Physical layer security for authentication, confidentiality, and malicious node detection: a paradigm shift in securing IoT networks

E Illi, M Qaraqe, S Althunibat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The pervasiveness of commercial Internet of Things (IoT) around the globe is expected to
reach significant levels with the upcoming sixth generation of mobile networks (6G) …

A survey of physical-layer authentication in wireless communications

N **e, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

Physical layer covert communication in B5G wireless networks—its research, applications, and challenges

Y Jiang, L Wang, HH Chen, X Shen - Proceedings of the IEEE, 2024 - ieeexplore.ieee.org
Physical layer covert communication is a crucial secure communication technology that
enables a transmitter to convey information covertly to a recipient without being detected by …

Physical-layer authentication using multiple channel-based features

N **e, J Chen, L Huang - IEEE transactions on information …, 2021 - ieeexplore.ieee.org
This paper concerns the problem of authenticating the transmitter without a secret key. In
comparison with traditional cryptographic-based authentication mechanisms, the Physical …

Threat analysis for space information network based on network security attributes: a review

X Wu, Y Du, T Fan, J Guo, J Ren, R Wu… - Complex & Intelligent …, 2023 - Springer
Abstract Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to
the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much …

Multi-user physical layer authentication based on CSI using ResNet in mobile IIoT

T **g, H Huang, Q Gao, Y Wu, Y Huo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In the context of the industrial Internet of Things (IIoT), communication devices are typically
mobile, increasing the complexity and diversity of channels due to metal device occlusion. A …

Smart applications in edge computing: Overview on authentication and data security

X Li, T Chen, Q Cheng, S Ma… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
As a new computing paradigm, edge computing has appeared in the public field of vision
recently. Owing to its advantages of low delay and fast response, edge computing has …

Exploiting carrier frequency offset and phase noise for physical layer authentication in UAV-aided communication systems

Y Teng, P Zhang, Y Liu, J Dong… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper exploits two intrinsic hardware-specific fingerprints in terms of carrier frequency
offset (CFO) and phase noise (PHN) to propose a two-dimensional physical layer …

Phy-layer authentication exploiting channel sparsity in mmwave mimo uav-ground systems

Y Teng, P Zhang, X Chen, X Jiang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper exploits the efficient channel modeling and channel sparsity to propose a novel
Physical (PHY)-layer authentication framework for a Millimeter Wave (mmWave) Multiple …

Physical layer authentication based on channel polarization response in dual-polarized antenna communication systems

Y Wu, D Wei, C Guo, W Huang - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This study presents a novel approach for physical layer authentication based on channel
polarization response (CPR). CPR is sensitive to variation in the physical properties of …