{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T11:15:25Z","timestamp":1725707725541},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,5]]},"DOI":"10.1109\/meditcom55741.2022.9928604","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:50:55Z","timestamp":1667526655000},"page":"136-141","source":"Crossref","is-referenced-by-count":4,"title":["Physical Layer Continuous Authentication for Wireless Mesh Networks: An Experimental Study"],"prefix":"10.1109","author":[{"given":"Elmehdi","family":"Illi","sequence":"first","affiliation":[{"name":"Center for Cyber-Physical Systems, Khalifa University,Abu Dhabi,UAE,127788"}]},{"given":"Anshul","family":"Pandey","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute,Abu Dhabi,UAE"}]},{"given":"Lina","family":"Bariah","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute,Abu Dhabi,UAE"}]},{"given":"Govind","family":"Singh","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute,Abu Dhabi,UAE"}]},{"given":"Jean-Pierre","family":"Giacalone","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute,Abu Dhabi,UAE"}]},{"given":"Sami","family":"Muhaidat","sequence":"additional","affiliation":[{"name":"Center for Cyber-Physical Systems, Khalifa University,Abu Dhabi,UAE,127788"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1509968"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/fi11040099"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.85"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS52077.2021.00059"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2558521"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900141"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1700412"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921908"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012314.00178"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2825560"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036892"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.280"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.104"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2784431"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3161006"},{"key":"ref16","first-page":"44","article-title":"\u201cAn enhanced cross-layer authentication mechanism for wireless communications based on PER and RSSI,\u201d","volume-title":"2013 13th Canadian Workshop on Information Theory","author":"Hao","year":"2013"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2848937"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148761"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2016.7869666"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854032"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/s17020289"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5601959"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2521718"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254494"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2706657"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2286269"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484444"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2833849"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2014.6990365"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2986399"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2012.6379142"}],"event":{"name":"2022 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)","start":{"date-parts":[[2022,9,5]]},"location":"Athens, Greece","end":{"date-parts":[[2022,9,8]]}},"container-title":["2022 IEEE International Mediterranean Conference on Communications and Networking (MeditCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9928527\/9928592\/09928604.pdf?arnumber=9928604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T04:06:34Z","timestamp":1706069194000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9928604\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/meditcom55741.2022.9928604","relation":{},"subject":[],"published":{"date-parts":[[2022,9,5]]}}}