{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T10:00:00Z","timestamp":1774173600285,"version":"3.50.1"},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.comnet.2026.112174","type":"journal-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T16:57:04Z","timestamp":1773075424000},"page":"112174","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Enhancing the performance of physical layer authentication through RIS in wireless networks"],"prefix":"10.1016","volume":"280","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-8065-4378","authenticated-orcid":false,"given":"Hala","family":"Amin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2443-1302","authenticated-orcid":false,"given":"Waqas","family":"Aman","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4402-7710","authenticated-orcid":false,"given":"Saif","family":"Al-Kuwari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0767-2478","authenticated-orcid":false,"given":"Marwa","family":"Qaraqe","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.comnet.2026.112174_bib0001","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/COMST.2023.3249835","article-title":"On the road to 6G: visions, requirements, key technologies, and testbeds","volume":"25","author":"Wang","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.comnet.2026.112174_bib0002","doi-asserted-by":"crossref","first-page":"55765","DOI":"10.1109\/ACCESS.2018.2872781","article-title":"5G wireless network slicing for eMBB, URLLC, and mMTC: a communication-theoretic view","volume":"6","author":"Popovski","year":"2018","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.comnet.2026.112174_bib0003","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MCOMSTD.0001.2100041","article-title":"Customized 5G and beyond private networks with integrated URLLC, eMBB, mMTC, and positioning for industrial verticals","volume":"6","author":"Guo","year":"2022","journal-title":"IEEE Commun. Standards Magaz."},{"key":"10.1016\/j.comnet.2026.112174_bib0004","doi-asserted-by":"crossref","first-page":"116753","DOI":"10.1109\/ACCESS.2019.2935192","article-title":"Wireless communications through reconfigurable intelligent surfaces","volume":"7","author":"Basar","year":"2019","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.comnet.2026.112174_bib0005","doi-asserted-by":"crossref","first-page":"1546","DOI":"10.1109\/COMST.2021.3077737","article-title":"Reconfigurable intelligent surfaces: principles and opportunities","volume":"23","author":"Liu","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"10.1016\/j.comnet.2026.112174_bib0006","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1109\/LCOMM.2023.3332173","article-title":"On the downlink coverage performance of RIS-Assisted THz networks","volume":"28","author":"Aman","year":"2024","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.comnet.2026.112174_bib0007","doi-asserted-by":"crossref","DOI":"10.1016\/j.phycom.2021.101339","article-title":"On the effective capacity of IRS-assisted wireless communication","volume":"47","author":"Aman","year":"2021","journal-title":"Phys. Commun."},{"issue":"11","key":"10.1016\/j.comnet.2026.112174_bib0008","doi-asserted-by":"crossref","first-page":"2275","DOI":"10.1109\/LWC.2022.3199593","article-title":"On the ergodic secrecy capacity of intelligent reflecting surface aided wireless powered communication systems","volume":"11","author":"Cao","year":"2022","journal-title":"IEEE Wireless Commun. Lett."},{"issue":"10","key":"10.1016\/j.comnet.2026.112174_bib0009","doi-asserted-by":"crossref","first-page":"9517","DOI":"10.1109\/TCOMM.2025.3548690","article-title":"Double-RIS enabled physical layer security for wireless-powered communication systems over Rayleigh fading channels","volume":"73","author":"Chen","year":"2025","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/j.comnet.2026.112174_bib0010","doi-asserted-by":"crossref","first-page":"1094","DOI":"10.1109\/OJCOMS.2021.3078081","article-title":"The roadmap to 6G security and privacy","volume":"2","author":"Porambage","year":"2021","journal-title":"IEEE Open J. Commun. Soc."