{"id":"https://openalex.org/W7125894300","doi":"https://doi.org/10.1109/commnet68224.2025.11288906","title":"Tag-Based Physical Layer Authentication over a Nakagami-m Block-Flat Fading Channel: Theory and GNU Radio Simulations for IIoT","display_name":"Tag-Based Physical Layer Authentication over a Nakagami-m Block-Flat Fading Channel: Theory and GNU Radio Simulations for IIoT","publication_year":2025,"publication_date":"2025-12-03","ids":{"openalex":"https://openalex.org/W7125894300","doi":"https://doi.org/10.1109/commnet68224.2025.11288906"},"language":"en","primary_location":{"id":"doi:10.1109/commnet68224.2025.11288906","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet68224.2025.11288906","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 8th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124056799","display_name":"Ewan Gencsek","orcid":null},"institutions":[{"id":"https://openalex.org/I130929987","display_name":"University of Mons","ror":"https://ror.org/02qnnz951","country_code":"BE","type":"education","lineage":["https://openalex.org/I130929987"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Ewan Gencsek","raw_affiliation_strings":["UMONS,Faculty of Engineering FPMs,Electromagnetism and Telecommunication Department,Mons,Belgium"],"affiliations":[{"raw_affiliation_string":"UMONS,Faculty of Engineering FPMs,Electromagnetism and Telecommunication Department,Mons,Belgium","institution_ids":["https://openalex.org/I130929987"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122881730","display_name":"P. M\u00e9gret","orcid":null},"institutions":[{"id":"https://openalex.org/I130929987","display_name":"University of Mons","ror":"https://ror.org/02qnnz951","country_code":"BE","type":"education","lineage":["https://openalex.org/I130929987"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Patrice M\u00e9gret","raw_affiliation_strings":["UMONS,Faculty of Engineering FPMs,Electromagnetism and Telecommunication Department,Mons,Belgium"],"affiliations":[{"raw_affiliation_string":"UMONS,Faculty of Engineering FPMs,Electromagnetism and Telecommunication Department,Mons,Belgium","institution_ids":["https://openalex.org/I130929987"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074854493","display_name":"V\u00e9ronique Moeyaert","orcid":"https://orcid.org/0000-0002-5908-7636"},"institutions":[{"id":"https://openalex.org/I130929987","display_name":"University of Mons","ror":"https://ror.org/02qnnz951","country_code":"BE","type":"education","lineage":["https://openalex.org/I130929987"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"V\u00e9ronique Moeyaert","raw_affiliation_strings":["UMONS,Faculty of Engineering FPMs,Electromagnetism and Telecommunication Department,Mons,Belgium"],"affiliations":[{"raw_affiliation_string":"UMONS,Faculty of Engineering FPMs,Electromagnetism and Telecommunication Department,Mons,Belgium","institution_ids":["https://openalex.org/I130929987"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5124056799"],"corresponding_institution_ids":["https://openalex.org/I130929987"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.64350293,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.7585999965667725,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.7585999965667725,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.1216999962925911,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.024900000542402267,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fading","display_name":"Fading","score":0.7759000062942505},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.7390000224113464},{"id":"https://openalex.org/keywords/software-defined-radio","display_name":"Software-defined radio","score":0.5049999952316284},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.48899999260902405},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4803999960422516},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4747999906539917},{"id":"https://openalex.org/keywords/capture-effect","display_name":"Capture effect","score":0.4171999990940094},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.4025999903678894},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.36480000615119934}],"concepts":[{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.7759000062942505},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.7390000224113464},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.714900016784668},{"id":"https://openalex.org/C171115542","wikidata":"https://www.wikidata.org/wiki/Q1331892","display_name":"Software-defined