{"id":"https://openalex.org/W4416965841","doi":"https://doi.org/10.1109/jiot.2025.3639966","title":"Intelligent Reflecting Surfaces-Aided Authentication Mechanism for IoT Devices","display_name":"Intelligent Reflecting Surfaces-Aided Authentication Mechanism for IoT Devices","publication_year":2025,"publication_date":"2025-12-03","ids":{"openalex":"https://openalex.org/W4416965841","doi":"https://doi.org/10.1109/jiot.2025.3639966"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3639966","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3639966","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085538289","display_name":"Wei Xiao","orcid":"https://orcid.org/0000-0001-5244-797X"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Xiao Wei","raw_affiliation_strings":["Department of Electrical and Computer Engineering, National University of Singapore, Queenstown, Singapore","Department of Electrical and Computer Engineering, National University of Singapore, 4 Engineering Drive 3, Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, National University of Singapore, Queenstown, Singapore","institution_ids":["https://openalex.org/I165932596"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, National University of Singapore, 4 Engineering Drive 3, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008664923","display_name":"Muhammad Naveed Aman","orcid":"https://orcid.org/0000-0002-4629-7589"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Muhammad Naveed Aman","raw_affiliation_strings":["School of Computing, University of Nebraska-Lincoln, Lincoln, NE, USA","School of Computing, University of Nebraska-Lincoln, 1400 R St, Lincoln, Nbraska, United States"],"affiliations":[{"raw_affiliation_string":"School of Computing, University of Nebraska-Lincoln, Lincoln, NE, USA","institution_ids":["https://openalex.org/I114395901"]},{"raw_affiliation_string":"School of Computing, University of Nebraska-Lincoln, 1400 R St, Lincoln, Nbraska, United States","institution_ids":["https://openalex.org/I114395901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041189303","display_name":"Biplab Sikdar","orcid":"https://orcid.org/0000-0002-0084-4647"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Biplab Sikdar","raw_affiliation_strings":["Department of Electrical and Computer Engineering, National University of Singapore, Queenstown, Singapore","Department of Electrical and Computer Engineering, National University of Singapore, 4 Engineering Drive 3, Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, National University of Singapore, Queenstown, Singapore","institution_ids":["https://openalex.org/I165932596"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, National University of Singapore, 4 Engineering Drive 3, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5085538289"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41149816,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"4","first_page":"6255","last_page":"6270"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.6049000024795532,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.6049000024795532,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.05849999934434891,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.04919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5945000052452087},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5782999992370605},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5672000050544739},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5468000173568726},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.41920000314712524},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.3919999897480011},{"id":"https://openalex.org/keywords/rss","display_name":"RSS","score":0.3741999864578247}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8648999929428101},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5945000052452087},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5782999992370605},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5672000050544739},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5584999918937683},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5468000173568726},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.41920000314712524},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.3919999897480011},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.37470000982284546},{"id":"https://openalex.org/C2385561","wikidata":"https://www.wikidata.org/wiki/Q45432","display_name":"RSS","level":2,"score":0.3741999864578247},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.37369999289512634},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.36410000920295715},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.3476000130176544},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