Thirty years of machine learning: The road to Pareto-optimal wireless networks
Future wireless networks have a substantial potential in terms of supporting a broad range of
complex compelling applications both in military and civilian fields, where the users are able …
complex compelling applications both in military and civilian fields, where the users are able …
A survey of physical-layer authentication in wireless communications
N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
A survey of physical layer techniques for secure wireless communications in industry
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …
service production and delivery. Communications are not an exception. Wired systems …
PHY-layer spoofing detection with reinforcement learning in wireless networks
L Xiao, Y Li, G Han, G Liu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the PHY-layer authentication that exploits radio channel
information (such as received signal strength indicators) to detect spoofing attacks in …
information (such as received signal strength indicators) to detect spoofing attacks in …
Physical layer authentication in wireless communication networks: A survey
Physical layer security (PLS) in wireless communication systems has attracted extensive
research attentions in recent years. Unlike cryptography-based methods applied in upper …
research attentions in recent years. Unlike cryptography-based methods applied in upper …
PHY-layer authentication with multiple landmarks with reduced overhead
Physical (PHY)-layer authentication systems can exploit channel state information of radio
transmitters to detect spoofing attacks in wireless networks. The use of multiple landmarks …
transmitters to detect spoofing attacks in wireless networks. The use of multiple landmarks …
On securing underwater acoustic networks: A survey
S Jiang - IEEE Communications Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Underwater acoustic networks (UWANs) are often deployed in unattended and
untransparent or even hostile environments and face many security threats, while many …
untransparent or even hostile environments and face many security threats, while many …
Crowd-GPS-Sec: Leveraging crowdsourcing to detect and localize GPS spoofing attacks
The aviation industry's increasing reliance on GPS to facilitate navigation and air traffic
monitoring opens new attack vectors with the purpose of hijacking UAVs or interfering with …
monitoring opens new attack vectors with the purpose of hijacking UAVs or interfering with …
WIDS: An anomaly based intrusion detection system for Wi-Fi (IEEE 802.11) protocol
P Satam, S Hariri - IEEE Transactions on Network and Service …, 2020 - ieeexplore.ieee.org
Over the last few decades, the Internet has seen unprecedented growth, with over 4.57
billion active users as of July 2022, encompassing 59% of the global population. In recent …
billion active users as of July 2022, encompassing 59% of the global population. In recent …
Adaptive physical layer authentication using machine learning with antenna diversity
M Abdrabou, TA Gulliver - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The heterogeneous characteristics of wireless mobile networks within the Internet of things
(IoT) create authentication challenges due to the large number of devices with diverse …
(IoT) create authentication challenges due to the large number of devices with diverse …