A survey of physical-layer authentication in wireless communications
Authentication is an important issue in wireless communications because the open nature of
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
the wireless medium provides more security vulnerabilities. Recently, Physical-Layer …
A survey of physical layer techniques for secure wireless communications in industry
The industrial environment poses strict requirements to the infrastructure of good and
service production and delivery. Communications are not an exception. Wired systems …
service production and delivery. Communications are not an exception. Wired systems …
An efficient cross-layer authentication scheme for secure communication in vehicular ad-hoc networks
Intelligent transportation systems contribute to improved traffic safety by facilitating real-time
communication between vehicles and infrastructures. In this context, message …
communication between vehicles and infrastructures. In this context, message …
[HTML][HTML] Adaptive chaotic map-based key extraction for efficient cross-layer authentication in VANETs
Abstract Vehicle-to-everything (V2X) communication is expected to offer users available and
ultra-reliable transmission, particularly for critical applications related to safety and …
ultra-reliable transmission, particularly for critical applications related to safety and …
{PhyAuth}:{Physical-Layer} Message Authentication for {ZigBee} Networks
ZigBee is a popular wireless communication standard for Internet of Things (IoT) networks.
Since each ZigBee network uses hop-by-hop network-layer message authentication based …
Since each ZigBee network uses hop-by-hop network-layer message authentication based …
[HTML][HTML] How secure are our roads? An in-depth review of authentication in vehicular communications
Intelligent transportation systems are pivotal in enhancing road safety by enabling intra-
vehicle communication. Due to the nature of the wireless communication link, several …
vehicle communication. Due to the nature of the wireless communication link, several …
Blind Tag-Based Physical-Layer Authentication
In comparison with upper-layer authentication mechanisms, the tag-based Physical-Layer
Authentication (PLA) attracts many research interests because of high security and low …
Authentication (PLA) attracts many research interests because of high security and low …
Physical layer authentication with high compatibility using an encoding approach
This paper concerns the problem of improving compatibility in the tag-based Physical-Layer
Authentication (PLA) without sacrificing robustness of the PLA schemes. The prior PLA …
Authentication (PLA) without sacrificing robustness of the PLA schemes. The prior PLA …
On the effect of malicious user on D2D cluster: CSI forgery and countermeasures
Device-to-device (D2D) communication in cellular networks refers to a technology that
enables direct transmission and reception between devices in proximity without …
enables direct transmission and reception between devices in proximity without …
Physical-Layer Authentication in the Presence of Cooperative Adversarial Attacks
This paper tackles a notable security loophole in tag-based Physical-Layer Authentication
(PLA) when faced with cooperative attacks, highlighting its significance due to two main …
(PLA) when faced with cooperative attacks, highlighting its significance due to two main …