{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:10:56Z","timestamp":1740179456379,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T00:00:00Z","timestamp":1581638400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T00:00:00Z","timestamp":1581638400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Iran J Comput Sci"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s42044-020-00053-3","type":"journal-article","created":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T15:04:47Z","timestamp":1581692687000},"page":"137-143","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting forged management frames with spoofed addresses in IEEE 802.11 networks using received signal strength indicator"],"prefix":"10.1007","volume":"3","author":[{"given":"Davar","family":"Ahmadpour","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5143-0498","authenticated-orcid":false,"given":"Peyman","family":"Kabiri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,14]]},"reference":[{"issue":"5","key":"53_CR1","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1109\/WCL.2013.072513.130428","volume":"2","author":"J Milliken","year":"2013","unstructured":"Milliken, J., Selis, V., Kian, M.Y., Marshall, A.: Impact of metric selection on wireless deauthentication DoS attack performance. IEEE Wirel. Commun. Lett. 2(5), 571\u2013574 (2013)","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"5","key":"53_CR2","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.1109\/TIFS.2012.2207383","volume":"7","author":"Y Chao","year":"2012","unstructured":"Chao, Y., Yimin, S., Guofei, G.: Active user-side evil twin access point detection using statistical techniques. IEEE Trans. Inf. Forensics Secur. 7(5), 1638\u20131651 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"53_CR3","doi-asserted-by":"crossref","unstructured":"Konings, B., Schaub, F., Kargl, F., Dietzel, S.: Channel switch and quiet attack: new DoS attacks exploiting the IEEE 802.11 standard. In: IEEE Conference on local computer networks (LCN), pp. 14\u201321. IEEE, Zurich (2009)","DOI":"10.1109\/LCN.2009.5355149"},{"issue":"7","key":"53_CR4","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1109\/TPDS.2009.96","volume":"21","author":"W Gu","year":"2010","unstructured":"Gu, W., Yang, Z., Xuan, D., Jia, W., Que, C.: Null data frame: a double-edged sword in IEEE 802.11 WLANs. IEEE Trans. Parallel Distrib. Syst. 21(7), 897\u2013910 (2010)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"53_CR5","unstructured":"Snort Homepage, http:\/\/www.snort-wireless.org\/. Last Accessed 1 Oct 2018"},{"issue":"4","key":"53_CR6","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1109\/TIFS.2007.910236","volume":"2","author":"Q Li","year":"2007","unstructured":"Li, Q., Trappe, W.: Detecting spoofing and anomalous traffic in wireless networks via forge-resistant relationships. IEEE Trans. Inf. Forensics Secur. 2(4), 793\u2013808 (2007)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"53_CR7","unstructured":"Madory, D.: New methods of spoof detection in IEEE 802.11b wireless networking. Master of Science Thesis, Thayer School of Engineering, Dartmouth College, Hanover, New Hampshire (2006)"},{"key":"53_CR8","doi-asserted-by":"crossref","unstructured":"Chandrasekaran, G., Francisco, J.-A., Ganapathy, V., Gruteser, M., Trappe, W.: Detecting identity spoofs in IEEE 802.11e wireless networks. In: IEEE Global Telecommunications Conference (GLOBECOM), pp. 1\u20136. IEEE, Honolulu, Hawaii, USA (2009)","DOI":"10.1109\/GLOCOM.2009.5426152"},{"key":"53_CR9","doi-asserted-by":"crossref","unstructured":"Chumchu, P., Saelim, T., Sriklauy, C.: A new MAC address spoofing detection algorithm using PLCP header. In: International Conference on information networking (ICOIN), pp. 48\u201353. Kuala Lumpur, Malaysia (2011)","DOI":"10.1109\/ICOIN.2011.5723112"},{"key":"53_CR10","doi-asserted-by":"crossref","unstructured":"Neumann, C., Heen, O., Onno, S.: An empirical study of passive IEEE 802.11 device fingerprinting. In: International Conference on distributed computing systems workshops (ICDCSW), pp. 593\u2013602. IEEE, Macau, China (2012)","DOI":"10.1109\/ICDCSW.2012.8"},{"issue":"3","key":"53_CR11","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1109\/TMC.2009.145","volume":"9","author":"S Jana","year":"2010","unstructured":"Jana, S., Kasera, S.K.: On fast and accurate detection of unauthorized wireless access points using clock skews. IEEE Trans. Mob. Comput. 9(3), 449\u2013462 (2010)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"53_CR12","doi-asserted-by":"crossref","unstructured":"Bratus, S., Cornelius, C., Kotz, D., Peebles. D.: Active behavioral fingerprinting of wireless devices. In: Proceedings of the first ACM Conference on wireless network security (WiSec), pp. 56\u201361. ACM, Alexandria, VA, USA (2008)","DOI":"10.1145\/1352533.1352543"},{"key":"53_CR13","unstructured":"Cache, J.: Fingerprinting IEEE 802.11 implementations via statistical analysis of the duration field. http:\/\/www.uninformed.org. Last Accessed 2006"},{"key":"53_CR14","doi-asserted-by":"crossref","unstructured":"Nagarajan, V., Arasan, V., Dijiang Huang: Using power hopping to counter MAC spoof attacks in WLAN. In: IEEE consumer communications and networking Conference (CCNC), pp. 1\u20135, Las Vegas, NV, USA (2010)","DOI":"10.1109\/CCNC.2010.5421588"},{"key":"53_CR15","doi-asserted-by":"crossref","unstructured":"Sheng, Y., Tan, K., Guanling, C., Kotz, D., Campbell, A.: Detecting IEEE 802.11 MAC layer spoofing using received signal strength. In: IEEE Conference on computer communications (INFOCOM), pp.1768\u20131776, Phoenix, AZ, USA (2008)","DOI":"10.1109\/INFOCOM.2008.239"},{"issue":"5","key":"53_CR16","doi-asserted-by":"publisher","first-page":"2418","DOI":"10.1109\/TVT.2010.2044904","volume":"59","author":"C Yingying","year":"2010","unstructured":"Yingying, C., Jie, Y., Trappe, W., Martin, R.P.: Detecting and localizing identity-based attacks in wireless and sensor networks. IEEE Trans. Veh. Technol. 59(5), 2418\u20132434 (2010)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"53_CR17","volume-title":"Wireless Communication and Networks","author":"W Stallings","year":"2004","unstructured":"Stallings, W.: Wireless Communication and Networks, 2nd edn. Prentice Hall, Upper Saddle River (2004)","edition":"2"},{"key":"53_CR18","unstructured":"OMNet Homepage, http:\/\/www.omnetpp.org\/. Last Accessed 1 Oct 2018"},{"key":"53_CR19","unstructured":"INet Homepage, http:\/\/www.inet.omnetpp.org\/. Last Accessed 1 Oct 2018"},{"key":"53_CR20","unstructured":"Yingying C., Francisco, J., Trappe, W., Martin, R.P.: A practical approach to landmark deployment for indoor localization. In: Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, pp. 365\u2013373, IEEE, Reston, VA, USA (2006)"}],"container-title":["Iran Journal of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-020-00053-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42044-020-00053-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42044-020-00053-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,13]],"date-time":"2021-02-13T23:22:16Z","timestamp":1613258536000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42044-020-00053-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,14]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["53"],"URL":"https:\/\/doi.org\/10.1007\/s42044-020-00053-3","relation":{},"ISSN":["2520-8438","2520-8446"],"issn-type":[{"type":"print","value":"2520-8438"},{"type":"electronic","value":"2520-8446"}],"subject":[],"published":{"date-parts":[[2020,2,14]]},"assertion":[{"value":"2 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}