{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:40:08Z","timestamp":1774719608844,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100011512","name":"National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100011512","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Science, Information, and Communication Technologies (ICT) and Future Planning","award":["NRF-2016K1A1A2912757"],"award-info":[{"award-number":["NRF-2016K1A1A2912757"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2020,5,1]]},"DOI":"10.1109\/tmc.2019.2903052","type":"journal-article","created":{"date-parts":[[2019,3,4]],"date-time":"2019-03-04T19:50:48Z","timestamp":1551729048000},"page":"1056-1071","source":"Crossref","is-referenced-by-count":22,"title":["Catch Me If You Can: Rogue Access Point Detection Using Intentional Channel Interference"],"prefix":"10.1109","volume":"19","author":[{"given":"Rhongho","family":"Jang","sequence":"first","affiliation":[]},{"given":"Jeonil","family":"Kang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3227-2505","authenticated-orcid":false,"given":"Aziz","family":"Mohaisen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5183-891X","authenticated-orcid":false,"given":"DaeHun","family":"Nyang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1352533.1352569"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob.2009.73"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05284-2_23"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2010.5682342"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298357"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.291"},{"key":"ref37","article-title":"The karma software patch for access points","author":"mano","year":"2015"},{"key":"ref36","article-title":"Aircrack-ng","author":"mano","year":"2015"},{"key":"ref35","article-title":"MadWiFi project","author":"mano","year":"2015"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1330332.1330334"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660338"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2008.4745081"},{"key":"ref11","article-title":"Take precautions on public Wi-Fi","author":"cheng","year":"2016"},{"key":"ref12","article-title":"This tool can alert you about evil twin access points in the area","author":"constantin","year":"2015"},{"key":"ref13","article-title":"Beware the &#x2018;evil&#x2019; Wi-Fi networks that turn your phone into a brick: Hackers can hijack systems to remotely attack your handset","author":"gery","year":"2015"},{"key":"ref14","article-title":"How to stop hackers from stealing your information on public Wi-Fi","author":"baxter","year":"2015"},{"key":"ref15","article-title":"The dangers of using public Wi-Fi hotspots","author":"tuvey","year":"2016"},{"key":"ref16","article-title":"White hat hackers steal data from london Wi-Fi users in &#x201C;evil twin&#x201D; attack","author":"cooper","year":"2013"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.75"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023724"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2012.108"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.239"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684213"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590333"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.125"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2642687.2642691"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.145"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2207383"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.14"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2015.7157981"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766512"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.40"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.153"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736871"},{"key":"ref20","first-page":"1","article-title":"Enhancing the security of corporate Wi-Fi networks using DAIR","author":"bahl","year":"2006","journal-title":"Proc ACM Int Conf Mobile Syst Appl Services"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6213952"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753358"},{"key":"ref21","first-page":"9","article-title":"A location-based management system for enterprise wireless LANs","author":"chandra","year":"2007","journal-title":"Proc 5th USENIX Symp Netw Syst Des Implementation"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.151"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.73"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684213"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2004.1378413"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CROWNCOM.2007.4549783"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161298"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120103"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409959"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/9056709\/08658163.pdf?arnumber=8658163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T16:39:16Z","timestamp":1651077556000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8658163\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,1]]},"references-count":46,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2019.2903052","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,1]]}}}