Security enhancement for mobile edge computing through physical layer authentication

RF Liao, H Wen, J Wu, F Pan, A Xu, H Song… - IEEE …, 2019 - ieeexplore.ieee.org
… 2 (b), we propose a mobile edge computing attack scenario in IoT that can be solved by the
physical layer data authentication. Attacker impersonates edge node 1 via claiming its media …

A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… -factor authentication system with both authentication mechanisms at the physical layer and
those at the upper layers… Specifically, the upper-layer authentication mechanism is used to …

Light-weight physical layer enhanced security schemes for 5G wireless networks

J Tang, H Wen, K Zeng, R Liao, F Pan, L Hu - IEEE Network, 2019 - ieeexplore.ieee.org
… to enhance 5G wireless network security. This article proposes physical layer security
enhancements to defend against security attacks from the three most significant aspects: …

Physical layer security for the Internet of Things: Authentication and key generation

J Zhang, S Rajendran, Z Sun… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
… This can be applied to the physical layer of the communications … security framework. We
conclude by outlining the future challenges in applying these compelling physical layer security

Physical layer security: Authentication, integrity, and confidentiality

M Shakiba-Herfeh, A Chorti, H Vincent Poor - Physical Layer Security, 2021 - Springer
security protection may be achieved at the physical layer”. In this … some of the security core
functions down to the physical layer, … three important security operations: node authentication, …

Physical layer authentication in wireless communication networks: A survey

L Bai, L Zhu, J Liu, J Choi… - Journal of Communications …, 2020 - ieeexplore.ieee.org
layer in network, PLS methods are applied in physical layerssecurity by utilizing the
randomness of signals and wireless … in the domain of physical layer authentication (PLA) in …

Multiple correlated attributes based physical layer authentication in wireless networks

S Xia, X Tao, N Li, S Wang, T Sui, H Wu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… timal authentication solution with low complexity. Specific to the inherent volatility nature of
the PHY-layer … algorithm to enhance the reliability of PHY-layer authentication. Unlike existing …

A learning approach for physical layer authentication using adaptive neural network

X Qiu, J Dai, M Hayes - IEEE Access, 2020 - ieeexplore.ieee.org
… We use physical layer security to deal with spoofing attacks in … These lead to unpredictable
variations in authentication systems. Physical layer authentication in our threat model …

Multiuser physical layer authentication in Internet of Things with data augmentation

RF Liao, H Wen, S Chen, F Xie, F Pan… - IEEE internet of …, 2019 - ieeexplore.ieee.org
… takes advantages of channel impulse response from wireless … -learning-based PHY-layer
authentication requires a large … PHY-layer authentication scheme to enhance the security of …

Deep-learning-based physical layer authentication for industrial wireless sensor networks

RF Liao, H Wen, J Wu, F Pan, A Xu, Y Jiang, F Xie… - sensors, 2019 - mdpi.com
… based PHY-layer authentication for an industrial wireless sensor network that can resist the
spoofing attack. The methods we propose can enhance the security of the industrial wireless