Security enhancement for mobile edge computing through physical layer authentication

RF Liao, H Wen, J Wu, F Pan, A Xu, H Song… - IEEE …, 2019 - ieeexplore.ieee.org
… 2 (b), we propose a mobile edge computing attack scenario in IoT that can be solved by the
physical layer data authentication. Attacker impersonates edge node 1 via claiming its media …

Weighted voting in physical layer authentication for industrial wireless edge networks

F Xie, Z Pang, H Wen, W Lei… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… Nevertheless, access authentication is a crucial security … physical layer information. Our
method employs a weighted voting scheme for channel state information based authentication

Physical layer authentication in wireless communication networks: A survey

L Bai, L Zhu, J Liu, J Choi… - … and Information Networks, 2020 - ieeexplore.ieee.org
… -layer in network, PLS methods are applied in physical layers … randomness of signals and
wireless channels. In this survey, … the domain of physical layer authentication (PLA) in wireless

Physical layer authentication in wireless networks-based machine learning approaches

L Alhoraibi, D Alghazzawi, R Alhebshi, OBJ Rabie - Sensors, 2023 - mdpi.com
… in the physical layer authentication. This study showed whether machine learning approaches
in physical layer authentication models increased wireless network security performance …

Deep-learning-based physical layer authentication for industrial wireless sensor networks

RF Liao, H Wen, J Wu, F Pan, A Xu, Y Jiang, F Xie… - sensors, 2019 - mdpi.com
… (DL)-based physical (PHY) layer authentication framework is … wireless sensor networks
(IWSNs). Three algorithms, the deep neural network (DNN)-based sensor nodes’ authentication

Automated labeling and learning for physical layer authentication against clone node and sybil attacks in industrial wireless edge networks

S Chen, Z Pang, H Wen, K Yu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… Sybil attacks in edge computing industrial wireless networks. First, … 1) We propose a physical
layer authentication strategy … attacks simultaneously in industrial wireless environments. 2) …

Multiple correlated attributes based physical layer authentication in wireless networks

S Xia, X Tao, N Li, S Wang, T Sui, H Wu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
PHY-layer attributes, which limits its generality. In this paper, we propose a multiattribute-based
PHY-layer authentication … to find a suboptimal authentication solution with low complexity…

Clustering based physical-layer authentication in edge computing systems with asymmetric resources

Y Chen, H Wen, J Wu, H Song, A Xu, Y Jiang, T Zhang… - Sensors, 2019 - mdpi.com
… In this paper, we propose a novel cross-layer secure physical-layer authentication program
for edge computing system with asymmetric resources. The proposed scheme combines …

Multiuser physical layer authentication in Internet of Things with data augmentation

RF Liao, H Wen, S Chen, F Xie, F Pan… - IEEE internet of …, 2019 - ieeexplore.ieee.org
… In addition, the performance of a traditional PHYlayer authentication method and the scheme
that we proposed in this paper are compared. Moreover, the simulation results illustrate …

On physical-layer authentication via online transfer learning

Y Chen, PH Ho, H Wen, SY Chang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
… 1) We claim the proposed TL-PHA is the first PHYlayer authentication scheme for the EC
applications that employs the TL strategy. Distinguished from the existing TL strategies, the …