Optimal Power Allocation for Channel-Based Physical Layer Authentication in Dual-Hop Wireless Networks

N Fan, J Sang, Y Heng, X Lei, T Tao - Sensors, 2022 - mdpi.com
Channel-based physical-layer authentication, which is capable of detecting spoofing attacks
in dual-hop wireless networks with low cost and low complexity, attracted a great deal of …

End-to-end physical layer authentication for dual-hop wireless networks

P Zhang, J Zhu, Y Chen, X Jiang - IEEE Access, 2019 - ieeexplore.ieee.org
End-to-end (E2E) physical layer authentication for multi-hop wireless networks is still not
well-explored by now. Like one step forward in this direction, this paper focuses on the E2E …

Physical layer authentication based on channel polarization response in dual-polarized antenna communication systems

Y Wu, D Wei, C Guo, W Huang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This study presents a novel approach for physical layer authentication based on channel
polarization response (CPR). CPR is sensitive to variation in the physical properties of …

Physical-layer authentication based on channel phase responses for multi-carriers transmission

X Lu, J Lei, Y Shi, W Li - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
To defend against eavesdropping and spoofing attacks, the physical layer authentication
(PLA) techniques utilize the unique attributes of channel or device for identifying attackers …

[HTML][HTML] Physical layer authentication enhancement using maximum SNR ratio based cooperative AF relaying

J Liu, X Wang, H Tang - Wireless Communications and Mobile …, 2017 - hindawi.com
Physical layer authentication techniques developed in conventional macrocell wireless
networks face challenges when applied in the future fifth-generation (5G) wireless …

A machine learning multi-hop physical layer authentication with hardware impairments

Z Ezzati Khatab, A Mohammadi, V Pourahmadi… - Wireless …, 2023 - Springer
Authentication is one of the major requirements of wireless networks security, which uses to
distinguish legal transmitter from illegal transmitter. Physical layer authentication by taking …

Signal relation-based physical layer authentication

MA Aygül, S Büyükçorak, DB da Costa… - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Most physical-layer authentication techniques use channel information to prevent spoofing
attacks. In such techniques, one must estimate the channel information for each …

Channel-based physical layer authentication

C Pei, N Zhang, XS Shen… - 2014 IEEE Global …, 2014 - ieeexplore.ieee.org
In this paper, we study channel-based authentication, where the receiver can identify and
authenticate the senders through channel vectors estimated from their frames. The …

Authentication based on channel state information for industrial wireless communications

F Pan, Z Pang, M Luvisotto, X Jiang… - IECON 2018-44th …, 2018 - ieeexplore.ieee.org
Physical layer authentication based on channel state information is an effective solution to
preventing spoofing attacks in wireless communications by comparing the channel impulse …

FHY-layer authentication with multiple landmarks with reduced communication overhead

X Wan, L Xiao, Q Li, Z Han - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
In this paper, we propose a physical (PHY)-layer authentication system that exploits the
channel state information of radio transmitters to detect spoofing attacks in wireless …