A lightweight ECC-based authentication scheme for Internet of Things (IoT)
Internet of Things (IoT) enables the interconnection of physical and virtual objects that are
managed by various types of hardware, software, and communication technologies. The …
managed by various types of hardware, software, and communication technologies. The …
Deep-learning-based physical layer authentication for industrial wireless sensor networks
In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is
proposed to enhance the security of industrial wireless sensor networks (IWSNs). Three …
proposed to enhance the security of industrial wireless sensor networks (IWSNs). Three …
Security enhancement for mobile edge computing through physical layer authentication
In this paper, we investigate the security threats in mobile edge computing (MEC) of Internet
of things, and propose a deep-learning (DL)-based physical (PHY) layer authentication …
of things, and propose a deep-learning (DL)-based physical (PHY) layer authentication …
New security mechanisms of high-reliability IoT communication based on radio frequency fingerprint
Nowadays, the serious security threat of industrial control system and sensors has become a
major challenge with the rapid development of Industrial Internet of Things (IIoT). Man-in-the …
major challenge with the rapid development of Industrial Internet of Things (IIoT). Man-in-the …
An adaptive specific emitter identification system for dynamic noise domain
M Zeng, Z Liu, Z Wang, H Liu, Y Li… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
With the sharply increasing number of wireless devices, specific emitter identification (SEI)
technology based on radio frequency fingerprint (RFF) is employed to enhance devices' …
technology based on radio frequency fingerprint (RFF) is employed to enhance devices' …
Wireless device identification based on radio frequency fingerprint features
With the development of the Internet of Things (IoT) technology and the rapid deployment of
5G wireless, more and more radiation devices are appearing in the increasingly complex …
5G wireless, more and more radiation devices are appearing in the increasingly complex …
[HTML][HTML] Game-theoretic physical layer authentication for spoofing detection in internet of things
Abstract The Internet of Things (IoT) has permeated various fields relevant to our lives. In
these applications, countless IoT devices transmit vast amounts of data, which often carry …
these applications, countless IoT devices transmit vast amounts of data, which often carry …
Radio frequency fingerprint-based intelligent mobile edge computing for internet of things authentication
In this paper, a light-weight radio frequency fingerprinting identification (RFFID) scheme that
combines with a two-layer model is proposed to realize authentications for a large number of …
combines with a two-layer model is proposed to realize authentications for a large number of …
Real-world ADS-B signal recognition based on radio frequency fingerprinting
To meet the future needs of increasingly crowded airspace, the International Civil Aviation
Organization (ICAO) proposed to use the Automatic Dependent Surveillance-Broadcast …
Organization (ICAO) proposed to use the Automatic Dependent Surveillance-Broadcast …
Clustering based physical-layer authentication in edge computing systems with asymmetric resources
In this paper, we propose a clustering based physical-layer authentication scheme (CPAS)
to overcome the drawback of traditional cipher-based authentication schemes that suffer …
to overcome the drawback of traditional cipher-based authentication schemes that suffer …