Physical layer authentication enhancement using a Gaussian mixture model

X Qiu, T Jiang, S Wu, M Hayes - IEEE Access, 2018 - ieeexplore.ieee.org
Wireless networks strive to integrate information technology into every corner of the world.
This openness of radio propagation is one reason why holistic wireless security …

PHY-layer spoofing detection with reinforcement learning in wireless networks

L Xiao, Y Li, G Han, G Liu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the PHY-layer authentication that exploits radio channel
information (such as received signal strength indicators) to detect spoofing attacks in …

FHY-layer authentication with multiple landmarks with reduced communication overhead

X Wan, L Xiao, Q Li, Z Han - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
In this paper, we propose a physical (PHY)-layer authentication system that exploits the
channel state information of radio transmitters to detect spoofing attacks in wireless …

Spoofing detection with reinforcement learning in wireless networks

L Xiao, Y Li, G Liu, Q Li… - 2015 IEEE Global …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the PHY-layer authentication in wireless networks, which
exploits PHY-layer channel information such as the received signal strength indicators to …

PHY-layer authentication with multiple landmarks with reduced overhead

L Xiao, X Wan, Z Han - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
Physical (PHY)-layer authentication systems can exploit channel state information of radio
transmitters to detect spoofing attacks in wireless networks. The use of multiple landmarks …

Physical‐Layer Channel Authentication for 5G via Machine Learning Algorithm

S Chen, H Wen, J Wu, J Chen, W Liu… - Wireless …, 2018 - Wiley Online Library
By utilizing the radio channel information to detect spoofing attacks, channel based physical
layer (PHY‐layer) enhanced authentication can be exploited in light‐weight securing 5G …

Physical-layer authentication based on extreme learning machine

N Wang, T Jiang, S Lv, L Xiao - IEEE Communications Letters, 2017 - ieeexplore.ieee.org
Most physical-layer authentication techniques use hypothesis tests to compare the radio
channel information with the channel record of Alice to detect spoofer Eve in wireless …

Channel-based authentication game in MIMO systems

L Xiao, T Chen, G Han, W Zhuang… - 2016 IEEE Global …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the PHY-layer authentication that exploits radio channel
information to detect spoofing attacks in multiple-input multiple-output (MIMO) systems. We …

An enhanced cross-layer authentication mechanism for wireless communications based on PER and RSSI

P Hao, X Wang, A Refaey - 2013 13th Canadian Workshop on …, 2013 - ieeexplore.ieee.org
Recently physical layer attributes and statistics have been exploited in securing wireless
communications. However, one major obstacle of physical layer security techniques is that …

Physical layer authentication under intelligent spoofing in wireless sensor networks

N Gao, Q Ni, D Feng, X Jing, Y Cao - Signal Processing, 2020 - Elsevier
Location based access in wireless sensor networks (WSN) are vulnerable to location
spoofing attacks. In this paper, we investigate the physical layer (PHY-layer) authentication …