Lightweight tag-based PHY-layer authentication for IoT devices in smart cities

P Zhang, J Liu, Y Shen, H Li… - IEEE Internet of things …, 2019 - ieeexplore.ieee.org
This article proposes a general and lightweight PHY-layer authentication framework for the
Internet of Things (IoT) devices in smart cities, based on tag embedding and tag verification …

A collaborative PHY-aided technique for end-to-end IoT device authentication

P Hao, X Wang, W Shen - IEEE Access, 2018 - ieeexplore.ieee.org
Nowadays, Internet of Things (IoT) devices are rapidly proliferating to support a vast number
of end-to-end (E2E) services and applications, which require reliable device authentication …

Physical-layer authentication for Internet of Things via WFRFT-based Gaussian tag embedding

N Zhang, X Fang, Y Wang, S Wu, H Wu… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is regarded as the fundamental platform for many emerging services,
such as smart city, smart home, and intelligent transportation systems. With ever-increasing …

Tag-based PHY-layer authentication for RIS-assisted communication systems

P Zhang, Y Teng, Y Shen, X Jiang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This article proposes a tag-based approach for physical (PHY)-layer authentication in a
reconfigurable intelligent surface (RIS) communication system. We first extract the intrinsic …

Multiuser physical layer authentication in Internet of Things with data augmentation

RF Liao, H Wen, S Chen, F Xie, F Pan… - IEEE internet of …, 2019 - ieeexplore.ieee.org
Unlike most of the upper layer authentication mechanisms, the physical (PHY) layer
authentication takes advantages of channel impulse response from wireless propagation to …

Integrating PHY security into NDN-IoT networks by exploiting MEC: Authentication efficiency, robustness, and accuracy enhancement

P Hao, X Wang - IEEE Transactions on Signal and Information …, 2019 - ieeexplore.ieee.org
Recent literature has demonstrated the improved data discovery and delivery efficiency
gained through applying named data networking (NDN) to a variety of information-centric …

[图书][B] A Beginner's Guide to Internet of Things Security: Attacks, Applications, Authentication, and Fundamentals

BB Gupta, A Tewari - 2020 - taylorfrancis.com
A Beginner's Guide to Internet of Things Security focuses on security issues and
developments in the Internet of Things (IoT) environment. The wide-ranging applications of …

A survey on authentication techniques for the internet of things

A Albalawi, A Almrshed, A Badhib… - … on computer and …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is a new computing paradigm that refers to interconnected physical
devices or IoT devices that contain sensors, actuators and connectivity to enable these IoT …

A Lightweight authentication approach based on linear feedback shift register and majority function for internet of things

E Ebrahimpour, S Babaie - Peer-to-Peer Networking and Applications, 2023 - Springer
Abstract Internet of Things (IoT) is a ubiquitous network of connected physical objects with
unique identity (ID), which can be controlled through a variety of communication …

Phase-assisted dynamic Tag-embedding message authentication for IoT networks

M Qaisi, S Althunibat, M Qaraqe - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Security is a critical issue in Internet of Things (IoT) networks and it has been under
investigation by researchers worldwide. Different from other wireless networks, IoT networks …