{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:13:30Z","timestamp":1771373610930,"version":"3.50.1"},"reference-count":45,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T00:00:00Z","timestamp":1630022400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Future Network of Jiangsu","award":["2018T110505"],"award-info":[{"award-number":["2018T110505"]}]},{"name":"Future Network of Jiangsu","award":["2017M611828"],"award-info":[{"award-number":["2017M611828"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2018T110505"],"award-info":[{"award-number":["2018T110505"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2017M611828"],"award-info":[{"award-number":["2017M611828"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012246","name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","doi-asserted-by":"publisher","award":["2018T110505"],"award-info":[{"award-number":["2018T110505"]}],"id":[{"id":"10.13039\/501100012246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012246","name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","doi-asserted-by":"publisher","award":["2017M611828"],"award-info":[{"award-number":["2017M611828"]}],"id":[{"id":"10.13039\/501100012246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,8,27]]},"abstract":"<jats:p>Cross-technology communication (CTC) technique can realize direct communication among heterogeneous wireless devices (e.g., WiFi, ZigBee, and Bluetooth in the 2.4\u2009G ISM band) without gateway equipment for forwarding, which makes heterogeneous wireless communication more convenient and greatly reduces communication costs. However, compared with the traditional homogeneous network model, CTC technique also makes it easier to implement spoofing attacks in heterogeneous networks. WiFi devices with long communication distances and sufficient energy supply can directly launch spoofing attacks against ZigBee devices, which brings severe security concerns for heterogeneous wireless communications. In this paper, we focus on the CTC spoofing attack, especially spoofing attacks from WiFi to ZigBee and propose a machine learning-based method to detect spoofing attacks for heterogeneous wireless networks by using physical-layer information. First, we model the received signal strength (RSS) data of legitimate ZigBee devices to construct a one-class support vector machine (OSVM) classifier for detecting CTC spoofing attacks depending on the obtained training samples. Then, we simulated CTC spoofing attacks in a live testbed and evaluated the performance of our detection method. Results show that our approach is highly effective in spoofing detection. Even if the distance between the legitimate ZigBee device and WiFi attacker is near each other (i.e., less than 2\u2009m) and does not require a large number of samples, the detection rate and precision of our method are both over 90%. Finally, we employ the OSVM classifier to obtain samples of spoofing attacks and then explore using SVM to further improve the performance of the classifier.<\/jats:p>","DOI":"10.1155\/2021\/3314595","type":"journal-article","created":{"date-parts":[[2021,8,28]],"date-time":"2021-08-28T17:50:07Z","timestamp":1630173007000},"page":"1-12","source":"Crossref","is-referenced-by-count":12,"title":["Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3768-2423","authenticated-orcid":true,"given":"Quan","family":"Sun","sequence":"first","affiliation":[{"name":"College of Information Science and Technology, Nanjing Forestry University, Nanjing, China"}]},{"given":"Xinyu","family":"Miao","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Nanjing Forestry University, Nanjing, China"}]},{"given":"Zhihao","family":"Guan","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Nanjing Forestry University, Nanjing, China"}]},{"given":"Jin","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Nanjing Forestry University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6704-8979","authenticated-orcid":true,"given":"Demin","family":"Gao","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Nanjing Forestry University, Nanjing, China"},{"name":"Department of Computer Science and Engineering, University of Minnesota, Minneapolis, MN 55414, USA"}]}],"member":"311","reference":[{"key":"1","article-title":"Iot report how internet of things technology is now reaching mainstream companies and consumers","year":"2019"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2017.2692758"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2018.6069"},{"key":"4","first-page":"171","article-title":"Stripcomm: interference-resilient cross-technology communication in coexisting environments","author":"X. Zheng"},{"key":"5","first-page":"1","article-title":"C-chirp: towards symmetric cross-technology communication over asymmetric channels","author":"D. Xia"},{"key":"6","first-page":"2","article-title":"Webee: physical-layer cross-technology communication via