A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

An overview of dynamic spectrum sharing: Ongoing initiatives, challenges, and a roadmap for future research

S Bhattarai, JMJ Park, B Gao, K Bian… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We are in the midst of a major paradigm shift in how we manage radio spectrum. This
paradigm shift is necessitated by the growth of wireless services of all types and the demand …

Physical layer authentication in wireless communication networks: A survey

L Bai, L Zhu, J Liu, J Choi… - Journal of Communications …, 2020 - ieeexplore.ieee.org
Physical layer security (PLS) in wireless communication systems has attracted extensive
research attentions in recent years. Unlike cryptography-based methods applied in upper …

Physical layer authentication for mobile systems with time-varying carrier frequency offsets

W Hou, X Wang, JY Chouinard… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
A novel physical layer authentication scheme is proposed in this paper by exploiting the time-
varying carrier frequency offset (CFO) associated with each pair of wireless communications …

Blind authentication at the physical layer under time-varying fading channels

N Xie, S Zhang - IEEE Journal on Selected Areas in …, 2018 - ieeexplore.ieee.org
Authentication is a key requirement for secure communications in modern wireless systems.
Compared with the conventional authentication at the upper layer using a cryptographic tool …

A collaborative PHY-aided technique for end-to-end IoT device authentication

P Hao, X Wang, W Shen - IEEe Access, 2018 - ieeexplore.ieee.org
Nowadays, Internet of Things (IoT) devices are rapidly proliferating to support a vast number
of end-to-end (E2E) services and applications, which require reliable device authentication …

A novel hybrid physical layer authentication scheme for multiuser wireless communication systems

E Illi, M Qaraqe, F El Bouanani - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Guaranteeing decent secrecy levels in future wireless network generations has gained
crucial importance due to the unprecedented increase in wireless connectivity worldwide. In …

Cross-layer authentication protocol design for ultra-dense 5G HetNets

CM Moreira, G Kaddoum… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Creating a secure environment for communications is becoming a significantly challenging
task in 5G Heterogeneous Networks (HetNets) given the stringent latency and high capacity …

A survey of Machine Learning-based Physical-Layer Authentication in wireless communications

R Meng, B Xu, X Xu, M Sun, B Wang, S Han… - Journal of Network and …, 2024 - Elsevier
To ensure secure and reliable communication in wireless systems, authenticating the
identities of numerous nodes is imperative. Traditional cryptography-based authentication …