P Zhang, J Zhu, Y Chen, X Jiang - IEEE Access, 2019 - ieeexplore.ieee.org
End-to-end (E2E) physical layer authentication for multi-hop wireless networks is still not well-explored by now. Like one step forward in this direction, this paper focuses on the E2E …
Y Wu, D Wei, C Guo, W Huang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This study presents a novel approach for physical layer authentication based on channel polarization response (CPR). CPR is sensitive to variation in the physical properties of …
X Lu, J Lei, Y Shi, W Li - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
To defend against eavesdropping and spoofing attacks, the physical layer authentication (PLA) techniques utilize the unique attributes of channel or device for identifying attackers …
J Liu, X Wang, H Tang - Wireless Communications and Mobile …, 2017 - hindawi.com
Physical layer authentication techniques developed in conventional macrocell wireless networks face challenges when applied in the future fifth-generation (5G) wireless …
Authentication is one of the major requirements of wireless networks security, which uses to distinguish legal transmitter from illegal transmitter. Physical layer authentication by taking …
Most physical-layer authentication techniques use channel information to prevent spoofing attacks. In such techniques, one must estimate the channel information for each …
C Pei, N Zhang, XS Shen… - 2014 IEEE Global …, 2014 - ieeexplore.ieee.org
In this paper, we study channel-based authentication, where the receiver can identify and authenticate the senders through channel vectors estimated from their frames. The …
Physical layer authentication based on channel state information is an effective solution to preventing spoofing attacks in wireless communications by comparing the channel impulse …
X Wan, L Xiao, Q Li, Z Han - 2017 IEEE international …, 2017 - ieeexplore.ieee.org
In this paper, we propose a physical (PHY)-layer authentication system that exploits the channel state information of radio transmitters to detect spoofing attacks in wireless …