Physical layer authentication enhancement using two-dimensional channel quantization

J Liu, X Wang - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
A novel physical layer authentication enhancement scheme is proposed in this paper by
integrating multipath delay characteristics of wireless channels into the channel impulse …

Physical Layer Authentication Based on Continuous Channel Polarization Response in Low SNR scenes

Y Wu, D Wei, Q Zhang, W Huang… - 2022 IEEE 33rd Annual …, 2022 - ieeexplore.ieee.org
In this paper, we propose a physical layer authentication scheme based on channel
polarization response (CPR) in low SNR scenes, such as IoT, 5G, and 6G communication …

PHY-layer spoofing detection with reinforcement learning in wireless networks

L Xiao, Y Li, G Han, G Liu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the PHY-layer authentication that exploits radio channel
information (such as received signal strength indicators) to detect spoofing attacks in …

Physical Layer Authentication Based on Full Channel Information under Dual-polarized Antenna Communication Systems

Y Wu, D Wei, J Li, W Huang… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
In this paper, we propose a physical authentication scheme based on the full channel
information (FCI) in dual-polarized antenna communication systems. Different from channel …

Game theoretic study on channel-based authentication in MIMO systems

L Xiao, T Chen, G Han, W Zhuang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, we investigate the authentication based on radio channel information in
multiple-input multiple-output (MIMO) systems and formulate the interactions between a …

PHY-layer authentication with multiple landmarks with reduced overhead

L Xiao, X Wan, Z Han - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
Physical (PHY)-layer authentication systems can exploit channel state information of radio
transmitters to detect spoofing attacks in wireless networks. The use of multiple landmarks …

Physical layer authentication and identification in wireless network via the locations of surrounding noise sources

Y Dang, Y Chen, H Wu, Y Shen… - … on Networking and …, 2017 - ieeexplore.ieee.org
Physical layer security is expected to address the security issue in wireless networks by
taking advantage of the unique attributes of fading channels. In this paper, we propose a …

[HTML][HTML] Physical-layer channel authentication for 5G via machine learning algorithm

S Chen, H Wen, J Wu, J Chen, W Liu, L Hu… - … and Mobile Computing, 2018 - hindawi.com
By utilizing the radio channel information to detect spoofing attacks, channel based physical
layer (PHY-layer) enhanced authentication can be exploited in light-weight securing 5G …

Physical layer challenge-response authentication in wireless networks with relay

X Du, D Shan, K Zeng, L Huie - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
Exploiting physical layer characteristics to enhance or complement authentication strength
in wireless networks has been attracting research attention recently. Existing physical layer …

Analytical method of physical layer authentication for performance evaluation

X Lu, J Lei, Y Shi, H Fang, W Li - 2022 IEEE Globecom …, 2022 - ieeexplore.ieee.org
To defend against the eavesdropping and spoofing attacks, the physical layer authentication
technique utilizes the unique attributes of channel or device for identifying attackers. In this …