.337799996137619},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3366999924182892},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.33399999141693115},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.32269999384880066},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.31130000948905945},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.25929999351501465}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3639966","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3639966","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W2010939995","https://openalex.org/W2030657791","https://openalex.org/W2034171435","https://openalex.org/W2036718974","https://openalex.org/W2048999575","https://openalex.org/W2067040941","https://openalex.org/W2169212403","https://openalex.org/W2465324213","https://openalex.org/W2520766963","https://openalex.org/W2601292847","https://openalex.org/W2741961238","https://openalex.org/W2808182497","https://openalex.org/W2895570089","https://openalex.org/W2895909303","https://openalex.org/W2897993795","https://openalex.org/W2901658766","https://openalex.org/W2912850378","https://openalex.org/W2914768460","https://openalex.org/W2933579063","https://openalex.org/W2937693915","https://openalex.org/W2947205477","https://openalex.org/W2950077417","https://openalex.org/W2951694401","https://openalex.org/W2952260178","https://openalex.org/W2963809228","https://openalex.org/W2981792785","https://openalex.org/W2990747873","https://openalex.org/W3000455992","https://openalex.org/W3006368298","https://openalex.org/W3009563387","https://openalex.org/W3010858269","https://openalex.org/W3035049807","https://openalex.org/W3036554922","https://openalex.org/W3038283497","https://openalex.org/W3045336918","https://openalex.org/W3096188699","https://openalex.org/W3100461713","https://openalex.org/W3123261042","https://openalex.org/W3129486236","https://openalex.org/W3178081691","https://openalex.org/W3199597982","https://openalex.org/W3204184545","https://openalex.org/W3217788440","https://openalex.org/W4205278438","https://openalex.org/W4207001703","https://openalex.org/W4210751617","https://openalex.org/W4224442085","https://openalex.org/W4226061238","https://openalex.org/W4283220411","https://openalex.org/W4381741281","https://openalex.org/W4399744035","https://openalex.org/W4402568261","https://openalex.org/W4402835589"],"related_works":[],"abstract_inverted_index":{"The":[0,138],"proliferation":[1],"of":[2,4,92],"Internet":[3],"Things":[5],"(IoT)":[6],"devices":[7,46],"necessitates":[8],"robust":[9],"authentication":[10,21,42,56,113],"mechanisms":[11],"to":[12,27,53,65,74,89,120,165],"ensure":[13],"security":[14],"and":[15,33,86,132,149],"privacy":[16],"in":[17,72],"resource-constrained":[18],"environments.":[19],"Existing":[20],"protocols":[22],"face":[23],"limitations,":[24],"including":[25,146],"vulnerability":[26],"physical":[28],"attacks,":[29],"high":[30,141],"computational":[31,162],"overhead,":[32],"scalability":[34],"challenges.":[35],"This":[36],"paper":[37],"presents":[38],"a":[39],"novel":[40],"IRS-aided":[41],"mechanism":[43,139],"for":[44,143],"IoT":[45],"that":[47],"leverages":[48],"Intelligent":[49],"Reflecting":[50],"Surfaces":[51],"(IRS)":[52],"enhance":[54],"location-based":[55],"through":[57],"controllable":[58],"signal":[59,127],"enhancement.":[60],"Our":[61],"approach":[62],"employs":[63],"IRS":[64,117],"amplify":[66],"Received":[67],"Signal":[68],"Strength":[69],"(RSS)":[70],"variations":[71],"response":[73],"device":[75],"mobility,":[76],"enabling":[77],"precise":[78],"location":[79],"change":[80],"detection":[81],"while":[82,152],"integrating":[83],"pseudo-identity":[84],"verification":[85],"RSS":[87],"filtering":[88],"mitigate":[90],"Denial":[91],"Service":[93],"(DoS)":[94],"attacks.":[95],"Comprehensive":[96],"robustness":[97],"analysis":[98],"demonstrates":[99],"exceptional":[100],"performance":[101,114],"under":[102],"realistic":[103],"deployment":[104],"constraints:":[105],"simulations":[106],"with":[107,124,160],"Rician":[108],"channel":[109],"models":[110],"show":[111],"99.82%\u221299.99%":[112],"across":[115],"commercial":[116],"implementations":[118],"(1-bit":[119],"3-bit":[121],"phase":[122],"shifters),":[123],"4.6":[125],"dB":[126],"enhancement":[128],"over":[129],"direct":[130],"paths":[131],"minimal":[133],"system":[134],"overhead":[135],"(<":[136],"0.03%).":[137],"achieves":[140],"suitability":[142],"infrastructure-dense":[144],"deployments,":[145],"smart":[147],"buildings":[148],"industrial":[150],"IoT,":[151],"providing":[153],"comprehensive":[154],"protection":[155],"against":[156],"major":[157],"attack":[158],"vectors":[159],"lower":[161],"complexity":[163],"compared":[164],"existing":[166],"protocols.":[167]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-03T00:00:00"}
