过去一年中添加的文章,按日期排序

Authentication of multiple transaction using enhanced Elman spike neural network optimized with glowworm swarm optimization

SM Joans, JSL Jasmine, P Ponsudha - Wireless Networks, 2024 - Springer
3 天前 - authentication methods rely on easy-to-guess passwords, PIN numbers, or tokens
with several security … , biometric authentication techniques based on physical and behavioral …

A Provably Secure Two-Way Authenticated Key Agreement Protocol for IioT Environments

H Al-Aqrabi, Q Yaseen - papers.ssrn.com
8 天前 - … , ensuring robust security through … physical layer security while reducing
computational and communication costs, making it suitable for resource-constrained wireless

[PDF][PDF] EFFICIENT PHYSICAL KEY GENERATION TECHNIQUE BASED ON CHANNEL CORRELATION AND TRANSFORM FUNCTION FOR THE INTERNET OF …

A Singh, S Sharma - machineintelligenceresearchs.com
12 天前 - … novel physical layer key generation method for authenticating IoT… enhance the
capacity of physical layer security, contributing to the overall robustness and reliability of wireless

Towards Open-Set Specific Emitter Identification Using Auxiliary Classifier Generative Adversarial Network and OpenMax

L Guo, C Liu, Y Liu, Y Lin, G Gui - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
23 天前 - … technology for physical layer authentication of Internet of … poses a serious security
risk to the authentication system. To … is endowed with enhanced capabilities for identifying …

Two-Layered Multi-Factor Authentication Using Decentralized Blockchain in an IoT Environment

S Bamashmos, N Chilamkurti, AS Shahraki - Sensors, 2024 - mdpi.com
25 天前 - … The 45 nm CMOS SOI technology from GlobalFoundries incorporates 2.4 GHz
physical layer identification as a proof of concept. The article [24] presents a paradigm for cloud-…

Radio Frequency Fingerprint Identification for OFDM System Considering Unknown Multipath Fading Channel

J He, S Huang, Y Chen, S Chang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
29 天前 - … In this context, physical layer security (PLS) authentication methods have attracted
attention from academia and industry because of their low-complexity paradigm. Radio …

Enhancing Security and Privacy in Small Drone Networks Using 6G-IOT Driven Cyber Physical System

N Tandra, CNG Babu, J Dhanke, AVV Sudhakar… - Wireless Personal …, 2024 - Springer
40 天前 - … Specifically for smaller drones, this research aims to strengthen the cyber-security
of 6G-IoT devices by enhancing their core architecture. This study intends to address privacy …

Securing Collaborative Authentication: A Weighted Voting Strategy to Counter Unreliable Cooperators

Y Zhou, Y Huo, Q Gao, Y Wu, T Jing… - … Forensics and Security, 2024 - ieeexplore.ieee.org
40 天前 - … , collaborative physical layer authentication (CPLA… physical layer features or entities
with computational capabilities, reporting data to the center to aid in making final validation

Tailoring mmWave Physical Layer Security to Wireless Channel Knowledge

A Ishtiaq, L Khaloopour, V Jamali, M Hollick… - Authorea …, 2024 - techrxiv.org
55 天前 - … and effectiveness of BeamSec in enhancing physical layer security. • Experimental
validation in a real office environment. We conduct experimental validation of BeamSec in a …

On the Potential of RIS in the Context of PLA in Wireless Communication Systems

H Amin, W Aman, S Al-Kuwari - arXiv preprint arXiv:2405.00426, 2024 - arxiv.org
56 天前 - physical layer authentication (PLA). Specifically, we exploit two distinct features of
the physical layer… ) for PLA in RIS-assisted wireless communication. We construct hypothesis …