{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T07:46:38Z","timestamp":1767771998019,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T00:00:00Z","timestamp":1567555200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T00:00:00Z","timestamp":1567555200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61602113"],"award-info":[{"award-number":["61602113"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61601114"],"award-info":[{"award-number":["61601114"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61571110"],"award-info":[{"award-number":["61571110"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1542-x","type":"journal-article","created":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T13:04:42Z","timestamp":1567602282000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":47,"title":["Physical layer identification of LoRa devices using constellation trace figure"],"prefix":"10.1186","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8254-6792","authenticated-orcid":false,"given":"Yu","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Linning","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Aiqun","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,4]]},"reference":[{"key":"1542_CR1","first-page":"2454","volume":"4","author":"A. Tiwary","year":"2018","unstructured":"A. Tiwary, M. Mahato, A. Chidar, M. K. Chandrol, M. Shrivastava, M. Tripathi, Internet of things (iot): research, architectures and applications. Int. J. Futur. Revolution. Comput. Sci. Commun. Eng.4:, 2454\u20134248 (2018).","journal-title":"Int. J. Futur. Revolution. Comput. Sci. Commun. Eng."},{"key":"1542_CR2","doi-asserted-by":"publisher","first-page":"43021","DOI":"10.1109\/ACCESS.2018.2863050","volume":"6","author":"C. Yan","year":"2018","unstructured":"C. Yan, X. Cui, L. Qi, X. Xu, X. Zhang, Privacy-aware data publishing and integration for collaborative service recommendation. IEEE Access. 6:, 43021\u201343028 (2018).","journal-title":"IEEE Access"},{"key":"1542_CR3","first-page":"1","volume":"2018","author":"W. Gong","year":"2018","unstructured":"W. Gong, L. Qi, Y. Xu, Privacy-aware multidimensional mobile service quality prediction and recommendation in distributed fog environment. Wirel. Commun. Mob. Comput.2018:, 1\u20138 (2018).","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"1542_CR4","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.ins.2018.11.030","volume":"480","author":"L. Qi","year":"2019","unstructured":"L. Qi, R. Wang, C. Hu, S. Li, Q. He, X. Xu, Time-aware distributed service recommendation with privacy-preservation. Inf. Sci. 480:, 354\u2013364 (2019).","journal-title":"Inf. Sci"},{"key":"1542_CR5","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1016\/j.future.2018.02.050","volume":"88","author":"L. Qi","year":"2018","unstructured":"L. Qi, X. Zhang, W. Dou, C. Hu, C. Yang, J. Chen, A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment. Futur. Gener. Comput. Syst. Int. J. Escience. 88:, 636\u2013643 (2018).","journal-title":"Futur. Gener. Comput. Syst. Int. J. Escience"},{"key":"1542_CR6","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.future.2017.07.060","volume":"78","author":"M. Conti","year":"2018","unstructured":"M. Conti, A. Dehghantanha, K. Franke, S. Watson, Internet of Things security and forensics: challenges and opportunities. Futur. Gener. Comput. Syst.78:, 544\u2013546 (2018).","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"11","key":"1542_CR7","doi-asserted-by":"publisher","first-page":"2616","DOI":"10.1109\/JSAC.2017.2760458","volume":"35","author":"L. Qi","year":"2017","unstructured":"L. Qi, X. Zhang, W. Dou, Q. Ni, A Distributed locality-sensitive hashing-based approach for cloud service recommendation from multi-source data. IEEE J Sel. Areas Commun.35(11), 2616\u20132624 (2017).","journal-title":"IEEE J Sel. Areas Commun."