{"id":"https://openalex.org/W4411866995","doi":"https://doi.org/10.1109/jiot.2025.3584617","title":"Improved PHY-Layer Authentication Utilizing Radiation Pattern Feature for 6G-IoT Systems","display_name":"Improved PHY-Layer Authentication Utilizing Radiation Pattern Feature for 6G-IoT Systems","publication_year":2025,"publication_date":"2025-07-01","ids":{"openalex":"https://openalex.org/W4411866995","doi":"https://doi.org/10.1109/jiot.2025.3584617"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3584617","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3584617","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112980014","display_name":"Changjian Qin","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Changjian Qin","raw_affiliation_strings":["School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111172790","display_name":"Mu Niu","orcid":"https://orcid.org/0009-0003-4587-6815"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mu Niu","raw_affiliation_strings":["Portland Institute, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","School of Computer Science, and M. Niu is with the Portland Institute, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"],"raw_orcid":"https://orcid.org/0009-0003-4587-6815","affiliations":[{"raw_affiliation_string":"Portland Institute, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"School of Computer Science, and M. Niu is with the Portland Institute, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100608622","display_name":"Ji He","orcid":"https://orcid.org/0000-0003-3640-3488"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ji He","raw_affiliation_strings":["School of Computer Science and Technology and the Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi&#x2019;an, China","School of Computer Science and Technology, Xidian University, Xi&#x2019;an, China"],"raw_orcid":"https://orcid.org/0000-0003-3640-3488","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology and the Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041554124","display_name":"Pinchang Zhang","orcid":"https://orcid.org/0000-0002-8310-7238"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pinchang Zhang","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","School of Computer Science, and M. Niu is with the Portland Institute, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"],"raw_orcid":"https://orcid.org/0000-0002-8310-7238","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]},{"raw_affiliation_string":"School of Computer Science, and M. Niu is with the Portland Institute, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5112980014"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":1.0273,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.80000852,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"12","issue":"16","first_page":"34619","last_page":"34622"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13905","display_name":"Telecommunications and Broadcasting Technologies","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13905","display_name":"Telecommunications and Broadcasting Technologies","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9714999794960022,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8509179353713989},{"id":"https://openalex.org/keywords/phy","display_name":"PHY","score":0.6540931463241577},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.6482895612716675},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5937083959579468},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5344004034996033},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.4928469657897949},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3340834677219391},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2696805000305176},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.24405145645141602},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11635515093803406}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8509179353713989},{"id":"https://openalex.org/C41918916","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"PHY","level":4,"score":0.6540931463241577},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.6482895612716675},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5937083959579468},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5344004034996033},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.4928469657897949},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3340834677219391},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2696805000305176},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.24405145645141602},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11635515093803406},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3584617","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3584617","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7747012976","display_name":null,"funder_award_id":"62272241","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7995815166","display_name":null,"funder_award_id":"2023YFB3107500","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W2150080833","https://openalex.org/W2776818420","https://openalex.org/W2887906137","https://openalex.org/W2902432556","https://openalex.org/W2980594903","https://openalex.org/W3024056085","https://openalex.org/W3085607537","https://openalex.org/W3110641849","https://openalex.org/W3119344003","https://openalex.org/W3158530087","https://openalex.org/W4320712861","https://openalex.org/W4361986817","https://openalex.org/W4402216285"],"related_works":["https://openalex.org/W2945523224","https://openalex.org/W4313639042","https://openalex.org/W2444418218","https://openalex.org/W2727597159","https://openalex.org/W4241709719","https://openalex.org/W1488909492","https://openalex.org/W4234133302","https://openalex.org/W2111773294","https://openalex.org/W2774037455","https://openalex.org/W1858159341"],"abstract_inverted_index":{"In":[0],"the":[1,17,56,91,94,107,112],"sixth":[2],"generation":[3],"and":[4,20,51,68,70,109],"Internet":[5],"of":[6,22,59,93,111],"Things":[7],"(6G-IoT)":[8],"systems,":[9],"impersonation":[10,37],"attacks":[11,38],"pose":[12],"significant":[13],"risks":[14],"due":[15],"to":[16,35,89,105],"high":[18],"interconnectivity,":[19],"complexity":[21],"devices.":[23],"This":[24],"study":[25],"develops":[26],"a":[27,98],"new,":[28],"improved":[29],"physical":[30],"layer":[31],"(PHY-layer)":[32],"authentication":[33,82,113],"method":[34],"counter":[36],"in":[39,48,65],"an":[40,81],"6G-IoT":[41],"system":[42],"by":[43],"leveraging":[44],"radiation":[45,60],"pattern":[46,61],"feature":[47],"gain,":[49,66],"phase,":[50,67],"position":[52],"errors.":[53],"We":[54],"analyze":[55],"statistical":[57,72,87],"behavior":[58],"with":[62],"random":[63],"errors":[64],"position,":[69],"establish":[71],"models":[73,88],"based":[74],"on":[75],"this":[76],"analysis.":[77],"Subsequently,":[78],"we":[79],"devise":[80],"scheme":[83,114],"that":[84],"utilizes":[85],"these":[86],"validate":[90,106],"legitimacy":[92],"IoT":[95],"device.":[96],"Finally,":[97],"performance":[99],"assessment":[100],"has":[101],"been":[102],"carried":[103],"out":[104],"dependability":[108],"efficacy":[110],"across":[115],"diverse":[116],"settings.":[117]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
