[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
survey
Free access
Just Accepted

A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven Approaches

Online AM: 16 December 2024 Publication History

Abstract

The open and broadcast nature of wireless mediums introduces significant security vulnerabilities, making authentication a critical concern in wireless networks.
In recent years, Physical-Layer Authentication (PLA) techniques have garnered considerable research interest due to their advantages over Upper-Layer Authentication (ULA) methods, such as lower complexity, enhanced security, and greater compatibility.
The application of signal processing techniques in PLA serves as a crucial link between the extraction of Physical-Layer Features (PLFs) and the authentication of received signals.
Different signal processing approaches, even with the same PLF, can result in varying authentication performances and computational demands.
Despite this, there remains a shortage of comprehensive overviews on state-of-the-art PLA schemes with a focus on signal processing approaches.
This paper presents the first thorough survey of signal processing in various PLA schemes, categorizing existing approaches into model-based and Machine Learning (ML)-based schemes.
We discuss motivation and address key issues in signal processing for PLA schemes.
The applications, challenges, and future research directions of PLA are discussed in Part 3 of the Appendix, which can be found in supplementary materials online.

Supplementary Material for A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven Approaches

PDF File
Supplementary Material

References

[1]
Liza Afeef, Haji M. Furqan, and Hüseyin Arslan. 2022. Physical Layer Authentication Scheme in Beamspace MIMO Systems. IEEE Communications Letters 26 (2022), 1484–1488.
[2]
Waqas Aman, Saif Al-Kuwari, and Marwa Qaraqe. 2023. Location-based Physical Layer Authentication in Underwater Acoustic Communication Networks. ArXiv (2023).
[3]
W. Aman, M. M. U. Rahman, J. Qadir, H. Pervaiz, and Q. Ni. 2018. Impersonation Detection in Line-of-Sight Underwater Acoustic Sensor Networks. IEEE Access 6(2018), 44459–44472.
[4]
L. Bai, L. Zhu, J. Liu, J. Choi, and W. Zhang. 2020. Physical layer authentication in wireless communication networks: A survey. Journal of Communications and Information Networks 5, 3 (2020), 237–264.
[5]
S. Balakrishnan, S. Gupta, A. Bhuyan, P. Wang, D. Koutsonikolas, and Z. Sun. 2020. Physical Layer Identification Based on Spatial-Temporal Beam Features for Millimeter-Wave Wireless Networks. IEEE Transactions on Information Forensics and Security 15 (2020), 1831–1845.
[6]
Gianmarco Baldini, Raimondo Giuliani, and Gary Steri. 2018. Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform. Applied Sciences 8, 11 (2018).
[7]
G. Baldini, R. Giuliani, G. Steri, and R. Neisse. 2017. Physical layer authentication of Internet of Things wireless devices through permutation and dispersion entropy 2. In Global Internet of Things Summit (GIoTS). Geneva, Switzerland, 1–6.
[8]
G. Baldini and G. Steri. 2017. A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components. IEEE Communications Surveys and Tutorials 19, 3 (2017), 1761–1789.
[9]
Christoph Bandt and Bernd Pompe. 2002. Permutation Entropy: A Natural Complexity Measure for Time Series. Physical Review Letters 88, 17 (2002), 174102.
[10]
Jianrong Bao, Xiqi Gao, Xiaorong Xu, Rui Guo, and Bin Jiang. 2016. Low Rate QC LDPC Codes with Reconfigurable Structures for Space Information Networks. Journal of Communications 11, 3 (2016), 255–262.
[11]
Bert den Boer. 1993. A Simple and Key-Economical Unconditional Authentication Scheme. Journal of Computer Security 2 (1993), 65–72.
[12]
D. Chen, N. Zhang, R. Lu, X. Fang, K. Zhang, Z. Qin, and X. Shen. 2018. An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security. IEEE Journal on Selected Areas in Communications 36, 4(2018), 748–761.
[13]
M. Chen, U. Challita, W. Saad, C. Yin, and M. Debbah. 2019. Artificial Neural Networks-Based Machine Learning for Wireless Networks: A Tutorial. IEEE Communications Surveys and Tutorials 21, 4 (2019), 3039–3071.
[14]
S. Chen, Z. Pang, H. Wen, K. Yu, T. Zhang, and Y. Lu. 2021. Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks. IEEE Transactions on Industrial Informatics 17, 3 (2021), 2041–2051.
