Physical-layer authentication for wireless security enhancement: Current challenges and future developments

X Wang, P Hao, L Hanzo - IEEE Communications Magazine, 2016 - ieeexplore.ieee.org
… to enhancing wireless security. In this article, we first review the existing physical-layer
authentication techniques and identify their current limitations, ranging from low authentication

Security enhancement for mobile edge computing through physical layer authentication

RF Liao, H Wen, J Wu, F Pan, A Xu, H Song… - IEEE …, 2019 - ieeexplore.ieee.org
… 2 (b), we propose a mobile edge computing attack scenario in IoT that can be solved by the
physical layer data authentication. Attacker impersonates edge node 1 via claiming its media …

Light-weight physical layer enhanced security schemes for 5G wireless networks

J Tang, H Wen, K Zeng, R Liao, F Pan, L Hu - IEEE Network, 2019 - ieeexplore.ieee.org
… to enhance 5G wireless network security. This article proposes physical layer security
enhancements to defend against security attacks from the three most significant aspects: …

A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… -factor authentication system with both authentication mechanisms at the physical layer and
those at the upper layers… Specifically, the upper-layer authentication mechanism is used to …

Physical layer security for the Internet of Things: Authentication and key generation

J Zhang, S Rajendran, Z Sun… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
… This can be applied to the physical layer of the communications … security framework. We
conclude by outlining the future challenges in applying these compelling physical layer security

Physical-layer authentication in wirelessly powered communication networks

N Xie, H Tan, L Huang, AX Liu - IEEE/ACM Transactions on …, 2021 - ieeexplore.ieee.org
… transmission in the WPCN with physical layer authentication. We analyzed the events …
in this paper, although other inherent properties of the physical layer also can be utilized, eg…

Physical layer authentication enhancement using a Gaussian mixture model

X Qiu, T Jiang, S Wu, M Hayes - IEEE Access, 2018 - ieeexplore.ieee.org
wireless security mechanisms only rarely enter the picture. In this paper, we propose a
physical (PHY)-layer security authentication … attacks in wireless networks. Unlike most existing …

Physical layer security: Authentication, integrity, and confidentiality

M Shakiba-Herfeh, A Chorti, H Vincent Poor - Physical Layer Security, 2021 - Springer
security protection may be achieved at the physical layer”. In this … some of the security core
functions down to the physical layer, … three important security operations: node authentication, …

Physical layer authentication enhancement using two-dimensional channel quantization

J Liu, X Wang - IEEE Transactions on Wireless …, 2016 - ieeexplore.ieee.org
… in a non-robust decision-making for authentication. In this paper, we propose a novel
channel-based physical layer authentication enhancement scheme by exploiting the time-varying …

Physical layer authentication in wireless networks-based machine learning approaches

L Alhoraibi, D Alghazzawi, R Alhebshi, OBJ Rabie - Sensors, 2023 - mdpi.com
… in the physical layer authentication. This study showed whether machine learning approaches
in physical layer authentication models increased wireless network security performance …