{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:14:06Z","timestamp":1725704046136},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/ccece.2018.8447756","type":"proceedings-article","created":{"date-parts":[[2018,8,30]],"date-time":"2018-08-30T17:54:56Z","timestamp":1535651696000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Survey of Identity-Based Attacks Detection Techniques in Wireless Networks Using Received Signal Strength"],"prefix":"10.1109","author":[{"given":"Ahmad","family":"Raza Cheema","sequence":"first","affiliation":[]},{"given":"Malek","family":"Alsmadi","sequence":"additional","affiliation":[]},{"given":"Salama","family":"Ikki","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/Trustcom.2015.390"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/WAINA.2013.135"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/INFCOM.2009.5061974"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/MAHSS.2008.4660139"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/INFOCOM.2008.280"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/INFOCOM.2008.239"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/TPDS.2012.104"},{"key":"ref36","first-page":"35","article-title":"Detection of Identity-Based Attacks in Wireless Sensor Networks Using Signal-prints","author":"misra","year":"2010","journal-title":"Green Computing and Communications (GreenCom) 2010 IEEE\/ACM Int'l Conference on Int'l Conference on Cyber Physical and Social Computing (CPSCom)"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/TVT.2010.2044904"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/GLOCOM.2009.5426152"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ICC.2007.767"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/ICSSA.2016.16"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.3390\/s17020289"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1002\/ett.2653"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/JSAC.2013.130914"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TWC.2017.2688405"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/SP.2006.40"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/SNPD.2008.78"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3133956.3134027"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/COMST.2016.2548426"},{"key":"ref19","first-page":"309","article-title":"Sequence number-based mac address spoof detection","author":"guo","year":"2005","journal-title":"International Workshop on Recent Advances in Intrusion Detection"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/MOBHOC.2006.278663"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/1161289.1161298"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/WOWMOM.2006.27"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/COMST.2006.315852"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/MCOM.2012.6257526"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/SAHCN.2007.4292831"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/s11276-006-8870-6"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1049\/iet-cps.2016.0019"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1002\/sec.751"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/SAHCN.2006.288408"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/JPROC.2016.2558521"},{"key":"ref1","first-page":"15","article-title":"802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions","author":"bellardo","year":"2003","journal-title":"Proceedings of the 12th Conference on USENIX Security Symposium-Volume 12 Ser SSYM'03"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/SAHCN.2006.288408"},{"year":"0","author":"shankdhar","journal-title":"15 Best Free Packet Crafting Tools","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TIFS.2007.910236"},{"year":"2002","author":"rappaport","journal-title":"Wireless Communications Principles and Practice","key":"ref24"},{"year":"2012","author":"zekavat","journal-title":"Handbook of Position Location Theory Practice and Advances","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1016\/j.comnet.2004.03.007"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1017\/CBO9780511841224"}],"event":{"name":"2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE)","start":{"date-parts":[[2018,5,13]]},"location":"Quebec, QC, Canada","end":{"date-parts":[[2018,5,16]]}},"container-title":["2018 IEEE Canadian Conference on Electrical &amp; Computer Engineering (CCECE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8426058\/8447529\/08447756.pdf?arnumber=8447756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T10:40:35Z","timestamp":1643193635000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8447756\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/ccece.2018.8447756","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}