{"id":"https://openalex.org/W4392581082","doi":"https://doi.org/10.1109/tdsc.2024.3373778","title":"Design and Robust Evaluation of Next Generation Node Authentication Approach","display_name":"Design and Robust Evaluation of Next Generation Node Authentication Approach","publication_year":2024,"publication_date":"2024-03-08","ids":{"openalex":"https://openalex.org/W4392581082","doi":"https://doi.org/10.1109/tdsc.2024.3373778"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3373778","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3373778","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Design_and_Robust_Evaluation_of_Next_Generation_Node_Authentication_Approach/25425931","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071502084","display_name":"Dinh Duc Nha Nguyen","orcid":"https://orcid.org/0000-0002-8106-7703"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Dinh Duc Nha Nguyen","raw_affiliation_strings":["Centre for Cyber Resilience and Trust (CREST), School of IT, Deakin University, Docklands, VIC, Australia","School of IT, Deakin University, Burwood, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Cyber Resilience and Trust (CREST), School of IT, Deakin University, Docklands, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of IT, Deakin University, Burwood, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017825429","display_name":"Keshav Sood","orcid":"https://orcid.org/0000-0002-2127-1438"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Keshav Sood","raw_affiliation_strings":["Centre for Cyber Resilience and Trust (CREST), School of IT, Deakin University, Docklands, VIC, Australia","School of Information Technology, Deakin University, Burwood, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Cyber Resilience and Trust (CREST), School of IT, Deakin University, Docklands, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051297830","display_name":"Yong Xiang","orcid":"https://orcid.org/0000-0003-3545-7863"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yong Xiang","raw_affiliation_strings":["Deakin Blockchain Innovation Lab, School of IT, Deakin University, Docklands, VIC, Australia","Deakin University, School of Information Technology, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Deakin Blockchain Innovation Lab, School of IT, Deakin University, Docklands, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"Deakin University, School of Information Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012293028","display_name":"Longxiang Gao","orcid":"https://orcid.org/0000-0002-3026-7537"},"institutions":[{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longxiang Gao","raw_affiliation_strings":["Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","Shandong Computer Science, Qilu University of Technology, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]},{"raw_affiliation_string":"Shandong Computer Science, Qilu University of Technology, Jinan, China","institution_ids":["https://openalex.org/I152269853"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028422714","display_name":"Lianhua Chi","orcid":"https://orcid.org/0000-0002-6851-0731"},"institutions":[{"id":"https://openalex.org/I196829312","display_name":"La Trobe University","ror":"https://ror.org/01rxfrp27","country_code":"AU","type":"education","lineage":["https://openalex.org/I196829312"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Lianhua Chi","raw_affiliation_strings":["Computer Science &#x0026; Information Technology, La Trobe University, Sydney, NSW, Australia","School of Engineering and Mathematical Sciences, La Trobe University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Computer Science &#x0026; Information Technology, La Trobe University, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I196829312"]},{"raw_affiliation_string":"School of Engineering and Mathematical Sciences, La Trobe University, Melbourne, Australia","institution_ids":["https://openalex.org/I196829312"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101436409","display_name":"Gurpreet Singh","orcid":"https://orcid.org/0000-0001-5924-9386"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Gurpreet Singh","raw_affiliation_strings":["Centre for Cyber Resilience and Trust (CREST), School of IT, Deakin University, Docklands, VIC, Australia","School of IT, Deakin University, Burwood, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Cyber Resilience and Trust (CREST), School of IT, Deakin University, Docklands, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of IT, Deakin University, Burwood, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["University of Technology Sydney, Ultimo, NSW, Australia","School of Software, University of Technology Sydney Faculty of Engineering and Information Technology, Ultimo, Australia"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"School of Software, University of Technology Sydney Faculty of Engineering and Information Technology, Ultimo, Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5071502084"],"corresponding_institution_ids":["https://openalex.org/I149704539"],"apc_list":null,"apc_paid":null,"fwci":0.6209,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65528634,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"21","issue":"6","first_page":"5311","last_page":"5323"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.5576000213623047,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.5576000213623047,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7674297094345093},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5673992037773132},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5243018865585327},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5020520687103271},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4684709906578064},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36440974473953247},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08825978636741638}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7674297094345093},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5673992037773132},