{"id":"https://openalex.org/W4382396213","doi":"https://doi.org/10.1145/3558482.3590198","title":"Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions","display_name":"Mag-Auth: Authenticating Wireless Transmitters and Receivers on the Receiver Side via Magnetic Emissions","publication_year":2023,"publication_date":"2023-05-29","ids":{"openalex":"https://openalex.org/W4382396213","doi":"https://doi.org/10.1145/3558482.3590198"},"language":"en","primary_location":{"id":"doi:10.1145/3558482.3590198","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3558482.3590198","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034712757","display_name":"Omar Adel Ibrahim","orcid":"https://orcid.org/0000-0002-0171-8757"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Omar Adel Ibrahim","raw_affiliation_strings":["Hamad Bin Khalifa University (HBKU), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Hamad Bin Khalifa University (HBKU), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065932621","display_name":"Roberto Di Pietro","orcid":"https://orcid.org/0000-0003-1909-0336"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Roberto Di Pietro","raw_affiliation_strings":["Hamad Bin Khalifa University (HBKU), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Hamad Bin Khalifa University (HBKU), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5034712757"],"corresponding_institution_ids":["https://openalex.org/I4210144839"],"apc_list":null,"apc_paid":null,"fwci":1.2306,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.83144489,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"305","last_page":"316"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12131","display_name":"Wireless Signal Modulation Classification","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7160807847976685},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.6732875108718872},{"id":"https://openalex.org/keywords/transmitter","display_name":"Transmitter","score":0.6633797883987427},{"id":"https://openalex.org/keywords/autoencoder","display_name":"Autoencoder","score":0.6376103162765503},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5500990152359009},{"id":"https://openalex.org/keywords/wireless-security","display_name":"Wireless security","score":0.5107717514038086},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4674058258533478},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.430738627910614},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4205012917518616},{"id":"https://openalex.org/keywords/physical-layer","display_name":"Physical layer","score":0.41962915658950806},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.3175017237663269},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.22029757499694824},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.21458837389945984},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18269893527030945},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17068058252334595}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7160807847976685},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.6732875108718872},{"id":"https://openalex.org/C47798520","wikidata":"https://www.wikidata.org/wiki/Q190157","display_name":"Transmitter","level":3,"score":0.6633797883987427},{"id":"https://openalex.org/C101738243","wikidata":"https://www.wikidata.org/wiki/Q786435","display_name":"Autoencoder","level":3,"score":0.6376103162765503},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5500990152359009},{"id":"https://openalex.org/C2776946656","wikidata":"https://www.wikidata.org/wiki/Q1655812","display_name":"Wireless security","level":4,"score":0.5107717514038086},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4674058258533478},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.430738627910614},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4205012917518616},{"id":"https://openalex.org/C19247436","wikidata":"https://www.wikidata.org/wiki/Q192727","display_name":"Physical layer","level":3,"score":0.41962915658950806},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.3175017237663269},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.22029757499694824},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.21458837389945984},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18269893527030945},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17068058252334595}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3558482.3590198","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3558482.3590198","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[{"id":"https://openalex.org/G194256065","display_name":null,"funder_award_id":"GSRA6-1-0528-19046","funder_id":"https://openalex.org/F4320332753","funder_display_name":"Qatar National Research Fund"}],"funders":[{"id":"https://openalex.org/F4320309815","display_name":"Qatar