{"id":"https://openalex.org/W4313591198","doi":"https://doi.org/10.1109/tdsc.2022.3233862","title":"Tag-Based PHY-Layer Authentication for RIS-Assisted Communication Systems","display_name":"Tag-Based PHY-Layer Authentication for RIS-Assisted Communication Systems","publication_year":2023,"publication_date":"2023-01-04","ids":{"openalex":"https://openalex.org/W4313591198","doi":"https://doi.org/10.1109/tdsc.2022.3233862"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2022.3233862","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3233862","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041554124","display_name":"Pinchang Zhang","orcid":"https://orcid.org/0000-0002-8310-7238"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Pinchang Zhang","raw_affiliation_strings":["School of Computer, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"],"raw_orcid":"https://orcid.org/0000-0002-8310-7238","affiliations":[{"raw_affiliation_string":"School of Computer, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064256148","display_name":"Yulin Teng","orcid":"https://orcid.org/0000-0001-9646-6021"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yulin Teng","raw_affiliation_strings":["School of Computer, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043356063","display_name":"Yulong Shen","orcid":"https://orcid.org/0000-0002-8448-705X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yulong Shen","raw_affiliation_strings":["School of Computer Science, Xidian University, Xi&#x2019;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0002-8448-705X","affiliations":[{"raw_affiliation_string":"School of Computer Science, Xidian University, Xi&#x2019;an, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014884811","display_name":"Xiaohong Jiang","orcid":"https://orcid.org/0000-0001-9739-1930"},"institutions":[{"id":"https://openalex.org/I84400586","display_name":"Future University Hakodate","ror":"https://ror.org/05szw2z23","country_code":"JP","type":"education","lineage":["https://openalex.org/I84400586"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Xiaohong Jiang","raw_affiliation_strings":["School of Systems Information Science, Future University Hakodate, Hakodate, Hokkaido, Japan"],"raw_orcid":"https://orcid.org/0000-0001-9739-1930","affiliations":[{"raw_affiliation_string":"School of Systems Information Science, Future University Hakodate, Hakodate, Hokkaido, Japan","institution_ids":["https://openalex.org/I84400586"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100602821","display_name":"Fu Xiao","orcid":"https://orcid.org/0000-0003-1815-2793"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fu Xiao","raw_affiliation_strings":["School of Computer, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"],"raw_orcid":"https://orcid.org/0000-0003-1815-2793","affiliations":[{"raw_affiliation_string":"School of Computer, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5041554124"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":2.8106,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.90749525,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"20","issue":"6","first_page":"4778","last_page":"4792"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8266240954399109},{"id":"https://openalex.org/keywords/phy","display_name":"PHY","score":0.7315476536750793},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.7158412337303162},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5290811657905579},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.49548590183258057},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.49348342418670654},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.47569072246551514},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.446547269821167},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.43937310576438904},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41870760917663574},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.40631917119026184},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3654690682888031},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26075422763824463},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2569190263748169},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2078138291835785},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1930796205997467}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8266240954399109},{"id":"https://openalex.org/C41918916","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"PHY","level":4,"score":0.7315476536750793},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.7158412337303162},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5290811657905579},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.49548590183258057},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.49348342418670654},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.47569072246551514},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.446547269821167},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.43937310576438904},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