{"id":"https://openalex.org/W4360996706","doi":"https://doi.org/10.1109/icct56141.2022.10073198","title":"Implementing Continuous Authentication in Network Connection Based on Improved SPA","display_name":"Implementing Continuous Authentication in Network Connection Based on Improved SPA","publication_year":2022,"publication_date":"2022-11-11","ids":{"openalex":"https://openalex.org/W4360996706","doi":"https://doi.org/10.1109/icct56141.2022.10073198"},"language":"en","primary_location":{"id":"doi:10.1109/icct56141.2022.10073198","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icct56141.2022.10073198","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002267722","display_name":"Kun Jiang","orcid":"https://orcid.org/0000-0003-3148-5058"},"institutions":[{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]},{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kun Jiang","raw_affiliation_strings":["China Telecom Research Institute,Research Department of Security Technology,Shanghai,China","Research Department of Security Technology, China Telecom Research Institute, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"China Telecom Research Institute,Research Department of Security Technology,Shanghai,China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]},{"raw_affiliation_string":"Research Department of Security Technology, China Telecom Research Institute, Shanghai, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100701340","display_name":"Yao Xiao","orcid":"https://orcid.org/0000-0002-0533-8380"},"institutions":[{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]},{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yao Xiao","raw_affiliation_strings":["China Telecom Research Institute,Research Department of Security Technology,Shanghai,China","Research Department of Security Technology, China Telecom Research Institute, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"China Telecom Research Institute,Research Department of Security Technology,Shanghai,China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]},{"raw_affiliation_string":"Research Department of Security Technology, China Telecom Research Institute, Shanghai, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088985361","display_name":"Shumei Yuan","orcid":null},"institutions":[{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]},{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shumei Yuan","raw_affiliation_strings":["China Telecom Research Institute,Research Department of Security Technology,Shanghai,China","Research Department of Security Technology, China Telecom Research Institute, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"China Telecom Research Institute,Research Department of Security Technology,Shanghai,China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]},{"raw_affiliation_string":"Research Department of Security Technology, China Telecom Research Institute, Shanghai, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113692873","display_name":"Xuan Si","orcid":null},"institutions":[{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]},{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuan Si","raw_affiliation_strings":["China Telecom Research Institute,Research Department of Security Technology,Shanghai,China","Research Department of Security Technology, China Telecom Research Institute, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"China Telecom Research Institute,Research Department of Security Technology,Shanghai,China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]},{"raw_affiliation_string":"Research Department of Security Technology, China Telecom Research Institute, Shanghai, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5002267722"],"corresponding_institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"],"apc_list":null,"apc_paid":null,"fwci":0.0969,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.44186732,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"12","issue":null,"first_page":"1318","last_page":"1322"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7919148802757263},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6598678231239319},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6555742025375366},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6283221244812012},{"id":"https://openalex.org/keywords/heartbeat","display_name":"Heartbeat","score":0.5308281779289246},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.4794653654098511},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4535844624042511},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.44593268632888794}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7919148802757263},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6598678231239319},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6555742025375366},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6283221244812012},{"id":"https://openalex.org/C13852961","wikidata":"https://www.wikidata.org/wiki/Q17021880","display_name":"Heartbeat","level":2,"score":0.5308281779289246},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4794653654098511},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4535844624042511},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.44593268632888794}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icct56141.2022.10073198","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icct56141.2022.10073198","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 22nd International Conference on Communication Technology (ICCT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1979897473","https://openalex.org/W1994499141","https://openalex.org/W2111910727","https://openalex.org/W2116949229","https://openalex.org/W2275561544","https://openalex.org/W2327964468","https://openalex.org/W2897475637","https://openalex.org/W2966844505","https://openalex.org/W2979657369","https://openalex.org/W3005805959","https://openalex.org/W6677782732","https://openalex.org/W6713201810"],"related_works":["https://openalex.org/W2059474045","https://openalex.org/W2034419863","https://openalex.org/W3007106793","https://openalex.org/W2296396257","https://openalex.org/W2132505069","https://openalex.org/W1965515427","https://openalex.org/W2547137208","https://openalex.org/W2116285675","https://openalex.org/W2054202867","https://openalex.org/W2109882692"],"abstract_inverted_index":{"Compared":[0],"with":[1,112],"traditional":[2],"network":[3,23],"boundary":[4],"defense":[5],"based":[6],"on":[7],"dedicated":[8],"firewalls,":[9],"Software":[10],"Defined":[11],"Perimeter":[12],"(SDP)":[13],"brings":[14],"new":[15,141],"security":[16,52,69],"features":[17],"and":[18,30,72],"decreases":[19],"cyberattacks":[20],"caused":[21],"by":[22,25,193],"exposure":[24],"hiding":[26],"the":[27,38,45,68,84,91,109,124,154,164,170,176,182,201,211],"infrastructure,":[28],"applications":[29],"access":[31],"controls.":[32],"Single":[33],"Packet":[34],"Authorization":[35],"(SPA)":[36],"is":[37,64,86,143,147,206],"first":[39],"step":[40],"in":[41,88,153,169,179,187,199],"SDP":[42],"authentication.":[43],"After":[44],"verification":[46],"of":[47,70,74,166,172,203],"SPA,":[48],"there":[49],"are":[50,130],"some":[51],"issues":[53],"still":[54],"need":[55],"to":[56,66,96],"be":[57,121],"improved":[58,192],"or":[59,133],"addressed.":[60],"The":[61],"primary":[62],"issue":[63],"how":[65],"ensure":[67],"connection":[71,100,110,159,217],"timeliness":[73],"disconnection":[75],"while":[76],"both":[77],"communication":[78,103],"sides":[79],"will":[80],"stay":[81],"connected":[82],"until":[83],"session":[85],"finished":[87],"SDP.":[89],"As":[90],"most":[92],"widely":[93],"used":[94,151],"way":[95],"maintain":[97,108],"a":[98,140],"long-term":[99],"between":[101],"two":[102],"parties,":[104],"heartbeat":[105,128,173,204],"mechanism":[106],"can":[107,214],"state":[111],"few":[113],"resource":[114],"consumption.":[115],"However,":[116],"continuous":[117,167],"identity":[118],"authentication":[119,155,168,183],"cannot":[120],"performed":[122],"during":[123,175],"keepalive":[125,177],"phase":[126,156,178],"since":[127],"packets":[129,174,205],"usually":[131],"empty":[132],"containing":[134],"fixed":[135],"content.":[136],"In":[137],"this":[138],"paper,":[139],"scheme":[142,213],"proposed,":[144],"where":[145],"SPA":[146,188],"no":[148],"longer":[149],"only":[150],"once":[152],"before":[157],"initial":[158],"establishment,":[160],"but":[161],"also":[162],"plays":[163],"role":[165],"form":[171],"sessions.":[180],"Besides,":[181],"information":[184],"generation":[185],"method":[186],"module":[189],"has":[190],"been":[191],"optimizing":[194],"One":[195],"Time":[196],"Password":[197],"(OTP),":[198],"which":[200],"count":[202],"considered.":[207],"Analysis":[208],"shows":[209],"that":[210],"proposed":[212],"achieve":[215],"better":[216],"security.":[218]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
