In this article we consider authentication at the physical layer, in which the authenticator aims at distinguishing a legitimate supplicant from an attacker on the basis of the …
L Sun, Q Du - China communications, 2017 - ieeexplore.ieee.org
5G network is expected to support massive user connections and exponentially increasing wireless services, which makes network security unprecedentedly important. Unlike …
X Wu, Z Yang - IEEE Communications Letters, 2014 - ieeexplore.ieee.org
We propose a novel physical-layer challenge-response authentication scheme for multi- carrier transmission. This new scheme exploits both the reciprocity and randomness of the …
L Xiao, X Wan, Z Han - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
Physical (PHY)-layer authentication systems can exploit channel state information of radio transmitters to detect spoofing attacks in wireless networks. The use of multiple landmarks …
L Xiao, LJ Greenstein, NB Mandayam… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to exploit the …
FJ Liu, X Wang, SL Primak - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
Recently, channel impulse response (CIR) based physical layer authentication has been studied to enhance the security of wireless communications. However, the reliability of CIR …
K Zeng, K Govindan… - IEEE Wireless …, 2010 - ieeexplore.ieee.org
Lower/physical layer characteristics have been considered as potential alternatives/ complements to provide security services in wireless networks. This article provides an …
Exploiting the unique properties of the physical layer to enhance or complement authentication strength in wireless networks has attracted a lot of research attention recently …
W Trappe - IEEE communications magazine, 2015 - ieeexplore.ieee.org
There has recently been significant interest in applying the principles of information- theoretical security and signal processing to secure physical layer systems. Although the …