41870760917663574},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.40631917119026184},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3654690682888031},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26075422763824463},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2569190263748169},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2078138291835785},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1930796205997467},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2022.3233862","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3233862","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.75,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3040706457","display_name":null,"funder_award_id":"6197070890","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5767509517","display_name":null,"funder_award_id":"62220106004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7747012976","display_name":null,"funder_award_id":"62272241","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1917532482","https://openalex.org/W2043240002","https://openalex.org/W2051823724","https://openalex.org/W2058841768","https://openalex.org/W2115735006","https://openalex.org/W2150080833","https://openalex.org/W2153261701","https://openalex.org/W2153281696","https://openalex.org/W2153644609","https://openalex.org/W2155886813","https://openalex.org/W2170895945","https://openalex.org/W2208173047","https://openalex.org/W2311595852","https://openalex.org/W2524250027","https://openalex.org/W2577677465","https://openalex.org/W2609219981","https://openalex.org/W2620688973","https://openalex.org/W2744532080","https://openalex.org/W2755909956","https://openalex.org/W2776818420","https://openalex.org/W2787700610","https://openalex.org/W2797907857","https://openalex.org/W2808182497","https://openalex.org/W2902432556","https://openalex.org/W2940631331","https://openalex.org/W3008609509","https://openalex.org/W3014187232","https://openalex.org/W3016634017","https://openalex.org/W3033393151","https://openalex.org/W3035529916","https://openalex.org/W3039402952","https://openalex.org/W3043220753","https://openalex.org/W3104110632","https://openalex.org/W3110641849","https://openalex.org/W3154003282","https://openalex.org/W3180206688","https://openalex.org/W4285128464","https://openalex.org/W4285142094"],"related_works":["https://openalex.org/W2945523224","https://openalex.org/W4313639042","https://openalex.org/W2444418218","https://openalex.org/W2727597159","https://openalex.org/W4241709719","https://openalex.org/W1488909492","https://openalex.org/W4234133302","https://openalex.org/W2111773294","https://openalex.org/W2774037455","https://openalex.org/W1858159341"],"abstract_inverted_index":{"This":[0],"article":[1],"proposes":[2],"a":[3,11,43,57,108],"tag-based":[4],"approach":[5],"for":[6,175],"physical":[7],"(PHY)-layer":[8],"authentication":[9,101],"in":[10,29,113],"reconfigurable":[12],"intelligent":[13],"surface":[14],"(RIS)":[15],"communication":[16,27],"system.":[17],"We":[18,66,131],"first":[19],"extract":[20],"the":[21,49,53,63,86,93,104,117,122,128,139,150,155,165,168,176,189,195,198],"intrinsic":[22],"PHY-layer":[23,41],"features":[24],"of":[25,31,52,119,121,152,154,167,197],"RIS":[26],"systems":[28],"terms":[30],"channel":[32,123],"gain":[33],"and":[34,37,76,82,116,127,171,179,192],"background":[35,125],"noise,":[36],"then":[38,91],"apply":[39],"these":[40],"features,":[42],"random":[44,129],"signal":[45,61,111],"as":[46,48],"well":[47],"private":[50],"key":[51],"transmitter":[54],"to":[55,72,77,99,136,187,193],"construct":[56],"robust":[58],"cover":[59],"tag":[60,106,110],"against":[62,79],"impersonation":[64],"attack.":[65],"adopt":[67],"an":[68],"asymmetric":[69],"cryptography":[70],"technique":[71],"encrypt":[73],"tagged":[74],"signals":[75],"resist":[78,143],"unauthorized":[80,144],"detection":[81,180],"tampering":[83,146],"attacks":[84],"during":[85],"transmission":[87],"process.":[88],"The":[89],"receiver":[90],"applies":[92],"maximum":[94,159],"a-posteriori":[95],"(MAP)":[96],"ratio":[97,157],"test":[98,169],"conduct":[100],"based":[102],"on":[103],"received":[105],"signal,":[107],"reference":[109],"transmitted":[112],"training":[114],"phase":[115],"knowledge":[118],"distributions":[120],"gain,":[124],"noise":[126],"signal.":[130],"also":[132],"provide":[133],"security":[134],"analysis":[135],"demonstrate":[137],"how":[138],"proposed":[140,199],"scheme":[141],"can":[142],"detection,":[145],"attacks,":[147],"etc.":[148],"With":[149],"help":[151],"tools":[153],"MAP":[156],"test,":[158],"likelihood":[160],"estimation,":[161],"we":[162],"further":[163],"analyze":[164],"distribution":[166],"statistics":[170],"derive":[172],"analytical":[173],"models":[174],"false":[177],"alarm":[178],"probabilities.":[181],"Finally,":[182],"extensive":[183],"simulations":[184],"are":[185],"conducted":[186],"verify":[188],"theoretical":[190],"results":[191],"illustrate":[194],"performance":[196],"scheme.":[200]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":3}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