},{"key":"1542_CR8","doi-asserted-by":"publisher","unstructured":"L. Qi, Y. Chen, Y. Yuan, S. Fu, X. Zhang, X. Xu, A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems. World Wide Web J. (2019). \n                    https:\/\/doi.org\/10.1007\/s11280-019-00684-y\n                    \n                  .","DOI":"10.1007\/s11280-019-00684-y"},{"issue":"7","key":"1542_CR9","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.3390\/s18072037","volume":"18","author":"Lianyong Qi","year":"2018","unstructured":"L. Qi, S. Meng, X. Zhang, R. Wang, X. Xu, Z. Zhou, W. Dou, An exception handling approach for privacy-preserving service recommendation failure in a cloud environment. Sensors. 18(7) (2018).","journal-title":"Sensors"},{"key":"1542_CR10","doi-asserted-by":"publisher","first-page":"46926","DOI":"10.1109\/ACCESS.2018.2866641","volume":"6","author":"L. Qi","year":"2018","unstructured":"L. Qi, W. Dou, W. Wang, G. Li, H. Yu, S. Wan, Dynamic mobile crowdsourcing selection for electricity load forecasting. IEEE Access. 6:, 46926\u201346937 (2018).","journal-title":"IEEE Access"},{"key":"1542_CR11","doi-asserted-by":"publisher","unstructured":"A. Dorri, S. S. Kanhere, R. Jurdak, P. Gauravaram, in 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). Blockchain for iot security and privacy: The case study of a smart home (IEEE, 2017), pp. 618\u2013623. \n                    https:\/\/doi.org\/10.1109\/percomw.2017.7917634\n                    \n                  .","DOI":"10.1109\/percomw.2017.7917634"},{"key":"1542_CR12","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"M. A. Khan","year":"2018","unstructured":"M. A. Khan, K. Salah, Iot security: Review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst.82:, 395\u2013411 (2018).","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1542_CR13","doi-asserted-by":"publisher","unstructured":"R. Mahmoud, T. Yousuf, F. Aloul, I. Zualkernan, in 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). Internet of things (iot) security: Current status, challenges and prospective measures (IEEE, 2015), pp. 336\u2013341. \n                    https:\/\/doi.org\/10.1109\/icitst.2015.7412116\n                    \n                  .","DOI":"10.1109\/icitst.2015.7412116"},{"issue":"3","key":"1542_CR14","doi-asserted-by":"publisher","first-page":"635","DOI":"10.32604\/cmc.2018.03754","volume":"57","author":"C. Shi","year":"2018","unstructured":"C. Shi, A novel ensemble learning algorithm based on DS evidence theory for IoT security. Comput. Mater. Continua. 57(3), 635\u2013652 (2018).","journal-title":"Comput. Mater. Continua"},{"issue":"3","key":"1542_CR15","doi-asserted-by":"publisher","first-page":"679","DOI":"10.32604\/cmc.2019.06106","volume":"58","author":"B. Wang","year":"2019","unstructured":"B. Wang, W. Kong, W. Li, N. N. Xiong, A dual-chaining watermark scheme for data integrity protection in internet of things. CMC-Comput. Mater. Continua. 58(3), 679\u2013695 (2019).","journal-title":"CMC-Comput. Mater. Continua"},{"issue":"2","key":"1542_CR16","doi-asserted-by":"publisher","first-page":"545","DOI":"10.32604\/cmc.2019.03760","volume":"58","author":"L. Kou","year":"2019","unstructured":"L. Kou, Y. Shi, L. Zhang, D. Liu, Q. Yang, A lightweight three-factor user authentication protocol for the information perception of IoT. CMC-Comput. Mater. Continua. 58(2), 545\u2013565 (2019).","journal-title":"CMC-Comput. Mater. Continua"},{"key":"1542_CR17","first-page":"1","volume-title":"2016 17th International Conference on Mechatronics-Mechatronika (ME)","author":"L. Krupka","year":"2016","unstructured":"L. Krupka, L. Vojtech, M. Neruda, in 2016 17th International Conference on Mechatronics-Mechatronika (ME). The issue of lpwan technology coexistence in iot environment (IEEEPrague, 2016), pp. 1\u20138."},{"key":"1542_CR18","unstructured":"M. C. Bor, J. Vidler, U. Roedig, in LoRa for the internet of things. International Conference on Embedded Wireless Systems and Networks (EWSN), vol. 16 (Graz, 2016), pp. 361\u2013366."