{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T05:27:38Z","timestamp":1772083658839,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:00:00Z","timestamp":1655683200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T00:00:00Z","timestamp":1655683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11432-021-3284-y","type":"journal-article","created":{"date-parts":[[2022,6,25]],"date-time":"2022-06-25T16:02:51Z","timestamp":1656172971000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Reliable resource allocation with RF fingerprinting authentication in secure IoT networks"],"prefix":"10.1007","volume":"65","author":[{"given":"Weiwei","family":"Wu","sequence":"first","affiliation":[]},{"given":"Su","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Di","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,20]]},"reference":[{"key":"3284_CR1","doi-asserted-by":"publisher","first-page":"5962","DOI":"10.1109\/JIOT.2018.2847731","volume":"6","author":"X Liu","year":"2019","unstructured":"Liu X, Jia M, Zhang X, et al. A novel multichannel Internet of Things based on dynamic spectrum sharing in 5G communication. IEEE Internet Things J, 2019, 6: 5962\u20135970","journal-title":"IEEE Internet Things J"},{"key":"3284_CR2","doi-asserted-by":"publisher","first-page":"220302","DOI":"10.1007\/s11432-019-2906-y","volume":"63","author":"S Q Shen","year":"2020","unstructured":"Shen S Q, Zhang K, Zhou Y, et al. Security in edge-assisted Internet of Things: challenges and solutions. Sci China Inf Sci, 2020, 63: 220302","journal-title":"Sci China Inf Sci"},{"key":"3284_CR3","doi-asserted-by":"publisher","first-page":"029307","DOI":"10.1007\/s11432-017-9440-x","volume":"62","author":"S L Li","year":"2019","unstructured":"Li S L, Zhai D, Du P F, et al. Energy-efficient task offloading, load balancing, and resource allocation in mobile edge computing enabled IoT networks. Sci China Inf Sci, 2019, 62: 029307","journal-title":"Sci China Inf Sci"},{"key":"3284_CR4","doi-asserted-by":"publisher","first-page":"110301","DOI":"10.1007\/s11432-020-2955-6","volume":"64","author":"X H You","year":"2021","unstructured":"You X H, Wang C-X, Huang J, et al. Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts. Sci China Inf Sci, 2021, 64: 110301","journal-title":"Sci China Inf Sci"},{"key":"3284_CR5","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1109\/TVT.2020.3045473","volume":"70","author":"B Liang","year":"2021","unstructured":"Liang B, Fan R, Hu H, et al. Nonlinear pricing based distributed offloading in multi-user mobile edge computing. IEEE Trans Veh Technol, 2021, 70: 1077\u20131082","journal-title":"IEEE Trans Veh Technol"},{"key":"3284_CR6","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1109\/TCCN.2019.2963869","volume":"6","author":"G Kakkavas","year":"2020","unstructured":"Kakkavas G, Tsitseklis K, Karyotis V, et al. A software defined radio cross-layer resource allocation approach for cognitive radio networks: from theory to practice. IEEE Trans Cogn Commun Netw, 2020, 6: 740\u2013755","journal-title":"IEEE Trans Cogn Commun Netw"},{"key":"3284_CR7","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1109\/TITS.2018.2827460","volume":"20","author":"J Cui","year":"2019","unstructured":"Cui J, Wei L, Zhang J, et al. An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Trans Intell Transp Syst, 2019, 20: 1621\u20131632","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"3284_CR8","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1109\/JIOT.2018.2838071","volume":"6","author":"L Peng","year":"2019","unstructured":"Peng L, Hu A, Zhang J, et al. Design of a hybrid RF fingerprint extraction and device classification scheme. IEEE Internet Things J, 2019, 6: 349\u2013360","journal-title":"IEEE Internet Things J"},{"key":"3284_CR9","doi-asserted-by":"crossref","unstructured":"Das R, Gadre A, Zhang S, et al. A deep learning approach to IoT authentication. In: Proceedings of IEEE International Conference on Communications (ICC), Kansas City, 2018. 1\u20136","DOI":"10.1109\/ICC.2018.8422832"},{"key":"3284_CR10","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1109\/TSIPN.2019.2932678","volume":"5","author":"P Hao","year":"2019","unstructured":"Hao P, Wang X. Integrating PHY security into NDN-IoT networks by exploiting MEC: authentication efficiency, robustness, and accuracy enhancement. IEEE Trans Signal Inf Process over Networks, 2019, 5: 792\u2013806","journal-title":"IEEE Trans Signal Inf Process over Networks"},{"key":"3284_CR11","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/JIOT.2016.2619679","volume":"4","author":"D Chen","year":"2017","unstructured":"Chen D, Zhang N, Qin Z, et al. S2M: a lightweight acoustic fingerprints-based wireless device authentication protocol. IEEE Internet Things J, 2017, 4: 88\u2013100","journal-title":"IEEE Internet Things J"},{"key":"3284_CR12","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1109\/TIFS.2018.2850334","volume":"14","author":"D Y Xu","year":"2019","unstructured":"Xu D Y, Ren P Y, Ritcey J A. Independence-checking coding for OFDM channel training authentication: protocol design, security, stability, and tradeoff analysis. IEEE Trans Inform Forensic Secur, 2019, 14: 387\u2013402","journal-title":"IEEE Trans Inform Forensic Secur"},{"key":"3284_CR13","first-page":"7","volume":"8","author":"W