{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T16:46:34Z","timestamp":1768409194225,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,1,28]],"date-time":"2020-01-28T00:00:00Z","timestamp":1580169600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,1,28]],"date-time":"2020-01-28T00:00:00Z","timestamp":1580169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Delivering service intelligence to billions of connected devices is the next step in edge computing. Wi-Fi, as the <jats:italic>de facto<\/jats:italic> standard for high-throughput wireless connectivity, is highly vulnerable to packet-injection-based identity spoofing attacks (PI-ISAs). An attacker can spoof as the legitimate edge coordinator and perform denial of service (DoS) or even man-in-the-middle (MITM) attacks with merely a laptop. Such vulnerability leads to serious systematic risks, especially for the core edge\/cloud backbone network.In this paper, we propose PHYAlert, an identity spoofing attack alert system designed to protect a Wi-Fi-based edge network. PHYAlert profiles the wireless link with the rich dimensional Wi-Fi PHY layer information and enables real-time authentication for Wi-Fi frames. We prototype PHYAlert with commercial off-the-shelf (COTS) devices and perform extensive experiments in different scenarios. The experiments verify the feasibility of spoofing detection based on PHY layer information and show that PHYAlert can achieve an 8x improvement in the false positive rate over the conventional signal-strength-based solution.<\/jats:p>","DOI":"10.1186\/s13677-020-0154-7","type":"journal-article","created":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T01:28:08Z","timestamp":1580261288000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["PHYAlert: identity spoofing attack detection and prevention for a wireless edge network"],"prefix":"10.1186","volume":"9","author":[{"given":"Zhiping","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Kun","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jizhong","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Junzhao","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,28]]},"reference":[{"key":"154_CR1","doi-asserted-by":"publisher","unstructured":"Yin Y, Chen L, Xu Y, Wan J, Zhang H, Mai Z (2019) Qos prediction for service recommendation with deep feature learning in edge computing environment. Mob Networks Appl:1\u201311. https:\/\/doi.org\/10.1007\/s11036-019-01241-7.","DOI":"10.1007\/s11036-019-01241-7"},{"key":"154_CR2","doi-asserted-by":"publisher","unstructured":"Gao H, Xu Y, Yin Y, Zhang W, Li R, Wang X (2019) Context-aware qos prediction with neural collaborative filtering for internet-of-things services. IEEE Internet Things J:1\u20131. https:\/\/doi.org\/10.1109\/JIOT.2019.2956827.","DOI":"10.1109\/JIOT.2019.2956827"},{"key":"154_CR3","doi-asserted-by":"publisher","unstructured":"Gao H, Duan Y, Shao L, Sun X (2019) Transformation-based processing of typed resources for multimedia sources in the iot environment. Wirel Netw. https:\/\/doi.org\/10.1007\/s11276-019-02200-6.","DOI":"10.1007\/s11276-019-02200-6"},{"key":"154_CR4","doi-asserted-by":"publisher","unstructured":"Chen Y, Deng S, Ma H, Yin J (2019) Deploying data-intensive applications with multiple services components on edge. Mobile Netw Appl. https:\/\/doi.org\/10.1007\/s11036-019-01245-3.","DOI":"10.1007\/s11036-019-01245-3"},{"key":"154_CR5","doi-asserted-by":"publisher","unstructured":"Huang J, Albazrqaoe W, Xing G (2014) Blueid: A practical system for bluetooth device identification In: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.. IEEE. https:\/\/doi.org\/10.1109\/infocom.2014.6848235.","DOI":"10.1109\/infocom.2014.6848235"},{"issue":"17","key":"154_CR6","first-page":"1404","volume":"34","author":"NT Nguyen","year":"2011","unstructured":"Nguyen NT, Zheng G, Zhu H, Rong Z (2011) Device fingerprinting to enhance wireless security using