{"id":"https://openalex.org/W2754663238","doi":"https://doi.org/10.1109/trustcom/bigdatase/icess.2017.319","title":"Analysis of Authentication Parameters in Uplink Scenario of Heterogeneous Networks","display_name":"Analysis of Authentication Parameters in Uplink Scenario of Heterogeneous Networks","publication_year":2017,"publication_date":"2017-08-01","ids":{"openalex":"https://openalex.org/W2754663238","doi":"https://doi.org/10.1109/trustcom/bigdatase/icess.2017.319","mag":"2754663238"},"language":"en","primary_location":{"id":"doi:10.1109/trustcom/bigdatase/icess.2017.319","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom/bigdatase/icess.2017.319","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Trustcom/BigDataSE/ICESS","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009437218","display_name":"Mahsa Foruhandeh","orcid":"https://orcid.org/0000-0001-8667-2665"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mahsa Foruhandeh","raw_affiliation_strings":["Virginia Polytechnic Institute, State University, Virginia, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Polytechnic Institute, State University, Virginia, USA","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042147260","display_name":"Ryan Gerdes","orcid":"https://orcid.org/0000-0003-0876-1181"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ryan Gerdes","raw_affiliation_strings":["Virginia Polytechnic Institute, State University, Virginia, USA"],"affiliations":[{"raw_affiliation_string":"Virginia Polytechnic Institute, State University, Virginia, USA","institution_ids":["https://openalex.org/I859038795"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5009437218"],"corresponding_institution_ids":["https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":0.43,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65477161,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"833","last_page":"838"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7900656461715698},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.680109977722168},{"id":"https://openalex.org/keywords/heterogeneous-network","display_name":"Heterogeneous network","score":0.639527440071106},{"id":"https://openalex.org/keywords/telecommunications-link","display_name":"Telecommunications link","score":0.637473464012146},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.613772451877594},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.568035364151001},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5476450324058533},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.51679527759552},{"id":"https://openalex.org/keywords/performance-metric","display_name":"Performance metric","score":0.43956926465034485},{"id":"https://openalex.org/keywords/user-equipment","display_name":"User equipment","score":0.4395506978034973},{"id":"https://openalex.org/keywords/packet-loss","display_name":"Packet loss","score":0.4124201536178589},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.2197093963623047},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.12343773245811462},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.10674268007278442},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10475316643714905},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07202646136283875}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7900656461715698},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.680109977722168},{"id":"https://openalex.org/C158207573","wikidata":"https://www.wikidata.org/wiki/Q5747224","display_name":"Heterogeneous network","level":4,"score":0.639527440071106},{"id":"https://openalex.org/C138660444","wikidata":"https://www.wikidata.org/wiki/Q5607897","display_name":"Telecommunications link","level":2,"score":0.637473464012146},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.613772451877594},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.568035364151001},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5476450324058533},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.51679527759552},{"id":"https://openalex.org/C2780898871","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Performance metric","level":2,"score":0.43956926465034485},{"id":"https://openalex.org/C2781327853","wikidata":"https://www.wikidata.org/wiki/Q3552547","display_name":"User equipment","level":3,"score":0.4395506978034973},{"id":"https://openalex.org/C54108766","wikidata":"https://www.wikidata.org/wiki/Q391064","display_name":"Packet