{"id":"https://openalex.org/W4392901757","doi":"https://doi.org/10.1109/jiot.2024.3378476","title":"Lightweight Cross-Domain Authentication Scheme for Securing Wireless IoT Devices Using Backscatter Communication","display_name":"Lightweight Cross-Domain Authentication Scheme for Securing Wireless IoT Devices Using Backscatter Communication","publication_year":2024,"publication_date":"2024-03-18","ids":{"openalex":"https://openalex.org/W4392901757","doi":"https://doi.org/10.1109/jiot.2024.3378476"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3378476","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100392485","display_name":"Guoqiang Zhang","orcid":"https://orcid.org/0000-0002-2976-5854"},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoqiang Zhang","raw_affiliation_strings":["Research Center of6G Mobile Communications, School of Cyber Science and Engineering, Wuhan, P. R. China"],"affiliations":[{"raw_affiliation_string":"Research Center of6G Mobile Communications, School of Cyber Science and Engineering, Wuhan, P. R. China","institution_ids":["https://openalex.org/I180662265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085618694","display_name":"Qiwei Hu","orcid":"https://orcid.org/0000-0003-0220-961X"},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiwei Hu","raw_affiliation_strings":["Research Center of6G Mobile Communications, School of Cyber Science and Engineering, Wuhan, P. R. China"],"affiliations":[{"raw_affiliation_string":"Research Center of6G Mobile Communications, School of Cyber Science and Engineering, Wuhan, P. R. China","institution_ids":["https://openalex.org/I180662265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100433521","display_name":"Yu Zhang","orcid":"https://orcid.org/0000-0002-2645-804X"},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Zhang","raw_affiliation_strings":["Research Center of6G Mobile Communications, School of Cyber Science and Engineering, Wuhan, P. R. China"],"affiliations":[{"raw_affiliation_string":"Research Center of6G Mobile Communications, School of Cyber Science and Engineering, Wuhan, P. R. China","institution_ids":["https://openalex.org/I180662265"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009617425","display_name":"Yueyue Dai","orcid":"https://orcid.org/0000-0002-2163-987X"},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yueyue Dai","raw_affiliation_strings":["Research Center of6G Mobile Communications, School of Cyber Science and Engineering, Wuhan, P. R. China"],"affiliations":[{"raw_affiliation_string":"Research Center of6G Mobile Communications, School of Cyber Science and Engineering, Wuhan, P. R. China","institution_ids":["https://openalex.org/I180662265"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100678341","display_name":"Tao Jiang","orcid":"https://orcid.org/0000-0002-8482-1046"},"institutions":[{"id":"https://openalex.org/I180662265","display_name":"China Mobile (China)","ror":"https://ror.org/05gftfe97","country_code":"CN","type":"company","lineage":["https://openalex.org/I180662265"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Jiang","raw_affiliation_strings":["Research Center of6G Mobile Communications, School of Cyber Science and Engineering, Wuhan, P. R. China"],"affiliations":[{"raw_affiliation_string":"Research Center of6G Mobile Communications, School of Cyber Science and Engineering, Wuhan, P. R. China","institution_ids":["https://openalex.org/I180662265"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":84},"biblio":{"volume":"11","issue":"12","first_page":"22021","last_page":"22035"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Physical Layer Security in Wireless Communications","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Physical Layer Security in Wireless Communications","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Wireless Energy Harvesting and Information Transfer","score":0.9943,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":0.9926,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backscatter","display_name":"Backscatter (email)","score":0.64829785},{"id":"https://openalex.org/keywords/ambient-backscatter","display_name":"Ambient Backscatter","score":0.614638},{"id":"https://openalex.org/keywords/iot","display_name":"IoT","score":0.593366},{"id":"https://openalex.org/keywords/wireless-power-transfer","display_name":"Wireless Power Transfer","score":0.582489},{"id":"https://openalex.org/keywords/information-transfer","display_name":"Information Transfer","score":0.548795},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.547284}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.76518595},{"id":"https://openalex.org/C30354325","wikidata":"https://www.wikidata.org/wiki/Q204667","display_name":"Backscatter (email)","level":3,"score":0.64829785},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.60420984},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5858355},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5804617},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.56132895},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5455623},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37717164},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3137115},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3378476","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":37,"referenced_works":["https://openalex.org/W1551333318","https://openalex.org/W1967308747","https://openalex.org/W1969907290","https://openalex.org/W1972743861","https://openalex.org/W2022645011","https://openalex.org/W2076166888","https://openalex.org/W2155899844","https://openalex.org/W2800881063","https://openalex.org/W2801607016","https://openalex.org/W2833339309","https://openalex.org/W2897688655","https://openalex.org/W2910870188","https://openalex.org/W2912213068","https://openalex.org/W2925262016","https://openalex.org/W2945217752","https://openalex.org/W2981735416","https://openalex.org/W2996943723","https://openalex.org/W3042999029","https://openalex.org/W3089464105","https://openalex.org/W3093454165","https://openalex.org/W3108962068","https://openalex.org/W3156928296","https://openalex.org/W3168108422","https://openalex.org/W3168651634","https://openalex.org/W3169595081","https://openalex.org/W3192818697","https://openalex.org/W3193542172","https://openalex.org/W4242781462","https://openalex.org/W4289538107","https://openalex.org/W4298335015","https://openalex.org/W4308830332","https://openalex.org/W4320002750","https://openalex.org/W4321021465","https://openalex.org/W4323065970","https://openalex.org/W4379046573","https://openalex.org/W4381302747","https://openalex.org/W4386113723"],"related_works":["https://openalex.org/W4367296854","https://openalex.org/W4311097251","https://openalex.org/W4247463117","https://openalex.org/W4245926026","https://openalex.org/W4200598720","https://openalex.org/W3131810941","https://openalex.org/W2921026492","https://openalex.org/W2625093826","https://openalex.org/W2586548817","https://openalex.org/W2242172122"],"abstract_inverted_index":{"Cross-domain":[0],"collaboration":[1],"under":[2,162],"wireless":[3,21,69],"communication":[4],"scenarios":[5,38],"has":[6],"gained":[7],"traction":[8],"in":[9,36,153],"Internet-of-Things":[10],"(IoT)":[11],"applications.":[12],"Authentication":[13],"is":[14,98,119,143],"essential":[15],"for":[16,67],"ensuring":[17],"the":[18,26,41,52],"security":[19],"of":[20,43,48,55],"IoT":[22],"devices":[23],"(IoTDs).":[24],"However,":[25],"existing":[27],"cryptographic":[28],"and":[29,51,111,125,145,158],"physical":[30],"layer":[31],"authentication":[32,65,123],"schemes":[33],"are":[34,78],"unappealing":[35],"cross-domain":[37,49,64],"due":[39],"to":[40,100,121,129],"presence":[42],"resource-limited":[44],"IoTDs,":[45],"privacy":[46],"concerns":[47],"sharing,":[50],"negative":[53],"effect":[54],"malicious":[56,127],"attackers.":[57],"This":[58],"paper":[59],"proposes":[60],"FedScatter,":[61],"a":[62,94],"lightweight":[63],"scheme":[66],"securing":[68],"IoTDs":[70],"using":[71],"backscatter":[72,88],"communication.":[73],"First,":[74],"device":[75,102,109],"identity":[76,103],"signatures":[77],"constructed":[79],"by":[80,133],"harnessing":[81],"passive":[82],"signal":[83],"features":[84],"generated":[85],"from":[86],"feather-light":[87],"tags,":[89],"incurring":[90],"negligible":[91],"overhead.":[92],"Subsequently,":[93],"federated":[95],"learning":[96],"model":[97,131],"designed":[99],"aggregate":[101],"information":[104],"across":[105],"domains":[106],"while":[107],"respecting":[108],"heterogeneity":[110],"data":[112],"privacy.":[113],"A":[114,140],"novel":[115],"parameter":[116],"aggregation":[117],"algorithm":[118],"proposed":[120],"bolster":[122],"resilience":[124],"against":[126],"attacks":[128],"avoid":[130],"pollution":[132],"powerful":[134],"attackers":[135],"with":[136],"substantial":[137],"hardware":[138],"resources.":[139],"FedScatter":[141],"prototype":[142],"implemented":[144],"evaluated,":[146],"demonstrating":[147],"significant":[148],"improvements":[149],"over":[150],"state-of-the-art":[151],"works":[152],"both":[154],"true":[155],"positive":[156,160],"rate":[157,161],"false":[159],"various":[163],"attacks.":[164]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4392901757","counts_by_year":[],"updated_date":"2024-12-03T23:26:38.285144","created_date":"2024-03-19"}