[15]
Songlin Chen, Hong Wen, Jinsong Wu, Jie Chen, Wenjie Liu, Lin Hu, and Yi Chen. 2018. Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm. Wireless Communications and Mobile Computing (2018), 1–10.
[16]
Y. Chen, P. H. Ho, H. Wen, S. Y. Chang, and S. Real. 2022. On Physical-Layer Authentication via Online Transfer Learning. IEEE Internet of Things Journal 9, 2 (2022), 1374–1385.
[17]
Y. Chen, S. Real, H. Wen, B. Cheng, W. Wang, P. H. Ho, and S. Y. Chang. 2020. On Physical-Layer Authentication via Triple Pool Convolutional Neural Network. In IEEE Globecom Workshops (GC Wkshps). Taipei, China, 1–6.
[18]
Longwang Cheng, Li Zhou, Boon-Chong Seet, Wei Li, Dongtang Ma, and Jibo Wei. 2017. Efficient Physical-Layer Secret Key Generation and Authentication Schemes Based on Wireless Channel-Phase. Mobile Information Systems 2017 (2017), 7393526.
[19]
Zicheng Chi, Yan Li, Hongyu Sun, Yao Yao, Zheng Lu, and Ting Zhu. 2016. B2W2: N-Way Concurrent Communication for IoT Devices. In Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM (Stanford, CA, USA) (SenSys ’16). Association for Computing Machinery, New York, USA, 245–258. https://doi.org/10.1145/2994551.2994561
[20]
Keunwoo Choi, György Fazekas, Mark Sandler, and Kyunghyun Cho. 2017. Convolutional recurrent neural networks for music classification. In IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP). IEEE, New Orleans, USA, 2392–2396.
[21]
Boris Danev, Davide Zanetti, and Srdjan Capkun. 2012. On physical-layer identification of wireless devices. ACM Comput. Surv. 45, 1 (2012), Article 6.
[22]
Roy De Maesschalck, Delphine Jouan-Rimbaud, and Désiré L Massart. 2000. The Mahalanobis Distance. Chemometrics and Intelligent Laboratory Systems 50, 1 (2000), 1–18.
[23]
Whitfield Diffie and Martin E Hellman. 2022. New directions in cryptography. 365–390.
[24]
Ruizhong Du, Lin Zhen, and Yan Liu. 2023. Physical Layer Authentication Based on Integrated Semi-Supervised Learning in Wireless Networks for Dynamic Industrial Scenarios. IEEE Transactions on Vehicular Technology 72, 5 (2023), 6154–6164. https://doi.org/10.1109/TVT.2022.3231633
[25]
H. Fang, X. Wang, and L. Hanzo. 2019. Learning-Aided Physical Layer Authentication as an Intelligent Process. IEEE Transactions on Communications 67, 3 (2019), 2260–2273.
[26]
H. Fang, X. Wang, and S. Tomasin. 2019. Machine Learning for Intelligent Authentication in 5G and Beyond Wireless Networks. IEEE Wireless Communications 26, 5 (2019), 55–61.
[27]
Gerard J Foschini and Michael J Gans. 1998. On limits of wireless communications in a fading environment when using multiple antennas. Wireless Personal Communications 6 (1998), 311–335.
[28]
Yoav Freund and Robert E Schapire. 1997. A Decision-Theoretic Generalization of On-Line Learning and an Application to Boosting. J. Comput. System Sci. 55, 1 (1997), 119–139. https://doi.org/10.1006/jcss.1997.1504
[29]
Demin Gao, Liyuan Ou, Yongrui Chen, Xiuzhen Guo, Ruofeng Liu, Yunhuai Liu, and Tian He. 2024. Physical-layer CTC from BLE to Wi-Fi with IEEE 802.11ax. IEEE Transactions on Mobile Computing(2024), 1–14. https://doi.org/10.1109/TMC.2024.3462941
[30]
Demin Gao, Shuai Wang, Yunhuai Liu, Wenchao Jiang, Zhijun Li, and Tian He. 2021. Spoofing-jamming attack based on cross-technology communication for wireless networks. Computer Communications 177 (2021), 86–95.
[31]
K. St. Germain and F. Kragh. 2020. Multi-Transmitter Physical Layer Authentication Using Channel State Information and Deep Learning. In International Conference on Signal Processing and Communication Systems (ICSPCS). Adelaide, Australia, 1–8.
