Adaptive physical layer authentication using machine learning with antenna diversity

M Abdrabou, TA Gulliver - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The heterogeneous characteristics of wireless mobile networks within the Internet of things
(IoT) create authentication challenges due to the large number of devices with diverse …

Comparison of statistical and machine learning techniques for physical layer authentication

L Senigagliesi, M Baldi, E Gambi - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this article we consider authentication at the physical layer, in which the authenticator
aims at distinguishing a legitimate supplicant from an attacker on the basis of the …

Physical layer security with its applications in 5G networks: A review

L Sun, Q Du - China communications, 2017 - ieeexplore.ieee.org
5G network is expected to support massive user connections and exponentially increasing
wireless services, which makes network security unprecedentedly important. Unlike …

Physical-layer authentication for multi-carrier transmission

X Wu, Z Yang - IEEE Communications Letters, 2014 - ieeexplore.ieee.org
We propose a novel physical-layer challenge-response authentication scheme for multi-
carrier transmission. This new scheme exploits both the reciprocity and randomness of the …

PHY-layer authentication with multiple landmarks with reduced overhead

L Xiao, X Wan, Z Han - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
Physical (PHY)-layer authentication systems can exploit channel state information of radio
transmitters to detect spoofing attacks in wireless networks. The use of multiple landmarks …

Using the physical layer for wireless authentication in time-variant channels

L Xiao, LJ Greenstein, NB Mandayam… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
The wireless medium contains domain-specific information that can be used to complement
and enhance traditional security mechanisms. In this paper we propose ways to exploit the …

A two dimensional quantization algorithm for CIR-based physical layer authentication

FJ Liu, X Wang, SL Primak - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
Recently, channel impulse response (CIR) based physical layer authentication has been
studied to enhance the security of wireless communications. However, the reliability of CIR …

Non-cryptographic authentication and identification in wireless networks [security and privacy in emerging wireless networks]

K Zeng, K Govindan… - IEEE Wireless …, 2010 - ieeexplore.ieee.org
Lower/physical layer characteristics have been considered as potential alternatives/
complements to provide security services in wireless networks. This article provides an …

PHY-CRAM: Physical layer challenge-response authentication mechanism for wireless networks

D Shan, K Zeng, W Xiang… - IEEE Journal on …, 2013 - ieeexplore.ieee.org
Exploiting the unique properties of the physical layer to enhance or complement
authentication strength in wireless networks has attracted a lot of research attention recently …

The challenges facing physical layer security

W Trappe - IEEE communications magazine, 2015 - ieeexplore.ieee.org
There has recently been significant interest in applying the principles of information-
theoretical security and signal processing to secure physical layer systems. Although the …