Identity spoofing attacks pose one of the most serious threats to wireless networks, where the attacker can masquerade as legitimate users by modifying its own identity. Channel …
Developments in drones have opened new trends and opportunities in different fields, particularly in small drones. Drones provide interlocation services for navigation, and this …
N Xie, S Zhang - IEEE Journal on Selected Areas in …, 2018 - ieeexplore.ieee.org
Authentication is a key requirement for secure communications in modern wireless systems. Compared with the conventional authentication at the upper layer using a cryptographic tool …
Resorting to the exploitation of physical attributes, physical-layer authentication (PLA) is a promising technology to supplement and enhance current cryptography-based security …
T Gu, A Abhishek, H Fu, H Zhang… - 2020 IEEE 21st …, 2020 - ieeexplore.ieee.org
As a massive number of the Internet of Things (IoT) devices are deployed, the security and privacy issues in IoT arouse more and more attention. The IoT attacks are causing …
L Nie, Y Li, X Kong - IEEE Access, 2018 - ieeexplore.ieee.org
Over the last decade, vehicular ad-hoc networks (VANETs) have received a greater attention in academia and industry due to their influence in intelligent transportation systems …
This article presents a framework for converting wireless signals into structured datasets, which can be fed into machine learning algorithms for the detection of active eavesdropping …
X Qiu, J Dai, M Hayes - IEEE Access, 2020 - ieeexplore.ieee.org
In communications, innovative paradigm shifts have emerged in integrating various devices into the network to provide advanced and intelligent services. However, various security …
This article introduces a novel physical-layer (PHY-layer) authentication scheme, called transfer learning-based PHY-layer authentication (TL-PHA), aiming to achieve fast online …