[32]
K. St. Germain and F. Kragh. 2020. Physical-Layer Authentication Using Channel State Information and Machine Learning. In International Conference on Signal Processing and Communication Systems (ICSPCS). Adelaide, Australia, 1–8.
[33]
K. S. Germain and F. Kragh. 2021. Channel Prediction and Transmitter Authentication With Adversarially-Trained Recurrent Neural Networks. IEEE Open Journal of the Communications Society 2 (2021), 964–974.
[34]
K. S. Germain and F. Kragh. 2021. Mobile Physical-Layer Authentication Using Channel State Information and Conditional Recurrent Neural Networks. In IEEE Vehicular Technology Conference (VTC). Helsinki, Finland, 1–6.
[35]
Kia Ghazaleh, Plets David, Ben Van Herbruggen, Jaron Fontaine, Leen Verloock, Eli De Poorter, and Jukka Talvitie. 2023. UWB CIR Data Collected in 9 Different Environments in Ghent, Belgium.
[36]
Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. Advances in Neural Information Processing Systems 27 (2014).
[37]
Z. Gu, H. Chen, P. Xu, Y. Li, and B. Vucetic. 2020. Physical Layer Authentication for Non-Coherent Massive SIMO-Enabled Industrial IoT Communications. IEEE Transactions on Information Forensics and Security 15 (2020), 3722–3733.
[38]
N. Gulati, R. Greenstadt, K. R. Dandekar, and J. M. Walsh. 2013. GMM Based Semi-Supervised Learning for Channel-Based Authentication Scheme. In IEEE Vehicular Technology Conference (VTC). Las Vegas, USA, 1–6.
[39]
J. Han, C. Qian, P. Yang, D. Ma, Z. Jiang, W. Xi, and J. Zhao. 2016. GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags. IEEE/ACM Transactions on Networking 24, 2 (2016), 846–858.
[40]
K. Hara, D. Saito, and H. Shouno. 2015. Analysis of function of rectified linear unit used in deep learning. In International Joint Conference on Neural Networks (IJCNN). Killarney, Ireland, 1–8.
[41]
Tiep M Hoang, Alireza Vahid, Hoang Duong Tuan, and Lajos Hanzo. 2024. Physical layer authentication and security design in the machine learning era. IEEE Communications Surveys and Tutorials(2024).
[42]
W. Hou, X. Wang, and J. Chouinard. 2012. Physical layer authentication in OFDM systems based on hypothesis testing of CFO estimates. In IEEE International Conference on Communications (ICC). Ottawa, Canada, 3559–3563.
[43]
W. Hou, X. Wang, J. Chouinard, and A. Refaey. 2014. Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets. IEEE Transactions on Communications 62, 5 (2014), 1658–1667.
[44]
Elmehdi Illi, Marwa Qaraqe, Saud Althunibat, Abdullah Alhasanat, Moath Alsafasfeh, Marcus de Ree, Georgios Mantas, Jonathan Rodriguez, Waqas Aman, and Saif Al-Kuwari. 2023. Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks. IEEE Communications Surveys and Tutorials(2023), 1–1.
[45]
Martin Jaggi. 2013. Revisiting Frank-Wolfe: Projection-Free Sparse Convex Optimization. In International Conference on Machine Learning (ICML), Vol.  28. Atlanta, USA, 427–435.
[46]
J. R. Jiang. 2020. Short Survey on Physical Layer Authentication by Machine-Learning for 5G-based Internet of Things. In IEEE International Conference on Knowledge Innovation and Invention (ICKII). Kaohsiung, China, 41–44.
[47]
Yang Jing, Ji Xinsheng, Huang Kaizhi, Chen Yajun, and Qi Xiaohui. 2015. A physical-layer authentication scheme based on hash method. In IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC). Shenzhen, China, 99–104.
[48]
Zhang Jinling, H. Wen, Song Huanhuan, Jiang Yixin, Zhang Zhengguang, Zhang Luping, and Zhu Xiping. 2016. Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System. In IEEE Conference on Communications and Network Security (CNS). Philadelphia, PA, 348–349.
[49]
Li Junhong. 2009. Design of authentication protocols preventing replay attacks. In International Conference on Future BioMedical Information Engineering (FBIE). Sanya, China, 362–365.
[50]
B. Kang, D. G. García, J. Lijffijt, R. Santos-Rodríguez, and T. de Bie. 2021. Conditional t-SNE: More informative t-SNE embeddings. In IEEE International Conference on Data Science and Advanced Analytics (DSAA). Porto, Portugal, 1–2.
