{"id":"https://openalex.org/W4361986917","doi":"https://doi.org/10.1109/tifs.2023.3263636","title":"Collaborative Authentication for 6G Networks: An Edge Intelligence Based Autonomous Approach","display_name":"Collaborative Authentication for 6G Networks: An Edge Intelligence Based Autonomous Approach","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4361986917","doi":"https://doi.org/10.1109/tifs.2023.3263636"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3263636","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3263636","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088230040","display_name":"He Fang","orcid":"https://orcid.org/0000-0002-4562-9190"},"institutions":[{"id":"https://openalex.org/I3923682","display_name":"Soochow University","ror":"https://ror.org/05t8y2r12","country_code":"CN","type":"education","lineage":["https://openalex.org/I3923682"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"He Fang","raw_affiliation_strings":["School of Electronic and Information Engineering, Soochow University, Soochow, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Soochow University, Soochow, China","institution_ids":["https://openalex.org/I3923682"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071318199","display_name":"Zhenlong Xiao","orcid":"https://orcid.org/0000-0003-2124-8315"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenlong Xiao","raw_affiliation_strings":["Department of Information and Communication Engineering, School of Informatics, Xiamen University, Xiamen, China","Department of Informatics and Communication Engineering, School of Informatics, Xiamen University, Xiamen, China"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Engineering, School of Informatics, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]},{"raw_affiliation_string":"Department of Informatics and Communication Engineering, School of Informatics, Xiamen University, Xiamen, China","institution_ids":["https://openalex.org/I191208505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100733413","display_name":"Xianbin Wang","orcid":"https://orcid.org/0000-0003-4890-0748"},"institutions":[{"id":"https://openalex.org/I125749732","display_name":"Western University","ror":"https://ror.org/02grkyz14","country_code":"CA","type":"education","lineage":["https://openalex.org/I125749732"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Xianbin Wang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Western University, London, Canada","Department of Electrical and Computer Engineering, Western University, London, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Western University, London, Canada","institution_ids":["https://openalex.org/I125749732"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Western University, London, ON, Canada","institution_ids":["https://openalex.org/I125749732"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030884513","display_name":"Li Xu","orcid":"https://orcid.org/0000-0002-8972-3373"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Xu","raw_affiliation_strings":["Fujian Provincial Key Laboratory of Network Security and Cryptology and the College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","College of Computer and Cyber Security and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"Fujian Provincial Key Laboratory of Network Security and Cryptology and the College of Computer and Cyber Security, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"College of Computer and Cyber Security and the Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5091122305","display_name":"Lajos Hanzo","orcid":"https://orcid.org/0000-0002-2636-5214"},"institutions":[{"id":"https://openalex.org/I43439940","display_name":"University of Southampton","ror":"https://ror.org/01ryk1543","country_code":"GB","type":"education","lineage":["https://openalex.org/I43439940"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Lajos Hanzo","raw_affiliation_strings":["School of Electronics and Computer Science, University of Southampton, Southampton, U.K"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Computer Science, University of Southampton, Southampton, U.K","institution_ids":["https://openalex.org/I43439940"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5088230040"],"corresponding_institution_ids":["https://openalex.org/I3923682"],"apc_list":null,"apc_paid":null,"fwci":2.857,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.91078378,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"18","issue":null,"first_page":"2091","last_page":"2103"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9029514193534851},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6311106085777283},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5783144235610962},{"id":"https://openalex.org/keywords/single-point-of-failure","display_name":"Single point of failure","score":0.5080063939094543},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.411246657371521},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.38321542739868164},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36558854579925537},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3211819529533386}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9029514193534851},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6311106085777283},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5783144235610962},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.5080063939094543},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.411246657371521},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.38321542739868164},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36558854579925537},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3211819529533386},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2023.3263636","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3263636","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:eprints.soton.ac.uk:476789","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401019","display_name":"ePrints Soton (University of Southampton)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I43439940","host_organization_name":"University