Thirty years of machine learning: The road to Pareto-optimal wireless networks

J Wang, C Jiang, H Zhang, Y Ren… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Future wireless networks have a substantial potential in terms of supporting a broad range of
complex compelling applications both in military and civilian fields, where the users are able …

A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

A survey of physical layer techniques for secure wireless communications in industry

P Angueira, I Val, J Montalban, Ó Seijo… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …

PHY-layer spoofing detection with reinforcement learning in wireless networks

L Xiao, Y Li, G Han, G Liu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the PHY-layer authentication that exploits radio channel
information (such as received signal strength indicators) to detect spoofing attacks in …

Physical layer authentication in wireless communication networks: A survey

L Bai, L Zhu, J Liu, J Choi… - Journal of Communications …, 2020 - ieeexplore.ieee.org
Physical layer security (PLS) in wireless communication systems has attracted extensive
research attentions in recent years. Unlike cryptography-based methods applied in upper …

PHY-layer authentication with multiple landmarks with reduced overhead

L Xiao, X Wan, Z Han - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
Physical (PHY)-layer authentication systems can exploit channel state information of radio
transmitters to detect spoofing attacks in wireless networks. The use of multiple landmarks …

On securing underwater acoustic networks: A survey

S Jiang - IEEE Communications Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Underwater acoustic networks (UWANs) are often deployed in unattended and
untransparent or even hostile environments and face many security threats, while many …

Crowd-GPS-Sec: Leveraging crowdsourcing to detect and localize GPS spoofing attacks

K Jansen, M Schäfer, D Moser… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
The aviation industry's increasing reliance on GPS to facilitate navigation and air traffic
monitoring opens new attack vectors with the purpose of hijacking UAVs or interfering with …

WIDS: An anomaly based intrusion detection system for Wi-Fi (IEEE 802.11) protocol

P Satam, S Hariri - IEEE Transactions on Network and Service …, 2020 - ieeexplore.ieee.org
Over the last few decades, the Internet has seen unprecedented growth, with over 4.57
billion active users as of July 2022, encompassing 59% of the global population. In recent …

Adaptive physical layer authentication using machine learning with antenna diversity

M Abdrabou, TA Gulliver - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The heterogeneous characteristics of wireless mobile networks within the Internet of things
(IoT) create authentication challenges due to the large number of devices with diverse …