radio","level":2,"score":0.5049999952316284},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.48899999260902405},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4803999960422516},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4794999957084656},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4747999906539917},{"id":"https://openalex.org/C187077762","wikidata":"https://www.wikidata.org/wiki/Q5036976","display_name":"Capture effect","level":4,"score":0.4171999990940094},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.4025999903678894},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.36480000615119934},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.30979999899864197},{"id":"https://openalex.org/C56296756","wikidata":"https://www.wikidata.org/wiki/Q840922","display_name":"Bit error rate","level":3,"score":0.3089999854564667},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.30399999022483826},{"id":"https://openalex.org/C65422117","wikidata":"https://www.wikidata.org/wiki/Q358527","display_name":"Transmitter power output","level":4,"score":0.29829999804496765},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.296999990940094},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.2906999886035919},{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.2872999906539917},{"id":"https://openalex.org/C2781307350","wikidata":"https://www.wikidata.org/wiki/Q6887221","display_name":"Mobile radio","level":2,"score":0.2849999964237213},{"id":"https://openalex.org/C2779478453","wikidata":"https://www.wikidata.org/wiki/Q6889748","display_name":"Modularity (biology)","level":2,"score":0.28189998865127563},{"id":"https://openalex.org/C161126049","wikidata":"https://www.wikidata.org/wiki/Q5429266","display_name":"Fading distribution","level":5,"score":0.27799999713897705},{"id":"https://openalex.org/C12570599","wikidata":"https://www.wikidata.org/wiki/Q2891044","display_name":"Link layer","level":3,"score":0.27300000190734863},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2623000144958496},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2615000009536743}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/commnet68224.2025.11288906","is_oa":false,"landing_page_url":"https://doi.org/10.1109/commnet68224.2025.11288906","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 8th International Conference on Advanced Communication Technologies and Networking (CommNet)","raw_type":"proceedings-article"},{"id":"pmh:oai:orbi.umons.ac.be:20.500.12907/54689","is_oa":false,"landing_page_url":"https://orbi.umons.ac.be/handle/20.500.12907/54689","pdf_url":null,"source":{"id":"https://openalex.org/S7407055454","display_name":"ORBi UMONS","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2025 8th International Conference on Advanced Communication Technologies and Networking (2025-12-21); 2025 8th International Conference on Advanced Communication Technologies and Networking (CommNet), Rabat, Morocco [MA], 3-5 d\u00e9cembre 2025","raw_type":"peer reviewed"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4451145827770233,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0,138],"paper":[1,73],"investigates":[2],"the":[3,12,23,30,46,63,98,107,111,140],"impact":[4],"of":[5,25,32,57,100,142],"a":[6],"Nakagami-m":[7],"block-flat":[8],"fading":[9,87],"channel":[10,116],"on":[11,45],"superimposed-tag":[13],"(SUP)":[14],"physical":[15],"layer":[16],"authentication":[17,33],"(PLA)":[18],"scheme.":[19],"Semi-analytical":[20],"expressions":[21],"for":[22,40],"probability":[24,31],"false":[26],"alarm":[27],"(PFA)":[28],"and":[29,77,121],"(PA)":[34],"are":[35,80],"derived.":[36],"A":[37],"simulation":[38,78],"framework":[39,64],"wireless":[41],"communication":[42],"implementing":[43],"PLA":[44,67],"open":[47],"source":[48],"software":[49],"GNU":[50,58],"Radio":[51,59],"is":[52],"also":[53],"proposed.":[54],"The":[55],"modularity":[56],"allows":[60],"to":[61,65,93,109,114,118,148],"adapt":[62,110],"other":[66],"schemes.":[68],"We":[69,83],"show":[70],"in":[71],"this":[72],"that":[74,85],"theoretical":[75],"predictions":[76],"results":[79],"matching":[81],"together.":[82],"demonstrate":[84],"severe":[86],"requires":[88],"higher":[89],"tag":[90,126,145],"power":[91,127,146],"allocation":[92,128,147],"maintain":[94],"reliable":[95],"authentication,":[96],"at":[97],"expense":[99],"data":[101,130],"signal":[102],"power.":[103],"These":[104],"findings":[105],"emphasize":[106],"need":[108],"SUP":[112],"scheme":[113],"changing":[115],"conditions":[117],"ensure":[119],"robust":[120],"efficient":[122],"authentication.":[123],"However,":[124],"increasing":[125],"increases":[129],"bit":[131],"error":[132],"rate":[133],"(BER),":[134],"decreasing":[135],"therefore":[136],"PA.":[137,150],"highlights":[139],"existence":[141],"an":[143],"optimum":[144],"maximize":[149]},"counts_by_year":[],"updated_date":"2026-03-16T09:10:04.655348","created_date":"2026-01-29T00:00:00"}
