L Bai, L Zhu, J Liu, J Choi… - Journal of Communications …, 2020 - ieeexplore.ieee.org
Physical layer security (PLS) in wireless communication systems has attracted extensive research attentions in recent years. Unlike cryptography-based methods applied in upper …
N Xie, J Chen, L Huang - IEEE transactions on information …, 2021 - ieeexplore.ieee.org
This paper concerns the problem of authenticating the transmitter without a secret key. In comparison with traditional cryptographic-based authentication mechanisms, the Physical …
X Wang, P Hao, L Hanzo - IEEE Communications Magazine, 2016 - ieeexplore.ieee.org
While the open nature of radio propagation enables convenient “anywhere” wireless access, it becomes the root of security vulnerabilities in wireless communications. In light of this …
W Wang, Z Sun, S Piao, B Zhu… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
The wireless physical-layer identification (WPLI) techniques utilize the unique features of the physical waveforms of wireless signals to identify and classify authorized devices. As the …
H Fang, X Wang, L Hanzo - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Performance of the existing physical layer authentication schemes could be severely affected by the imperfect estimates and variations of the communication link attributes used …
S Wang, K Huang, X Xu, Z Zhong… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
CSI-Based physical layer authentication is a promising candidate to achieve fast and lightweight authentication for wireless communication. However, the current methods …
S Xia, X Tao, N Li, S Wang, T Sui, H Wu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Physical (PHY) layer authentication has been a significant trend towards ensuring the identity security of terminals in wireless networks due to the high security and low …
The wireless medium offers many opportunities for broadcast communications. However, it also opens the possibility for attackers to eavesdrop the broadcast data or to pretend to be …
The heterogeneous characteristics of wireless mobile networks within the Internet of things (IoT) create authentication challenges due to the large number of devices with diverse …