N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… -factor authentication system with both authentication mechanisms at the physicallayer and those at the upper layers… Specifically, the upper-layerauthentication mechanism is used to …
J Tang, H Wen, K Zeng, R Liao, F Pan, L Hu - IEEE Network, 2019 - ieeexplore.ieee.org
… to enhance 5G wireless network security. This article proposes physicallayersecurity enhancements to defend against security attacks from the three most significant aspects: …
… This can be applied to the physicallayer of the communications … security framework. We conclude by outlining the future challenges in applying these compelling physicallayersecurity …
… security protection may be achieved at the physicallayer”. In this … some of the security core functions down to the physicallayer, … three important security operations: node authentication, …
L Bai, L Zhu, J Liu, J Choi… - Journal of Communications …, 2020 - ieeexplore.ieee.org
… layer in network, PLS methods are applied in physicallayers … security by utilizing the randomness of signals and wireless … in the domain of physicallayerauthentication (PLA) in …
S Xia, X Tao, N Li, S Wang, T Sui, H Wu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… timal authentication solution with low complexity. Specific to the inherent volatility nature of the PHY-layer … algorithm to enhance the reliability of PHY-layerauthentication. Unlike existing …
X Qiu, J Dai, M Hayes - IEEE Access, 2020 - ieeexplore.ieee.org
… We use physicallayersecurity to deal with spoofing attacks in … These lead to unpredictable variations in authentication systems. Physicallayerauthentication in our threat model …
RF Liao, H Wen, S Chen, F Xie, F Pan… - IEEE internet of …, 2019 - ieeexplore.ieee.org
… takes advantages of channel impulse response from wireless … -learning-based PHY-layer authentication requires a large … PHY-layerauthentication scheme to enhance the security of …
RF Liao, H Wen, J Wu, F Pan, A Xu, Y Jiang, F Xie… - sensors, 2019 - mdpi.com
… based PHY-layerauthentication for an industrial wireless sensor network that can resist the spoofing attack. The methods we propose can enhance the security of the industrial wireless …