J Wang, Y Shao, Y Wang, Y Ge, R Yu - IEEE Access, 2020 - ieeexplore.ieee.org
… authentication model based on physical layer characteristics. Then we use the Kalman filter
to refine the iterative model and threshold model. … the physical layer for enhanced security […