},{"issue":"1","key":"10.1016\/j.comnet.2026.112174_bib0011","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/COMST.2023.3327327","article-title":"Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks","volume":"26","author":"Illi","year":"2024","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"11","key":"10.1016\/j.comnet.2026.112174_bib0012","doi-asserted-by":"crossref","first-page":"1261","DOI":"10.3390\/e22111261","article-title":"An overview of key technologies in physical layer security","volume":"22","author":"Sanenga","year":"2020","journal-title":"Entropy"},{"issue":"10","key":"10.1016\/j.comnet.2026.112174_bib0013","doi-asserted-by":"crossref","first-page":"1702","DOI":"10.1109\/JPROC.2015.2469602","article-title":"Broadcasting into the uncertainty: authentication and confidentiality by physical-layer processing","volume":"103","author":"Jorswieck","year":"2015","journal-title":"Proc. IEEE"},{"issue":"1","key":"10.1016\/j.comnet.2026.112174_bib0014","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1109\/COMST.2020.3042188","article-title":"A survey of physical-layer authentication in wireless communications","volume":"23","author":"Xie","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.comnet.2026.112174_bib0015","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2023.103114","article-title":"Security of underwater and air\u2013water wireless communication: state-of-the-art, challenges and outlook","volume":"142","author":"Aman","year":"2023","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.comnet.2026.112174_bib0016","series-title":"International Symposium on Networks, Computers and Communications (ISNCC)","first-page":"1","article-title":"Hybrid PLS-ML authentication scheme for V2I communication networks","author":"Amin","year":"2023"},{"issue":"10","key":"10.1016\/j.comnet.2026.112174_bib0017","doi-asserted-by":"crossref","first-page":"12296","DOI":"10.1109\/TVT.2020.3007521","article-title":"Secrecy performance analysis of RIS-aided wireless communication systems","volume":"69","author":"Yang","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"10.1016\/j.comnet.2026.112174_bib0018","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1109\/JSYST.2022.3153932","article-title":"Physical layer security for RIS-Aided wireless communications with uncertain eavesdropper distributions","volume":"17","author":"Gu","year":"2023","journal-title":"IEEE Syst. J."},{"issue":"4","key":"10.1016\/j.comnet.2026.112174_bib0019","doi-asserted-by":"crossref","first-page":"5415","DOI":"10.1109\/TII.2023.3333842","article-title":"Secrecy performance analysis of RIS-aided smart grid communications","volume":"20","author":"Kaveh","year":"2024","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"6","key":"10.1016\/j.comnet.2026.112174_bib0020","doi-asserted-by":"crossref","first-page":"3637","DOI":"10.1109\/TCOMM.2023.3251345","article-title":"Robust beamforming design for RIS-aided NOMA secure networks with transceiver hardware impairments","volume":"71","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Commun."},{"issue":"12","key":"10.1016\/j.comnet.2026.112174_bib0021","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1109\/MCOM.001.2200339","article-title":"Challenge-response physical layer authentication over partially controllable channels","volume":"60","author":"Tomasin","year":"2022","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.comnet.2026.112174_bib0022","series-title":"IEEE 97th Vehicular Technology Conference (VTC2023-Spring)","first-page":"1","article-title":"Physical layer authentication with simultaneous reflecting and sensing RIS","author":"Selim","year":"2023"},{"issue":"6","key":"10.1016\/j.comnet.2026.112174_bib0023","doi-asserted-by":"crossref","first-page":"4778","DOI":"10.1109\/TDSC.2022.3233862","article-title":"Tag-based PHY-layer authentication for RIS-assisted communication systems","volume":"20","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.comnet.2026.112174_bib0024","series-title":"2024 IEEE 99th Vehicular Technology Conference (VTC2024-Spring)","first-page":"1","article-title":"Reconfigurable intelligent surface-aided physical layer authentication with deep learning","author":"Liu","year":"2024"},{"key":"10.1016\/j.comnet.2026.112174_bib0025","series-title":"2024 IEEE International Conference on Communications Workshops (ICC Workshops)","first-page":"560","article-title":"Physical-layer challenge-response authentication with IRS and single-antenna devices","author":"Guglielmi","year":"2024"},{"key":"10.1016\/j.comnet.2026.112174_bib0026","doi-asserted-by":"crossref","first-page":"9494","DOI":"10.1109\/TIFS.2024.3471185","article-title":"Analysis of challenge-response authentication with reconfigurable intelligent surfaces","volume":"19","author":"Tomasin","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comnet.2026.112174_bib0027","series-title":"2024 IEEE International Conference on Communications Workshops (ICC Workshops)","first-page":"1986","article-title":"Divergence-minimizing attack against challenge-response authentication with IRSs","author":"Crosara","year":"2024"},{"issue":"14","key":"10.1016\/j.comnet.2026.112174_bib0028","doi-asserted-by":"crossref","first-page":"24984","DOI":"10.1109\/JIOT.2024.3390098","article-title":"Enhancing PHY-layer authentication in RIS-assisted IoT systems with cascaded channel features","volume":"11","author":"He","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"10.1016\/j.comnet.2026.112174_bib0029","doi-asserted-by":"crossref","first-page":"2260","DOI":"10.1109\/LWC.2024.3411108","article-title":"How to leverage double-Structured sparsity of RIS channels to boost physical-Layer authentication","volume":"13","author":"Bendaimi","year":"2024","journal-title":"IEEE Wireless Commun. Lett."