A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

Cross-layer device authentication with quantum encryption for 5G enabled IIoT in industry 4.0

D Xu, K Yu, JA Ritcey - IEEE Transactions on Industrial …, 2021 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT), a core enabler of Industry 4.0, is evolving rapidly to tackle
the challenges imposed by explosive real-time manufacturing data in the context of Internet …

Physical layer authentication in wireless communication networks: A survey

L Bai, L Zhu, J Liu, J Choi… - Journal of Communications …, 2020 - ieeexplore.ieee.org
Physical layer security (PLS) in wireless communication systems has attracted extensive
research attentions in recent years. Unlike cryptography-based methods applied in upper …

PHY-layer authentication with multiple landmarks with reduced overhead

L Xiao, X Wan, Z Han - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
Physical (PHY)-layer authentication systems can exploit channel state information of radio
transmitters to detect spoofing attacks in wireless networks. The use of multiple landmarks …

Overview of 5G security technology

X Ji, K Huang, L Jin, H Tang, C Liu, Z Zhong… - Science China …, 2018 - Springer
The 5th-generation mobile communication system (5G) has higher security requirements
than previous systems. Accordingly, international standard organizations, operators, and …

Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city

D Wang, B Bai, K Lei, W Zhao, Y Yang, Z Han - IEEE Access, 2019 - ieeexplore.ieee.org
Heterogeneous Internet of Things (IoT) and multi-access mobile edge computing (MA-MEC)
are believed as supporting technologies for building a smart city. The advancement and …

Towards secure 5G networks: A Survey

S Zhang, Y Wang, W Zhou - Computer Networks, 2019 - Elsevier
To support various new use cases from vertical industries besides enhanced mobile
broadband communication services, the 5G system aims to provide higher speed, lower …

A comprehensive survey of 6G wireless communications

Y Zhao, W Zhai, J Zhao, T Zhang, S Sun… - arXiv preprint arXiv …, 2020 - arxiv.org
While fifth-generation (5G) communications are being rolled out worldwide, sixth-generation
(6G) communications have attracted much attention from both the industry and the …

Physical-layer authentication for Internet of Things via WFRFT-based Gaussian tag embedding

N Zhang, X Fang, Y Wang, S Wu, H Wu… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is regarded as the fundamental platform for many emerging services,
such as smart city, smart home, and intelligent transportation systems. With ever-increasing …