A survey of physical-layer authentication in wireless communications

N Xie, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

Physical layer authentication in wireless communication networks: A survey

L Bai, L Zhu, J Liu, J Choi… - Journal of Communications …, 2020 - ieeexplore.ieee.org
Physical layer security (PLS) in wireless communication systems has attracted extensive
research attentions in recent years. Unlike cryptography-based methods applied in upper …

The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges

M Waqas, S Tu, Z Halim, SU Rehman, G Abbas… - Artificial Intelligence …, 2022 - Springer
Security is one of the biggest challenges concerning networks and communications. The
problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence …

Open set wireless transmitter authorization: Deep learning approaches and dataset considerations

S Hanna, S Karunaratne… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to imperfections in transmitters' hardware, wireless signals can be used to verify their
identity in an authorization system. While deep learning was proposed for transmitter …

Comparison of statistical and machine learning techniques for physical layer authentication

L Senigagliesi, M Baldi, E Gambi - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In this article we consider authentication at the physical layer, in which the authenticator
aims at distinguishing a legitimate supplicant from an attacker on the basis of the …

Machine learning in NextG networks via generative adversarial networks

E Ayanoglu, K Davaslioglu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Generative Adversarial Networks (GANs) are Machine Learning (ML) algorithms that have
the ability to address competitive resource allocation problems together with detection and …

Physical layer security: Detection of active eavesdropping attacks by support vector machines

TM Hoang, TQ Duong, HD Tuan, S Lambotharan… - IEEE …, 2021 - ieeexplore.ieee.org
This article presents a framework for converting wireless signals into structured datasets,
which can be fed into machine learning algorithms for the detection of active eavesdropping …

Adaptive RF fingerprints fusion via dual attention convolutions

W Zhang, W Zhao, X Tan, L Shao… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
In recent years, with the rise of intelligent hardware technology, the Internet of Things (IoT)
has achieved rapid development and has been widely used in smart cities, smart power …

A Review of Fundamental Optimization Approaches and the Role of AI Enabling Technologies in Physical Layer Security

MK Tefera, Z Jin, S Zhang - Sensors, 2022 - mdpi.com
With the proliferation of 5G mobile networks within next-generation wireless communication,
the design and optimization of 5G networks are progressing in the direction of improving the …

Physical layer authentication in mission-critical MTC networks: A security and delay performance analysis

H Forssell, R Thobaben, H Al-Zubaidy… - IEEE Journal on …, 2019 - ieeexplore.ieee.org
We study the detection and delay performance impacts of a feature-based physical layer
authentication (PLA) protocol in mission-critical machine-type communication (MTC) …