Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer processing

E Jorswieck, S Tomasin, A Sezgin - Proceedings of the IEEE, 2015 - ieeexplore.ieee.org
… of this security scenario, with reference to a wireless multiple-… the secure communications,
SKA, wireless authentication, and the impact of imperfect CSIT on these physical-layer security

Cooperative jamming for physical layer security enhancement in Internet of Things

L Hu, H Wen, B Wu, F Pan, RF Liao… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
… It was shown in [32] that, both secrecy rate and secure energy efficiency can be enhanced
… In this paper, we investigate security enhancement for downlink transmission in IoT networks…

[HTML][HTML] Key less physical layer security for wireless networks: A survey

MS Kumar, R Ramanathan, M Jayakumar - Engineering Science and …, 2022 - Elsevier
… In this research, Watermark Blind Physical Layer Security technique is employed to protect
VLC communication at the physical layer by combining watermarking and jamming primitives. …

Authentication Mechanism Based on Physical Layer Security in Industrial Wireless Sensor Networks

R Du, L Zhen, Y Liu - International Conference on Wireless Algorithms …, 2022 - Springer
… In order to overcome this shortcoming, we propose a physical layer authentication strategy
based on PU bagging algorithm. This scheme is more suitable for industrial scenarios that do …

Slope authentication at the physical layer

N Xie, C Chen - … on Information Forensics and Security, 2018 - ieeexplore.ieee.org
authentication in a wireless system at the physical layer. … at the physical layer in the existing
literature, authentication with … a new authentication method at the physical layer, referred to …

Physical layer authentication based on integrated semi-supervised learning in wireless networks for dynamic industrial scenarios

R Du, L Zhen, Y Liu - IEEE Transactions on Vehicular …, 2022 - ieeexplore.ieee.org
… a physical layer authentication scheme based on PU bagging to distinguish and authenticate
… out the traditional upper layer authentication to obtain the initial physical layer channel infor…

CSI-based physical layer authentication via deep learning

S Wang, K Huang, X Xu, Z Zhong… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
… fast and lightweight authentication for wireless communication. … authentication and are
susceptible to channel noise. Besides, the current learning-aided physical layer authentication

What physical layer security can do for 6G security

M Mitev, A Chorti, HV Poor… - IEEE Open Journal of …, 2023 - ieeexplore.ieee.org
security design bottom up, starting at the physical layer, is not only viable in 6G but importantly,
arises as an efficient way to overcome security … treat physical layer security orthogonally …

[图书][B] Novel Physical Layer Authentication Techniques for Secure Wireless Communications

J Liu - 2015 - search.proquest.com
… In Chapter 5, we develop an enhanced physical layer authentication scheme by integrating
additional multipath delay characteristics into the CIR-based authentication framework. A two…

Securearray: Improving wifi security with fine-grained physical-layer information

J Xiong, K Jamieson - Proceedings of the 19th annual international …, 2013 - dl.acm.org
… This paper describes the SecureArray system, a cross-layer approach to enhance wireless
security that is designed to provide defense in depth against active attacks, those in which the …