},{"issue":"1","key":"1542_CR19","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.icte.2017.03.004","volume":"3","author":"R. S. Sinha","year":"2017","unstructured":"R. S. Sinha, Y. Wei, S. -H. Hwang, A survey on LPWA technology: LoRa and NB-IoT. Ict Express. 3(1), 14\u201321 (2017).","journal-title":"Ict Express"},{"key":"1542_CR20","unstructured":"N Sornin, M Luis, T Eirich, et al., in LoRaWAN specification. LoRa alliance (2015)."},{"key":"1542_CR21","first-page":"1","volume-title":"2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech)","author":"J. de Carvalho Silva","year":"2017","unstructured":"J. de Carvalho Silva, J. J. Rodrigues, A. M. Alberti, P. Solic, A. L. Aquino, in 2017 2nd International Multidisciplinary Conference on Computer and Energy Science (SpliTech). LoRaWAN-a low power wan protocol for internet of things: A review and opportunities (IEEESplit, 2017), pp. 1\u20136."},{"issue":"3","key":"1542_CR22","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MWC.2017.1600421","volume":"24","author":"I. Yaqoob","year":"2017","unstructured":"I. Yaqoob, E. Ahmed, I. A. T. Hashem, A. I. A. Ahmed, A. Gani, M. Imran, M. Guizani, Internet of things architecture: recent advances, taxonomy, requirements, and open challenges. IEEE Wirel. Commun.24(3), 10\u201316 (2017).","journal-title":"IEEE Wirel. Commun."},{"key":"1542_CR23","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1016\/j.procs.2015.05.099","volume":"52","author":"F. Olivier","year":"2015","unstructured":"F. Olivier, G. Carlos, N. Florent, New security architecture for IoT network. Procedia Comput. Sci.52:, 1028\u20131033 (2015).","journal-title":"Procedia Comput. Sci."},{"issue":"4","key":"1542_CR24","doi-asserted-by":"publisher","first-page":"34","DOI":"10.3390\/cryptography2040034","volume":"2","author":"J. Han","year":"2018","unstructured":"J. Han, J. Wang, An enhanced key management scheme for LoRaWAN. Cryptography. 2(4), 34 (2018).","journal-title":"Cryptography"},{"issue":"6","key":"1542_CR25","doi-asserted-by":"publisher","first-page":"1833","DOI":"10.3390\/s18061833","volume":"18","author":"R. Sanchez-Iborra","year":"2018","unstructured":"R. Sanchez-Iborra, J. S\u00e1nchez-G\u00f3mez, S. P\u00e9rez, P. Fern\u00e1ndez, J. Santa, J. Hern\u00e1ndez-Ramos, A. Skarmeta, Enhancing LoRaWAN security through a lightweight and authenticated key management approach. Sensors. 18(6), 1833 (2018).","journal-title":"Sensors"},{"key":"1542_CR26","unstructured":"L. S. Laufenberg, Impersonating LoRaWAN gateways using Semtech Packet Forwarder (2019). arXiv preprint arXiv:1904.10728."},{"key":"1542_CR27","doi-asserted-by":"publisher","unstructured":"E. Aras, G. S. Ramachandran, P. Lawrence, D. Hughes, in 2017 3rd IEEE International Conference on Cybernetics (CYBCONF). Exploring the security vulnerabilities of LoRa (IEEE, 2017), pp. 1\u20136. \n                    https:\/\/doi.org\/10.1109\/cybconf.2017.7985777\n                    \n                  .","DOI":"10.1109\/cybconf.2017.7985777"},{"key":"1542_CR28","doi-asserted-by":"publisher","unstructured":"T. Stefano, Z. Simone, V. Lorenzo, in IEEE Wireless Communications and Networking Conference Workshops (WCNCW). Security analysis of LoRaWANTM Join Procedure for Internet of Things Networks, (2017). \n                    https:\/\/doi.org\/10.1109\/wcncw.2017.7919091\n                    \n                  .","DOI":"10.1109\/wcncw.2017.7919091"},{"key":"1542_CR29","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1016\/j.comnet.2018.11.017","volume":"148","author":"M. Eldefrawy","year":"2019","unstructured":"M. Eldefrawy, I. Butun, N. Pereira, M. Gidlund, Formal security analysis of LoRaWAN. Comput. Netw.148:, 328\u2013339 (2019).","journal-title":"Comput. Netw."