{"id":"https://openalex.org/W2787700610","doi":"https://doi.org/10.1109/tifs.2018.2797963","title":"Slope Authentication at the Physical Layer","display_name":"Slope Authentication at the Physical Layer","publication_year":2018,"publication_date":"2018-01-25","ids":{"openalex":"https://openalex.org/W2787700610","doi":"https://doi.org/10.1109/tifs.2018.2797963","mag":"2787700610"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2018.2797963","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2797963","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037751722","display_name":"Ning Xie","orcid":"https://orcid.org/0000-0002-6443-8111"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ning Xie","raw_affiliation_strings":["Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100751846","display_name":"Changsheng Chen","orcid":"https://orcid.org/0000-0002-4121-2451"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changsheng Chen","raw_affiliation_strings":["Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen, China","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5037751722"],"corresponding_institution_ids":["https://openalex.org/I180726961"],"apc_list":null,"apc_paid":null,"fwci":2.3553,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.88994847,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"13","issue":"6","first_page":"1579","last_page":"1594"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8474037051200867},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.7653921842575073},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6298888921737671},{"id":"https://openalex.org/keywords/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.4963858723640442},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.491428017616272},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.48910409212112427},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.4800906777381897},{"id":"https://openalex.org/keywords/lightweight-extensible-authentication-protocol","display_name":"Lightweight Extensible Authentication Protocol","score":0.4703125059604645},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3329601287841797},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.2675139307975769},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2606268525123596},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12853145599365234}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8474037051200867},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.7653921842575073},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6298888921737671},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.4963858723640442},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.491428017616272},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.48910409212112427},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.4800906777381897},{"id":"https://openalex.org/C167169670","wikidata":"https://www.wikidata.org/wiki/Q1824705","display_name":"Lightweight Extensible Authentication Protocol","level":4,"score":0.4703125059604645},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3329601287841797},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2675139307975769},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2606268525123596},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12853145599365234}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2018.2797963","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2797963","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1815889288","display_name":null,"funder_award_id":"2017A030310382","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G6288753258","display_name":null,"funder_award_id":"61702340","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6818679975","display_name":null,"funder_award_id":"2016A030313046","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null},{"id":"https://openalex.org/F4320334800","display_name":"Research Committee, Aristotle University of Thessaloniki","ror":"https://ror.org/02j61yw88"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W252932944","https://openalex.org/W949353694","https://openalex.org/W1522045078","https://openalex.org/W1660562555","https://openalex.org/W1688906656","https://openalex.org/W1881701533","https://openalex.org/W1899711495","https://openalex.org/W1971066773","https://openalex.org/W1995875735","https://openalex.org/W2012166391","https://openalex.org/W2051823724","https://openalex.org/W2051990896","https://openalex.org/W2063551896","https://openalex.org/W2076166888","https://openalex.org/W2093935141","https://openalex.org/W2115735006","https://openalex.org/W2144007028","https://openalex.org/W2153261701","https://openalex.org/W2153644609","https://openalex.org/W2155886813","https://openalex.org/W2159126760","https://openalex.org/W2169128714","https://openalex.org/W2169305433","https://openalex.org/W2208173047","https://openalex.org/W2290621023","https://openalex.org/W2295631747","https://openalex.org/W2314565273","https://openalex.org/W2344173564","https://openalex.org/W2400286683","https://openalex.org/W2431890594","https://openalex.org/W2605292858","https://openalex.org/W2963580435","https://openalex.org/W3023553154","https://openalex.org/W6683549911","https://openalex.org/W6712691025"],"related_works":["https://openalex.org/W2360010141","https://openalex.org/W2134444393","https://openalex.org/W2093798919","https://openalex.org/W2107692711","https://openalex.org/W2314541983","https://openalex.org/W1949088485","https://openalex.org/W2941888532","https://openalex.org/W2374177735","https://openalex.org/W2136908128","https://openalex.org/W3096443715"],"abstract_inverted_index":{"Authentication":[0],"is":[1,127],"a":[2,15,99],"key":[3],"requirement":[4],"for":[5,141],"secure":[6,140],"communications.":[7],"In":[8],"this":[9],"paper,":[10],"we":[11],"consider":[12],"authentication":[13,26,36,44,56,101,111],"in":[14,32,53,154],"wireless":[16],"system":[17],"at":[18,28,103,112],"the":[19,29,33,54,68,74,104,113,122,133],"physical":[20,30,105,114],"layer.":[21,115],"There":[22],"are":[23,51,150],"two":[24],"main":[25],"methods":[27,79],"layer":[31],"existing":[34,55],"literature,":[35],"with":[37,45],"time":[38],"division":[39],"multiplexed":[40],"tag":[41,47],"(Auth-TDM)":[42],"and":[43,88,94,139,152],"superimposed":[46],"(Auth-SUP).":[48],"However,":[49],"there":[50],"drawbacks":[52,124],"methods.":[57],"The":[58,64,116,144],"Auth-TDM":[59],"method":[60,66,102,118],"requires":[61],"additional":[62,81],"bandwidth.":[63],"Auth-SUP":[65],"corrupts":[67],"entire":[69],"data":[70],"message.":[71],"Moreover,":[72],"regarding":[73],"purpose":[75],"of":[76],"authentication,":[77],"both":[78],"require":[80],"complicated":[82],"preprocessing":[83],"such":[84],"as":[85,109],"channel":[86],"estimation":[87],"message":[89],"symbol":[90],"recovery":[91],"through":[92],"demodulation":[93],"decoding.":[95],"This":[96],"paper":[97],"proposes":[98],"new":[100],"layer,":[106],"referred":[107],"to":[108,129,132,137],"slope":[110],"proposed":[117],"not":[119],"only":[120],"overcomes":[121],"aforementioned":[123],"but":[125],"also":[126],"designed":[128],"be":[130],"covert":[131],"unware":[134],"user,":[135],"robust":[136],"interference,":[138],"identity":[142],"verification.":[143],"tradeoffs":[145],"by":[146],"considering":[147],"different":[148],"goals":[149],"discussed":[151],"analyzed":[153],"block-fading":[155],"channels.":[156]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
