A survey of physical-layer authentication in wireless communications
N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
Physical layer authentication in wireless communication networks: A survey
Physical layer security (PLS) in wireless communication systems has attracted extensive
research attentions in recent years. Unlike cryptography-based methods applied in upper …
research attentions in recent years. Unlike cryptography-based methods applied in upper …
Physical-layer authentication using multiple channel-based features
This paper concerns the problem of authenticating the transmitter without a secret key. In
comparison with traditional cryptographic-based authentication mechanisms, the Physical …
comparison with traditional cryptographic-based authentication mechanisms, the Physical …
Physical-layer authentication for wireless security enhancement: Current challenges and future developments
While the open nature of radio propagation enables convenient “anywhere” wireless access,
it becomes the root of security vulnerabilities in wireless communications. In light of this …
it becomes the root of security vulnerabilities in wireless communications. In light of this …
Wireless physical-layer identification: Modeling and validation
The wireless physical-layer identification (WPLI) techniques utilize the unique features of the
physical waveforms of wireless signals to identify and classify authorized devices. As the …
physical waveforms of wireless signals to identify and classify authorized devices. As the …
Learning-aided physical layer authentication as an intelligent process
Performance of the existing physical layer authentication schemes could be severely
affected by the imperfect estimates and variations of the communication link attributes used …
affected by the imperfect estimates and variations of the communication link attributes used …
CSI-based physical layer authentication via deep learning
S Wang, K Huang, X Xu, Z Zhong… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
CSI-Based physical layer authentication is a promising candidate to achieve fast and
lightweight authentication for wireless communication. However, the current methods …
lightweight authentication for wireless communication. However, the current methods …
Multiple correlated attributes based physical layer authentication in wireless networks
Physical (PHY) layer authentication has been a significant trend towards ensuring the
identity security of terminals in wireless networks due to the high security and low …
identity security of terminals in wireless networks due to the high security and low …
Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing
The wireless medium offers many opportunities for broadcast communications. However, it
also opens the possibility for attackers to eavesdrop the broadcast data or to pretend to be …
also opens the possibility for attackers to eavesdrop the broadcast data or to pretend to be …
Adaptive physical layer authentication using machine learning with antenna diversity
M Abdrabou, TA Gulliver - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The heterogeneous characteristics of wireless mobile networks within the Internet of things
(IoT) create authentication challenges due to the large number of devices with diverse …
(IoT) create authentication challenges due to the large number of devices with diverse …