A survey of physical-layer authentication in wireless communications

N **e, Z Li, H Tan - IEEE Communications Surveys & Tutorials, 2020‏ - ieeexplore.ieee.org
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …

A survey of physical layer techniques for secure wireless communications in industry

P Angueira, I Val, J Montalban, Ó Seijo… - … Surveys & Tutorials, 2022‏ - ieeexplore.ieee.org
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …

An efficient cross-layer authentication scheme for secure communication in vehicular ad-hoc networks

MA Shawky, M Bottarelli, G Epiphaniou… - IEEE Transactions …, 2023‏ - ieeexplore.ieee.org
Intelligent transportation systems contribute to improved traffic safety by facilitating real-time
communication between vehicles and infrastructures. In this context, message …

[HTML][HTML] Adaptive chaotic map-based key extraction for efficient cross-layer authentication in VANETs

MA Shawky, M Usman, MA Imran, QH Abbasi… - Vehicular …, 2023‏ - Elsevier
Abstract Vehicle-to-everything (V2X) communication is expected to offer users available and
ultra-reliable transmission, particularly for critical applications related to safety and …

{PhyAuth}:{Physical-Layer} Message Authentication for {ZigBee} Networks

A Li, J Li, D Han, Y Zhang, T Li, T Zhu… - 32nd USENIX Security …, 2023‏ - usenix.org
ZigBee is a popular wireless communication standard for Internet of Things (IoT) networks.
Since each ZigBee network uses hop-by-hop network-layer message authentication based …

[HTML][HTML] How secure are our roads? An in-depth review of authentication in vehicular communications

MA Shawky, ST Shah, M Abdrabou, M Usman… - Vehicular …, 2024‏ - Elsevier
Intelligent transportation systems are pivotal in enhancing road safety by enabling intra-
vehicle communication. Due to the nature of the wireless communication link, several …

Blind Tag-Based Physical-Layer Authentication

C Wang, M Sha, W **ong, N **e, R Mao… - IEEE/ACM …, 2024‏ - ieeexplore.ieee.org
In comparison with upper-layer authentication mechanisms, the tag-based Physical-Layer
Authentication (PLA) attracts many research interests because of high security and low …

Physical layer authentication with high compatibility using an encoding approach

N **e, W **ong, M Sha, T Hu, P Zhang… - IEEE Transactions …, 2022‏ - ieeexplore.ieee.org
This paper concerns the problem of improving compatibility in the tag-based Physical-Layer
Authentication (PLA) without sacrificing robustness of the PLA schemes. The prior PLA …

On the effect of malicious user on D2D cluster: CSI forgery and countermeasures

I Bang, VAS Manya, J Kim, T Kim - IEEE Access, 2023‏ - ieeexplore.ieee.org
Device-to-device (D2D) communication in cellular networks refers to a technology that
enables direct transmission and reception between devices in proximity without …

Physical-Layer Authentication in the Presence of Cooperative Adversarial Attacks

J Liang, Y Li, Y Cai, Y Chen, N **e… - IEEE Transactions on …, 2025‏ - ieeexplore.ieee.org
This paper tackles a notable security loophole in tag-based Physical-Layer Authentication
(PLA) when faced with cooperative attacks, highlighting its significance due to two main …