},{"issue":"2","key":"10.1016\/j.comnet.2026.112174_bib0030","doi-asserted-by":"crossref","first-page":"2603","DOI":"10.1109\/TCE.2025.3557239","article-title":"Efficient gaussian process classification-based physical-layer authentication with configurable fingerprints for 6G-enabled IoT","volume":"71","author":"Meng","year":"2025","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"6","key":"10.1016\/j.comnet.2026.112174_bib0031","doi-asserted-by":"crossref","first-page":"1728","DOI":"10.1109\/JSAC.2022.3156632","article-title":"Integrated sensing and communications: toward dual-functional wireless networks for 6G and beyond","volume":"40","author":"Liu","year":"2022","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"5","key":"10.1016\/j.comnet.2026.112174_bib0032","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1109\/LWC.2019.2960779","article-title":"Intelligent reflecting surfaces: physics, propagation, and pathloss modeling","volume":"9","author":"\u00d6zdogan","year":"2019","journal-title":"IEEE Wireless Commun. Lett."},{"issue":"1","key":"10.1016\/j.comnet.2026.112174_bib0033","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TDSC.2018.2883598","article-title":"Security model of authentication at the physical layer and performance analysis over fading channels","volume":"18","author":"Xie","year":"2018","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.comnet.2026.112174_bib0034","doi-asserted-by":"crossref","first-page":"1506","DOI":"10.1109\/TIFS.2020.3033454","article-title":"Comparison of statistical and machine learning techniques for physical layer authentication","volume":"16","author":"Senigagliesi","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"6","key":"10.1016\/j.comnet.2026.112174_bib0035","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/MNET.011.2000122","article-title":"Physical layer authentication for 5G communications: opportunities and road ahead","volume":"34","author":"Wang","year":"2020","journal-title":"IEEE Netw."},{"key":"10.1016\/j.comnet.2026.112174_bib0036","series-title":"IEEE Latin-American Conference on Communications (LATINCOM)","first-page":"1","article-title":"SimRIS channel simulator for reconfigurable intelligent surface-empowered communication systems","author":"Basar","year":"2020"},{"issue":"12","key":"10.1016\/j.comnet.2026.112174_bib0037","doi-asserted-by":"crossref","first-page":"8600","DOI":"10.1109\/TCOMM.2021.3113954","article-title":"Indoor and outdoor physical channel modeling and efficient positioning for reconfigurable intelligent surfaces in mmwave bands","volume":"69","author":"Basar","year":"2021","journal-title":"IEEE Trans. Commun."},{"issue":"3","key":"10.1016\/j.comnet.2026.112174_bib0038","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/MWC.001.2000338","article-title":"Reconfigurable intelligent surfaces for future wireless networks: a channel modeling perspective","volume":"28","author":"Basar","year":"2021","journal-title":"IEEE Wireless Commun."},{"issue":"5","key":"10.1016\/j.comnet.2026.112174_bib0039","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/JRPROC.1946.234568","article-title":"A note on a simple transmission formula","volume":"34","author":"Friis","year":"1946","journal-title":"Proc. IRE"},{"issue":"13","key":"10.1016\/j.comnet.2026.112174_bib0040","doi-asserted-by":"crossref","first-page":"14691","DOI":"10.1109\/JSEN.2023.3274687","article-title":"Countering active attacks on RAFT-based IoT blockchain networks","volume":"23","author":"Buttar","year":"2023","journal-title":"IEEE Sens. J."},{"key":"10.1016\/j.comnet.2026.112174_bib0041","series-title":"IEEE 85th Vehicular Technology Conference (VTC Spring)","first-page":"1","article-title":"Channel impulse response-based distributed physical layer authentication","author":"Mahmood","year":"2017"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626001866?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626001866?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T09:43:11Z","timestamp":1774172591000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128626001866"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":41,"alternative-id":["S1389128626001866"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112174","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Enhancing the performance of physical layer authentication through RIS in wireless networks","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112174","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112174"}}