{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:49:25Z","timestamp":1762876165308,"version":"3.37.3"},"reference-count":128,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003093","name":"Ministry of Higher Education (MOHE) in Malaysia and Universiti Teknologi Malaysia (UTM) for this research through the HICoe Research Grant Scheme","doi-asserted-by":"publisher","award":["J130000.7851.4J412"],"award-info":[{"award-number":["J130000.7851.4J412"]}],"id":[{"id":"10.13039\/501100003093","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Management Centre (RMC) at UTM"},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia (FCT)\/Minist\u00e9rio da Ci\u00eancia, Tecnologia e Ensino Superior (MCTES) through national funds and when applicable co-funded EU funds","doi-asserted-by":"publisher","award":["UIDB\/EEA\/50008\/2020"],"award-info":[{"award-number":["UIDB\/EEA\/50008\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Brazilian National Council for the Scientific and Technological Development","award":["309335\/2017-5"],"award-info":[{"award-number":["309335\/2017-5"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2991459","type":"journal-article","created":{"date-parts":[[2020,4,30]],"date-time":"2020-04-30T19:59:51Z","timestamp":1588276791000},"page":"84584-84603","source":"Crossref","is-referenced-by-count":16,"title":["A Survey on Security and Privacy Challenges in Device Discovery for Next-Generation Systems"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5067-5845","authenticated-orcid":false,"given":"Omar","family":"Hayat","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7799-8468","authenticated-orcid":false,"given":"Razali","family":"Ngah","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7163-0443","authenticated-orcid":false,"given":"Zeeshan","family":"Kaleem","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5122-7166","authenticated-orcid":false,"given":"Siti Zaiton Mohd","family":"Hashim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8657-3800","authenticated-orcid":false,"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2375934"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2538791"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23452-6_4"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MWC.2009.5281259","article-title":"Security, privacy, and accountability in wireless access networks","volume":"16","author":"lou","year":"2009","journal-title":"IEEE Wireless Commun"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.505"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.052311.101613"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2675451"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2877174"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.09.010"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.002"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5751298"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.06.003"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/5618742"},{"key":"ref20","first-page":"207","article-title":"Security issues in Internet of Things: A comprehensive review","volume":"53","author":"sial","year":"2019","journal-title":"Amer Sci Res J Eng Technol Sci"},{"journal-title":"T G P P (3GPP)","year":"2019","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.11.001"},{"key":"ref24","first-page":"103","article-title":"Signals and communication technology book series (SCT)","author":"wu","year":"2007","journal-title":"Book Section A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-016-0741-5"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2013.2241043"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2015.10.006"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090404"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2014.7005129"},{"article-title":"The evolution of security in 5g","year":"2018","author":"americas","key":"ref51"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2441724"},{"journal-title":"Internet Security Threat Report","year":"2018","key":"ref58"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2015.7112037"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04984-3_2"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107478732"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99516-8_8"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2768499"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1002\/9781119053385"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7579020"},{"key":"ref4","first-page":"1","article-title":"White paper for research beyond 5g (final edit)","volume":"1","author":"aguia","year":"2010","journal-title":"NETA World"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06173-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0359-6"},{"key":"ref5","first-page":"1","article-title":"5G vision, requirements, and enabling technologies","volume":"2","author":"paper","year":"2016","journal-title":"5G Forum Republic Korea"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2016.0029"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2016.2525814"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2544790"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WIRELESSVITAE.2011.5940857"},{"key":"ref46","first-page":"2805","article-title":"Android security overview: A systematic survey","author":"xia","year":"2016","journal-title":"Proc 2nd IEEE Int Conf Comput Commun (ICCC)"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.44"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/CITSM.2016.7577517"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2724642"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICAEE.2015.7506822"},{"key":"ref41","first-page":"48","article-title":"A survey on wireless security protocols (WEP, WPA and WPA2\/802.11i)","author":"lashkari","year":"2009","journal-title":"Proc 2nd IEEE Int Conf Comput Sci Inf Technol"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.23"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC.2015.7432975"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01150-5"},{"key":"ref126","first-page":"1","article-title":"Cybok-physical layer and telecommunications security knowledge area","volume":"2019","author":"capkun","year":"2019","journal-title":"Georg Danezis Univ College London"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-34208-5_12"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1588-9"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2015.7347970"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2360883"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/CDAN.2016.7570944"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.002"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2645452"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.02.018"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2494017"},{"key":"ref74","first-page":"1226","article-title":"Black hole prevention in vanets using trust management and fuzzy logic analyzer","volume":"14","author":"rafique","year":"2016","journal-title":"Int J Comput Sci Inf Secur"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2017.8094172"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2769878"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/SPIN.2016.7566741"},{"key":"ref60","article-title":"Classification of attacks in wireless sensor networks","author":"messai","year":"2014","journal-title":"arXiv 1406 4516"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2264633"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2329956"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417462"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2014.6906441"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2014.0053"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2730479"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2740569"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2557784"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2899922"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2744182"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941138"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2892285"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228590"},{"key":"ref108","article-title":"Towards ultra-reliable low-latency communications: Typical scenarios, possible solutions, and open issues","author":"feng","year":"2019","journal-title":"arXiv 1903 03913"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2014.28"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848175"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441922"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2421946"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/MobServ.2015.30"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2495291"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2014.6734877"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/2634274.2634275"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2014.6804213"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.93"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2012.104"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2018DRP0039"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.3906\/elk-1802-61"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2019.8791551"},{"key":"ref98","first-page":"763","article-title":"The new casper: Query processing for location services without compromising privacy","author":"mokbel","year":"2006","journal-title":"Proc 32nd Int Conf Very Large Data Bases"},{"key":"ref99","first-page":"2517","article-title":"ARTSense: Anonymous reputation and trust in participatory sensing","author":"oscar wang","year":"2013","journal-title":"Proc IEEE InfoCom"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2014.6911794"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/1600150.1600175"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4745-7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2348950"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761940"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2019.8685499"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01289-5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3934\/dcdss.2019099"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3203-2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.12.018"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721742"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/NRSC.2019.8734532"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2828120"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2013.6596086"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-016-0741-5"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417364"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.2019.1900008"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2017.0119"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.157"},{"key":"ref114","first-page":"34","article-title":"GNSS jamming in the name of privacy-potential threat to GPS aviation","volume":"7","author":"pullen","year":"2012","journal-title":"Inside GNSS"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3207"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.12.006"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00578-4"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.3390\/info10080259"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/SRII.2012.17"},{"journal-title":"A Comprehensive Guide to 5G Security","year":"2017","author":"liyanage","key":"ref121"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2416396"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2019.8719256"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.415"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7416965"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/2666310.2666384"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.05.010"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09082694.pdf?arnumber=9082694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:51:46Z","timestamp":1639770706000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9082694\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":128,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2991459","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}