S Chen,
H Wen,
J Wu, J Chen, W Liu… - Wireless …, 2018 - Wiley Online Library
By utilizing the radio channel information to detect spoofing attacks, channel based physical
layer (PHY‐layer) enhanced authentication can be exploited in light‐weight securing 5G …