{"id":"https://openalex.org/W7122480926","doi":"https://doi.org/10.4108/eetsis.9691","title":"Ensuring Security in Multi-Tag Backscatter Communication Systems","display_name":"Ensuring Security in Multi-Tag Backscatter Communication Systems","publication_year":2026,"publication_date":"2026-01-12","ids":{"openalex":"https://openalex.org/W7122480926","doi":"https://doi.org/10.4108/eetsis.9691"},"language":null,"primary_location":{"id":"doi:10.4108/eetsis.9691","is_oa":true,"landing_page_url":"https://doi.org/10.4108/eetsis.9691","pdf_url":"https://publications.eai.eu/index.php/sis/article/download/9691/3838","source":{"id":"https://openalex.org/S4210240886","display_name":"ICST Transactions on Scalable Information Systems","issn_l":"2032-9407","issn":["2032-9407"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321145","host_organization_name":"European Alliance for Innovation","host_organization_lineage":["https://openalex.org/P4310321145"],"host_organization_lineage_names":["European Alliance for Innovation"],"type":"journal"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICST Transactions on Scalable Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://publications.eai.eu/index.php/sis/article/download/9691/3838","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121494443","display_name":"Zilin You","orcid":null},"institutions":[{"id":"https://openalex.org/I4210142126","display_name":"Jiangsu Provincial Key Laboratory of Network and Information Security","ror":"https://ror.org/03jan5912","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210142126"]},{"id":"https://openalex.org/I74872605","display_name":"China Southern Power Grid (China)","ror":"https://ror.org/03hkh9419","country_code":"CN","type":"company","lineage":["https://openalex.org/I74872605"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zilin You","raw_affiliation_strings":["China Southern Power Grid (China)","Guangdong Provincial Key Laboratory of Power System Network Security"],"affiliations":[{"raw_affiliation_string":"China Southern Power Grid (China)","institution_ids":["https://openalex.org/I74872605"]},{"raw_affiliation_string":"Guangdong Provincial Key Laboratory of Power System Network Security","institution_ids":["https://openalex.org/I4210142126"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122797232","display_name":"Zhihong Liang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210142126","display_name":"Jiangsu Provincial Key Laboratory of Network and Information Security","ror":"https://ror.org/03jan5912","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210142126"]},{"id":"https://openalex.org/I74872605","display_name":"China Southern Power Grid (China)","ror":"https://ror.org/03hkh9419","country_code":"CN","type":"company","lineage":["https://openalex.org/I74872605"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihong Liang","raw_affiliation_strings":["China Southern Power Grid (China)","Guangdong Provincial Key Laboratory of Power System Network Security"],"affiliations":[{"raw_affiliation_string":"China Southern Power Grid (China)","institution_ids":["https://openalex.org/I74872605"]},{"raw_affiliation_string":"Guangdong Provincial Key Laboratory of Power System Network Security","institution_ids":["https://openalex.org/I4210142126"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122757494","display_name":"Siliang Suo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210142126","display_name":"Jiangsu Provincial Key Laboratory of Network and Information Security","ror":"https://ror.org/03jan5912","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210142126"]},{"id":"https://openalex.org/I74872605","display_name":"China Southern Power Grid (China)","ror":"https://ror.org/03hkh9419","country_code":"CN","type":"company","lineage":["https://openalex.org/I74872605"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Siliang Suo","raw_affiliation_strings":["China Southern Power Grid (China)","Guangdong Provincial Key Laboratory of Power System Network Security"],"affiliations":[{"raw_affiliation_string":"China Southern Power Grid (China)","institution_ids":["https://openalex.org/I74872605"]},{"raw_affiliation_string":"Guangdong Provincial Key Laboratory of Power System Network Security","institution_ids":["https://openalex.org/I4210142126"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054154836","display_name":"Lifeng Mai","orcid":"https://orcid.org/0000-0002-4510-5178"},"institutions":[{"id":"https://openalex.org/I4210142126","display_name":"Jiangsu Provincial Key Laboratory of Network and Information