On the basic limits of RF-fingerprint-based authentication

O Gungor, CE Koksal - IEEE transactions on information theory, 2016 - ieeexplore.ieee.org
RF fingerprinting exploits the variations in the RF chain of radios to uniquely identify
transmitters, and distinguish adversarial transmissions from the transmissions of legitimate …

Keyless authentication and authenticated capacity

W Tu, L Lai - IEEE Transactions on Information Theory, 2018 - ieeexplore.ieee.org
We consider the problem of keyless message authentication over noisy channels in the
presence of an active adversary. Different from the existing models, in our model, the …

User capacity of wireless physical-layer identification

W Wang, Z Sun, K Ren, B Zhu - IEEE Access, 2017 - ieeexplore.ieee.org
A wireless physical layer identification (WPLI) system aims at identifying or classifying
authorized devices of different users based on the unique radio frequency fingerprints …

Keyless authentication over noisy channel

W Tu, L Lai - 2016 50th Asilomar Conference on Signals …, 2016 - ieeexplore.ieee.org
We consider the problem of keyless message authentication over noisy channels in the
presence of an active adversary. Different from the existing models, in our model, the …

Research on WiFi radio signal and MAC address mapping based on stream label

J Tian, T Ren, W Miao, Y Sun, W Liu… - International …, 2023 - spiedigitallibrary.org
Radio frequency signal information of a wireless terminal is based on inherent differences in
hardware. It has uniqueness, time-invariance, independence and robustness. Therefore, it is …

[图书][B] Information Theoretic Approaches for Security and Privacy

W Tu - 2018 - search.proquest.com
Abstract Information theoretic security and privacy is an emerging field in information theory
that aims to secure future generations of communication systems by exploiting physical layer …