[51]
Kazuya Kawakami. 2008. Supervised sequence labelling with recurrent neural networks. Ph. D. Dissertation. Technical University of Munich.
[52]
Steven M. Kay. 1998. Fundamentals of Statistical Signal Processing: Detection Theory. Prentice Hall PTR, New Jersey, USA.
[53]
M. Khalid, R. Zhao, and N. Ahmed. 2020. Physical Layer Authentication in Line-of-Sight Underwater Acoustic Sensor Networks. In Global Oceans 2020: Singapore – U.S. Gulf Coast (OCEANS). Biloxi, USA, 1–5.
[54]
Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature 521, 7553 (2015), 436–444.
[55]
W. Li, N. Wang, L. Jiao, and K. Zeng. 2021. Physical Layer Spoofing Attack Detection in MmWave Massive MIMO 5G Networks. IEEE Access 9(2021), 60419–60432.
[56]
Xingwang Li, Qunshu Wang, Ming Zeng, Yuanwei Liu, Shuping Dang, Theodoros A. Tsiftsis, and Octavia A. Dobre. 2023. Physical-Layer Authentication for Ambient Backscatter-Aided NOMA Symbiotic Systems. IEEE Transactions on Communications 71 (2023), 2288–2303.
[57]
R. Liao, H. Wen, F. Pan, H. Song, A. Xu, and Y. Jiang. 2019. A Novel Physical Layer Authentication Method with Convolutional Neural Network. In IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA). Dalian, China, 231–235.
[58]
R. F. Liao, H. Wen, S. Chen, F. Xie, F. Pan, J. Tang, and H. Song. 2020. Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation. IEEE Internet of Things Journal 7, 3 (2020), 2077–2088.
[59]
Run-Fa Liao, Hong Wen, Jinsong Wu, Fei Pan, Aidong Xu, Yixin Jiang, Feiyi Xie, and Minggui Cao. 2019. Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks. Sensors 19, 11 (2019).
[60]
R. F. Liao, H. Wen, J. Wu, F. Pan, A. Xu, H. Song, F. Xie, Y. Jiang, and M. Cao. 2019. Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication. IEEE Access 7(2019), 116390–116401.
[61]
F. J. Liu, X. Wang, and S. L. Primak. 2013. A two dimensional quantization algorithm for CIR-based physical layer authentication. In IEEE International Conference on Communications (ICC). Budapest, Hungary, 4724–4728.
[62]
F. J. Liu, Wang Xianbin, and H. Tang. 2011. Robust physical layer authentication using inherent properties of channel impulse response. In Military Communications Conference (MILCOM). Baltimore, USA.
[63]
Hongbo Liu, Yan Wang, Jian Liu, Jie Yang, and Yingying Chen. 2014. Practical User Authentication Leveraging Channel State Information (CSI). In ACM Symposium on Information, Computer, and Communications Security (ASIA CCS). Kyoto, Japan, 389–400.
[64]
Hongbo Liu, Wang Yan, Liu Jian, Yang Jie, Yingying Chen, and Vincent Poor. 2018. Authenticating Users through Fine-grained Channel Information. IEEE Transactions on Mobile Computing 17 (2018), 251–264.
[65]
J. Liu and X. Wang. 2016. Physical Layer Authentication Enhancement Using Two-Dimensional Channel Quantization. IEEE Transactions on Wireless Communications 15, 6(2016), 4171–4182.
[66]
Y. Liu, H. H. Chen, and L. Wang. 2017. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges. IEEE Communications Surveys and Tutorials 19, 1 (2017), 347–376.
[67]
Yangyang Liu, Pinchang Zhang, Jun Liu, Yulong Shen, and Xiaohong Jiang. 2023. Exploiting Fine-Grained Channel/Hardware Features for PHY-Layer Authentication in MmWave MIMO Systems. IEEE Transactions on Information Forensics and Security 18 (2023), 4059–4074.
[68]
Bingxian Lu, Zhenquan Qin, Mingyi Yang, Xu Xia, Renjie Zhang, and Lei Wang. 2018. Spoofing Attack Detection Using Physical Layer Information in Cross-Technology Communication. In 2018 15th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON). Hong Kong, China, 1–2. https://doi.org/10.1109/SAHCN.2018.8397149
[69]
X. Lu, J. Lei, Y. Shi, and W. Li. 2022. Improved Physical Layer Authentication Scheme Based on Wireless Channel Phase. IEEE Wireless Communications Letters 11, 1 (2022), 198–202.