nonparametric bayesian method. Proceedings - IEEE INFOCOM 34(17):1404\u20131412.","journal-title":"Proceedings - IEEE INFOCOM"},{"key":"154_CR7","doi-asserted-by":"publisher","unstructured":"Wang G, Qian C, Cai H, Han J, Ding H, Zhao J (2018) Towards replay-resilient rfid authentication In: Proceedings of the 24th Annual International Conference on Mobile Computing and Networking - MobiCom \u201918.. ACM Press. https:\/\/doi.org\/10.1145\/3241539.3241541.","DOI":"10.1145\/3241539.3241541"},{"key":"154_CR8","doi-asserted-by":"crossref","unstructured":"Polianytsia A, Starkova O, Herasymenko K (2016) Survey of hardware iot platforms In: Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T, 152\u2013153.. IEEE.","DOI":"10.1109\/INFOCOMMST.2016.7905364"},{"key":"154_CR9","doi-asserted-by":"publisher","unstructured":"Jiang Z, Zhao J, Li XY, Han J (2013) Rejecting the attack: Source authentication for wi-fi management frames using csi information In: 2013 Proceedings IEEE INFOCOM.. IEEE. https:\/\/doi.org\/10.1109\/infcom.2013.6567061.","DOI":"10.1109\/infcom.2013.6567061"},{"key":"154_CR10","doi-asserted-by":"publisher","unstructured":"Vanhoef M, Piessens F (2014) Advanced wi-fi attacks using commodity hardware In: Proceedings of the 30th Annual Computer Security Applications Conference on - ACSAC \u201914. https:\/\/doi.org\/10.1145\/2664243.2664260.","DOI":"10.1145\/2664243.2664260"},{"key":"154_CR11","doi-asserted-by":"publisher","unstructured":"Zhou T, Cai Z, Xiao B, Chen Y, Ming X (2017) Detecting rogue ap with the crowd wisdom In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). https:\/\/doi.org\/10.1109\/icdcs.2017.31.","DOI":"10.1109\/icdcs.2017.31"},{"key":"154_CR12","doi-asserted-by":"publisher","unstructured":"IEEEIeee standard for information technology\u2013 local and metropolitan area networks\u2013 specific requirements\u2013 part 11: Wireless lan medium access control (mac)and physical layer (phy) specifications amendment 5: Enhancements for higher throughput. IEEE. https:\/\/doi.org\/10.1109\/ieeestd.2009.5307322.","DOI":"10.1109\/ieeestd.2009.5307322"},{"key":"154_CR13","doi-asserted-by":"crossref","unstructured":"Xin L, Starobinski D, Noubir G (2016) Cascading denial of service attacks on Wi-Fi networks In: IEEE Conference on Communications and Network Security (CNS), 91\u201399, IEEE.","DOI":"10.1109\/CNS.2016.7860474"},{"key":"154_CR14","doi-asserted-by":"publisher","unstructured":"Eian M, Mjolsnes SF. A formal analysis of ieee 802.11w deadlock vulnerabilities. IEEE. https:\/\/doi.org\/10.1109\/infcom.2012.6195841.","DOI":"10.1109\/infcom.2012.6195841"},{"key":"154_CR15","doi-asserted-by":"publisher","unstructured":"Sheng Y, Tan K, Chen G, Kotz D, Campbell A. Detecting 802.11 mac layer spoofing using received signal strength. IEEE. https:\/\/doi.org\/10.1109\/infocom.2008.239.","DOI":"10.1109\/infocom.2008.239"},{"key":"154_CR16","doi-asserted-by":"publisher","unstructured":"Wang T, Yang Y. Analysis on perfect location spoofing attacks using beamforming. IEEE. https:\/\/doi.org\/10.1109\/infcom.2013.6567087.","DOI":"10.1109\/infcom.2013.6567087"},{"key":"154_CR17","doi-asserted-by":"crossref","unstructured":"Halperin D, Hu W, Sheth A, Wetherall D (2011) Tool release: Gathering 802.11n traces with channel state information. ACM SIGCOMM CCR.","DOI":"10.1145\/1925861.1925870"},{"issue":"99","key":"154_CR18","first-page":"1","volume":"PP","author":"Y Xie","year":"2015","unstructured":"Xie Y (2015) Precise power delay profiling with commodity wifi. IEEE Trans Mobile Comput PP(99):1\u20131.","journal-title":"IEEE Trans Mobile Comput"},{"issue":"5","key":"154_CR19","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1007\/s11276-016-1210-6","volume":"23","author":"B Shojaie","year":"2017","unstructured":"Shojaie B, Saberi I, Salleh M (2017) Enhancing eap-tls authentication protocol for ieee 802.11i. Wirel Netw 23(5):1491\u20131508.","journal-title":"Wirel Netw"},{"key":"154_CR20","doi-asserted-by":"crossref","unstructured":"Borisov N, Goldberg I, Wagner D2001. Intercepting mobile communications: the insecurity of 802.11.","DOI":"10.1145\/381677.381695"},{"key":"154_CR21","doi-asserted-by":"crossref","unstructured":"Kaur J (2016) Mac layer management frame denial of service attacks In: International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE), 155\u2013160.. IEEE.","DOI":"10.1109\/ICMETE.2016.83"},{"key":"154_CR22","unstructured":"Bellardo J, Savage S. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions."},{"key":"154_CR23","doi-asserted-by":"publisher","unstructured":"Konings B, Schaub F, Kargl F, Dietzel S. Channel switch and quiet attack: New dos attacks exploiting the 802.11 standard. IEEE. https:\/\/doi.org\/10.1109\/lcn.2009.5355149.","DOI":"10.1109\/lcn.2009.5355149"},{"issue":"6","key":"154_CR24","doi-asserted-by":"publisher","first-page":"1334","DOI":"10.3390\/s17061334","volume":"17","author":"J Han","year":"2017","unstructured":"Han J, Park T (2017) Security-enhanced push button configuration for home smart control. Sensors 17(6):1334.","journal-title":"Sensors"},{"key":"154_CR25","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/11663812_16","volume-title":"Lecture Notes in Computer Science","author":"Fanglu Guo","year":"2006","unstructured":"Guo F, Chiueh T-cSequence number-based mac address spoof detection In: Lecture Notes in Computer Science, 309\u2013329.. Springer Berlin Heidelberg. https:\/\/doi.org\/10.1007\/11663812_16."},{"key":"154_CR26","doi-asserted-by":"publisher","unstructured":"Aslam B, Islam MH, Khan SA. Pseudo randomized sequence number based solution to 802.11 disassociation denial of service attack. IEEE. https:\/\/doi.org\/10.1109\/mcwc.2006.4375224.","DOI":"10.1109\/mcwc.2006.4375224"},{"issue":"2","key":"154_CR27","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MIC.2017.33","volume":"21","author":"M Shahzad","year":"2017","unstructured":"Shahzad M, Singh MP (2017) Continuous authentication and authorization for the internet of things. IEEE Internet Comput 21(2):86\u201390.","journal-title":"IEEE Internet Comput"},{"key":"154_CR28","doi-asserted-by":"publisher","unstructured":"Liu M, Mukherjee A, Zhang Z, Liu X (2016) Tbas: Enhancing wi-fi authentication by actively eliciting channel state information In: 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).. IEEE. https:\/\/doi.org\/10.1109\/sahcn.2016.7733021.","DOI":"10.1109\/sahcn.2016.7733021"},{"key":"154_CR29","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1109\/JSAC.2011.110812","volume":"29","author":"AC Polak","year":"2011","unstructured":"Polak AC, Dolatshahi S, Goeckel DL (2011) Identifying wireless users via transmitter imperfections. IEEE J Sel Areas Commun 29:1469\u20131479. https:\/\/doi.org\/10.1109\/jsac.2011.110812.","journal-title":"IEEE J Sel Areas Commun"},{"issue":"4","key":"154_CR30","doi-asserted-by":"publisher","first-page":"1346","DOI":"10.1109\/TIFS.2011.2162949","volume":"6","author":"Y Shi","year":"2011","unstructured":"Shi Y, Jensen MA (2011) Improved radiometric identification of wireless devices using mimo transmission. IEEE Trans Inf Forensic Secur 6(4):1346\u20131354.","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"5","key":"154_CR31","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MWC.2010.5601960","volume":"17","author":"S Mathur","year":"2010","unstructured":"Mathur S, Reznik A, Ye C, Mukherjee R, Rahman A, Shah Y, Trappe W, Mandayam N (2010) Exploiting the physical layer for enhanced security [security and privacy in emerging wireless networks]. IEEE Trans Wirel Commun 17(5):63\u201370. https:\/\/doi.org\/10.1109\/mwc.2010.5601960.","journal-title":"IEEE Trans Wirel Commun"},{"key":"154_CR32","unstructured":"Hao C, Zhang Y, Wei L, Ping Z (2017) Non-cooperative wi-fi localization via monitoring probe request frames In: Vehicular Technology Conference."