{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:25:07Z","timestamp":1773246307709,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/lcnw.2015.7365932","type":"proceedings-article","created":{"date-parts":[[2015,12,28]],"date-time":"2015-12-28T21:30:27Z","timestamp":1451338227000},"page":"812-817","source":"Crossref","is-referenced-by-count":53,"title":["A survey: Spoofing attacks in physical layer security"],"prefix":"10.1109","author":[{"given":"Mustafa Harun","family":"Yilmaz","sequence":"first","affiliation":[]},{"given":"Huseyin","family":"Arslan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","year":"0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2006.27"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2012.6415851"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868458"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2008.16"},{"key":"ref14","article-title":"Recent advances in wireless indoor localization techniques and system","volume":"2013","author":"zahid farid","year":"2013","journal-title":"Journal of Computer Networks and Communications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11741-008-0113-2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080104"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655319"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409949"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.12.081544"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2012.84"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6257526"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.112310.100630"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.06.006"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5751298"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.1458273"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"55","DOI":"10.3390\/s120100055","article-title":"Security issues in healthcare applications using wireless medical sensor networks: A survey","volume":"12","author":"kumar","year":"2011","journal-title":"SENSORS"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.104"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381942"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2013.6825169"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567087"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292831"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5723797"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2010.0573"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2010.5457906"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018438"},{"key":"ref23","first-page":"315","article-title":"A secure authentication scheme for integration of cellular networks and MANETs","author":"wang","year":"2008","journal-title":"International Conf on Neural Networks and Signal Processing"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.091510.100629"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/NPSEC.2008.4664876"}],"event":{"name":"2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)","location":"Clearwater Beach, FL","start":{"date-parts":[[2015,10,26]]},"end":{"date-parts":[[2015,10,29]]}},"container-title":["2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7360341\/7365758\/07365932.pdf?arnumber=7365932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T02:36:27Z","timestamp":1498271787000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7365932\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/lcnw.2015.7365932","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}