{"id":"https://openalex.org/W4301373819","doi":"https://doi.org/10.1109/icccworkshops55477.2022.9896714","title":"Physical- Layer Authentication based on Spreading Code Watermarking for IoT Networks","display_name":"Physical- Layer Authentication based on Spreading Code Watermarking for IoT Networks","publication_year":2022,"publication_date":"2022-08-11","ids":{"openalex":"https://openalex.org/W4301373819","doi":"https://doi.org/10.1109/icccworkshops55477.2022.9896714"},"language":"en","primary_location":{"id":"doi:10.1109/icccworkshops55477.2022.9896714","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccworkshops55477.2022.9896714","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040928300","display_name":"Yuqi Leng","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuqi Leng","raw_affiliation_strings":["School of Electronics and Information Technology, Sun Yat-sen University,Guangzhou,China,510006"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Technology, Sun Yat-sen University,Guangzhou,China,510006","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100786643","display_name":"Ruiqi Zhang","orcid":"https://orcid.org/0000-0003-3901-8737"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiqi Zhang","raw_affiliation_strings":["School of Electronics and Information Technology, Sun Yat-sen University,Guangzhou,China,510006"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Technology, Sun Yat-sen University,Guangzhou,China,510006","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062092919","display_name":"Wenkun Wen","orcid":"https://orcid.org/0009-0002-1915-7748"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wenkun Wen","raw_affiliation_strings":["Guangzhou Techphant Co. Ltd.,Guangzhou,China,510310"],"affiliations":[{"raw_affiliation_string":"Guangzhou Techphant Co. Ltd.,Guangzhou,China,510310","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033422280","display_name":"Peiran Wu","orcid":"https://orcid.org/0000-0001-9747-3629"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peiran Wu","raw_affiliation_strings":["School of Electronics and Information Technology, Sun Yat-sen University,Guangzhou,China,510006"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Technology, Sun Yat-sen University,Guangzhou,China,510006","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052938144","display_name":"Minghua Xia","orcid":"https://orcid.org/0000-0002-0820-2227"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minghua Xia","raw_affiliation_strings":["School of Electronics and Information Technology, Sun Yat-sen University,Guangzhou,China,510006"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Technology, Sun Yat-sen University,Guangzhou,China,510006","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5040928300"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.183,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.47966866,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"434","last_page":"438"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8063054084777832},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7281793355941772},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.6980639696121216},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6215644478797913},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.5949410796165466},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.5861636400222778},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.49304434657096863},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.44621285796165466},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43632322549819946},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.4188436269760132},{"id":"https://openalex.org/keywords/preamble","display_name":"Preamble","score":0.4158393442630768},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.35547134280204773},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3517382740974426},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.32729318737983704},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23497772216796875},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.2127428650856018},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.20874276757240295},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.13813775777816772},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13631224632263184},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13084015250205994},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.0952366292476654}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8063054084777832},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7281793355941772},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.6980639696121216},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6215644478797913},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.5949410796165466},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.5861636400222778},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.49304434657096863},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.44621285796165466},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43632322549819946},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.4188436269760132},{"id":"https://openalex.org/C2780691134","wikidata":"https://www.wikidata.org/wiki/Q1129448","display_name":"Preamble","level":3,"score":0.4158393442630768},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.35547134280204773},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3517382740974426},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.32729318737983704},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23497772216796875},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.2127428650856018},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.20874276757240295},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.13813775777816772},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13631224632263184},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13084015250205994},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0952366292476654},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccworkshops55477.2022.9896714","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccworkshops55477.2022.9896714","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1318076700","display_name":null,"funder_award_id":"U2001213,62171486,61801526","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1996158400","https://openalex.org/W2005801175","https://openalex.org/W2129690209","https://openalex.org/W2751870338","https://openalex.org/W2807313035","https://openalex.org/W2915283585","https://openalex.org/W2945217752","https://openalex.org/W2968774960","https://openalex.org/W3030941702","https://openalex.org/W3034284552","https://openalex.org/W3048592926","https://openalex.org/W3108962068"],"related_works":["https://openalex.org/W2155066260","https://openalex.org/W1555715488","https://openalex.org/W1510656496","https://openalex.org/W2997078490","https://openalex.org/W2770964263","https://openalex.org/W2296461337","https://openalex.org/W2162914389","https://openalex.org/W2144158704","https://openalex.org/W3022072034","https://openalex.org/W4301373819"],"abstract_inverted_index":{"Physical-layer":[0],"authentication":[1,26,109,135],"(PLA)":[2],"is":[3,76,122],"capable":[4],"of":[5,14,91,96,141,149,162],"providing":[6],"lightweight":[7],"security":[8],"solutions":[9],"for":[10,30,64,136],"the":[11,23,31,60,65,69,94,97,101,116,131,146,154,160],"next-generation":[12],"Internet":[13],"Things":[15],"(IoT)":[16],"networks.":[17,42],"This":[18],"paper":[19],"adopts":[20],"and":[21,50,100,124,130],"modifies":[22],"spreading":[24,61],"code":[25,62],"techniques":[27],"originally":[28],"designed":[29],"Global":[32],"Navigation":[33],"Satellite":[34],"System":[35],"to":[36,39,55,107],"apply":[37],"PLA":[38],"narrowband":[40],"IoT":[41],"In":[43,68,115],"particular,":[44],"two":[45],"watermarking":[46,52,143,151],"schemes":[47],"including":[48],"single-":[49],"multi-frame":[51,117,150],"are":[53],"developed":[54],"replace":[56],"chip":[57],"values":[58],"in":[59,82],"segment":[63],"PHY-layer":[66],"preamble.":[67],"single-frame":[70,142],"scheme,":[71,118],"a":[72,83,87,104,113,119],"whole":[73],"watermark":[74,120],"sequence":[75,121],"embedded":[77,126],"into":[78,127],"one":[79],"single":[80],"frame":[81],"preamble-bit-wise":[84],"manner,":[85],"with":[86,145],"randomly":[88],"generated":[89],"set":[90],"indices":[92],"indicating":[93],"position":[95],"watermarked":[98],"segments,":[99],"receiver":[102,132],"makes":[103],"correlation":[105],"test":[106],"make":[108],"decisions":[110],"once":[111],"receiving":[112],"message.":[114],"split":[123],"periodically":[125],"several":[128],"frames,":[129],"conducts":[133],"joint":[134],"these":[137],"frames.":[138],"Simulation":[139],"results":[140],"along":[144],"prototype":[147],"validation":[148],"based":[152],"on":[153],"GNU":[155],"Radio/USRP":[156],"SDR":[157],"platform":[158],"corroborate":[159],"effectiveness":[161],"both":[163],"schemes.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
