[HTML][HTML] IoT nodes authentication and ID spoofing detection based on joint use of physical layer security and machine learning

D Marabissi, L Mucchi, A Stomaci - Future Internet, 2022 - mdpi.com
PHY layer continuous authentication and spoofing detection. In particular, the paper proposes
a machine-learning (ML) wireless … indoor area wireless communication systems operating …

Reinforcement learning based PHY authentication for VANETs

X Lu, L Xiao, T Xu, Y Zhao, Y Tang… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
… We propose a reinforcement learning based PHY authentication scheme (RLPA) that …
Zhuang, “PHY-layer spoofing detection with reinforcement learning in wireless networks,” …

Physical layer authentication under intelligent spoofing in wireless sensor networks

N Gao, Q Ni, D Feng, X Jing, Y Cao - Signal Processing, 2020 - Elsevier
… a PHY-layer authentication scheme under the threats of the investigated intelligent location
spoofing … Furthermore, Q-learning is a model-free reinforcement learning algorithm, and we …

[HTML][HTML] PHYAlert: identity spoofing attack detection and prevention for a wireless edge network

Z Jiang, K Zhao, R Li, J Zhao, J Du - Journal of Cloud Computing, 2020 - Springer
… edge network. PHYAlert profiles the wireless link with the rich dimensional Wi-Fi PHY layer
… The experiments verify the feasibility of spoofing detection based on PHY layer information …

Reinforcement learning-based physical cross-layer security and privacy in 6G

X Lu, L Xiao, P Li, X Ji, C Xu, S Yu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
… Afterward, we review the RL based PHYlayer security and … The PHY-layer spoofing detection
in [19] applies the … but the detection accuracy degrades in dynamic wireless networks. As …

[HTML][HTML] Physical layer authentication in wireless networks-based machine learning approaches

L Alhoraibi, D Alghazzawi, R Alhebshi, OBJ Rabie - Sensors, 2023 - mdpi.com
… models for spoofing detection in dynamic wireless networks by … threshold based on
reinforcement learning without knowing … Q-learning as a simple reinforcement learning technique; …

Multiple correlated attributes based physical layer authentication in wireless networks

S Xia, X Tao, N Li, S Wang, T Sui, H Wu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
PHY-layer attributes, we propose an unsupervised machine … signals and spoofing signals by
comparing the PHY-layer attributes … machine learning algorithm, such as federated learning. …

Reinforcement learning-based physical-layer authentication for controller area networks

L Xiao, X Lu, T Xu, W Zhuang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… ]) that focus on the image authentication, we apply reinforcement learning (RL) to optimize
the … Zhuang, “PHY-layer spoofing detection with reinforcement learning in wireless networks,” …

Machine learning-based spoofing attack detection in mmWave 60GHz IEEE 802.11 ad networks

N Wang, L Jiao, P Wang, W Li… - IEEE INFOCOM 2020 …, 2020 - ieeexplore.ieee.org
… We consider an IEEE 802.11ad-based wireless network and introduce three different parties:
an access point (AP), a legitimate user, and an attacker. All the three parties are assumed …

Physical layer spoofing attack detection in MmWave massive MIMO 5G networks

W Li, N Wang, L Jiao, K Zeng - IEEE Access, 2021 - ieeexplore.ieee.org
… ; (ii) we propose a new machine learning-based spoofing attack detection strategy to tackle
the … Zhuang, “Phy-layer spoofing detection with reinforcement learning in wireless networks,” …