Security enhancement for mobile edge computing through physical layer authentication

RF Liao, H Wen, J Wu, F Pan, A Xu, H Song… - IEEE …, 2019 - ieeexplore.ieee.org
PHY-layer data authentication in MEC server. As shown in Fig. 2 (b), we propose a mobile
edge … IoT that can be solved by the physical layer data authentication. Attacker impersonates …

Multiuser physical layer authentication in Internet of Things with data augmentation

RF Liao, H Wen, S Chen, F Xie, F Pan… - IEEE internet of …, 2019 - ieeexplore.ieee.org
… However, the training of machine-learning-based PHY-layer authentication requires a large
… -user PHY-layer authentication scheme to enhance the security of mobile edge computing …

Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city

D Wang, B Bai, K Lei, W Zhao, Y Yang, Z Han - IEEE Access, 2019 - ieeexplore.ieee.org
… from physical layer perspectives, since physical layer security … along with physical layer key
generation and authentication, to … , physical layer authentication is carried out at the physical

Physical-layer security based mobile edge computing for emerging cyber physical systems

L Chen, S Tang, V Balasubramanian, J Xia… - Computer …, 2022 - Elsevier
… This paper studies a secure mobile edge computing (MEC) for emerging cyber physical … In
[26], a physical authentication system is proposed to prevent rogue edge attackers from faking …

Multiuser physical-layer authentication based on latent perturbed neural networks for industrial internet of things

R Meng, X Xu, H Sun, H Zhao, B Wang… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
… authentication performance and lightweight deployment in Mobile Edge Computing (MEC)-…
authentication system, which will cause over-fitting issues and deteriorate the authentication

Clustering based physical-layer authentication in edge computing systems with asymmetric resources

Y Chen, H Wen, J Wu, H Song, A Xu, Y Jiang, T Zhang… - Sensors, 2019 - mdpi.com
… In this paper, we propose a novel cross-layer secure physical-layer authentication program
for edge computing system with asymmetric resources. The proposed scheme combines …

Physical layer authentication for 5G communications: Opportunities and road ahead

N Wang, W Li, P Wang, A Alipour-Fanid, L Jiao… - IEEE …, 2020 - ieeexplore.ieee.org
Mobile users will have to frequently switch between different … , which results in frequent
authentication handover. This case … physical layer features that are not sensitive to the mobile

SDN-based handover authentication scheme for mobile edge computing in cyber-physical systems

C Wang, Y Zhang, X Chen, K Liang… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
… These user specific attributes consist of location, physical layer attributes (channel state
information, signal strength, and clock skew), and movement direction and speed [17], some of …

On physical-layer authentication via online transfer learning

Y Chen, PH Ho, H Wen, SY Chang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
… ON PHYSICAL-LAYER AUTHENTICATION VIA ONLINE … TL-PHA is the first PHYlayer
authentication scheme for the EC … mobile edge computing through physical layer authentication,” …

Physical layer authentication in wireless communication networks: A survey

L Bai, L Zhu, J Liu, J Choi… - Journal of Communications …, 2020 - ieeexplore.ieee.org
Physical layer security (PLS) in wireless communication … -layer in network, PLS methods
are applied in physical layers … review in the domain of physical layer authentication (PLA) in …