A survey of physical-layer authentication in wireless communications

N **e, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

Physical layer security for next generation wireless networks: Theories, technologies, and challenges

Y Liu, HH Chen, L Wang - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …

The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges

M Waqas, S Tu, Z Halim, SU Rehman, G Abbas… - Artificial Intelligence …, 2022 - Springer
Security is one of the biggest challenges concerning networks and communications. The
problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence …

Principles of physical layer security in multiuser wireless networks: A survey

A Mukherjee, SAA Fakoorian, J Huang… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
This paper provides a comprehensive review of the domain of physical layer security in
multiuser wireless networks. The essential premise of physical layer security is to enable the …

PHY-layer spoofing detection with reinforcement learning in wireless networks

L **ao, Y Li, G Han, G Liu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we investigate the PHY-layer authentication that exploits radio channel
information (such as received signal strength indicators) to detect spoofing attacks in …

PHY-layer authentication with multiple landmarks with reduced overhead

L **ao, X Wan, Z Han - IEEE Transactions on Wireless …, 2017 - ieeexplore.ieee.org
Physical (PHY)-layer authentication systems can exploit channel state information of radio
transmitters to detect spoofing attacks in wireless networks. The use of multiple landmarks …

Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city

D Wang, B Bai, K Lei, W Zhao, Y Yang, Z Han - IEEE Access, 2019 - ieeexplore.ieee.org
Heterogeneous Internet of Things (IoT) and multi-access mobile edge computing (MA-MEC)
are believed as supporting technologies for building a smart city. The advancement and …

An efficient cross-layer authentication scheme for secure communication in vehicular ad-hoc networks

MA Shawky, M Bottarelli, G Epiphaniou… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Intelligent transportation systems contribute to improved traffic safety by facilitating real-time
communication between vehicles and infrastructures. In this context, message …

[HTML][HTML] Deep-learning-based physical layer authentication for industrial wireless sensor networks

RF Liao, H Wen, J Wu, F Pan, A Xu, Y Jiang, F **e… - sensors, 2019 - mdpi.com
In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is
proposed to enhance the security of industrial wireless sensor networks (IWSNs). Three …

Physical-layer authentication based on extreme learning machine

N Wang, T Jiang, S Lv, L **ao - IEEE Communications Letters, 2017 - ieeexplore.ieee.org
Most physical-layer authentication techniques use hypothesis tests to compare the radio
channel information with the channel record of Alice to detect spoofer Eve in wireless …