireless Network Security, pp. 169\u2013174 (2010)","DOI":"10.1145\/1741866.1741894"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Lu, Q., Qu, H., Zhuang, Y., et al.: A passive client-based approach to detect evil twin attacks. In: 2017 IEEE Trustcom\/BigDataSE\/ICESS, pp. 233\u2013239. IEEE (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.242"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Liu, P., Yang, P., Song, W.Z., et al.: Real-time identification of rogue WiFi connections using environment-independent physical features. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 109\u2013198. IEEE (2019)","DOI":"10.1109\/INFOCOM.2019.8737455"},{"issue":"2","key":"10_CR11","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/s10776-018-0396-1","volume":"25","author":"M Agarwal","year":"2018","unstructured":"Agarwal, M., Biswas, S., Nandi, S.: An efficient scheme to detect evil twin rogue access point attack in 802.11 Wi-Fi networks. Int. J. Wirel. Inf. Netw. 25(2), 130\u2013145 (2018)","journal-title":"Int. J. Wirel. Inf. Netw."},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Bauer, K., Gonzales, H., McCoy, D.: Mitigating evil twin attacks in 802.11. In: 2008 IEEE International Performance, Computing and Communications Conference, pp. 513\u2013516. IEEE (2008)","DOI":"10.1109\/PCCC.2008.4745081"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Gonzales, H., Bauer, K., Lindqvist, J., et al.: Practical defenses for evil twin attacks in 802.11. In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, pp. 1\u20136. IEEE (2010)","DOI":"10.1109\/GLOCOM.2010.5684213"},{"key":"10_CR14","unstructured":"Byrd, C., Cross, T., Takahashi, T.: Secure open wireless networking. Black Hat (2015)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Kumar, A., Paul, P.: Security analysis and implementation of a simple method for prevention and detection against Evil Twin attack in IEEE 802.11 wireless LAN. In: 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), pp. 176\u2013181. IEEE (2016)","DOI":"10.1109\/ICCTICT.2016.7514574"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Bahl, P., Chandra, R., Padhye, J., et al.: Enhancing the security of corporate Wi-Fi networks using DAIR. In: Proceedings of the 4th International Conference on Mobile Systems, Applications and Services, pp. 1\u201314 (2006)","DOI":"10.1145\/1134680.1134682"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Wei, W., Wang, B., Zhang, C., et al.: Classification of access network types: ethernet wireless LAN, ADSL, cable modem or dialup? In: Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 1060\u20131071. IEEE (2005)","DOI":"10.1109\/INFCOM.2005.1498334"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Wei, W., Suh, K., Wang, B., et al.: Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pp. 365\u2013378 (2007)","DOI":"10.1145\/1298306.1298357"},{"key":"10_CR19","unstructured":"Yin, H., Chen, G., Wang, J.: Detecting protected layer-3 rogue APs. In: 2007 Fourth International Conference on Broadband Communications, Networks and Systems (BROADNETS\u201907), pp. 449\u2013458. IEEE (2007)"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Shetty, S., Song, M., Ma, L.: Rogue access point detection by analyzing network traffic characteristics. In: MILCOM 2007-IEEE Military Communications Conference, pp. 1\u20137. IEEE (2007)","DOI":"10.1109\/MILCOM.2007.4455018"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/978-3-540-72606-7_31","volume-title":"NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet","author":"V Baiamonte","year":"2007","unstructured":"Baiamonte, V., Papagiannaki, K., Iannaccone, G.: Detecting 802.11 wireless hosts from remote passive observations. In: Akyildiz, I.F., Sivakumar, R., Ekici, E., Oliveira, J.C., McNair, J. (eds.) NETWORKING 2007. LNCS, vol. 4479, pp. 356\u2013367. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72606-7_31"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Watkins, L., Beyah, R., Corbett, C.: A passive approach to rogue access point detection. In: IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, pp. 355\u2013360. IEEE (2007)","DOI":"10.1109\/GLOCOM.2007.73"},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"7470","DOI":"10.1109\/JIOT.2020.2984662","volume":"7","author":"H Xia","year":"2020","unstructured":"Xia, H., Li, L., Cheng, X., et al.: Modeling and analysis botnet propagation in social Internet of Things. IEEE Internet Things J. 7, 7470\u20137481 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"10_CR24","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/TMC.2009.145","volume":"9","author":"S Jana","year":"2009","unstructured":"Jana, S., Kasera, S.K.: On fast and accurate detection of unauthorized wireless access points using clock skews. IEEE Trans. Mob. Comput. 9(3), 449\u2013462 (2009)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Song, Y., Yang, C., Gu, G.: Who is peeping at your passwords at Starbucks?-To catch an evil twin access point. In: 2010 IEEE\/IFIP International Conference on Dependable Systems & Networks (DSN), pp. 323\u2013332. IEEE (2010)","DOI":"10.1109\/DSN.2010.5544302"},{"issue":"5","key":"10_CR26","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.1109\/TIFS.2012.2207383","volume":"7","author":"C Yang","year":"2012","unstructured":"Yang, C., Song, Y., Gu, G.: Active user-side evil twin access point detection using statistical techniques. IEEE Trans. Inf. Forensics Secur. 7(5), 1638\u20131651 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Neumann, C., Heen, O., Onno, S.: An empirical study of passive 802.11 device fingerprinting. In: 2012 32nd International Conference on Distributed Computing Systems Workshops, pp. 593\u2013602. IEEE (2012)","DOI":"10.1109\/ICDCSW.2012.8"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Xia, H., Zhang, R., et al.: Two-stage game design of payoff decision-making scheme for crowdsourcing dilemma. IEEE\/ACM Trans. Netw. (2020)","DOI":"10.1109\/TNET.2020.3018448"},{"key":"10_CR29","unstructured":"Alotaibi, B., Elleithy, K.: A passive fingerprint technique to detect fake access points. In: Wireless Telecommunications Symposium (WTS), pp. 1\u20138. IEEE (2015)"},{"key":"10_CR30","doi-asserted-by":"publisher","first-page":"8036","DOI":"10.1109\/JIOT.2020.2990365","volume":"7","author":"H Xia","year":"2020","unstructured":"Xia, H., Li, L., Cheng, X., et al.: A dynamic virus propagation model based on social attributes in city IoTs. IEEE Internet Things J. 7, 8036\u20138048 (2020)","journal-title":"IEEE Internet Things J."},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Liu, H., Wang, Y., Liu, J., et al.: Practical user authentication leveraging channel state information (CSI). In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 389\u2013400 (2014)","DOI":"10.1145\/2590296.2590321"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Hua, J., Sun, H., Shen, Z., et al.: Accurate and efficient wireless device fingerprinting using channel state information. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp. 1700\u20131708. IEEE (2018)","DOI":"10.1109\/INFOCOM.2018.8485917"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Zhuo, Y., Zhu, H., Xue, H., et al.: Perceiving accurate CSI phases with commodity WiFi devices. In: IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pp. 1\u20139. IEEE (2017)","DOI":"10.1109\/INFOCOM.2017.8056964"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63095-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,18]],"date-time":"2024-08-18T22:23:10Z","timestamp":1724019790000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-63095-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030630942","9783030630959"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63095-9_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"12 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"120","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,86","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}