A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

Physical layer authentication in wireless communication networks: A survey

L Bai, L Zhu, J Liu, J Choi… - Journal of Communications …, 2020 - ieeexplore.ieee.org
Physical layer security (PLS) in wireless communication systems has attracted extensive
research attentions in recent years. Unlike cryptography-based methods applied in upper …

Physical-layer authentication using multiple channel-based features

N Xie, J Chen, L Huang - IEEE transactions on information …, 2021 - ieeexplore.ieee.org
This paper concerns the problem of authenticating the transmitter without a secret key. In
comparison with traditional cryptographic-based authentication mechanisms, the Physical …

Physical-layer authentication for wireless security enhancement: Current challenges and future developments

X Wang, P Hao, L Hanzo - IEEE Communications Magazine, 2016 - ieeexplore.ieee.org
While the open nature of radio propagation enables convenient “anywhere” wireless access,
it becomes the root of security vulnerabilities in wireless communications. In light of this …

Wireless physical-layer identification: Modeling and validation

W Wang, Z Sun, S Piao, B Zhu… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
The wireless physical-layer identification (WPLI) techniques utilize the unique features of the
physical waveforms of wireless signals to identify and classify authorized devices. As the …

Learning-aided physical layer authentication as an intelligent process

H Fang, X Wang, L Hanzo - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Performance of the existing physical layer authentication schemes could be severely
affected by the imperfect estimates and variations of the communication link attributes used …

CSI-based physical layer authentication via deep learning

S Wang, K Huang, X Xu, Z Zhong… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
CSI-Based physical layer authentication is a promising candidate to achieve fast and
lightweight authentication for wireless communication. However, the current methods …

Multiple correlated attributes based physical layer authentication in wireless networks

S Xia, X Tao, N Li, S Wang, T Sui, H Wu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Physical (PHY) layer authentication has been a significant trend towards ensuring the
identity security of terminals in wireless networks due to the high security and low …

Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing

E Jorswieck, S Tomasin, A Sezgin - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
The wireless medium offers many opportunities for broadcast communications. However, it
also opens the possibility for attackers to eavesdrop the broadcast data or to pretend to be …

Adaptive physical layer authentication using machine learning with antenna diversity

M Abdrabou, TA Gulliver - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The heterogeneous characteristics of wireless mobile networks within the Internet of things
(IoT) create authentication challenges due to the large number of devices with diverse …