Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3213593
Abstract: Recently, physical-layer authentication (PLA) has attracted much attention since it takes advantage of the channel randomness nature of transmission media to achieve communication confidentiality and authentication. In the complex environment, such as the Industrial Internet…
read more here.
Keywords:
authentication;
hierarchical variational;
physical layer;
layer authentication ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2022.3170509
Abstract: The broadcast nature of wireless communication makes it vulnerable to various security threats such as spoofing attacks. Physical layer (PL) authentication has emerged as a promising and powerful approach to secure future wireless technologies for…
read more here.
Keywords:
authentication;
authentication scheme;
signature;
physical layer ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2022.3180901
Abstract: CSI-Based physical layer authentication is a promising candidate to achieve fast and lightweight authentication for wireless communication. However, the current methods usually cannot achieve initial authentication and are susceptible to channel noise. Besides, the current…
read more here.
Keywords:
authentication;
physical layer;
layer authentication;
deep learning ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Communications"
DOI: 10.1109/tcomm.2022.3196648
Abstract: The heterogeneous characteristics of wireless mobile networks within the Internet of things (IoT) create authentication challenges due to the large number of devices with diverse requirements and capabilities. Physical layer authentication (PLA) can provide solutions…
read more here.
Keywords:
authentication;
antenna diversity;
machine;
physical layer ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Communications"
DOI: 10.1109/tcomm.2022.3200599
Abstract: The promising physical-layer authentication (PLA) scheme enjoys low computational complexity and provides a lightweight solution for the wireless transmission security problem. However, the ideal but impractical assumptions are made on the priori knowledge in the…
read more here.
Keywords:
authentication;
sample characteristics;
physical layer;
layer authentication ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Communications"
DOI: 10.1109/tcomm.2022.3216634
Abstract: This paper concerns the problem of improving compatibility in the tag-based Physical-Layer Authentication (PLA) without sacrificing robustness of the PLA schemes. The prior PLA schemes for improving compatibility often sacrifice robustness or introduce extra communication…
read more here.
Keywords:
tag based;
physical layer;
layer authentication;
compatibility ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Communications"
DOI: 10.1109/tcomm.2023.3259439
Abstract: Spatial Modulation (SM) is a promising low-complexity modulation scheme for Multiple-Input Multiple-Output (MIMO) systems. In this paper, we address the problem of authenticating the transmitter device in the SM. We propose an authentication approach for…
read more here.
Keywords:
authentication;
pla;
physical layer;
spatial modulation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "International Journal of Distributed Sensor Networks"
DOI: 10.1177/15501329221107822
Abstract: With the number of Internet of Things devices continually increasing, the endogenous security of Internet of Things communication systems is growingly critical. Physical layer authentication is a powerful means of resisting active attacks by exploiting…
read more here.
Keywords:
authentication;
threshold free;
physical layer;
layer authentication ... See more keywords