Effective cyber security system to secure optical data based on deep learning approach for healthcare application

P Kanagala - Optik, 2023 - Elsevier
In the recent days, data's plays a significant role and its enormous quantity are extracted
based on various IoT devices. Various IoT devices generates huge data and it is processed …

Multiuser physical-layer authentication based on latent perturbed neural networks for Industrial Internet of Things

R Meng, X Xu, H Sun, H Zhao, B Wang… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Recently, learning (DL)-based physical-layer authentication (PLA) has attracted much
attention since artificial neural networks (ANNs) can be built to extract useful features from …

Physical-layer authentication based on adaptive Kalman filter for V2X communication

J Wang, Y Shao, Y Ge, R Yu - Vehicular Communications, 2020 - Elsevier
Security and authentication are an important guarantee for vehicle to everything (V2X). At
present, V2X security schemes in most countries are based on public key infrastructure …

Multi-level Sub-granting by Power of Attorney and OAuth Authorization Server in Cyber-Physical Systems

SV Sudarsan, O Schelén… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Many cyber–physical systems (CPSs) are today semi-autonomous and powerful enough to
perform advanced tasks on their own. This means they can also act as representatives of …

Transferable Physical Layer Authentication Based on Time-Varying Patterns Toward Zero Training Deployment for Mobile IIoT Devices

Q Wang, Z Pang, W Liang, J Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Physical layer authentication (PLA) is a promising approach to ensure wireless network
security. However, existing PLA algorithms require channel state information calibration and …

Physical Layer Authentication and Security Design in the Machine Learning Era

TM Hoang, A Vahid, HD Tuan… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Security at the physical layer (PHY) is a salient research topic in wireless systems, and
machine learning (ML) is emerging as a powerful tool for providing new data-driven security …

Clone detection based on BPNN and physical layer reputation for industrial wireless CPS

F Pan, H Wen, X Gao, H Pu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Industrial wireless cyber-physical systems are vulnerable to malicious node attacks, for
example, clone node attack. The existing clone detection schemes are either based on …

Collaborative physical layer authentication in Internet of Things based on federated learning

S Wang, N Li, S Xia, X Tao, H Lu - 2021 IEEE 32nd Annual …, 2021 - ieeexplore.ieee.org
With the booming growth of Internet of Things (IoT), ensuring the secure access of the IoT
terminals is paramount importance. Machine learning (ML) based physical layer …

Physical layer authentication based on nonlinear kalman filter for v2x communication

J Wang, Y Shao, Y Wang, Y Ge, R Yu - IEEE Access, 2020 - ieeexplore.ieee.org
Authentication is an important guarantee for vehicle to everything (V2X) commercial
deployment. Currently, V2X security often use identity authentication schemes based on …

Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction

M Umar, J Wang, F Li, S Wang, M Zheng, Z Zhang… - Ad Hoc Networks, 2024 - Elsevier
The high security and low complexity of physical layer authentication (PLA) make it a
promising complement for complex cryptographic authentication approaches, especially for …