In this article we consider authentication at the physical layer, in which the authenticator aims at distinguishing a legitimate supplicant from an attacker on the basis of the …
In this paper we assess the security performance of key-less physical layer authentication schemes in the case of time-varying fading channels, considering both partial and no …
Wireless communications employing multi-carrier transmissions, like orthogonal frequency division multiplexing (OFDM) or single-carrier frequency division multiple access (SCFDMA) …
S Tomasin - WSA 2017; 21th International ITG Workshop on …, 2017 - ieeexplore.ieee.org
Authentication is a key element of security, by which a receiver confirms the sender identity of a message. Typical approaches include either key-based authentication at the application …
The Internet of Things (IoT) has revolutionized various industries by enabling the interconnection of physical devices and the collection and exchange of vast amounts of …
The design of a general architecture for the Internet of Things (IoT) is a complex task, due to the heterogeneity of devices, communication technologies, and applications that are part of …