S Chen, H Wen, J Wu, J Chen, W Liu, L Hu… - … and Mobile Computing, 2018 - dl.acm.org
By utilizing the radio channel information to detect spoofing attacks, channel based physical
layer (PHY-layer) enhanced authentication can be exploited in light-weight securing 5G …