{"id":"https://openalex.org/W4415743621","doi":"https://doi.org/10.1109/ton.2025.3624385","title":"CovertAuth: Joint Covert Communication and Authentication in mmWave Systems","display_name":"CovertAuth: Joint Covert Communication and Authentication in mmWave Systems","publication_year":2025,"publication_date":"2025-10-31","ids":{"openalex":"https://openalex.org/W4415743621","doi":"https://doi.org/10.1109/ton.2025.3624385"},"language":null,"primary_location":{"id":"doi:10.1109/ton.2025.3624385","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ton.2025.3624385","pdf_url":null,"source":{"id":"https://openalex.org/S5407042750","display_name":"IEEE Transactions on Networking","issn_l":"2998-4157","issn":["2998-4157"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064256148","display_name":"Yulin Teng","orcid":"https://orcid.org/0000-0001-9646-6021"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yulin Teng","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"],"raw_orcid":"https://orcid.org/0000-0001-9646-6021","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041554124","display_name":"Pinchang Zhang","orcid":"https://orcid.org/0000-0002-8310-7238"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pinchang Zhang","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"],"raw_orcid":"https://orcid.org/0000-0002-8310-7238","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113392431","display_name":"Keshuang Han","orcid":null},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Keshuang Han","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014884811","display_name":"Xiaohong Jiang","orcid":"https://orcid.org/0000-0001-9739-1930"},"institutions":[{"id":"https://openalex.org/I84400586","display_name":"Future University Hakodate","ror":"https://ror.org/05szw2z23","country_code":"JP","type":"education","lineage":["https://openalex.org/I84400586"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Xiaohong Jiang","raw_affiliation_strings":["School of Systems Information Science, Future University Hakodate, Hakodate, Japan"],"raw_orcid":"https://orcid.org/0000-0001-9739-1930","affiliations":[{"raw_affiliation_string":"School of Systems Information Science, Future University Hakodate, Hakodate, Japan","institution_ids":["https://openalex.org/I84400586"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043356063","display_name":"Yulong Shen","orcid":"https://orcid.org/0000-0002-8448-705X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yulong Shen","raw_affiliation_strings":["School of Computer Science and Technology, Xidian University, Xi&#x2019;an, China"],"raw_orcid":"https://orcid.org/0000-0002-8448-705X","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100602821","display_name":"Fu Xiao","orcid":"https://orcid.org/0000-0003-1815-2793"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fu Xiao","raw_affiliation_strings":["School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"],"raw_orcid":"https://orcid.org/0000-0003-1815-2793","affiliations":[{"raw_affiliation_string":"School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5064256148"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.29761039,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"34","issue":null,"first_page":"1421","last_page":"1436"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.8213000297546387,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.8213000297546387,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.11819999665021896,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10936","display_name":"Millimeter-Wave Propagation and Modeling","score":0.01600000075995922,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.8144000172615051},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.5537999868392944},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.49729999899864197},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4668000042438507},{"id":"https://openalex.org/keywords/covert-channel","display_name":"Covert channel","score":0.4595000147819519},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.42989999055862427},{"id":"https://openalex.org/keywords/channel-state-information","display_name":"Channel state information","score":0.4101000130176544},{"id":"https://openalex.org/keywords/joint","display_name":"Joint (building)","score":0.3718999922275543},{"id":"https://openalex.org/keywords/secure-transmission","display_name":"Secure transmission","score":0.36730000376701355},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.3499999940395355}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.8144000172615051},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7307000160217285},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.5537999868392944},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.49729999899864197},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4941999912261963},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4668000042438507},{"id":"https://openalex.org/C29024540","wikidata":"https://www.wikidata.org/wiki/Q1476964","display_name":"Covert channel","level":5,"score":0.4595000147819519},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.42989999055862427},{"id":"https://openalex.org/C148063708","wikidata":"https://www.wikidata.org/wiki/Q5072511","display_name":"Channel state information","level":3,"score":0.4101000130176544},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4007999897003174},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.3718999922275543},{"id":"https://openalex.org/C2779814227","wikidata":"https://www.wikidata.org/wiki/Q7444882","display_name":"Secure transmission","level":3,"score":0.36730000376701355},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.3499999940395355},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3345000147819519},{"id":"https://openalex.org/C131129157","wikidata":"https://www.wikidata.org/wiki/Q1059963","display_name":"Challenge\u2013response