{"id":"https://openalex.org/W4414080147","doi":"https://doi.org/10.1109/mnet.2025.3599326","title":"Physical Layer Security in NFC: Advances, Potential Toward 6G Wireless Communications","display_name":"Physical Layer Security in NFC: Advances, Potential Toward 6G Wireless Communications","publication_year":2025,"publication_date":"2025-09-08","ids":{"openalex":"https://openalex.org/W4414080147","doi":"https://doi.org/10.1109/mnet.2025.3599326"},"language":"en","primary_location":{"id":"doi:10.1109/mnet.2025.3599326","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.2025.3599326","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074729807","display_name":"Junhao Duan","orcid":"https://orcid.org/0009-0009-0251-1123"},"institutions":[{"id":"https://openalex.org/I3923682","display_name":"Soochow University","ror":"https://ror.org/05t8y2r12","country_code":"CN","type":"education","lineage":["https://openalex.org/I3923682"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junhao Duan","raw_affiliation_strings":["School of Electronic and Information Engineering, Soochow University, Suzhou, Jiangsu, China"],"raw_orcid":"https://orcid.org/0009-0009-0251-1123","affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Soochow University, Suzhou, Jiangsu, China","institution_ids":["https://openalex.org/I3923682"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101996821","display_name":"Jia Hou","orcid":"https://orcid.org/0000-0001-6530-1769"},"institutions":[{"id":"https://openalex.org/I3923682","display_name":"Soochow University","ror":"https://ror.org/05t8y2r12","country_code":"CN","type":"education","lineage":["https://openalex.org/I3923682"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jia Hou","raw_affiliation_strings":["School of Electronic and Information Engineering, Soochow University, Suzhou, Jiangsu, China"],"raw_orcid":"https://orcid.org/0000-0001-6530-1769","affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Soochow University, Suzhou, Jiangsu, China","institution_ids":["https://openalex.org/I3923682"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5074729807"],"corresponding_institution_ids":["https://openalex.org/I3923682"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.33967889,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"39","issue":"6","first_page":"48","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10069","display_name":"Antenna Design and Analysis","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.879800021648407},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.8108000159263611},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.6373000144958496},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.546500027179718},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.538100004196167},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4927000105381012},{"id":"https://openalex.org/keywords/antenna","display_name":"Antenna (radio)","score":0.39410001039505005},{"id":"https://openalex.org/keywords/communications-system","display_name":"Communications system","score":0.3865000009536743},{"id":"https://openalex.org/keywords/wireless-security","display_name":"Wireless security","score":0.36230000853538513}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.879800021648407},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.8108000159263611},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7656000256538391},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.6373000144958496},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.546500027179718},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.538100004196167},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4977000057697296},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4927000105381012},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.451200008392334},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41119998693466187},{"id":"https://openalex.org/C21822782","wikidata":"https://www.wikidata.org/wiki/Q131214","display_name":"Antenna (radio)","level":2,"score":0.39410001039505005},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.3865000009536743},{"id":"https://openalex.org/C2776946656","wikidata":"https://www.wikidata.org/wiki/Q1655812","display_name":"Wireless security","level":4,"score":0.36230000853538513},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.353300005197525},{"id":"https://openalex.org/C2781089630","wikidata":"https://www.wikidata.org/wiki/Q21856745","display_name":"Realization (probability)","level":2,"score":0.3368000090122223},{"id":"https://openalex.org/C2776157020","wikidata":"https://www.wikidata.org/wiki/Q851598","display_name":"Physical