Foundation","ror":"https://ror.org/01cawbq05"},{"id":"https://openalex.org/F4320321038","display_name":"Fonds National de la Recherche Luxembourg","ror":"https://ror.org/039z13y21"},{"id":"https://openalex.org/F4320332753","display_name":"Qatar National Research Fund","ror":"https://ror.org/01svaqq28"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1976842305","https://openalex.org/W2030091742","https://openalex.org/W2052476756","https://openalex.org/W2083804560","https://openalex.org/W2171819552","https://openalex.org/W2317978897","https://openalex.org/W2402043120","https://openalex.org/W2766393343","https://openalex.org/W2886145918","https://openalex.org/W2891054065","https://openalex.org/W2921412127","https://openalex.org/W2929496932","https://openalex.org/W2939511003","https://openalex.org/W2943484928","https://openalex.org/W2963910109","https://openalex.org/W2979507955","https://openalex.org/W2985766404","https://openalex.org/W2997754156","https://openalex.org/W3004340854","https://openalex.org/W3009816315","https://openalex.org/W3017079671","https://openalex.org/W3036818015","https://openalex.org/W3108962068","https://openalex.org/W3111004365","https://openalex.org/W4200236195","https://openalex.org/W4229076093","https://openalex.org/W4230685329"],"related_works":["https://openalex.org/W2460691506","https://openalex.org/W2963815763","https://openalex.org/W2068090402","https://openalex.org/W1499142163","https://openalex.org/W2269066968","https://openalex.org/W2003349868","https://openalex.org/W2938818065","https://openalex.org/W4283217267","https://openalex.org/W2514980439","https://openalex.org/W2093719639"],"abstract_inverted_index":{"Device":[0],"authentication":[1,81,196,253],"over":[2,232],"the":[3,19,23,37,48,57,63,85,91,95,111,135,137,140,147,154,178,239,259],"wireless":[4,64,96,128,158,192,213],"channel":[5],"is":[6,12,51,124,149,167],"still":[7],"an":[8,104,115],"open":[9],"issue.":[10],"This":[11],"especially":[13],"true":[14],"for":[15,47,182],"low-end":[16],"devices":[17,65,129,214],"like":[18],"IoT":[20],"ones,":[21],"where":[22],"overhead":[24],"required":[25],"by":[26,271],"traditional":[27],"asymmetric":[28],"cryptographic":[29],"techniques":[30],"can":[31],"be":[32],"overwhelming,":[33],"or-more":[34],"in":[35,101],"general-when":[36],"crypto":[38],"material":[39],"might":[40],"have":[41,142,175],"been":[42,143],"compromised.":[43],"A":[44],"robust":[45,252],"solution":[46],"above":[49],"scenarios":[50],"Physical-Layer":[52],"Authentication":[53],"(PLA),":[54],"which":[55],"exploits":[56],"inherent":[58],"intrinsic":[59],"unique":[60,164],"features":[61],"of":[62,157,211,226,236,243],"to":[66,103,126,134,151,174,177,190,265],"achieve":[67],"low-cost,":[68],"crypto-less":[69],"authentication.":[70],"In":[71],"this":[72],"paper,":[73],"we":[74,256],"present":[75],"Mag-Auth,":[76],"a":[77,118,222,233,248],"novel":[78],"and":[79,98,117,139,194,215,219,241,251,269,274],"lightweight":[80],"scheme":[82],"that":[83,130],"leverages":[84],"Electro-Magnetic":[86],"(EM)":[87],"emissions":[88,246,262],"released":[89,258],"at":[90],"joint":[92],"connection":[93],"between":[94],"device":[97],"its":[99],"antenna":[100],"response":[102],"excitation":[105],"signal.":[106],"Specifically,":[107],"Mag-Auth":[108,161],"trains,":[109],"on":[110],"collected":[112,231,260],"EM":[113,245,261],"emissions,":[114],"autoencoder":[116,123,138],"Neural":[119],"Network":[120],"(NN).":[121],"The":[122],"employed":[125],"reject":[127],"do":[131],"not":[132,172],"belong":[133],"set":[136],"NN":[141,148],"trained":[144],"over,":[145],"while":[146],"applied":[150],"uniquely":[152],"identify":[153],"different":[155],"classes":[156],"transmitter-receiver":[159],"pairs.":[160],"enjoys":[162],"some":[163],"features:":[165],"it":[166,170,188,199],"privacy-preserving":[168],"as":[169,247],"does":[171],"require":[173],"access":[176],"radio":[179],"board":[180],"(unlike,":[181],"instance,":[183],"in-phase/quadrature":[184],"(IQ)-based":[185],"PLA":[186],"methods);":[187],"caters":[189],"both":[191],"transmitter":[193],"receiver":[195],"scenarios;":[197],"and,":[198],"sports":[200],"striking":[201],"performance.":[202],"Indeed,":[203],"our":[204],"extensive":[205],"experimental":[206],"campaign":[207],"involving":[208],"600":[209],"combinations":[210],"various":[212],"antennas":[216],"(including":[217],"SDRs":[218],"IoTs)":[220],"unveiled":[221],"minimum":[223],"average":[224],"F1-Score":[225],"0.94":[227],"when":[228],"classifying":[229],"samples":[230],"maximum":[234],"length":[235],"1s,":[237],"proving":[238],"effectiveness":[240],"viability":[242],"using":[244],"lightweight,":[249],"efficient,":[250],"mechanism.":[254],"Finally,":[255],"also":[257],"raw":[263],"data":[264],"foster":[266],"further":[267],"investigations":[268],"development":[270],"Academia,":[272],"Industry,":[273],"practitioners.":[275]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
