Integrity Regions: Authentication through Presence in Wireless Networks | IEEE Journals & Magazine | IEEE Xplore