P Zhang, Y Shen, X Jiang, B Wu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this paper, we propose a physical layer authentication scheme in heterogeneous coexist multiple-input-multiple-output (MIMO) systems. This scheme utilizes two physical layer …
LY Paul, BM Sadler - IEEE Transactions on information …, 2011 - ieeexplore.ieee.org
We consider authentication of a wireless multiple-input-multiple-output (MIMO) system by deliberately introducing a stealthy fingerprint at the physical layer. The fingerprint is …
H Forssell, R Thobaben - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Feature-based physical layer authentication (PLA) schemes, using position-specific channel characteristics as identifying features, can provide lightweight protection against …
Authentication is a fundamental requirement for secure communications. In this article, we describe a general framework for fingerprint embedding at the physical layer in order to …
J Yoon, Y Lee, E Hwang - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
This paper proposes a machine learning (ML)-based physical layer authentication scheme in the multi-input multi-output (MIMO) wireless communication environment. In the proposed …
S Wang, K Huang, X Xu, Z Zhong… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
CSI-Based physical layer authentication is a promising candidate to achieve fast and lightweight authentication for wireless communication. However, the current methods …
The use of fingerprint embedding at the physical layer enables a receiver to authenticate a transmitter by detecting a low-power authentication tag superimposed upon the message …
O Gungor, CE Koksal - IEEE transactions on information theory, 2016 - ieeexplore.ieee.org
RF fingerprinting exploits the variations in the RF chain of radios to uniquely identify transmitters, and distinguish adversarial transmissions from the transmissions of legitimate …
Authentication via fingerprint embedding at the physical layer utilizes noise in the wireless channel to attain a certain degree of information theoretic security that traditional HMAC …