[70]
Larry R Medsker and LC Jain. 2001. Recurrent neural networks. Design and Applications 5, 64-67 (2001), 2.
[71]
Mehdi Mirza and Simon Osindero. 2014. Conditional Generative Adversarial Nets. ArXiv abs/1411.1784(2014). https://api.semanticscholar.org/CorpusID:12803511
[72]
Gabriele Oligeri, Savio Sciancalepore, Simone Raponi, and Roberto Di Pietro. 2023. PAST-AI: Physical-Layer Authentication of Satellite Transmitters via Deep Learning. IEEE Transactions on Information Forensics and Security 18 (2023), 274–289.
[73]
F. Pan, Z. Pang, M. Luvisotto, M. Xiao, and H. Wen. 2018. Physical-Layer Security for Industrial Wireless Control Systems: Basics and Future Directions. IEEE Industrial Electronics Magazine 12, 4 (2018), 18–27.
[74]
F. Pan, Z. Pang, H. Wen, M. Luvisotto, M. Xiao, R. Liao, and J. Chen. 2019. Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS. IEEE Transactions on Industrial Informatics 15, 12 (2019), 6481–6491.
[75]
F. Pan, H. Wen, R. Liao, Y. Jiang, A. Xu, K. Ouyang, and X. Zhu. 2017. Physical layer authentication based on channel information and machine learning. In IEEE Conference on Communications and Network Security (CNS). Las Vegas, USA, 364–365.
[76]
C. Pei, N. Zhang, X. S. Shen, and J. W. Mark. 2014. Channel-based physical layer authentication. In IEEE Global Communications Conference (GLOBECOM). Austin, USA, 4114–4119.
[77]
L. Peng, J. Zhang, M. Liu, and A. Hu. 2020. Deep Learning Based RF Fingerprint Identification Using Differential Constellation Trace Figure. IEEE Transactions on Vehicular Technology 69, 1 (2020), 1091–1095.
[78]
X. Qiu, J. Dai, and M. Hayes. 2020. A Learning Approach for Physical Layer Authentication Using Adaptive Neural Network. IEEE Access 8(2020), 26139–26149.
[79]
X. Qiu, Z. Du, and X. Sun. 2019. Artificial Intelligence-Based Security Authentication: Applications in Wireless Multimedia Networks. IEEE Access 7(2019), 172004–172011.
[80]
X. Qiu, T. Jiang, S. Wu, and M. Hayes. 2018. Physical Layer Authentication Enhancement Using a Gaussian Mixture Model. IEEE Access 6(2018), 53583–53592.
[81]
Richard A Roberts and Clifford T Mullis. 1987. Digital signal processing. Addison-Wesley Longman Co., Massachusetts, USA.
[82]
Pieter Robyns, Eduard Marin, Wim Lamotte, Peter Quax, Dave Singelée, and Bart Preneel. 2017. Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning. In ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec). Boston, USA, 58–63.
[83]
M. Rostaghi and H. Azami. 2016. Dispersion Entropy: A Measure for Time-Series Analysis. IEEE Signal Processing Letters 23, 5 (2016), 610–614.
[84]
S. Rumpel, A. Wolf, and E. A. Jorswieck. 2016. Physical layer based authentication without phase detection. In Asilomar Conference on Signals, Systems and Computers (ACSSC). Pacific Grove, USA, 1675–1679.
[85]
A. S. Saqlain, F. Fang, T. Ahmad, L. Wang, and Z. u. Abidin. 2021. Evolution and effectiveness of loss functions in generative adversarial networks. China Communications 18, 10 (2021), 45–76.
[86]
Jürgen Schmidhuber. 2015. Deep learning in neural networks: An overview. Neural Networks 61(2015), 85–117.
[87]
L. Senigagliesi, M. Baldi, and E. Gambi. 2019. Statistical and Machine Learning-Based Decision Techniques for Physical Layer Authentication. In IEEE Global Communications Conference (GLOBECOM). Waikoloa, USA, 1–6.
[88]
L. Senigagliesi, M. Baldi, and E. Gambi. 2020. Physical Layer Authentication Techniques based on Machine Learning with Data Compression. In IEEE Conference on Communications and Network Security (CNS). Avignon, France, 1–6.
