On physical-layer authentication via online transfer learning

Y Chen, PH Ho, H Wen, SY Chang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
This article introduces a novel physical-layer (PHY-layer) authentication scheme, called
transfer learning-based PHY-layer authentication (TL-PHA), aiming to achieve fast online …

Physical layer authentication based on channel polarization response in dual-polarized antenna communication systems

Y Wu, D Wei, C Guo, W Huang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This study presents a novel approach for physical layer authentication based on channel
polarization response (CPR). CPR is sensitive to variation in the physical properties of …

Physical layer security: Detection of active eavesdropping attacks by support vector machines

TM Hoang, TQ Duong, HD Tuan, S Lambotharan… - IEEE …, 2021 - ieeexplore.ieee.org
This article presents a framework for converting wireless signals into structured datasets,
which can be fed into machine learning algorithms for the detection of active eavesdropping …

Security and privacy in 5g-iiot smart factories: Novel approaches, trends, and challenges

CC Lin, CT Tsai, YL Liu, TT Chang… - Mobile Networks and …, 2023 - Springer
To implement various artificial intelligence and automation applications in smart factories,
edge computing and industrial Internet of Things (IIoT) devices must be widely deployed, so …

Radio frequency fingerprint-based intelligent mobile edge computing for internet of things authentication

S Chen, H Wen, J Wu, A Xu, Y Jiang, H Song, Y Chen - Sensors, 2019 - mdpi.com
In this paper, a light-weight radio frequency fingerprinting identification (RFFID) scheme that
combines with a two-layer model is proposed to realize authentications for a large number of …

Artificial intelligence-based security authentication: Applications in wireless multimedia networks

X Qiu, Z Du, X Sun - Ieee Access, 2019 - ieeexplore.ieee.org
Security provisioning has become a key issue in wireless multimedia networks due to their
vital roles in supporting various services. Conventional security solutions have deficiencies …

A physical layer, zero-round-trip-time, multifactor authentication protocol

M Mitev, M Shakiba-Herfeh, A Chorti, M Reed… - IEEE …, 2022 - ieeexplore.ieee.org
Lightweight physical layer security schemes that have recently attracted a lot of attention
include physical unclonable functions (PUFs), RF fingerprinting/proximity based …

Weighted voting in physical layer authentication for industrial wireless edge networks

F Xie, Z Pang, H Wen, W Lei… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Edge computing (EC) is an essential component of large-scale intelligent manufacturing
systems for Industry 4.0, which promises to provide a preprocessing platform for the massive …

Emerging technologies of industry 4.0: Challenges and opportunities

MO Okwu, LK Tartibu, C Maware… - … Big Data, Computing …, 2022 - ieeexplore.ieee.org
Industry 4.0 is beyond change and transformation but a comprehensive revolution that
accelerates scientific and technological progress, which has led to great functionality of …

Multiuser physical layer security mechanism in the wireless communication system of the IIOT

R Du, L Zhen - Computers & Security, 2022 - Elsevier
Wireless system in industrial scene plays an important role in the process of automation.
This kind of system urgently needs low complexity, lightweight, high security authentication …