security","level":2,"score":0.31850001215934753},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3082999885082245},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2989000082015991},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.29429998993873596},{"id":"https://openalex.org/C2779079576","wikidata":"https://www.wikidata.org/wiki/Q17092823","display_name":"Jamming","level":2,"score":0.2928999960422516},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.2865000069141388},{"id":"https://openalex.org/C92545706","wikidata":"https://www.wikidata.org/wiki/Q902174","display_name":"Radio spectrum","level":2,"score":0.26649999618530273},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.26429998874664307},{"id":"https://openalex.org/C152800680","wikidata":"https://www.wikidata.org/wiki/Q5408491","display_name":"Tactical communications","level":2,"score":0.25600001215934753},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.25029999017715454}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mnet.2025.3599326","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mnet.2025.3599326","pdf_url":null,"source":{"id":"https://openalex.org/S186584794","display_name":"IEEE Network","issn_l":"0890-8044","issn":["0890-8044","1558-156X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Network","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1989821035","https://openalex.org/W4352976955","https://openalex.org/W4376481253","https://openalex.org/W4385885073","https://openalex.org/W4390577869","https://openalex.org/W4396753436","https://openalex.org/W4396817326","https://openalex.org/W4399665799","https://openalex.org/W4403423093","https://openalex.org/W4406028326","https://openalex.org/W4407154397","https://openalex.org/W4407782736","https://openalex.org/W4410219630","https://openalex.org/W4410887673"],"related_works":["https://openalex.org/W2793769208","https://openalex.org/W2170850604","https://openalex.org/W2367921105","https://openalex.org/W197658719","https://openalex.org/W3181189131","https://openalex.org/W2380772419","https://openalex.org/W2034154246","https://openalex.org/W2353349109","https://openalex.org/W2277479932","https://openalex.org/W2119831558"],"abstract_inverted_index":{"With":[0],"the":[1,7,60,67,86,123,171,177],"advent":[2],"of":[3,9,63,88,125,140,173],"sixth-generation":[4],"wireless":[5],"communication,":[6],"development":[8],"extremely":[10,141],"large-scale":[11,142],"antenna":[12],"arrays":[13],"(ELAA)":[14],"and":[15,66,147],"terahertz":[16],"(THz)":[17],"frequency":[18],"bands":[19],"has":[20],"significantly":[21],"advanced":[22],"research":[23],"into":[24,170],"near-field":[25],"communication":[26,31,175],"(NFC).":[27],"Unlike":[28],"traditional":[29],"far-field":[30],"(FFC),":[32],"which":[33],"is":[34,92],"based":[35],"on":[36,44],"a":[37],"plane":[38],"wave":[39,48],"propagation":[40,49],"model,":[41],"NFC":[42,64,131],"capitalizes":[43],"its":[45],"unique":[46],"spherical":[47],"characteristics":[50],"to":[51,97,106,117,150,163],"precisely":[52],"focus":[53],"signals,":[54],"thus":[55],"attracting":[56],"considerable":[57],"attention.":[58],"However,":[59],"inherent":[61],"complexity":[62],"channels":[65],"security":[68,128],"threats":[69],"associated":[70],"with":[71],"short-range":[72],"communications":[73],"present":[74],"significant":[75],"challenges.":[76],"To":[77],"better":[78],"reflect":[79],"realistic":[80],"scenarios,":[81],"this":[82,120,158],"article":[83,121,159],"assumes":[84],"that":[85],"position":[87],"potential":[89],"untrusted":[90],"nodes":[91],"uncertain,":[93],"allowing":[94],"dynamic":[95],"adjustments":[96],"attack":[98],"strategies.":[99],"Consequently,":[100],"legitimate":[101],"users":[102],"may":[103],"be":[104],"exposed":[105],"risks":[107],"such":[108],"as":[109],"passive":[110],"eavesdropping":[111],"or":[112],"active":[113],"interference.":[114],"In":[115],"response":[116],"these":[118],"concerns,":[119],"addresses":[122],"issue":[124],"physical":[126],"layer":[127],"(PLS)":[129],"in":[130,176],"by":[132],"leveraging":[133],"key":[134],"technologies":[135],"including":[136],"resolution":[137],"enhancement,":[138],"deployment":[139],"reconfigurable":[143],"intelligent":[144],"surfaces":[145],"(XL-RIS),":[146],"pinching":[148],"antennas":[149],"propose":[151],"methods":[152],"for":[153],"enhancing":[154],"system":[155],"security.":[156],"Finally,":[157],"outlines":[160],"feasible":[161],"solutions":[162],"anticipated":[164],"future":[165],"challenges,":[166],"providing":[167],"new":[168],"insights":[169],"realization":[172],"secure":[174],"near-field.":[178]},"counts_by_year":[],"updated_date":"2025-11-18T23:42:31.664661","created_date":"2025-10-10T00:00:00"}
