Journal articles on the topic 'Physical layer authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Physical layer authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yu, Paul L., John S. Baras, and Brian M. Sadler. "Physical-Layer Authentication." IEEE Transactions on Information Forensics and Security 3, no. 1 (2008): 38–51. http://dx.doi.org/10.1109/tifs.2007.916273.
Full textLavanya, D. L., R. Ramaprabha, and K. Gunaseelan. "Privacy Preserving Physical Layer Authentication Scheme for LBS based Wireless Networks." Defence Science Journal 71, no. 2 (2021): 241–47. http://dx.doi.org/10.14429/dsj.71.15355.
Full textChen, Songlin, Hong Wen, Jinsong Wu, et al. "Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm." Wireless Communications and Mobile Computing 2018 (October 2, 2018): 1–10. http://dx.doi.org/10.1155/2018/6039878.
Full textShi, Zhi Yuan, Chang Zheng Zhang, Cai Dan Zhao, Lian Fen Huang, and Yi Feng Zhao. "One Solution to Physical-Layer Authentication in Wireless Communication System." Advanced Materials Research 791-793 (September 2013): 2071–75. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.2071.
Full textXie, Ning, and Changsheng Chen. "Slope Authentication at the Physical Layer." IEEE Transactions on Information Forensics and Security 13, no. 6 (2018): 1579–94. http://dx.doi.org/10.1109/tifs.2018.2797963.
Full textChen, Yi, Hong Wen, Jinsong Wu, et al. "Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources." Sensors 19, no. 8 (2019): 1926. http://dx.doi.org/10.3390/s19081926.
Full textJing, Tao, Hongyan Huang, Yue Wu, Qinghe Gao, Yan Huo, and Jiayu Sun. "Threshold-free multi-attributes physical layer authentication based on expectation–conditional maximization channel estimation in Internet of Things." International Journal of Distributed Sensor Networks 18, no. 7 (2022): 155013292211078. http://dx.doi.org/10.1177/15501329221107822.
Full textQiu, Xiaoying, Xuan Sun, and Monson Hayes. "Enhanced Security Authentication Based on Convolutional-LSTM Networks." Sensors 21, no. 16 (2021): 5379. http://dx.doi.org/10.3390/s21165379.
Full textZhang, Xiaolong, Wei Wu, and Bin Zhou. "Secure Physical Layer Transmission and Authentication Mechanism Based on Compressed Sensing of Multiple Antenna Arrays." Journal of Sensors 2021 (November 10, 2021): 1–11. http://dx.doi.org/10.1155/2021/7022297.
Full textLiao, Run-Fa, Hong Wen, Jinsong Wu, et al. "Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks." Sensors 19, no. 11 (2019): 2440. http://dx.doi.org/10.3390/s19112440.
Full textAyyildiz, Cem, Ramazan Cetin, Zulfidin Khodzhaev, et al. "Physical layer authentication for extending battery life." Ad Hoc Networks 123 (December 2021): 102683. http://dx.doi.org/10.1016/j.adhoc.2021.102683.
Full textYu, Paul L., Gunjan Verma, and Brian M. Sadler. "Wireless physical layer authentication via fingerprint embedding." IEEE Communications Magazine 53, no. 6 (2015): 48–53. http://dx.doi.org/10.1109/mcom.2015.7120016.
Full textWu, Xiaofu, and Zhen Yang. "Physical-Layer Authentication for Multi-Carrier Transmission." IEEE Communications Letters 19, no. 1 (2015): 74–77. http://dx.doi.org/10.1109/lcomm.2014.2375191.
Full textCobb, William E., Eric D. Laspe, Rusty O. Baldwin, Michael A. Temple, and Yong C. Kim. "Intrinsic Physical-Layer Authentication of Integrated Circuits." IEEE Transactions on Information Forensics and Security 7, no. 1 (2012): 14–24. http://dx.doi.org/10.1109/tifs.2011.2160170.
Full textLI, Min, Shaoquan JIANG, and Yongjian LIAO. "Physical-Layer Authentication via a Dynamic Scaling." Chinese Journal of Electronics 29, no. 4 (2020): 651–59. http://dx.doi.org/10.1049/cje.2020.05.009.
Full textWang, Shaoyu, Kaizhi Huang, Xiaoming Xu, Xiaoyan Hu, Jing Yang, and Liang Jin. "Unconditional Authentication Based on Physical Layer Offered Chain Key in Wireless Communication." Entropy 24, no. 4 (2022): 488. http://dx.doi.org/10.3390/e24040488.
Full textCheng, Longwang, Li Zhou, Boon-Chong Seet, Wei Li, Dongtang Ma, and Jibo Wei. "Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase." Mobile Information Systems 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/7393526.