[89]
L. Senigagliesi, M. Baldi, and E. Gambi. 2021. Comparison of Statistical and Machine Learning Techniques for Physical Layer Authentication. IEEE Transactions on Information Forensics and Security 16 (2021), 1506–1521.
[90]
L. Senigagliesi, M. Baldi, and E. Gambi. 2021. Physical Layer Authentication with Cooperative Wireless Communications and Machine Learning. In IEEE Latin-American Conference on Communications (LATINCOM). Santo Domingo, Dominican Republic, 1–6.
[91]
L. Senigagliesi, L. Cintioni, M. Baldi, and E. Gambi. 2019. Blind Physical Layer Authentication over Fading Wireless Channels through Machine Learning. In IEEE International Workshop on Information Forensics and Security (WIFS). Delft, Netherlands, 1–6.
[92]
D. Shan, K. Zeng, W. Xiang, P. Richardson, and Y. Dong. 2013. PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks. IEEE Journal on Selected Areas in Communications 31, 9(2013), 1817–1827.
[93]
Karl J Smith. 2013. Precalculus: A Functional Approach to Graphing and Problem Solving. Jones and Bartlett Learning, Burlington, USA.
[94]
R. S. Sutton and A. G. Barto. 1998. Reinforcement Learning: An Introduction. IEEE Transactions on Neural Networks 9, 5 (1998), 1054–1054.
[95]
Daniel Svozil, Vladimir Kvasnicka, and Jiri Pospichal. 1997. Introduction to multi-layer feed-forward neural networks. Chemometrics and Intelligent Laboratory Systems 39, 1 (1997), 43–62.
[96]
Jie Tang, Hong Wen, and Huanhuan Song. 2022. Physical layer authentication for 5G/6G millimeter wave communications by using channel sparsity. IET Communications 16, 3 (2022), 206–217.
[97]
J. Tang, A. Xu, Y. Jiang, Y. Zhang, H. Wen, and T. Zhang. 2020. MmWave MIMO Physical layer Authentication by Using Channel Sparsity. In IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS). Dalian, China, 221–224.
[98]
Michel Tokic. 2010. Adaptive ε-greedy exploration in reinforcement learning based on value differences. In Annual German Conference on AI (KI). Springer, Karlsruhe, Germany, 203–210.
[99]
J. K. Tugnait and H. Kim. 2010. A channel-based hypothesis testing approach to enhance user authentication in wireless networks. In International Conference on Communication Systems and Networks (COMSNETS). Bangalore, India, 1–9.
[100]
Bill Waggener and William N Waggener. 1995. Pulse code modulation techniques. Springer Science and Business Media, Berlin, German.
[101]
X. Wan, L. Xiao, Q. Li, and Z. Han. 2017. PHY-layer authentication with multiple landmarks with reduced communication overhead. In IEEE International Conference on Communications (ICC). Paris, France, 1–6.
[102]
N. Wang, T. Jiang, S. Lv, and L. Xiao. 2017. Physical-Layer Authentication Based on Extreme Learning Machine. IEEE Communications Letters 21, 7 (2017), 1557–1560.
[103]
N. Wang, W. Li, P. Wang, A. Alipour-Fanid, L. Jiao, and K. Zeng. 2020. Physical Layer Authentication for 5G Communications: Opportunities and Road Ahead. IEEE Network 34, 6 (2020), 198–204.
[104]
Q. Wang, H. Li, D. Zhao, Z. Chen, S. Ye, and J. Cai. 2019. Deep Neural Networks for CSI-Based Authentication. IEEE Access 7(2019), 123026–123034.
[105]
Shaoyu Wang, Kaizhi Huang, Xiaoming Xu, Zhou Zhong, and You Zhou. 2022. CSI-Based Physical Layer Authentication via Deep Learning. IEEE Wireless Communications Letters 11 (2022), 1748–1752.
[106]
S. Wang, N. Li, S. Xia, X. Tao, and H. Lu. 2021. Collaborative Physical Layer Authentication in Internet of Things Based on Federated Learning. In IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). Helsinki, Finland, 714–719.
[107]
Wei Wang, Xin Liu, Zicheng Chi, Stuart Ray, and Ting Zhu. 2024. Key Establishment for Secure Asymmetric Cross-Technology Communication. In Proceedings of the 19th ACM Asia Conference on Computer and Communications Security. 412–422.