Tobi","year":"2020","unstructured":"Tobi W. Weak password policies: a lack of corporate social responsibility. J Colloq Inf Syst Sec Educ, 2020, 8: 7\u20138","journal-title":"J Colloq Inf Syst Sec Educ"},{"key":"3284_CR14","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1109\/TDSC.2014.2369033","volume":"12","author":"S V Radhakrishnan","year":"2015","unstructured":"Radhakrishnan S V, Uluagac A S, Beyah R. GTID: a technique for physical device and device type fingerprinting. IEEE Trans Dependable Secure Comput, 2015, 12: 519\u2013532","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"3284_CR15","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MWC.2019.1800405","volume":"26","author":"X Fan","year":"2019","unstructured":"Fan X, Wang F, Wang F, et al. When RFID meets deep learning: exploring cognitive intelligence for activity identification. IEEE Wireless Commun, 2019, 26: 19\u201325","journal-title":"IEEE Wireless Commun"},{"key":"3284_CR16","doi-asserted-by":"publisher","first-page":"1405","DOI":"10.1049\/el.2018.6404","volume":"54","author":"Q Wu","year":"2018","unstructured":"Wu Q, Feres C, Kuzmenko D, et al. Deep learning based RF fingerprinting for device identification and wireless security. Electron lett, 2018, 54: 1405\u20131407","journal-title":"Electron lett"},{"key":"3284_CR17","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MCOM.2018.1701277","volume":"56","author":"X Wang","year":"2018","unstructured":"Wang X, Wang X, Mao S. RF sensing in the Internet of Things: a general deep learning framework. IEEE Commun Mag, 2018, 56: 62\u201367","journal-title":"IEEE Commun Mag"},{"key":"3284_CR18","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1109\/JRFID.2018.2880457","volume":"2","author":"K Youssef","year":"2018","unstructured":"Youssef K, Bouchard L, Haigh K, et al. Machine learning approach to RF transmitter identification. IEEE J Radio Freq Identif, 2018, 2: 197\u2013205","journal-title":"IEEE J Radio Freq Identif"},{"key":"3284_CR19","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/IOTM.0001.1900065","volume":"3","author":"T Jian","year":"2020","unstructured":"Jian T, Rendon B C, Ojuba E, et al. Deep learning for RF fingerprinting: a massive experimental study. IEEE Internet Things M, 2020, 3: 50\u201357","journal-title":"IEEE Internet Things M"},{"key":"3284_CR20","doi-asserted-by":"crossref","unstructured":"Sankhe K, Belgiovine M, Zhou F, et al. Oracle: optimized radio classification through convolutional neural networks. In: Proceedings of IEEE Conference on Computer Communications, 2019. 370\u2013378","DOI":"10.1109\/INFOCOM.2019.8737463"},{"key":"3284_CR21","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1109\/JIOT.2018.2849324","volume":"6","author":"B Chatterjee","year":"2019","unstructured":"Chatterjee B, Das D, Maity S, et al. RF-PUF: enhancing IoT security through authentication of wireless nodes using in-situ machine learning. IEEE Internet Things J, 2019, 6: 388\u2013398","journal-title":"IEEE Internet Things J"},{"key":"3284_CR22","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1109\/MCOM.2018.1800153","volume":"56","author":"S Riyaz","year":"2018","unstructured":"Riyaz S, Sankhe K, Ioannidis S, et al. Deep learning convolutional neural networks for radio identification. IEEE Commun Mag, 2018, 56: 146\u2013152","journal-title":"IEEE Commun Mag"},{"key":"3284_CR23","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/TCCN.2019.2948919","volume":"6","author":"D Roy","year":"2020","unstructured":"Roy D, Mukherjee T, Chatterjee M, et al. RFAL: adversarial learning for RF transmitter identification and classification. IEEE Trans Cogn Commun Netw, 2020, 6: 783\u2013801","journal-title":"IEEE Trans Cogn Commun Netw"},{"key":"3284_CR24","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.ipl.2008.03.017","volume":"108","author":"R Cohen","year":"2008","unstructured":"Cohen R, Katzir L. The generalized maximum coverage problem. Inf Processing Lett, 2008, 108: 15\u201322","journal-title":"Inf Processing Lett"},{"key":"3284_CR25","doi-asserted-by":"publisher","first-page":"37632","DOI":"10.1109\/ACCESS.2020.2975310","volume":"8","author":"X Li","year":"2020","unstructured":"Li X, Dang Y, Aazam M, et al. Energy-efficient computation offloading in vehicular edge cloud computing. IEEE Access, 2020, 8: 37632\u201337644","journal-title":"IEEE Access"},{"key":"3284_CR26","doi-asserted-by":"crossref","unstructured":"He K, Sun J. Convolutional neural networks at constrained time cost. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015. 5353\u20135360","DOI":"10.1109\/CVPR.2015.7299173"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-021-3284-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-021-3284-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-021-3284-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T21:04:05Z","timestamp":1691183045000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-021-3284-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,20]]},"references-count":26,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["3284"],"URL":"https:\/\/doi.org\/10.1007\/s11432-021-3284-y","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,20]]},"assertion":[{"value":"4 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"170304"}}