Full textAlhoraibi, Lamia, Daniyal Alghazzawi, Reemah Alhebshi, and Osama Bassam J. Rabie. "Physical Layer Authentication in Wireless Networks-Based Machine Learning Approaches." Sensors 23, no. 4 (2023): 1814. http://dx.doi.org/10.3390/s23041814.
Full textXie, Ning, Junjie Chen, and Lei Huang. "Physical-Layer Authentication Using Multiple Channel-Based Features." IEEE Transactions on Information Forensics and Security 16 (2021): 2356–66. http://dx.doi.org/10.1109/tifs.2021.3054534.
Full textXie, Ning, Haijun Tan, Lei Huang, and Alex X. Liu. "Physical-Layer Authentication in Wirelessly Powered Communication Networks." IEEE/ACM Transactions on Networking 29, no. 4 (2021): 1827–40. http://dx.doi.org/10.1109/tnet.2021.3071670.
Full textXie, Ning, and TianXing Hu. "Improving the covertness in the physical-layer authentication." China Communications 18, no. 3 (2021): 122–31. http://dx.doi.org/10.23919/jcc.2021.03.010.
Full textWang, Ning, Ting Jiang, Shichao Lv, and Liang Xiao. "Physical-Layer Authentication Based on Extreme Learning Machine." IEEE Communications Letters 21, no. 7 (2017): 1557–60. http://dx.doi.org/10.1109/lcomm.2017.2690437.
Full textBaracca, Paolo, Nicola Laurenti, and Stefano Tomasin. "Physical Layer Authentication over MIMO Fading Wiretap Channels." IEEE Transactions on Wireless Communications 11, no. 7 (2012): 2564–73. http://dx.doi.org/10.1109/twc.2012.051512.111481.
Full textLiu, Jiazi, Ahmed Refaey, Xianbin Wang, and Helen Tang. "Reliability enhancement for CIR-based physical layer authentication." Security and Communication Networks 8, no. 4 (2014): 661–71. http://dx.doi.org/10.1002/sec.1014.
Full textNagamani, K., and R. Monisha. "Physical Layer Security Using Cross Layer Authentication for AES-ECDSA Algorithm." Procedia Computer Science 215 (2022): 380–92. http://dx.doi.org/10.1016/j.procs.2022.12.040.
Full textPoor, H. Vincent, and Rafael F. Schaefer. "Wireless physical layer security." Proceedings of the National Academy of Sciences 114, no. 1 (2016): 19–26. http://dx.doi.org/10.1073/pnas.1618130114.
Full textWang, Ge, Shouqian Shi, Minmei Wang, et al. "RF-Chain." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, no. 4 (2022): 1–28. http://dx.doi.org/10.1145/3569493.
Full textBai, Lin, Lina Zhu, Jianwei Liu, Jinho Choi, and Wei Zhang. "Physical layer authentication in wireless communication networks: A survey." Journal of Communications and Information Networks 5, no. 3 (2020): 237–64. http://dx.doi.org/10.23919/jcin.2020.9200889.
Full textXie, Ning, Shengli Zhang, and Alex X. Liu. "Physical-Layer Authentication in Non-Orthogonal Multiple Access Systems." IEEE/ACM Transactions on Networking 28, no. 3 (2020): 1144–57. http://dx.doi.org/10.1109/tnet.2020.2979058.
Full textFang, He, Xianbin Wang, and Lajos Hanzo. "Learning-Aided Physical Layer Authentication as an Intelligent Process." IEEE Transactions on Communications 67, no. 3 (2019): 2260–73. http://dx.doi.org/10.1109/tcomm.2018.2881117.
Full textYu, Paul L., and Brian M. Sadler. "MIMO Authentication via Deliberate Fingerprinting at the Physical Layer." IEEE Transactions on Information Forensics and Security 6, no. 3 (2011): 606–15. http://dx.doi.org/10.1109/tifs.2011.2134850.
Full textLiu, Jiazi, and Xianbin Wang. "Physical Layer Authentication Enhancement Using Two-Dimensional Channel Quantization." IEEE Transactions on Wireless Communications 15, no. 6 (2016): 4171–82. http://dx.doi.org/10.1109/twc.2016.2535442.
Full textWen, Hong, Yifan Wang, Liang Zhou, Xiping Zhu, and Jianqiang Li. "Physical layer assist authentication technique for smart meter system." IET Communications 7, no. 3 (2013): 189–97. http://dx.doi.org/10.1049/iet-com.2012.0300.
Full textAlthunibat, Saud, Victor Sucasas, Georgios Mantas, and Jonathan Rodriguez. "Physical-layer entity authentication scheme for mobile MIMO systems." IET Communications 12, no. 6 (2018): 712–18. http://dx.doi.org/10.1049/iet-com.2017.0518.
Full textQiu, Xiaoying, Ting Jiang, Sheng Wu, and Monson Hayes. "Physical Layer Authentication Enhancement Using a Gaussian Mixture Model." IEEE Access 6 (2018): 53583–92. http://dx.doi.org/10.1109/access.2018.2871514.
