{"id":"https://openalex.org/W4412964265","doi":"https://doi.org/10.1109/ntms65597.2025.11076929","title":"CD<sup>2</sup>A: Continuous Device-to-Device Authentication Exploiting Crystal Oscillator Impurities","display_name":"CD<sup>2</sup>A: Continuous Device-to-Device Authentication Exploiting Crystal Oscillator Impurities","publication_year":2025,"publication_date":"2025-06-18","ids":{"openalex":"https://openalex.org/W4412964265","doi":"https://doi.org/10.1109/ntms65597.2025.11076929"},"language":"en","primary_location":{"id":"doi:10.1109/ntms65597.2025.11076929","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ntms65597.2025.11076929","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 12th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033490799","display_name":"M. Selvam","orcid":null},"institutions":[{"id":"https://openalex.org/I180825142","display_name":"City, University of London","ror":"https://ror.org/04489at23","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I180825142"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Muthupavithran Selvam","raw_affiliation_strings":["City University of London,London,UK"],"affiliations":[{"raw_affiliation_string":"City University of London,London,UK","institution_ids":["https://openalex.org/I180825142"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101758699","display_name":"Zeba Khanam","orcid":"https://orcid.org/0000-0002-2886-683X"},"institutions":[{"id":"https://openalex.org/I1332878012","display_name":"BT Group (United Kingdom)","ror":"https://ror.org/00kv9pj15","country_code":"GB","type":"company","lineage":["https://openalex.org/I1332878012"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zeba Khanam","raw_affiliation_strings":["British Telecom Security Research London,UK"],"affiliations":[{"raw_affiliation_string":"British Telecom Security Research London,UK","institution_ids":["https://openalex.org/I1332878012"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100634925","display_name":"Amit Kumar Singh","orcid":"https://orcid.org/0000-0001-7359-2068"},"institutions":[{"id":"https://openalex.org/I110002522","display_name":"University of Essex","ror":"https://ror.org/02nkf1q06","country_code":"GB","type":"education","lineage":["https://openalex.org/I110002522"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Amit Kumar Singh","raw_affiliation_strings":["University of Essex,Essex,UK"],"affiliations":[{"raw_affiliation_string":"University of Essex,Essex,UK","institution_ids":["https://openalex.org/I110002522"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101445032","display_name":"Zhanfeng Cui","orcid":"https://orcid.org/0000-0002-9251-9752"},"institutions":[{"id":"https://openalex.org/I1332878012","display_name":"BT Group (United Kingdom)","ror":"https://ror.org/00kv9pj15","country_code":"GB","type":"company","lineage":["https://openalex.org/I1332878012"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zhan Cui","raw_affiliation_strings":["British Telecom Security Research London,UK"],"affiliations":[{"raw_affiliation_string":"British Telecom Security Research London,UK","institution_ids":["https://openalex.org/I1332878012"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059640195","display_name":"Muttukrishnan Rajarajan","orcid":"https://orcid.org/0000-0001-5814-9922"},"institutions":[{"id":"https://openalex.org/I180825142","display_name":"City, University of London","ror":"https://ror.org/04489at23","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I180825142"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Rajarajan Muttukrishnan","raw_affiliation_strings":["City University of London,London,UK"],"affiliations":[{"raw_affiliation_string":"City University of London,London,UK","institution_ids":["https://openalex.org/I180825142"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5033490799"],"corresponding_institution_ids":["https://openalex.org/I180825142"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28416836,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"377","last_page":"385"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9822999835014343,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/impurity","display_name":"Impurity","score":0.7135300636291504},{"id":"https://openalex.org/keywords/crystal-oscillator","display_name":"Crystal oscillator","score":0.6206714510917664},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6105647683143616},{"id":"https://openalex.org/keywords/optoelectronics","display_name":"Optoelectronics","score":0.49942541122436523},{"id":"https://openalex.org/keywords/crystal","display_name":"Crystal (programming language)","score":0.48227551579475403},{"id":"https://openalex.org/keywords/materials-science","display_name":"Materials science","score":0.3972896933555603},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.37666434049606323},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.34661364555358887},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13640975952148438},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.1330265998840332}],"concepts":[{"id":"https://openalex.org/C71987851","wikidata":"https://www.wikidata.org/wiki/Q7216430","display_name":"Impurity","level":2,"score":0.7135300636291504},{"id":"https://openalex.org/C172137495","wikidata":"https://www.wikidata.org/wiki/Q877055","display_name":"Crystal oscillator","level":3,"score":0.6206714510917664},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6105647683143616},{"id":"https://openalex.org/C49040817","wikidata":"https://www.wikidata.org/wiki/Q193091","display_name":"Optoelectronics","level":1,"score":0.49942541122436523},{"id":"https://openalex.org/C2781285689","wikidata":"https://www.wikidata.org/wiki/Q21921428","display_name":"Crystal (programming language)","level":2,"score":0.48227551579475403},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.3972896933555603},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.37666434049606323},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.34661364555358887},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13640975952148438},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.1330265998840332},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C97126364","wikidata":"https://www.wikidata.org/wiki/Q349669","display_name":"Resonator","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ntms65597.2025.11076929","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ntms65597.2025.11076929","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 12th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320314731","display_name":"UK Research and Innovation","ror":"https://ror.org/001aqnf71"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1483550678","https://openalex.org/W1520914943","https://openalex.org/W1532295511","https://openalex.org/W1751283969","https://openalex.org/W2004543878","https://openalex.org/W2043079332","https://openalex.org/W2142668586","https://openalex.org/W2405780103","https://openalex.org/W2471556897","https://openalex.org/W2584343393","https://openalex.org/W2889741439","https://openalex.org/W2891699316","https://openalex.org/W2907410281","https://openalex.org/W2956131158","https://openalex.org/W2963331030","https://openalex.org/W2982350200","https://openalex.org/W3000441679","https://openalex.org/W3131508642","https://openalex.org/W3169126164","https://openalex.org/W3197762724","https://openalex.org/W4200522845","https://openalex.org/W4220757321","https://openalex.org/W4286374021","https://openalex.org/W4290189322","https://openalex.org/W4294206371","https://openalex.org/W4313594094","https://openalex.org/W4385190330","https://openalex.org/W4387967760","https://openalex.org/W4388765676","https://openalex.org/W6639220344","https://openalex.org/W6765502552"],"related_works":["https://openalex.org/W2027609287","https://openalex.org/W2466090274","https://openalex.org/W2110730455","https://openalex.org/W2535392226","https://openalex.org/W2073486863","https://openalex.org/W2037750760","https://openalex.org/W2099433441","https://openalex.org/W3130187921","https://openalex.org/W2065517914","https://openalex.org/W2101233088"],"abstract_inverted_index":{"Every":[0],"day,":[1],"on":[2,109,243],"average,":[3],"eight":[4],"cybercrimes":[5],"targeting":[6],"IoT":[7,35,60,245],"networks":[8,36],"occur,":[9],"leading":[10],"to":[11,31,34,56,80,128,184],"a":[12,99,156,166,181],"cumulative":[13],"loss":[14],"of":[15,28,44,65,143,146,232,260],"${\\$}$":[16],"10":[17],"million":[18],"The":[19,250],"main":[20],"reason":[21],"for":[22],"these":[23],"attacks":[24],"is":[25,69,138,153,193],"the":[26,39,63,73,120,147,169,175,219,225,238],"ability":[27],"unauthorized":[29],"devices":[30,58,78,203],"gain":[32],"access":[33],"by":[37,161,196,217],"replicating":[38],"hardware":[40],"and":[41,89,115,152,211,224,270],"software":[42],"configurations":[43],"authorized":[45],"devices.":[46,249],"To":[47,94,201],"tackle":[48],"this":[49,66,76],"pressing":[50],"issue,":[51],"cryptographic":[52],"keys":[53],"are":[54],"used":[55,265],"authenticate":[57],"in":[59,155,168,230,266],"networks.":[61],"Given":[62],"requirements":[64],"process,":[67],"authentication":[68,258],"performed":[70],"once":[71],"at":[72,165,188],"beginning.":[74],"However,":[75],"makes":[77],"susceptible":[79],"cyber-attacks":[81,205],"like":[82,149,206],"spoofing,":[83,207],"Sybil":[84,208],"attacks,":[85,209],"distributed":[86],"denial-of-service":[87],"(DDoS),":[88],"Advanced":[90],"Persistent":[91],"Threats":[92],"(APT).":[93],"address":[95],"this,":[96],"we":[97,124,179,213],"propose":[98],"novel":[100,134],"Continuous":[101,117,176],"Device-to-Device":[102],"Authentication":[103,177,221],"(CD<sup":[104],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[105,240,252],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>A)":[106],"framework":[107,242,254],"based":[108],"two":[110],"components:":[111],"1)":[112],"Identity":[113,121],"Establishment":[114,122],"2)":[116],"Authentication.":[118],"In":[119,174],"phase,":[123,178],"use":[125],"manufacturing":[126],"imperfections":[127],"model":[129],"unique":[130],"device":[131,135,186,192,215],"behaviours.":[132],"A":[133],"fingerprint":[136],"algorithm":[137],"proposed":[139],"that":[140],"leverages":[141],"impurities":[142],"built-in":[144],"components":[145],"device,":[148],"crystal":[150],"oscillators,":[151],"measured":[154],"graphical":[157],"processing":[158,171],"unit":[159,172],"(GPU)":[160],"isolating":[162],"each":[163],"core":[164],"time":[167],"central":[170],"(CPU).":[173],"implement":[180],"dynamic":[182],"timeline":[183],"establish":[185],"identity":[187],"regular":[189],"intervals.":[190],"Each":[191],"continuously":[194],"authenticated":[195],"using":[197],"machine":[198,272],"learning":[199,273],"techniques.":[200],"protect":[202],"from":[204],"DDoS,":[210],"APT,":[212],"track":[214],"legitimacy":[216],"calculating":[218],"Device":[220,226],"Score":[222],"(DAS)":[223],"Risk":[227],"Factor":[228],"(DRF)":[229],"view":[231],"varying":[233],"security":[234],"risks.":[235],"We":[236],"evaluate":[237],"CD<sup":[239,251],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>A":[241,253],"an":[244,256],"system":[246],"with":[247,268],"11":[248],"achieves":[255],"average":[257],"accuracy":[259],"99.96%":[261],"and9":[262],"99.85%":[263],"when":[264],"tandem":[267],"CatBoost":[269],"XGBoost":[271],"algorithms,":[274],"respectively.":[275]},"counts_by_year":[],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
