6G and beyond wireless channel characteristics for physical layer security: opportunities and challenges

AB Kihero, HM Furqan, MM Sahin… - IEEE Wireless …, 2023 - ieeexplore.ieee.org
Security has emerged as one of the critical requirements of future wireless networks. Unlike
traditional cryptography-based security, physical layer security (PLS) tends to exploit various …

A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven Approaches

Z Lai, Z Chang, M Sha, Q Zhang, N Xie, C Chen… - ACM Computing …, 2024 - dl.acm.org
The open and broadcast nature of wireless mediums introduces significant security
vulnerabilities, making authentication a critical concern in wireless networks. In recent years …

Towards a unified framework for physical layer security in 5G and beyond networks

MSJ Solaija, H Salman, H Arslan - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Wireless systems have become an increasingly pivotal part of our lives. Various critical
applications and use cases such as healthcare, financial transactions, e-commerce …

Multi-attribute weighted convolutional attention neural network for multiuser physical layer authentication in IIoT

Y Wu, T Jing, Q Gao, J Mao, Y Huo, Z Yang - Ad Hoc Networks, 2024 - Elsevier
Compared with upper layer authentication, physical layer authentication (PLA) is essential in
unmanned Industrial Internet of Things (IIoT) scenarios, owing to its low complexity and …

Robust tracking-based PHY-authentication in mmWave MIMO systems

L Afeef, HM Furqan, H Arslan - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Physical Layer Authentication (PLA) is a topic of considerable interest in ensuring strong
security for upcoming wireless networks. However, existing PLA methods face challenges in …

Exploiting Carrier Frequency Offset and Phase Noise for Physical Layer Authentication in UAV-aided Communication Systems

Y Teng, P Zhang, Y Liu, J Dong… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper exploits two intrinsic hardware-specific fingerprints in terms of carrier frequency
offset (CFO) and phase noise (PHN) to propose a two-dimensional physical layer …

[HTML][HTML] Improved PHY-layer authentication utilizing multi-modal features for mmWave MIMO UAV-enabled systems

M Niu, K Han, X Zhong, B Ren, P Zhang, J He - Digital Communications …, 2024 - Elsevier
This paper exploits multi-modal Physical (PHY)-layer features in terms of artificial fingerprint,
In-phase/Quadrature (IQ) imbalance and Angle of Arrival (AoA) to propose a novel PHY …

Physical Layer Authentication Utilizing Beam Pattern Features in Millimeter-Wave MIMO Systems

P Zhang, Y Teng, M Niu, X Jiang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The super-directive arrays in millimeter wave (mmWave) multiple-input multiple-output
(MIMO) systems possess some intrinsic beam pattern features like amplitude and phase …

Physical layer authentication of MIMO-STBC systems based on constellation dithering

Y An, H Bai, S Zhang, Z Ji - Intelligent and Converged Networks, 2023 - ieeexplore.ieee.org
Most of the existing physical layer watermarking authentication schemes are based on a
single-input single-output system and require pre-issue of shared keys. To address these …

How to Leverage Double-Structured Sparsity of RIS Channels to Boost Physical Layer Authentication

A Bendaimi, A Abdallah, A Celik… - IEEE Wireless …, 2024 - ieeexplore.ieee.org
Reconfigurable Intelligent Surfaces (RIS)-assisted systems are promising technology in next-
generation wireless networks, but are susceptible to spoofing attacks due to their broadcast …