{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T18:09:19Z","timestamp":1774721359829,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"BMBF","award":["CRISP-DA"],"award-info":[{"award-number":["CRISP-DA"]}]},{"name":"DFG","award":["CRC 1119 CROSSING"],"award-info":[{"award-number":["CRC 1119 CROSSING"]}]},{"name":"LOEWE","award":["NICER"],"award-info":[{"award-number":["NICER"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1145\/3264492.3264494","type":"proceedings-article","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T13:19:23Z","timestamp":1539263963000},"page":"3-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Authenticating the Sector Sweep to Protect Against Beam-Stealing Attacks in IEEE 802.11ad Networks"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Steinmetzer","sequence":"first","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Saad","family":"Ahmad","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Nikolaos","family":"Anagnostopoulos","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2915371.2915377"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Quynh Dang. 2012. NIST Special Publication 800--107 Revision 1: Recommendation for Applications Using Approved Hash Algorithms.   Quynh Dang. 2012. NIST Special Publication 800--107 Revision 1: Recommendation for Applications Using Approved Hash Algorithms.","DOI":"10.6028\/NIST.SP.800-107r1"},{"key":"e_1_3_2_1_3_1","volume-title":"84th Vehicular Technology Conference (VTC-Fall) . IEEE, Montreal, QC, Canada.","author":"Eltayeb Mohammed E.","unstructured":"Mohammed E. Eltayeb , Junil Choi , Tareq Y. Al-Naffouri , and Robert W. Heath . 2016. On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets . In 84th Vehicular Technology Conference (VTC-Fall) . IEEE, Montreal, QC, Canada. Mohammed E. Eltayeb, Junil Choi, Tareq Y. Al-Naffouri, and Robert W. Heath. 2016. On the Security of Millimeter Wave Vehicular Communication Systems using Random Antenna Subsets. In 84th Vehicular Technology Conference (VTC-Fall) . IEEE, Montreal, QC, Canada."},{"key":"e_1_3_2_1_4_1","volume-title":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 3: Enhancements for Very High Throughput in the 60 GHz Band","author":"IEEE Standards Association","year":"2012","unstructured":"IEEE Standards Association . 2014. IEEE Std 802.11ad-2012 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 3: Enhancements for Very High Throughput in the 60 GHz Band . ISO\/IEC\/IEEE 8802--11: 2012 \/Amd.3:2014(E) . IEEE Standards Association. 2014. IEEE Std 802.11ad-2012: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 3: Enhancements for Very High Throughput in the 60 GHz Band. ISO\/IEC\/IEEE 8802--11:2012\/Amd.3:2014(E) ."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1160-4"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6979964"},{"key":"e_1_3_2_1_7_1","volume-title":"Murdock","author":"Rappaport Theodore S.","year":"2014","unstructured":"Theodore S. Rappaport , Robert W. Heath Jr , Robert C. Daniels , and James N . Murdock . 2014 . Millimeter Wave Wireless Communications. Prentice Hall . Theodore S. Rappaport, Robert W. Heath Jr, Robert C. Daniels, and James N. Murdock. 2014. Millimeter Wave Wireless Communications. Prentice Hall."},{"key":"e_1_3_2_1_8_1","volume-title":"An Attack on Antenna Subset Modulation for Millimeter Wave Communication. In International Conference on Acoustics, Speech and Signal Processing (ICASSP) . IEEE, Brisbane, QLD, Australia.","author":"Rusu Cristian","unstructured":"Cristian Rusu , Nuria Gonz\u00e1lez-Prelcic , and Robert W . Heath Jr. 2015 . An Attack on Antenna Subset Modulation for Millimeter Wave Communication. In International Conference on Acoustics, Speech and Signal Processing (ICASSP) . IEEE, Brisbane, QLD, Australia. Cristian Rusu, Nuria Gonz\u00e1lez-Prelcic, and Robert W. Heath Jr. 2015. An Attack on Antenna Subset Modulation for Millimeter Wave Communication. In International Conference on Acoustics, Speech and Signal Processing (ICASSP) . IEEE, Brisbane, QLD, Australia."},{"key":"e_1_3_2_1_9_1","volume-title":"Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves. In Conference on Communications and Network Security (CNS)","author":"Steinmetzer Daniel","year":"2015","unstructured":"Daniel Steinmetzer , Joe Chen , Jiska Classen , Edward W. Knightly , and Matthias Hollick . 2015 . Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves. In Conference on Communications and Network Security (CNS) . Florence, Italy. Daniel Steinmetzer, Joe Chen, Jiska Classen, Edward W. Knightly, and Matthias Hollick. 2015. Eavesdropping with Periscopes: Experimental Security Analysis of Highly Directional Millimeter Waves. In Conference on Communications and Network Security (CNS). Florence, Italy."},{"key":"e_1_3_2_1_10_1","volume-title":"Talon Tools: Practical IEEE 802.11ad Research. https:\/\/seemoo.de\/talon-tools","author":"Steinmetzer Daniel","year":"2018","unstructured":"Daniel Steinmetzer , Daniel Wegemer , and Matthias Hollick . 2018 a. Talon Tools: Practical IEEE 802.11ad Research. https:\/\/seemoo.de\/talon-tools Daniel Steinmetzer, Daniel Wegemer, and Matthias Hollick. 2018a. Talon Tools: Practical IEEE 802.11ad Research. https:\/\/seemoo.de\/talon-tools"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212499"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.061013.120459"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212493"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04474-8_33"},{"key":"e_1_3_2_1_15_1","volume-title":"Physical Layer Security in Large-Scale Millimeter Wave Ad Hoc Networks. In Global Communications Conference (GLOBECOM). IEEE, Washington DC, USA.","author":"Zhu Yongxu","unstructured":"Yongxu Zhu , Lifeng Wang , Kai-Kit Wong , and Robert W. Heath . 2016 . Physical Layer Security in Large-Scale Millimeter Wave Ad Hoc Networks. In Global Communications Conference (GLOBECOM). IEEE, Washington DC, USA. Yongxu Zhu, Lifeng Wang, Kai-Kit Wong, and Robert W. Heath. 2016. Physical Layer Security in Large-Scale Millimeter Wave Ad Hoc Networks. In Global Communications Conference (GLOBECOM). IEEE, Washington DC, USA."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2676087"}],"event":{"name":"MobiCom '18: The 24th Annual International Conference on Mobile Computing and Networking","location":"New Delhi India","acronym":"MobiCom '18","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 2nd ACM Workshop on Millimeter Wave Networks and Sensing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264492.3264494","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264492.3264494","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:35Z","timestamp":1750235975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264492.3264494"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":16,"alternative-id":["10.1145\/3264492.3264494","10.1145\/3264492"],"URL":"https:\/\/doi.org\/10.1145\/3264492.3264494","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]},"assertion":[{"value":"2018-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}