A machine learning multi-hop physical layer authentication with hardware impairments

Z Ezzati Khatab, A Mohammadi, V Pourahmadi… - … Networks, 2023 - Springer
Dual-hop scenario End-to-end PLA for multi-hop wireless networks has not been well … In
this section, we focus on E2E PLA in dual-hop wireless network with a trusted or untrusted relay …

On the Physical Layer Security of a Dual-Hop UAV-based Network in the Presence of per-hop Eavesdropping and Imperfect CSI

E Illi, M Qaraqe, F El Bouanani… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
… , the physical layer security of a dualhop unmanned aerial vehicle-based wireless network,
… Importantly, the authors of [14], [16], [25], [27], [28], [30], and [32] analyzed the end-to-end

Optimal Power Allocation for Channel-Based Physical Layer Authentication in Dual-Hop Wireless Networks

N Fan, J Sang, Y Heng, X Lei, T Tao - Sensors, 2022 - mdpi.com
End-to-end communication usually requires relays for assistance, and there are only a few
research works at present. Zhang et al. in [14] jointly utilized the location-specific features of …

A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… an end-to-end PLA scheme for dualhop wireless networks by exploiting the intrinsic properties
of cascaded multipath channels [33]. He et al. employed the inherent physical parameters …

Machine learning-based physical layer security: techniques, open challenges, and applications

AK Kamboj, P Jindal, P Verma - Wireless Networks, 2021 - Springer
Wireless physical layer security (WPLS) is a powerful technology for current and emerging
mobile networks. Physical layer authentication (PLA), antenna selection (AS), and relay node …

Machine learning for physical layer in 5G and beyond wireless networks: A survey

J Tanveer, A Haider, R Ali, A Kim - Electronics, 2021 - mdpi.com
… -user, dual-hop, heterogeneous, and point-to-point schemes. A physical layer authentication
… to support E2E to achieve an end-to-end latency of 1 ms in network slicing with the help of …

Preventing identity attacks in RFID backscatter communication systems: A physical-layer approach

A Mehmood, W Aman, MMU Rahman… - … Conference on UK …, 2020 - ieeexplore.ieee.org
… the non-reciprocity of the end-to-end channel (ie, the residual … Jin, “Enhancing physical
layer security in dual-hop multiuser … of multiple spoofing attackers in wireless networks,” IEEE …

Physical layer security performance analysis of RIS-assisted wireless communication systems

S Yadav, AK Yadav, DS Gurjary… - 2022 IEEE 96th …, 2022 - ieeexplore.ieee.org
dual-hop wireless communication systems. Recently, the authors in [13] and [14] have analyzed
the secrecy performance of RIS-aided wireless networks (… the instantaneous end-to-end

A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security

MK Tefera, Z Jin, S Zhang - Sensors, 2022 - mdpi.com
… In this context, the ML- and AI-based solutions that pertain to end-to-end physical layer
joint … , which cover three different problems within the physical layer of wireless networks, …

Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions

F Irram, M Ali, M Naeem, S Mumtaz - … of Network and Computer Applications, 2022 - Elsevier
… and 5G networks in detail. The survey includes different threat models of wireless networks,
along with countermeasures and security analysis techniques used by authentication and …