authentication","level":4,"score":0.3165000081062317},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.31029999256134033},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.3093000054359436},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.3061999976634979},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.30480000376701355},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.30329999327659607},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.29580000042915344},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2791999876499176},{"id":"https://openalex.org/C32022120","wikidata":"https://www.wikidata.org/wiki/Q797225","display_name":"Interference (communication)","level":3,"score":0.2685999870300293},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.2676999866962433},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.26179999113082886},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.2581999897956848},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.25679999589920044},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.2563999891281128},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.2563000023365021},{"id":"https://openalex.org/C186370098","wikidata":"https://www.wikidata.org/wiki/Q442787","display_name":"Energy (signal processing)","level":2,"score":0.25290000438690186},{"id":"https://openalex.org/C21822782","wikidata":"https://www.wikidata.org/wiki/Q131214","display_name":"Antenna (radio)","level":2,"score":0.25220000743865967},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ton.2025.3624385","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ton.2025.3624385","pdf_url":null,"source":{"id":"https://openalex.org/S5407042750","display_name":"IEEE Transactions on Networking","issn_l":"2998-4157","issn":["2998-4157"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G575347255","display_name":null,"funder_award_id":"BK20243053","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6826744464","display_name":null,"funder_award_id":"BK20251877","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G7747012976","display_name":null,"funder_award_id":"62272241","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7995815166","display_name":null,"funder_award_id":"2023YFB3107500","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W2055705596","https://openalex.org/W2737688805","https://openalex.org/W2761420876","https://openalex.org/W2797475427","https://openalex.org/W2810054921","https://openalex.org/W2897220077","https://openalex.org/W2955485202","https://openalex.org/W2964279222","https://openalex.org/W3016754131","https://openalex.org/W3047322466","https://openalex.org/W3119339993","https://openalex.org/W3155558707","https://openalex.org/W3205594872","https://openalex.org/W3213207990","https://openalex.org/W4226267674","https://openalex.org/W4250589301","https://openalex.org/W4293203827","https://openalex.org/W4312772093","https://openalex.org/W4313854346","https://openalex.org/W4313855641","https://openalex.org/W4319993362","https://openalex.org/W4322731123","https://openalex.org/W4327522026","https://openalex.org/W4328007328","https://openalex.org/W4362683631","https://openalex.org/W4386453772","https://openalex.org/W4386554138","https://openalex.org/W4391365599","https://openalex.org/W4391992316","https://openalex.org/W4393305249","https://openalex.org/W4393372418","https://openalex.org/W4394896997","https://openalex.org/W4403937606","https://openalex.org/W4404238311","https://openalex.org/W4405632137"],"related_works":[],"abstract_inverted_index":{"Beam":[0],"alignment":[1],"(BA)":[2],"is":[3,104,145,165,176],"a":[4,37,46,76,107,112,161,207],"crucial":[5],"process":[6],"in":[7,88],"millimeter-wave":[8],"(mmWave)":[9],"communications":[10],"for":[11,122,211],"precise":[12],"directional":[13],"transmission":[14,73],"and":[15,28,72,92,127],"efficient":[16],"link":[17],"establishment,":[18],"but":[19],"its":[20,64],"open":[21],"nature":[22],"makes":[23],"it":[24],"vulnerable":[25],"to":[26,44,75,110,134,147,167,183],"eavesdropping":[27,53],"identity":[29,169],"impersonation":[30,99],"attacks.":[31],"To":[32],"this":[33],"end,":[34],"we":[35,55],"propose":[36],"novel":[38,113],"security":[39,186,209],"framework":[40],"named":[41],"CovertAuth,":[42],"designed":[43],"provide":[45],"unified":[47],"defense":[48],"against":[49],"both":[50],"threats.":[51],"For":[52,98],"attacks,":[54,100],"advance":[56],"the":[57,68,83,101,149,180,185,188,203,212],"existing":[58],"covert":[59,181],"communication":[60,182],"design":[61,111],"by":[62],"extending":[63],"joint":[65],"optimization":[66,143],"of":[67,187],"beam":[69],"training":[70],"budget":[71],"power":[74],"more":[77],"practical":[78],"BA":[79,189,214],"scenario":[80],"that":[81,153,195],"incorporates":[82],"mutual":[84],"coupling":[85],"(MC)":[86],"effect":[87,103],"antenna":[89],"array":[90],"impairments":[91],"imperfect":[93],"eavesdropper":[94],"channel":[95],"state":[96],"information.":[97],"MC":[102],"explored":[105],"as":[106],"device":[108],"feature":[109],"adaptive":[114,173],"weight-based":[115],"physical":[116],"layer":[117],"authentication":[118,123,155,174],"mechanism.":[119],"Theoretical":[120],"models":[121],"metrics":[124],"like":[125],"detection":[126,199],"false":[128],"alarm":[129],"probabilities":[130],"are":[131],"first":[132],"provided":[133],"conduct":[135],"performance":[136],"analysis.":[137],"Based":[138],"on":[139],"these":[140,158],"models,":[141],"an":[142],"problem":[144],"constructed":[146],"determine":[148],"optimal":[150,159],"weight":[151],"value":[152],"maximizes":[154],"accuracy.":[156],"With":[157],"weights,":[160],"weighted-sum":[162],"energy":[163],"detector":[164],"employed":[166],"achieve":[168],"validation.":[170],"The":[171],"resulting":[172],"scheme":[175],"then":[177],"integrated":[178],"with":[179],"enhance":[184],"phase.":[190],"Finally,":[191],"simulation":[192],"results":[193],"demonstrate":[194],"CovertAuth":[196],"achieves":[197],"high":[198],"accuracy":[200],"while":[201],"satisfying":[202],"covertness":[204],"requirement,":[205],"offering":[206],"comprehensive":[208],"solution":[210],"mmWave":[213],"stage.":[215]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-31T00:00:00"}