},{"key":"1542_CR30","doi-asserted-by":"publisher","unstructured":"V. Brik, S. Banerjee, M. Gruteser, S. Oh, in Proceedings of the 14th ACM International Conference on Mobile Computing and Networking. Wireless device identification with radiometric signatures (ACM, 2008), pp. 116\u2013127. \n                    https:\/\/doi.org\/10.1145\/1409944.1409959\n                    \n                  .","DOI":"10.1145\/1409944.1409959"},{"key":"1542_CR31","doi-asserted-by":"publisher","unstructured":"T. D. Vo-Huu, T. D. Vo-Huu, G. Noubir, in Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks. Fingerprinting Wi-Fi devices using software defined radios (ACM, 2016), pp. 3\u201314. \n                    https:\/\/doi.org\/10.1145\/2939918.2939936\n                    \n                  .","DOI":"10.1145\/2939918.2939936"},{"key":"1542_CR32","doi-asserted-by":"publisher","unstructured":"L. Peng, A. Hu, Y. Jiang, Y. Yan, C. Zhu, in 2016 8th International Conference on Wireless Communications & Signal Processing (WCSP). A differential constellation trace figure based device identification method for ZigBee nodes (IEEE, 2016), pp. 1\u20136. \n                    https:\/\/doi.org\/10.1109\/wcsp.2016.7752534\n                    \n                  .","DOI":"10.1109\/wcsp.2016.7752534"},{"key":"1542_CR33","doi-asserted-by":"publisher","unstructured":"P. Robyns, E. Marin, W. Lamotte, P. Quax, D. Singel\u00e9e, B. Preneel, in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning (ACM, 2017), pp. 58\u201363. \n                    https:\/\/doi.org\/10.1145\/3098243.3098267\n                    \n                  .","DOI":"10.1145\/3098243.3098267"},{"key":"1542_CR34","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.jnca.2018.09.006","volume":"124","author":"X. Xu","year":"2018","unstructured":"X. Xu, S. Fu, L. Qi, X. Zhang, Q. Liu, Q. He, S. Li, An IoT-oriented data placement method with privacy preservation in cloud environment. J. Netw. Comput. Appl.124:, 148\u2013157 (2018).","journal-title":"J. Netw. Comput. Appl."},{"key":"1542_CR35","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.future.2019.01.012","volume":"96","author":"X. Xu","year":"2019","unstructured":"X. Xu, Y. Xue, L. Qi, Y. Yuan, X. Zhang, T. Umer, S. Wan, An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Futur. Gener. Comput. Syst.96:, 89\u2013100 (2019).","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1542_CR36","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1016\/j.future.2018.12.055","volume":"95","author":"X. Xu","year":"2019","unstructured":"X. Xu, Q. Liu, Y. Luo, K. Peng, X. Zhang, S. Meng, L. Qi, A computation offloading method over big data for IoT-enabled cloud-edge computing. Futur. Gener. Comput. Syst.95:, 522\u2013533 (2019).","journal-title":"Futur. Gener. Comput. Syst."},{"key":"1542_CR37","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.jnca.2019.02.008","volume":"133","author":"X. Xu","year":"2019","unstructured":"X. Xu, Y. Li, T. Huang, Y. Xue, K. Peng, L. Qi, W. Dou, An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks. J. Netw. Comput. Appl.133:, 75\u201385 (2019).","journal-title":"J. Netw. Comput. Appl."},{"issue":"9","key":"1542_CR38","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.3390\/s16091466","volume":"16","author":"A. Augustin","year":"2016","unstructured":"A. Augustin, J. Yi, T. Clausen, W. Townsley, A study of LoRa: long range & low power networks for the internet of things. Sensors. 16(9), 1466 (2016).","journal-title":"Sensors"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1542-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1542-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1542-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,2]],"date-time":"2020-09-02T23:07:46Z","timestamp":1599088066000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1542-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,4]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1542"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1542-x","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2019,9,4]]},"assertion":[{"value":"16 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"223"}}