Physical layer authentication enhancement using two-dimensional channel quantization

J Liu, X Wang - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
A novel physical layer authentication enhancement scheme is proposed in this paper by
integrating multipath delay characteristics of wireless channels into the channel impulse …

A two dimensional quantization algorithm for CIR-based physical layer authentication

FJ Liu, X Wang, SL Primak - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
Recently, channel impulse response (CIR) based physical layer authentication has been
studied to enhance the security of wireless communications. However, the reliability of CIR …

Channel-based physical layer authentication

C Pei, N Zhang, XS Shen… - 2014 IEEE Global …, 2014 - ieeexplore.ieee.org
In this paper, we study channel-based authentication, where the receiver can identify and
authenticate the senders through channel vectors estimated from their frames. The …

Robust physical layer authentication using inherent properties of channel impulse response

FJ Liu, X Wang, H Tang - 2011-MILCOM 2011 Military …, 2011 - ieeexplore.ieee.org
We propose a robust physical layer authentication scheme for wireless communications
based on a hypothesis testing of the inherent properties of channel impulse response (CIR) …

Physical-layer authentication using multiple channel-based features

N Xie, J Chen, L Huang - IEEE transactions on information …, 2021 - ieeexplore.ieee.org
This paper concerns the problem of authenticating the transmitter without a secret key. In
comparison with traditional cryptographic-based authentication mechanisms, the Physical …

Physical‐Layer Channel Authentication for 5G via Machine Learning Algorithm

S Chen, H Wen, J Wu, J Chen, W Liu… - Wireless …, 2018 - Wiley Online Library
By utilizing the radio channel information to detect spoofing attacks, channel based physical
layer (PHY‐layer) enhanced authentication can be exploited in light‐weight securing 5G …

Physical layer authentication enhancement using a Gaussian mixture model

X Qiu, T Jiang, S Wu, M Hayes - IEEE Access, 2018 - ieeexplore.ieee.org
Wireless networks strive to integrate information technology into every corner of the world.
This openness of radio propagation is one reason why holistic wireless security …

Physical layer authentication based on channel information and machine learning

F Pan, H Wen, R Liao, Y Jiang, A Xu… - … IEEE Conference on …, 2017 - ieeexplore.ieee.org
Most of the physical-layer authentication methods are based on the pre-knowledge of the
channel information and the threshold is fixed before the communication process. In this …

PHY-layer spoofing detection with reinforcement learning in wireless networks

L Xiao, Y Li, G Han, G Liu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the PHY-layer authentication that exploits radio channel
information (such as received signal strength indicators) to detect spoofing attacks in …

PHY-layer authentication with multiple landmarks with reduced overhead

L Xiao, X Wan, Z Han - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
Physical (PHY)-layer authentication systems can exploit channel state information of radio
transmitters to detect spoofing attacks in wireless networks. The use of multiple landmarks …