{"id":"https://openalex.org/W2971713817","doi":"https://doi.org/10.1109/sahcn.2019.8824935","title":"Towards Fast and Reliable WiFi Authentication by Utilizing Visible Light Diversity","display_name":"Towards Fast and Reliable WiFi Authentication by Utilizing Visible Light Diversity","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2971713817","doi":"https://doi.org/10.1109/sahcn.2019.8824935","mag":"2971713817"},"language":"en","primary_location":{"id":"doi:10.1109/sahcn.2019.8824935","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sahcn.2019.8824935","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062212392","display_name":"Zhiwei Zhao","orcid":"https://orcid.org/0000-0001-5293-0558"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiwei Zhao","raw_affiliation_strings":["University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100770003","display_name":"Geyong Min","orcid":"https://orcid.org/0000-0003-1395-7314"},"institutions":[{"id":"https://openalex.org/I23923803","display_name":"University of Exeter","ror":"https://ror.org/03yghzc09","country_code":"GB","type":"education","lineage":["https://openalex.org/I23923803"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Geyong Min","raw_affiliation_strings":["University of Exeter, UK"],"affiliations":[{"raw_affiliation_string":"University of Exeter, UK","institution_ids":["https://openalex.org/I23923803"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024438588","display_name":"Yaoyao Pang","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaoyao Pang","raw_affiliation_strings":["University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028801035","display_name":"Weifeng Gao","orcid":"https://orcid.org/0000-0003-2727-9040"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weifeng Gao","raw_affiliation_strings":["University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086161245","display_name":"Jiamei Lv","orcid":"https://orcid.org/0000-0002-6673-722X"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiamei Lv","raw_affiliation_strings":["Zhejiang University, China"],"affiliations":[{"raw_affiliation_string":"Zhejiang University, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5062212392"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.4769,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.65441352,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"25","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10851","display_name":"Optical Wireless Communication Technologies","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10851","display_name":"Optical Wireless Communication Technologies","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8310831785202026},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.713094174861908},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.668057918548584},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6515573263168335},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.572695255279541},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.517997145652771},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4757542312145233},{"id":"https://openalex.org/keywords/replay-attack","display_name":"Replay attack","score":0.46074119210243225},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4446210563182831},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17576837539672852}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8310831785202026},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.713094174861908},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.668057918548584},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6515573263168335},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.572695255279541},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.517997145652771},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4757542312145233},{"id":"https://openalex.org/C11560541","wikidata":"https://www.wikidata.org/wiki/Q1756025","display_name":"Replay attack","level":3,"score":0.46074119210243225},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4446210563182831},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17576837539672852}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sahcn.2019.8824935","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sahcn.2019.8824935","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W321599858","https://openalex.org/W1493163583","https://openalex.org/W1606819087","https://openalex.org/W1798241695","https://openalex.org/W1969298656","https://openalex.org/W1972743861","https://openalex.org/W1987102965","https://openalex.org/W2058271228","https://openalex.org/W2068836818","https://openalex.org/W2081869611","https://openalex.org/W2109606373","https://openalex.org/W2125281025","https://openalex.org/W2144644352","https://openalex.org/W2150992478","https://openalex.org/W2155899844","https://openalex.org/W2159456857","https://openalex.org/W2163670414","https://openalex.org/W2172292165","https://openalex.org/W2272996903","https://openalex.org/W2307851164","https://openalex.org/W2467585892","https://openalex.org/W2526689049","https://openalex.org/W2547786387","https://openalex.org/W2550345298","https://openalex.org/W2787134033","https://openalex.org/W2797226653","https://openalex.org/W3128096218","https://openalex.org/W4252854061","https://openalex.org/W6636424872","https://openalex.org/W6671108768","https://openalex.org/W6698302138","https://openalex.org/W6803376173"],"related_works":["https://openalex.org/W3007059209","https://openalex.org/W4220832730","https://openalex.org/W4313224733","https://openalex.org/W4312120756","https://openalex.org/W1688416049","https://openalex.org/W4288120931","https://openalex.org/W2972017669","https://openalex.org/W3005888540","https://openalex.org/W2783658022","https://openalex.org/W2836844603"],"abstract_inverted_index":{"The":[0,26,57,162],"openness":[1],"of":[2,63,73,97,150],"indoor":[3,121],"WiFi":[4,122,133],"networks":[5],"makes":[6],"it":[7],"prone":[8],"to":[9,21,49,66,93,102,131,168],"spoofing":[10],"attacks":[11],"and":[12,144,159,178],"password":[13],"leakage/sharing,":[14],"where":[15],"undesired":[16,44],"users":[17,45,100,177],"may":[18],"be":[19,137],"able":[20],"access":[22,50],"the":[23,31,39,46,51,95,98,126,151,169,179],"network":[24,52],"resources.":[25],"fundamental":[27],"reason":[28],"is":[29,35,182],"that":[30,166],"actual":[32],"communication":[33],"range":[34],"much":[36],"larger":[37],"than":[38],"valid":[40],"authentication":[41,55],"range,":[42],"leaving":[43],"same":[47],"chance":[48],"from":[53],"invalid":[54],"ranges.":[56],"existing":[58,170],"works":[59],"exploit":[60],"various":[61],"features":[62,75,128],"wireless":[64],"signals":[65],"identify":[67,85,175],"legitimate/undesired":[68,176],"users.":[69,134],"Either":[70],"frequent":[71,148],"measurement/learning":[72,149],"signal":[74],"or":[76],"hardware":[77],"modifications":[78],"are":[79],"required.":[80],"In":[81],"this":[82,108],"paper,":[83],"we":[84,110],"visible":[86],"light":[87],"(VL)":[88],"as":[89,129],"a":[90,113],"good":[91],"indicator":[92],"distinguish":[94],"positions":[96],"accessing":[99],"due":[101],"its":[103],"frequency":[104],"diversity.":[105],"Based":[106],"on":[107,118,140],"observation,":[109],"propose":[111],"VL-Auth,":[112],"novel":[114],"Authentication":[115],"framework":[116],"based":[117],"VL":[119,127,152],"for":[120],"networks,":[123],"which":[124],"uses":[125],"credentials":[130],"authenticate":[132],"VL-Auth":[135,156,172],"can":[136,173],"easily":[138],"installed":[139],"commercial-off-the-shelf":[141],"(COTS)":[142],"devices":[143],"do":[145],"not":[146],"require":[147],"features.":[153],"We":[154],"implement":[155],"with":[157],"OpenWrt":[158],"Android":[160],"devices.":[161],"evaluation":[163],"results":[164],"show":[165],"compared":[167],"works,":[171],"accurately":[174],"connection":[180],"delay":[181],"also":[183],"reduced.":[184]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