emulation","author":"Z. Li"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2018.2842228"},{"key":"8","first-page":"1117","article-title":"Hide and seek: waveform emulation attack and defense in cross-technology communication","author":"X. Zhang"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.104"},{"key":"10","first-page":"1768","article-title":"Detecting 802.11 MAC layer spoofing using received signal strength","author":"Y. Sheng"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.015"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2010.2044904"},{"key":"13","first-page":"193","article-title":"Detecting and localizing wireless spoofing attacks","author":"Y. Chen"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2010.5601959"},{"key":"15","first-page":"8","article-title":"Secure and efficient key management in mobile ad hoc networks","author":"B. Wu"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-3522-9"},{"key":"17","first-page":"79","article-title":"An authentication framework for hierarchical ad hoc sensor networks","author":"M. Bohge"},{"key":"18","first-page":"29","article-title":"Cryptographically generated addresses (CGA)","author":"T. Aura"},{"key":"19","first-page":"43","article-title":"Detecting identity-based attacks in wireless networks using signalprints","author":"D. B. Faria"},{"key":"20","first-page":"279","article-title":"Interference alignment by motion","author":"F. Adib"},{"key":"21","first-page":"693","article-title":"On heterogeneous neighbor discovery in wireless sensor networks","author":"L. Chen"},{"key":"22","first-page":"3094","article-title":"Gap sense: lightweight coordination of heterogeneous wireless devices","author":"X. Zhang"},{"key":"23","first-page":"1","article-title":"Enabling coexistence of heterogeneous wireless systems: case for ZigBee and WiFi","author":"X. Zhang"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.17"},{"key":"25","first-page":"85","article-title":"Esense: communication through energy sensing","author":"K. Chebrolu"},{"key":"26","first-page":"317","article-title":"Freebee: cross-technology communication via free side-channel","author":"S. M. Kim"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2020.3013921"},{"key":"28","first-page":"1","article-title":"Transparent cross-technology communication over data traffic","author":"W. Jiang"},{"key":"29","first-page":"1","article-title":"C-morse: cross-technology communication with transparent morse coding","author":"Z. Yin"},{"key":"30","first-page":"153","article-title":"TwinBee: reliable physical-layer cross-technology communication with symbol-level coding","author":"Y. Chen"},{"key":"31","first-page":"162","article-title":"LongBee: enabling long-range cross-technology communication","author":"Z. Li"},{"key":"32","first-page":"1","article-title":"Spoofing attack detection using physical layer information in cross-technology communication","author":"B. Lu"},{"key":"33","first-page":"34","article-title":"Jamcloak: reactive jamming attack over cross-technology communication links","author":"G. Chen"},{"key":"34","volume-title":"Wireless Communications: Principles and Practice","author":"T. S. Rappaport","year":"1996"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/map.2003.1232163"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cma.2008.05.004"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133363"},{"issue":"2","key":"38","first-page":"103","article-title":"An introduction to support vector machines and other kernel-based learning methods","volume":"22","author":"T. Zhang","year":"2001","journal-title":"AI Magazine"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2007.19.5.1155"},{"key":"40","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1016\/j.comcom.2021.06.017","article-title":"Spoofing-jamming attack based on cross-technology communication for wireless networks","volume":"177","author":"B. Dga","year":"2021","journal-title":"Computer Communications"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2020.3008283"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/lwc.2021.3075467"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/LSENS.2020.3044337"},{"key":"44","first-page":"1","article-title":"Achieving spectrum efficient communication under cross-technology interference","author":"S. Wang"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2902902"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/3314595.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/3314595.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/3314595.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,28]],"date-time":"2021-08-28T17:50:13Z","timestamp":1630173013000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/3314595\/"}},"subtitle":[],"editor":[{"given":"Shehzad Ashraf","family":"Chaudhry","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,8,27]]},"references-count":45,"alternative-id":["3314595","3314595"],"URL":"https:\/\/doi.org\/10.1155\/2021\/3314595","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2021,8,27]]}}}