loss","level":3,"score":0.4124201536178589},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.2197093963623047},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.12343773245811462},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.10674268007278442},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10475316643714905},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07202646136283875},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/trustcom/bigdatase/icess.2017.319","is_oa":false,"landing_page_url":"https://doi.org/10.1109/trustcom/bigdatase/icess.2017.319","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Trustcom/BigDataSE/ICESS","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1750553315","https://openalex.org/W1984714570","https://openalex.org/W1994080576","https://openalex.org/W2040714707","https://openalex.org/W2089573388","https://openalex.org/W2130459259","https://openalex.org/W2140327371","https://openalex.org/W2142774189","https://openalex.org/W2149170915","https://openalex.org/W2151383094","https://openalex.org/W2532967233","https://openalex.org/W2548339434","https://openalex.org/W3105072513","https://openalex.org/W6682307640","https://openalex.org/W6728934231"],"related_works":["https://openalex.org/W3006920049","https://openalex.org/W2962922943","https://openalex.org/W2038093983","https://openalex.org/W2921549278","https://openalex.org/W3046102531","https://openalex.org/W3167642505","https://openalex.org/W1975663209","https://openalex.org/W2957675536","https://openalex.org/W4376480765","https://openalex.org/W2098636313"],"abstract_inverted_index":{"The":[0,83,111,179,228],"role":[1],"of":[2,15,23,43,74,121,129,159,170,181,187,196,214,254,262,269],"Heterogeneous":[3],"Networks":[4],"(HetNets)":[5],"at":[6,146],"providing":[7],"sufficient":[8],"capacity":[9],"based":[10,165,217],"on":[11,36,92,184,204,219,259],"fast":[12],"growing":[13],"demands":[14],"user":[16,117],"equipment":[17],"(UE)":[18],"is":[19,34,51,116,124,136,152,167,192,207,223,233,250,271],"not":[20],"deniable.":[21],"Design":[22],"a":[24,44,101,130,163],"secure":[25],"and":[26,61,69,96,161],"robust":[27],"authentication":[28,49,70,94,173,182],"mechanism":[29,50],"for":[30,65,78,104,126],"the":[31,37,75,93,105,147,156,168,172,185,188,193,212,220,226,237,245,266],"mobile":[32],"users":[33],"essential":[35],"other":[38],"hand.":[39],"A":[40],"mathematical":[41],"model":[42,139],"HetNet":[45],"equipped":[46],"with":[47,143],"butterfly-graph":[48,216],"derived":[52,125],"here":[53,115],"that":[54,222,231,247,265],"takes":[55],"into":[56],"account":[57],"packet":[58,79,148,249],"loss":[59,80],"probability":[60,158,175],"provides":[62],"strong":[63],"tools":[64],"studying":[66],"HetNets.":[67,82,90],"Outage":[68],"failure":[71,174],"are":[72,99,257],"two":[73],"main":[76,112,194],"reasons":[77,103],"in":[81,89,119,176,236],"former":[84],"stems":[85],"from":[86],"higher":[87],"interference":[88],"Attacks":[91],"signals,":[95],"noisy":[97],"channels":[98],"only":[100],"few":[102],"latter":[106],"to":[107,138,154,201,225,244],"be":[108],"named":[109],"here.":[110],"evaluation":[113],"metric":[114],"experience":[118],"terms":[120],"throughput":[122],"which":[123,199,206],"uplink":[127],"scenario":[128],"K-tier":[131],"HetNet,":[132],"where":[133],"queuing":[134],"theory":[135],"exploited":[137],"an":[140],"M/G/1":[141],"queue":[142,190],"interruption":[144],"operating":[145],"level,":[149],"stochastic":[150],"geometry":[151],"used":[153],"find":[155],"outage":[157],"tiers,":[160],"finally":[162],"graph-theory":[164],"algorithm":[166],"basis":[169],"finding":[171],"closed":[177],"form.":[178],"effect":[180,213],"parameters":[183,263],"statistics":[186],"UE":[189],"length":[191],"focus":[195],"this":[197,241],"paper":[198],"leads":[200],"direct":[202],"impressions":[203],"throughput,":[205],"next":[208],"followed":[209],"by":[210],"analyzing":[211],"using":[215,240],"signatures":[218],"overhead":[221,238],"imposed":[224],"system.":[227],"results":[229],"show":[230],"there":[232],"significant":[234],"reduction":[235],"when":[239],"scheme":[242],"compared":[243],"case":[246],"each":[248],"signed":[251],"individually.":[252],"All":[253],"these":[255],"benefits":[256],"conditioned":[258],"proper":[260],"choice":[261],"such":[264],"stability":[267],"condition":[268],"system":[270],"satisfied.":[272]},"counts_by_year":[{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