[108]
X. Wang, P. Hao, and L. Hanzo. 2016. Physical-layer authentication for wireless security enhancement: current challenges and future developments. IEEE Communications Magazine 54, 6 (2016), 152–158.
[109]
X. Wang, G. Wang, R. He, and Y. Zou. 2017. Uplink channel estimation with basis expansion model and expectation maximization for wireless communication systems on high speed railways. In International Conference on Communications in China (ICCC). Qingdao, China, 1–5.
[110]
Y. Wang, J. Jin, Y. Li, and C. Choi. 2020. A Reliable Physical Layer Authentication Algorithm for Massive IoT Systems. IEEE Access 8(2020), 80684–80690.
[111]
A. Weinand, M. Karrenbauer, J. Lianghai, and H. D. Schotten. 2017. Physical Layer Authentication for Mission Critical Machine Type Communication Using Gaussian Mixture Model Based Clustering. In IEEE Vehicular Technology Conference (VTC Spring). Sydney, Australia, 1–5.
[112]
A. Weinand, M. Karrenbauer, R. Sattiraju, and H. Schotten. 2017. Application of Machine Learning for Channel based Message Authentication in Mission Critical Machine Type Communication. In European Wireless Conference (EWC). Dresden, Germany, 1–5.
[113]
X. Wu and Z. Yang. 2015. Physical-Layer Authentication for Multi-Carrier Transmission. IEEE Communications Letters 19, 1 (2015), 74–77.
[114]
X. Wu, Z. Yang, C. Ling, and X. G. Xia. 2016. Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission. IEEE Transactions on Wireless Communications 15, 10(2016), 6611–6625.
[115]
Yuemei Wu, Dong Wei, Caili Guo, and Weiqing Huang. 2023. Physical Layer Authentication Based on Channel Polarization Response in Dual-Polarized Antenna Communication Systems. IEEE Transactions on Information Forensics and Security 18 (2023), 2144–2159.
[116]
S. Xia, X. Tao, N. Li, S. Wang, T. Sui, H. Wu, J. Xu, and Z. Han. 2021. Multiple Correlated Attributes Based Physical Layer Authentication in Wireless Networks. IEEE Transactions on Vehicular Technology 70, 2 (2021), 1673–1687.
[117]
L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe. 2008. Using the physical layer for wireless authentication in time-variant channels. IEEE Transactions on Wireless Communications 7, 7(2008), 2571–2579.
[118]
L. Xiao, Y. Li, G. Han, G. Liu, and W. Zhuang. 2016. PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks. IEEE Transactions on Vehicular Technology 65, 12 (2016), 10037–10047.
[119]
L. Xiao, Y. Li, G. Liu, Q. Li, and W. Zhuang. 2015. Spoofing Detection with Reinforcement Learning in Wireless Networks. In IEEE Global Communications Conference (GLOBECOM). San Diego, USA., 1–5.
[120]
L. Xiao, X. Lu, T. Xu, W. Zhuang, and H. Dai. 2021. Reinforcement Learning-Based Physical-Layer Authentication for Controller Area Networks. IEEE Transactions on Information Forensics and Security 16 (2021), 2535–2547.
[121]
L. Xiao, G. Sheng, X. Wan, W. Su, and P. Cheng. 2019. Learning-Based PHY-Layer Authentication for Underwater Sensor Networks. IEEE Communications Letters 23, 1 (2019), 60–63.
[122]
L. Xiao, X. Wan, and Z. Han. 2018. PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead. IEEE Transactions on Wireless Communications 17, 3(2018), 1676–1687.
[123]
F. Xie, Z. Pang, H. Wen, W. Lei, and X. Xu. 2021. Weighted Voting in Physical Layer Authentication for Industrial Wireless Edge Networks. IEEE Transactions on Industrial Informatics(2021), 1–1.
[124]
N. Xie, C. Chen, and Z. Ming. 2021. Security Model of Authentication at the Physical Layer and Performance Analysis over Fading Channels. IEEE Transactions on Dependable and Secure Computing 18, 1 (2021), 253–268.
[125]
N. Xie, J. Chen, and L. Huang. 2021. Physical-Layer Authentication Using Multiple Channel-Based Features. IEEE Transactions on Information Forensics and Security 16 (2021), 2356–2366.
[126]
N. Xie, Z. Li, and H. Tan. 2021. A Survey of Physical-Layer Authentication in Wireless Communications. IEEE Communications Surveys and Tutorials 23, 1 (2021), 282–310.
