R Meng, X Xu, H Sun, H Zhao, B Wang… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Recently, learning (DL)-based physical-layer authentication (PLA) has attracted much attention since artificial neural networks (ANNs) can be built to extract useful features from …
RF Liao, H Wen, S Chen, F Xie, F Pan… - IEEE internet of …, 2019 - ieeexplore.ieee.org
Unlike most of the upper layer authentication mechanisms, the physical (PHY) layer authentication takes advantages of channel impulse response from wireless propagation to …
H Fang, X Wang, L Hanzo - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Performance of the existing physical layer authentication schemes could be severely affected by the imperfect estimates and variations of the communication link attributes used …
The physical layer security of wireless networks is becoming increasingly important because of the rapid development of wireless communications and the increasing security threats. In …
X Qiu, J Dai, M Hayes - IEEE Access, 2020 - ieeexplore.ieee.org
In communications, innovative paradigm shifts have emerged in integrating various devices into the network to provide advanced and intelligent services. However, various security …
Recently, physical-layer authentication (PLA) has attracted much attention since it takes advantage of the channel randomness nature of transmission media to achieve …
S Wang, N Li, S Xia, X Tao, H Lu - 2021 IEEE 32nd Annual …, 2021 - ieeexplore.ieee.org
With the booming growth of Internet of Things (IoT), ensuring the secure access of the IoT terminals is paramount importance. Machine learning (ML) based physical layer …
JR Jiang - 2020 3rd IEEE International Conference on …, 2020 - ieeexplore.ieee.org
5G-based Internet of Things (IoT) comprises numerous devices communicating with 10 Gbit/s peak data rate and 1 ms latency. It is challenging to secure the 5G-based IoT. Physical …
S Wang, K Huang, X Xu, Z Zhong… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
CSI-Based physical layer authentication is a promising candidate to achieve fast and lightweight authentication for wireless communication. However, the current methods …