{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T11:07:34Z","timestamp":1772449654098,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819699131","type":"print"},{"value":"9789819699148","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-9914-8_12","type":"book-chapter","created":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T14:23:51Z","timestamp":1752675831000},"page":"137-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Cross-Layer and Multi-center Authentication Fusion Framework for Mobile Industrial Internet of Things"],"prefix":"10.1007","author":[{"given":"Ao","family":"Dong","sequence":"first","affiliation":[]},{"given":"Fangyuan","family":"Xing","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,17]]},"reference":[{"issue":"6","key":"12_CR1","doi-asserted-by":"publisher","first-page":"7164","DOI":"10.1109\/JIOT.2024.3492279","volume":"12","author":"B He","year":"2025","unstructured":"He, B., Feng, T., Liu, C., Su, C.: CD-BISHAC: cross-domain scheme for blockchain-based industrial internet of things security hybrid access control. IEEE Internet Things J. 12(6), 7164\u20137179 (2025)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"12_CR2","doi-asserted-by":"publisher","first-page":"1387","DOI":"10.1109\/TCC.2024.3480194","volume":"12","author":"F Xing","year":"2024","unstructured":"Xing, F., Tong, F., Yang, J., Cheng, G., He, S.: RAM: a resource-aware Ddos attack mitigation framework in clouds. IEEE Trans. Cloud Comput. 12(4), 1387\u20131400 (2024)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"8","key":"12_CR3","doi-asserted-by":"publisher","first-page":"1748","DOI":"10.1109\/LWC.2022.3180901","volume":"11","author":"S Wang","year":"2022","unstructured":"Wang, S., Huang, K., Xu, X., Zhong, Z., Zhou, Y.: CSI-based physical layer authentication via deep learning. IEEE Wireless Commun. Lett. 11(8), 1748\u20131752 (2022)","journal-title":"IEEE Wireless Commun. Lett."},{"issue":"1","key":"12_CR4","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1109\/JIOT.2021.3099028","volume":"9","author":"Y Liu","year":"2022","unstructured":"Liu, Y., Wang, J., Li, J., Niu, S., Song, H.: Machine learning for the detection and identification of internet of things devices: a survey. IEEE Internet Things J. 9(1), 298\u2013320 (2022)","journal-title":"IEEE Internet Things J."},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Sun, Y., Xing, F., Guo, Z., Chen, H., He, S.: Heterogeneous gateway planning for semantic communication in industrial networks. IEEE Transactions on Cognitive Communications and Networking (2025)","DOI":"10.1109\/TCCN.2025.3544282"},{"issue":"4","key":"12_CR6","doi-asserted-by":"publisher","first-page":"2819","DOI":"10.1109\/TII.2024.3507201","volume":"21","author":"J Hu","year":"2025","unstructured":"Hu, J., Sun, D., Lu, W., Dong, J., Wu, H.: Blockchain-enabled distributed authentication mechanism for industrial device access. IEEE Trans. Industr. Inf. 21(4), 2819\u20132828 (2025)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"6","key":"12_CR7","doi-asserted-by":"publisher","first-page":"9230","DOI":"10.1109\/JIOT.2023.3323293","volume":"11","author":"G Liu","year":"2024","unstructured":"Liu, G., et al.: E-Chain: Lightweight and secure BIoT voting mechanism on variable bandwidth networks. IEEE Internet Things J. 11(6), 9230\u20139243 (2024)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"12_CR8","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1109\/TGCN.2023.3236630","volume":"7","author":"H Chen","year":"2023","unstructured":"Chen, H., et al.: A lightweight mobile-anchor-based multi-target outdoor localization scheme using LoRa communication. IEEE Trans. Green Communications. Netwo. 7(4), 1607\u20131619 (2023)","journal-title":"IEEE Trans. Green Communications. Netwo."},{"issue":"5","key":"12_CR9","doi-asserted-by":"publisher","first-page":"1706","DOI":"10.1109\/JSAC.2022.3145818","volume":"40","author":"F Xing","year":"2022","unstructured":"Xing, F., He, S., Leung, V.C.M., Yin, H.: Energy efficiency optimization for rate-splitting multiple access-based indoor visible light communication networks. IEEE J. Sel. Areas Commun. 40(5), 1706\u20131720 (2022)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"12_CR10","unstructured":"3GPP TR 38.901 v18.0.0.: Study on channel model for frequencies from 0.5 to 100\u202fGHz. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=3173. Accessed 01 Feb 2025"},{"key":"12_CR11","unstructured":"3GPP TR 36.873 v12.7.0: Study on 3D channel model for LTE. https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2574. Accessed 01 Feb 2025"},{"key":"12_CR12","unstructured":"Sparber, T., Boano, C. A., Kanhere, S., R\u00f6mer, K. U.: Mitigating radio interference in large IoT networks through dynamic CCA adjustment. Open J. Internet Things (2017)"},{"key":"12_CR13","unstructured":"Digi International Inc.: XBee\u00ae\/XBee-PRO\u00aeS2C Zigbee\u00ae RF Module User Guide. https:\/\/www.digi.com\/resources\/documentation\/digidocs\/pdfs. Accessed 10 Feb 2025"},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"33544","DOI":"10.1109\/ACCESS.2019.2903444","volume":"7","author":"LJ Wong","year":"2019","unstructured":"Wong, L.J., Headley, W.C., Michaels, A.J.: Specific emitter identification using convolutional neural network-based IQ imbalance estimators. IEEE Access 7, 33544\u201333555 (2019)","journal-title":"IEEE Access"},{"key":"12_CR15","unstructured":"Verband der Automobilindustrie: VDA 5050: Interface for the communication between automated guided vehicles and a master control. http:\/\/www.vda.de\/en\/topics\/automotive-industry\/vda-5050. Accessed 10 Feb 2025"},{"key":"12_CR16","unstructured":"5G Alliance for Connected Industries and Automation: 5G for Connected Industries and Automation. https:\/\/5g-acia.org\/whitepapers\/5g-for-connected-industries-and-automation-second-edition. Accessed 10 Feb 2025"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s11276-023-03478-3","volume":"30","author":"RR Chowdhury","year":"2024","unstructured":"Chowdhury, R.R., Idris, A.C., Abas, P.E.: Identifying SH-IoT devices from network traffic characteristics using random forest classifier. Wireless Netw. 30, 405\u2013419 (2024)","journal-title":"Wireless Netw."},{"issue":"10","key":"12_CR18","doi-asserted-by":"publisher","first-page":"8356","DOI":"10.1109\/JIOT.2020.3045305","volume":"8","author":"D Reising","year":"2021","unstructured":"Reising, D., Cancelleri, J., Loveless, T.D., Kandah, F., Skjellum, A.: Radio identity verification-based IoT security using RF-DNA fingerprints and SVM. IEEE Internet Things J. 8(10), 8356\u20138371 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"12_CR19","doi-asserted-by":"publisher","first-page":"2260","DOI":"10.1109\/TCOMM.2018.2881117","volume":"67","author":"H Fang","year":"2019","unstructured":"Fang, H., Wang, X., Hanzo, L.: Learning-aided physical layer authentication as an intelligent process. IEEE Trans. Commun. 67(3), 2260\u20132273 (2019)","journal-title":"IEEE Trans. Commun."}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-9914-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T10:39:21Z","timestamp":1772447961000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-9914-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819699131","9789819699148"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-9914-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ningbo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/icg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}