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5243018865585327},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5020520687103271},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4684709906578064},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36440974473953247},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08825978636741638},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2024.3373778","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3373778","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/25425931","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Design_and_Robust_Evaluation_of_Next_Generation_Node_Authentication_Approach/25425931","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/25425931","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Design_and_Robust_Evaluation_of_Next_Generation_Node_Authentication_Approach/25425931","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1420883908","display_name":null,"funder_award_id":"LP190100594","funder_id":"https://openalex.org/F4320334704","funder_display_name":"Australian Research Council"}],"funders":[{"id":"https://openalex.org/F4320334704","display_name":"Australian Research Council","ror":"https://ror.org/05mmh0f86"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":58,"referenced_works":["https://openalex.org/W146244851","https://openalex.org/W1966626958","https://openalex.org/W2615459164","https://openalex.org/W2893857624","https://openalex.org/W2913860854","https://openalex.org/W2929757916","https://openalex.org/W2938144699","https://openalex.org/W2951694401","https://openalex.org/W2963197901","https://openalex.org/W2963910109","https://openalex.org/W2977498438","https://openalex.org/W2979084672","https://openalex.org/W2982145123","https://openalex.org/W2995360785","https://openalex.org/W2999467118","https://openalex.org/W3002823324","https://openalex.org/W3004340854","https://openalex.org/W3007035956","https://openalex.org/W3009821960","https://openalex.org/W3010909809","https://openalex.org/W3015471529","https://openalex.org/W3018537975","https://openalex.org/W3020687048","https://openalex.org/W3030941702","https://openalex.org/W3035529916","https://openalex.org/W3040112465","https://openalex.org/W3042612328","https://openalex.org/W3045866765","https://openalex.org/W3047279638","https://openalex.org/W3047788099","https://openalex.org/W3084338304","https://openalex.org/W3094247147","https://openalex.org/W3107490494","https://openalex.org/W3110871108","https://openalex.org/W3119564016","https://openalex.org/W3121056417","https://openalex.org/W3122999500","https://openalex.org/W3131541364","https://openalex.org/W3134326557","https://openalex.org/W3136235398","https://openalex.org/W3155558707","https://openalex.org/W3161228823","https://openalex.org/W3161415750","https://openalex.org/W3172553205","https://openalex.org/W3179046031","https://openalex.org/W3184988174","https://openalex.org/W3208268217","https://openalex.org/W4206771767","https://openalex.org/W4206776951","https://openalex.org/W4212888398","https://openalex.org/W4214908052","https://openalex.org/W4220705833","https://openalex.org/W4226492554","https://openalex.org/W4286374021","https://openalex.org/W4293868502","https://openalex.org/W4296915416","https://openalex.org/W4319342016","https://openalex.org/W4361802926"],"related_works":["https://openalex.org/W2770593030","https://openalex.org/W3154990682","https://openalex.org/W4281727072","https://openalex.org/W2560201613","https://openalex.org/W2171975302","https://openalex.org/W2022352247","https://openalex.org/W2377538627","https://openalex.org/W2107220315","https://openalex.org/W1589637664","https://openalex.org/W2912135041"],"abstract_inverted_index":{"The":[0,180],"flexibility":[1],"of":[2,30,44,67,88,132,144,157],"5G-NGNs":[3],"makes":[4],"them":[5,93],"an":[6],"ideal":[7],"infrastructure":[8],"for":[9],"supporting":[10],"mission-critical":[11],"IoT":[12,45,52,89,113],"applications":[13],"that":[14],"require":[15],"low":[16],"latency":[17],"and":[18,27,57,63,91,174,190],"high":[19],"bandwidth.":[20],"However,":[21],"due":[22],"to":[23,94,105,110,153],"the":[24,28,35,42,58,81,106,112,121,145,155,158,166,175,186,191],"rapid":[25],"proliferation":[26],"integration":[29],"IoTs":[31],"with":[32,169,196],"5":[33,177],"G,":[34],"threat":[36],"surface":[37],"has":[38],"considerably":[39],"expanded.":[40],"Hence":[41],"security":[43,60],"devices":[46,53,90],"is":[47],"a":[48,96,170],"big":[49],"concern.":[50],"Unfortunately,":[51],"have":[54,119],"limited":[55],"resources,":[56],"traditional":[59],"approaches":[61],"(authentication":[62],"intrusion":[64],"detection":[65,124],"approaches)":[66],"cryptography":[68],"do":[69],"not":[70],"work":[71],"effectively":[72],"on":[73],"5G-IoT":[74],"ecosystems.":[75],"Motivated":[76],"from":[77],"this,":[78],"we":[79,118,164],"leverage":[80],"distinctive":[82],"RF":[83,172],"(Radio":[84],"Frequency)":[85],"fingerprinting":[86],"signatures":[87],"used":[92],"train":[95],"Deep":[97],"learning":[98],"model,":[99],"Mahalanobis":[100],"Distance":[101],"theory":[102],"in":[103,134,161],"addition":[104],"Chi-square":[107],"distribution":[108],"theory,":[109],"authenticate":[111],"nodes.":[114],"Under":[115],"robust":[116],"scenarios":[117],"tested":[120,165],"approach":[122],"shows":[123],"accuracy":[125],"(99.35%)":[126],"as":[127,129,138],"well":[128],"significant":[130],"amount":[131],"reduction":[133],"model's":[135],"training":[136],"time":[137],"these":[139],"two":[140],"metrics":[141],"are":[142],"one":[143],"primary":[146],"key":[147],"performance":[148],"indicators":[149],"(KPIs).":[150],"In":[151],"order":[152],"evaluate":[154],"effectiveness":[156],"proposed":[159,167],"method":[160],"real-time":[162],"scenarios,":[163],"solution":[168],"real":[171],"dataset":[173],"OSM-MANO":[176],"G":[178],"platform.":[179],"model":[181],"underwent":[182],"formal":[183],"verification":[184],"using":[185],"Tamarin":[187],"Prover":[188],"tool,":[189],"proposal":[192],"was":[193],"also":[194],"compared":[195],"recent":[197],"research":[198],"works.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