Full textChen, Dajiang, Ning Zhang, Nan Cheng, Kuan Zhang, Zhiguang Qin, and Xuemin Shen. "Physical Layer based Message Authentication with Secure Channel Codes." IEEE Transactions on Dependable and Secure Computing 17, no. 5 (2020): 1079–93. http://dx.doi.org/10.1109/tdsc.2018.2846258.
Full textTomasin, Stefano, Hongliang Zhang, Arsenia Chorti, and H. Vincent Poor. "Challenge-Response Physical Layer Authentication over Partially Controllable Channels." IEEE Communications Magazine 60, no. 12 (2022): 138–44. http://dx.doi.org/10.1109/mcom.001.2200339.
Full textLiu, Jiazi, Xianbin Wang, and Helen Tang. "Physical Layer Authentication Enhancement Using Maximum SNR Ratio Based Cooperative AF Relaying." Wireless Communications and Mobile Computing 2017 (2017): 1–16. http://dx.doi.org/10.1155/2017/7206187.
Full textHazratifard, Mehdi, Fayez Gebali, and Mohammad Mamun. "Using Machine Learning for Dynamic Authentication in Telehealth: A Tutorial." Sensors 22, no. 19 (2022): 7655. http://dx.doi.org/10.3390/s22197655.
Full textXia, Shida, Xiaofeng Tao, Na Li, et al. "Multiple Correlated Attributes Based Physical Layer Authentication in Wireless Networks." IEEE Transactions on Vehicular Technology 70, no. 2 (2021): 1673–87. http://dx.doi.org/10.1109/tvt.2021.3055563.
Full textPerazzone, Jake Bailey, Paul L. Yu, Brian M. Sadler, and Rick S. Blum. "Artificial Noise-Aided MIMO Physical Layer Authentication With Imperfect CSI." IEEE Transactions on Information Forensics and Security 16 (2021): 2173–85. http://dx.doi.org/10.1109/tifs.2021.3050599.
Full textXiao, Liang, Xiaozhen Lu, Tangwei Xu, Weihua Zhuang, and Huaiyu Dai. "Reinforcement Learning-Based Physical-Layer Authentication for Controller Area Networks." IEEE Transactions on Information Forensics and Security 16 (2021): 2535–47. http://dx.doi.org/10.1109/tifs.2021.3056206.
Full textRefaey, Ahmed, Weikun Hou, and Khaled Loukhaoukha. "Multilayer Authentication for Communication Systems Based on Physical-Layer Attributes." Journal of Computer and Communications 02, no. 08 (2014): 64–75. http://dx.doi.org/10.4236/jcc.2014.28007.
Full textLu, Xinjin, Jing Lei, Yuxin Shi, and Wei Li. "Improved Physical Layer Authentication Scheme Based on Wireless Channel Phase." IEEE Wireless Communications Letters 11, no. 1 (2022): 198–202. http://dx.doi.org/10.1109/lwc.2021.3123820.
Full textZhang, Pinchang, Tarik Taleb, Xiaohong Jiang, and Bin Wu. "Physical Layer Authentication for Massive MIMO Systems With Hardware Impairments." IEEE Transactions on Wireless Communications 19, no. 3 (2020): 1563–76. http://dx.doi.org/10.1109/twc.2019.2955128.
Full textWang, Ning, Weiwei Li, Pu Wang, Amir Alipour-Fanid, Long Jiao, and Kai Zeng. "Physical Layer Authentication for 5G Communications: Opportunities and Road Ahead." IEEE Network 34, no. 6 (2020): 198–204. http://dx.doi.org/10.1109/mnet.011.2000122.
Full textVerma, Gunjan, Paul Yu, and Brian M. Sadler. "Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios." IEEE Access 3 (2015): 81–88. http://dx.doi.org/10.1109/access.2015.2398734.
Full textRan, Yachao, Harith Al-Shwaily, Chaoqing Tang, Gui Yun Tian, and Martin Johnston. "Physical layer authentication scheme with channel based tag padding sequence." IET Communications 13, no. 12 (2019): 1776–80. http://dx.doi.org/10.1049/iet-com.2018.5749.
Full textGao, Ning, Qiang Ni, Daquan Feng, Xiaojun Jing, and Yue Cao. "Physical layer authentication under intelligent spoofing in wireless sensor networks." Signal Processing 166 (January 2020): 107272. http://dx.doi.org/10.1016/j.sigpro.2019.107272.
Full textWang, Yupeng, Jianfeng Jin, Yufeng Li, and Chang Choi. "A Reliable Physical Layer Authentication Algorithm for Massive IoT Systems." IEEE Access 8 (2020): 80684–90. http://dx.doi.org/10.1109/access.2020.2989395.
Full text