of Southampton","host_organization_lineage":["https://openalex.org/I43439940"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.5}],"awards":[{"id":"https://openalex.org/G1131370387","display_name":"UKRI-India Future Networks Initiative","funder_award_id":"EP/W016605/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G1471839284","display_name":null,"funder_award_id":"EP/W016605/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G2394373749","display_name":null,"funder_award_id":"789028","funder_id":"https://openalex.org/F4320334678","funder_display_name":"European Research Council"},{"id":"https://openalex.org/G2490835098","display_name":"Pervasive Wireless Intelligence Beyond the Generations (PerCom)","funder_award_id":"EP/X01228X/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G4851854195","display_name":null,"funder_award_id":"62271430","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7069725611","display_name":null,"funder_award_id":"RGPIN2018-06254","funder_id":"https://openalex.org/F4320334593","funder_display_name":"Natural Sciences and Engineering Research Council of Canada"},{"id":"https://openalex.org/G8269789390","display_name":null,"funder_award_id":"EP/X01228X/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320320994","display_name":"Canada Research Chairs","ror":"https://ror.org/0517h6h17"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"},{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"},{"id":"https://openalex.org/F4320334678","display_name":"European Research Council","ror":"https://ror.org/0472cxd90"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W1509061701","https://openalex.org/W1957358593","https://openalex.org/W1983340603","https://openalex.org/W2045079045","https://openalex.org/W2102523268","https://openalex.org/W2124431228","https://openalex.org/W2157820996","https://openalex.org/W2170290823","https://openalex.org/W2294142022","https://openalex.org/W2296053318","https://openalex.org/W2341433667","https://openalex.org/W2588737662","https://openalex.org/W2653031489","https://openalex.org/W2751212131","https://openalex.org/W2776818420","https://openalex.org/W2803696359","https://openalex.org/W2805752413","https://openalex.org/W2887675532","https://openalex.org/W2887906137","https://openalex.org/W2942655651","https://openalex.org/W2946575199","https://openalex.org/W2964029185","https://openalex.org/W2968746919","https://openalex.org/W2999074226","https://openalex.org/W3001072634","https://openalex.org/W3003326230","https://openalex.org/W3005714870","https://openalex.org/W3007256892","https://openalex.org/W3011830499","https://openalex.org/W3019423257","https://openalex.org/W3021654819","https://openalex.org/W3033203076","https://openalex.org/W3045385301","https://openalex.org/W3049088677","https://openalex.org/W3088323682","https://openalex.org/W3089626165","https://openalex.org/W3102886933","https://openalex.org/W3105108969","https://openalex.org/W3108962068","https://openalex.org/W3114262415","https://openalex.org/W3172644050","https://openalex.org/W3188286850","https://openalex.org/W3195333310","https://openalex.org/W3198654303","https://openalex.org/W3201954451","https://openalex.org/W3203778842","https://openalex.org/W3211917946","https://openalex.org/W3212941463","https://openalex.org/W4249848180","https://openalex.org/W4250589301","https://openalex.org/W4287854949","https://openalex.org/W4292363360"],"related_works":["https://openalex.org/W2490513112","https://openalex.org/W4253724542","https://openalex.org/W4285266525","https://openalex.org/W2116049285","https://openalex.org/W1581129489","https://openalex.org/W2133227686","https://openalex.org/W1841239429","https://openalex.org/W2908230797","https://openalex.org/W2091654523","https://openalex.org/W2109703739"],"abstract_inverted_index":{"The":[0,169],"conventional":[1],"device":[2],"authentication":[3,34,59,68,108,118],"of":[4,22,24,43,144],"wireless":[5],"networks":[6],"usually":[7],"relies":[8],"on":[9],"a":[10,65,104,131,158],"security":[11],"server":[12],"and":[13,20,46,98,125,183,187],"centralized":[14],"process,":[15],"leading":[16],"to":[17,52,80],"long":[18],"latency":[19],"risk":[21],"single-point":[23],"failure.":[25],"While":[26],"these":[27,63],"challenges":[28],"might":[29],"be":[30],"mitigated":[31],"by":[32,40,90,161],"collaborative":[33,58,67,107],"schemes,":[35],"their":[36,92,117],"performance":[37],"remains":[38],"limited":[39],"the":[41,57,82,113,122,142,148,162,174],"rigidity":[42],"data":[44],"collection":[45],"aggregated":[47],"result.":[48],"They":[49],"also":[50,152],"tend":[51],"ignore":[53],"attacker":[54],"localization":[55],"in":[56,85,147],"process.":[60],"To":[61],"overcome":[62],"challenges,":[64],"novel":[66],"scheme":[69,176],"is":[70,110,137,167,177],"proposed,":[71],"where":[72,112],"multiple":[73],"edge":[74],"devices":[75],"act":[76],"as":[77],"cooperative":[78,114,145,163],"peers":[79,115,146,164],"assist":[81],"service":[83],"provider":[84],"distributively":[86],"authenticating":[87],"its":[88],"users":[89],"estimating":[91],"received":[93],"signal":[94],"strength":[95],"indicator":[96],"(RSSI)":[97],"mobility":[99],"trajectory":[100],"(TRA).":[101],"More":[102],"explicitly,":[103],"distributed":[105],"learning-based":[106],"algorithm":[109,136,155],"conceived,":[111],"update":[116,135],"models":[119],"locally,":[120],"thus":[121],"network":[123],"congestion":[124],"response":[126],"time":[127],"remain":[128],"low.":[129],"Moreover,":[130],"situation-aware":[132],"secure":[133],"group":[134],"proposed":[138,175],"for":[139,156,180],"autonomously":[140],"refreshing":[141],"set":[143],"dynamic":[149],"environment.":[150],"We":[151],"develop":[153],"an":[154],"localizing":[157],"malicious":[159],"user":[160],"once":[165],"it":[166],"identified.":[168],"simulation":[170],"results":[171],"demonstrate":[172],"that":[173],"eminently":[178],"suitable":[179],"both":[181],"indoor":[182],"outdoor":[184],"communication":[185],"scenarios,":[186],"outperforms":[188],"some":[189],"existing":[190],"benchmark":[191],"schemes.":[192]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
