A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… -factor authentication system with both authentication mechanisms at the physical layer and
those at the upper layers… Specifically, the upper-layer authentication mechanism is used to …

Physical layer security: Authentication, integrity, and confidentiality

M Shakiba-Herfeh, A Chorti, H Vincent Poor - Physical Layer Security, 2021 - Springer
security protection may be achieved at the physical layer”. In this … some of the security core
functions down to the physical layer, … three important security operations: node authentication, …

Physical layer authentication in wireless communication networks: A survey

L Bai, L Zhu, J Liu, J Choi… - Journal of Communications …, 2020 - ieeexplore.ieee.org
layer in network, PLS methods are applied in physical layerssecurity by utilizing the
randomness of signals and wireless … in the domain of physical layer authentication (PLA) in …

Physical layer authentication under intelligent spoofing in wireless sensor networks

N Gao, Q Ni, D Feng, X Jing, Y Cao - Signal Processing, 2020 - Elsevier
wireless sensor networks (WSN) are vulnerable to location spoofing attacks. In this paper, we
investigate the physical layer (PHY-layer) authenticationPHY-layer authentication scheme…

Multiple correlated attributes based physical layer authentication in wireless networks

S Xia, X Tao, N Li, S Wang, T Sui, H Wu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… timal authentication solution with low complexity. Specific to the inherent volatility nature of
the PHY-layer … algorithm to enhance the reliability of PHY-layer authentication. Unlike existing …

A learning approach for physical layer authentication using adaptive neural network

X Qiu, J Dai, M Hayes - IEEE Access, 2020 - ieeexplore.ieee.org
… We use physical layer security to deal with spoofing attacks in … These lead to unpredictable
variations in authentication systems. Physical layer authentication in our threat model …

Physical layer authentication for 5G communications: Opportunities and road ahead

N Wang, W Li, P Wang, A Alipour-Fanid, L Jiao… - IEEE …, 2020 - ieeexplore.ieee.org
… of physical attributes, physical-layer authentication (PLA) is a promising technology to
supplement and enhance current cryptography-based security mechanisms in wireless

Physical-layer authentication using multiple channel-based features

N Xie, J Chen, L Huang - … on information forensics and security, 2021 - ieeexplore.ieee.org
Authentication (PLA) has the following advantages: high security, low complexity, and high
… and unique features of the physical layer to authenticate the transmitter rather than using a …

Physical-layer authentication for Internet of Things via WFRFT-based Gaussian tag embedding

N Zhang, X Fang, Y Wang, S Wu, H Wu… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
… world to the physical world. In this article, we investigate physical-layer authentication to
help … Specifically, we propose a Gaussian-tagembedded physical-layer authentication (GTEA) …

Context-aware security for 6G wireless: The role of physical layer security

A Chorti, AN Barreto, S Köpsell, M Zoli… - IEEE …, 2022 - ieeexplore.ieee.org
… our proposal of context-aware security solutions for future generations of wireless, which will
also be able to leverage the physical layer to provide flexible and adaptive security controls. …