Security","ror":"https://ror.org/03jan5912","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210142126"]},{"id":"https://openalex.org/I74872605","display_name":"China Southern Power Grid (China)","ror":"https://ror.org/03hkh9419","country_code":"CN","type":"company","lineage":["https://openalex.org/I74872605"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lifeng Mai","raw_affiliation_strings":["China Southern Power Grid (China)","Guangdong Provincial Key Laboratory of Power System Network Security"],"affiliations":[{"raw_affiliation_string":"China Southern Power Grid (China)","institution_ids":["https://openalex.org/I74872605"]},{"raw_affiliation_string":"Guangdong Provincial Key Laboratory of Power System Network Security","institution_ids":["https://openalex.org/I4210142126"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121454586","display_name":"Qiaoling Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210142126","display_name":"Jiangsu Provincial Key Laboratory of Network and Information Security","ror":"https://ror.org/03jan5912","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210142126"]},{"id":"https://openalex.org/I74872605","display_name":"China Southern Power Grid (China)","ror":"https://ror.org/03hkh9419","country_code":"CN","type":"company","lineage":["https://openalex.org/I74872605"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiaoling Lin","raw_affiliation_strings":["China Southern Power Grid (China)","Guangdong Provincial Key Laboratory of Power System Network Security"],"affiliations":[{"raw_affiliation_string":"China Southern Power Grid (China)","institution_ids":["https://openalex.org/I74872605"]},{"raw_affiliation_string":"Guangdong Provincial Key Laboratory of Power System Network Security","institution_ids":["https://openalex.org/I4210142126"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5121494443"],"corresponding_institution_ids":["https://openalex.org/I4210142126","https://openalex.org/I74872605"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.10386385,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"6","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.8723999857902527,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.8723999857902527,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.08950000256299973,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.0142000000923872,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6866000294685364},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.6431999802589417},{"id":"https://openalex.org/keywords/communications-system","display_name":"Communications system","score":0.5440999865531921},{"id":"https://openalex.org/keywords/rayleigh-fading","display_name":"Rayleigh fading","score":0.4537999927997589},{"id":"https://openalex.org/keywords/backscatter","display_name":"Backscatter (email)","score":0.4302999973297119},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4300000071525574},{"id":"https://openalex.org/keywords/selection","display_name":"Selection (genetic algorithm)","score":0.39629998803138733},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.36160001158714294}],"concepts":[{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6866000294685364},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.64410001039505},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.6431999802589417},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.5440999865531921},{"id":"https://openalex.org/C56985126","wikidata":"https://www.wikidata.org/wiki/Q854039","display_name":"Rayleigh fading","level":4,"score":0.4537999927997589},{"id":"https://openalex.org/C30354325","wikidata":"https://www.wikidata.org/wiki/Q204667","display_name":"Backscatter (email)","level":3,"score":0.4302999973297119},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4300000071525574},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.39910000562667847},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.39629998803138733},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.36160001158714294},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.3560999929904938},{"id":"https://openalex.org/C90559484","wikidata":"https://www.wikidata.org/wiki/Q778379","display_name":"Expression (computer science)","level":2,"score":0.35409998893737793},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35370001196861267},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.32989999651908875},{"id":"https://openalex.org/C13944312","wikidata":"https://www.wikidata.org/wiki/Q7512748","display_name":"Signal-to-noise ratio (imaging)","level":2,"score":0.32269999384880066},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.31380000710487366},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.2872999906539917},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2809999883174896},{"id":"https://openalex.org/C97744766","wikidata":"https://www.wikidata.org/wiki/Q870845","display_name":"Channel capacity","level":3,"score":0.27639999985694885},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.26829999685287476},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2646999955177307},{"id":"https://openalex.org/C46244369","wikidata":"https://www.wikidata.org/wiki/Q193709","display_name":"Rayleigh scattering","level":2,"score":0.26159998774528503},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2615000009536743},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2549999952316284}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4108/eetsis.9691","is_oa":true,"landing_page_url":"https://doi.org/10.4108/eetsis.9691","pdf_url":"https://publications.eai.eu/index.php/sis/article/download/9691/3838","source":{"id":"https://openalex.org/S4210240886","display_name":"ICST Transactions on Scalable Information Systems","issn_l":"2032-9407","issn":["2032-9407"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321145","host_organization_name":"European Alliance for Innovation","host_organization_lineage":["https://openalex.org/P4310321145"],"host_organization_lineage_names":["European Alliance for Innovation"],"type":"journal"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICST Transactions on Scalable Information Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.4108/eetsis.9691","is_oa":true,"landing_page_url":"https://doi.org/10.4108/eetsis.9691","pdf_url":"https://publications.eai.eu/index.php/sis/article/download/9691/3838","source":{"id":"https://openalex.org/S4210240886","display_name":"ICST Transactions on Scalable Information Systems","issn_l":"2032-9407","issn":["2032-9407"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321145","host_organization_name":"European Alliance for Innovation","host_organization_lineage":["https://openalex.org/P4310321145"],"host_organization_lineage_names":["European Alliance for Innovation"],"type":"journal"},"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICST Transactions on Scalable Information Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.497091144323349,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7122480926.pdf","grobid_xml":"https://content.openalex.org/works/W7122480926.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1,55],"studies":[2],"the":[3,23,35,42,45,61,69,79,91,96,99,103,106,115,120,128,134,144,148,153,157,160,165,173],"security":[4,30],"performance":[5,31],"of":[6,25,71,124,159],"a":[7,13,51,57],"multi-tag":[8],"backscatter":[9],"communication":[10,62],"system,":[11],"where":[12,147],"reader":[14,104],"exchanges":[15],"its":[16],"information":[17],"with":[18,98,177],"multiple":[19],"distributed":[20],"tags":[21],"in":[22],"presence":[24],"an":[26,109,169],"eavesdropper.":[27,107],"The":[28,54],"system":[29,46,72,116],"is":[32,87,112,131],"assessed":[33],"using":[34],"secrecy":[36,47,92],"outage":[37,174],"probability":[38,122],"(SOP),":[39],"which":[40,118],"quantifies":[41],"likelihood":[43],"that":[44],"capacity":[48,93],"drops":[49],"below":[50],"specified":[52],"threshold.":[53],"provides":[56],"mathematical":[58],"analysis":[59,167],"on":[60,78,172],"links,":[63],"considering":[64],"Rayleigh":[65],"fading,":[66],"and":[67,74,105,127],"investigates":[68],"effect":[70],"monostatic":[73],"bistatic":[75],"RFID":[76],"configurations":[77],"overall":[80],"security.":[81],"An":[82],"optimal":[83],"tag":[84,97],"selection":[85],"scheme":[86],"proposed":[88,161],"to":[89,142],"maximize":[90],"by":[94],"choosing":[95],"best":[100],"link":[101],"between":[102],"Moreover,":[108,164],"analytical":[110,154],"expression":[111],"derived":[113],"for":[114],"SOP,":[117],"incorporates":[119],"joint":[121],"distributions":[123],"channel":[125],"gains":[126],"asymptotic":[129,166],"SOP":[130,162],"provided":[132],"as":[133],"signal-to-noise":[135],"ratio":[136],"increases.":[137],"Simulation":[138],"results":[139,150],"are":[140],"presented":[141],"verify":[143],"theoretical":[145,178],"analysis,":[146],"simulation":[149],"closely":[151],"match":[152],"predictions,":[155],"confirming":[156],"accuracy":[158],"analysis.":[163,179],"offers":[168],"upper":[170],"bound":[171],"probability,":[175],"consistent":[176]},"counts_by_year":[],"updated_date":"2026-03-14T06:41:57.775601","created_date":"2026-01-13T00:00:00"}