},{"issue":"4","key":"154_CR33","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1145\/2829988.2787487","volume":"45","author":"M Kotaru","year":"2015","unstructured":"Kotaru M, Joshi K, Bharadia D, Katti S (2015) Spotfi:decimeter level localization using wifi. Acm Sigcomm Comput Commun Rev 45(4):269\u2013282.","journal-title":"Acm Sigcomm Comput Commun Rev"},{"key":"154_CR34","doi-asserted-by":"crossref","unstructured":"Gjengset J, Xiong J, Mcphillips G, Jamieson K (2014) Phaser: enabling phased array signal processing on commodity wifi access points In: International Conference on Mobile Computing & Networking.","DOI":"10.1145\/2639108.2639139"},{"key":"154_CR35","unstructured":"Xiong J, Jamieson KSecurearray: improving wifi security with fine-grained physical-layer information In: ACM MobiCom\u201913."},{"issue":"99","key":"154_CR36","first-page":"1","volume":"PP","author":"M Xu","year":"2018","unstructured":"Xu M, Fang Y, Liu S, Jian S, Zhu H (2018) Sparse channel estimation for mimo-ofdm systems in high-mobility situations. IEEE Trans Veh Technol PP(99):1\u20131.","journal-title":"IEEE Trans Veh Technol"},{"key":"154_CR37","unstructured":"Rappaport T (1996) Wireless communications: principles and practice 2. prentice hall PTR New Jersey."},{"issue":"10","key":"154_CR38","doi-asserted-by":"publisher","first-page":"1272","DOI":"10.1109\/26.539768","volume":"44","author":"GJ Janssen","year":"1996","unstructured":"Janssen GJ, Stigter PA, Prasad R (1996) Wideband indoor channel measurements and ber analysis of frequency selective multipath channels at 2.4, 4.75, and 11.5 ghz. IEEE Trans Commun 44(10):1272\u20131288. https:\/\/doi.org\/10.1109\/26.539768.","journal-title":"IEEE Trans Commun"},{"key":"154_CR39","volume-title":"Handbook of Mathematical Functions","author":"M Abramowitz","year":"1972","unstructured":"Abramowitz M, Stegun IA, et al. (1972) Handbook of Mathematical Functions, Vol. 1. Dover, New York."},{"key":"154_CR40","doi-asserted-by":"crossref","unstructured":"Yu J, Li J, Yu Z, Huang Q (2019) Multimodal transformer with multi-view visual representation for image captioning. arXiv preprint arXiv:1905.07841.","DOI":"10.1109\/TCSVT.2019.2947482"},{"issue":"11","key":"154_CR41","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.3390\/rs11111265","volume":"11","author":"L Kuang","year":"2019","unstructured":"Kuang L, Yan X, Tan X, Li S, Yang X (2019) Predicting taxi demand based on 3d convolutional neural network and multi-task learning. Remote Sens 11(11):1265.","journal-title":"Remote Sens"},{"key":"154_CR42","doi-asserted-by":"publisher","unstructured":"Salehi M, Leckie C, Bezdek JC, Vaithianathan T, Zhang X (2017) Fast memory efficient local outlier detection in data streams (extended abstract) In: 2017 IEEE 33rd International Conference on Data Engineering (ICDE).. IEEE. https:\/\/doi.org\/10.1109\/icde.2017.32.","DOI":"10.1109\/icde.2017.32"},{"key":"154_CR43","doi-asserted-by":"publisher","unstructured":"Ying G, Ganesan RK, Bischke B, Bernardi A, Maier A, Warkentin H, Steckel T, Dengel A (2017) Grid-based outlier detection in large data sets for combine harvesters In: 2017 IEEE 15th International Conference on Industrial Informatics (INDIN).. IEEE. https:\/\/doi.org\/10.1109\/indin.2017.8104877.","DOI":"10.1109\/indin.2017.8104877"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-020-0154-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13677-020-0154-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-020-0154-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T00:06:47Z","timestamp":1611706007000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-020-0154-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,28]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["154"],"URL":"https:\/\/doi.org\/10.1186\/s13677-020-0154-7","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,28]]},"assertion":[{"value":"10 September 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"5"}}