[127]
N. Xie, W. Wang, Y. Chen, P. Zhang, and L. Huang. 2022. Confidentiality-Preserving Edge-Based Wireless Communications for Contact Tracing Systems. IEEE Journal on Selected Areas in Communications 40, 11(2022), 3152–3171.
[128]
N. Xie, W. Xiong, J. Chen, P. Zhang, L. Huang, and J. Su. 2022. Multiple Phase Noises Physical-Layer Authentication. IEEE Transactions on Communications 70, 9 (2022), 6196–6211.
[129]
N. Xie, J. Zhang, Q. Zhang, H. Tan, A. X. Liu, and D. Niyato. 2023. Hybrid Physical-Layer Authentication. IEEE Transactions on Mobile Computing(2023), 1–16.
[130]
Ning Xie, Qihong Zhang, Junjie Chen, and Haijun Tan. 2022. Privacy-Preserving Physical-Layer Authentication for Non-Orthogonal Multiple Access Systems. IEEE Journal on Selected Areas in Communications 40 (2022), 1371–1385.
[131]
Ning Xie, Shengli Zhang, and Alex X. Liu. 2020. Physical-Layer Authentication in Non-Orthogonal Multiple Access Systems. IEEE/ACM Transactions on Networking 28 (2020), 1144–1157.
[132]
Q. Xu, R. Zheng, W. Saad, and Z. Han. 2016. Device Fingerprinting in Wireless Networks: Challenges and Opportunities. IEEE Communications Surveys and Tutorials 18, 1 (2016), 94–104.
[133]
Qiang Yang, Yang Liu, Tianjian Chen, and Yongxin Tong. 2019. Federated Machine Learning: Concept and Applications. ACM Transactions on Intelligent Systems and Technology 10, 2(2019), Article 12.
[134]
J. Yoon, Y. Lee, and E. Hwang. 2019. Machine Learning-based Physical Layer Authentication using Neighborhood Component Analysis in MIMO Wireless Communications. In International Conference on Information and Communication Technology Convergence (ICTC). Jeju, Korea (South), 63–65.
[135]
P. L. Yu, J. S. Baras, and B. M. Sadler. 2008. Physical-Layer Authentication. IEEE Transactions on Information Forensics and Security 3, 1(2008), 38–51.
[136]
Sihan Yu, Xiaonan Zhang, Pei Huang, and Linke Guo. 2019. Secure Authentication in Cross-Technology Communication for Heterogeneous IoT. In 2019 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN). Newark, USA, 1–2. https://doi.org/10.1109/DySPAN.2019.8935663
[137]
Sihan Yu, Xiaonan Zhang, Pei Huang, Linke Guo, Long Cheng, and Kuangching Wang. 2020. AuthCTC: Defending against waveform emulation attack in heterogeneous IoT environments. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security. 20–32.
[138]
P. Zhang, J. Liu, Y. Shen, and X. Jiang. 2021. Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication in Massive MIMO Systems. IEEE Transactions on Information Forensics and Security 16 (2021), 4265–4279.
[139]
P. Zhang, Y. Shen, X. Jiang, and B. Wu. 2020. Physical Layer Authentication Jointly Utilizing Channel and Phase Noise in MIMO Systems. IEEE Transactions on Communications 68, 4 (2020), 2446–2458.
[140]
P. Zhang, J. Zhu, Y. Chen, and X. Jiang. 2019. End-to-End Physical Layer Authentication for Dual-Hop Wireless Networks. IEEE Access 7(2019), 38322–38336.
[141]
Xiaonan Zhang, Sihan Yu, Hansong Zhou, Pei Huang, Linke Guo, and Ming Li. 2023. Signal Emulation Attack and Defense for Smart Home IoT. IEEE Transactions on Dependable and Secure Computing 20, 3 (2023), 2040–2057. https://doi.org/10.1109/TDSC.2022.3169705
[142]
Y. Zhang. 2021. Physical Layer Authentication Based on Gaussian Mixture Model Under Unknown Number of Attackers. In IEEE/CIC International Conference on Communications in China (ICCC). Xiamen, China, 70–74.
[143]
Z. Zhang, N. Li, S. Xia, and X. Tao. 2020. Fast Cross Layer Authentication Scheme for Dynamic Wireless Network. In IEEE Wireless Communications and Networking Conference (WCNC). Seoul, Korea (South), 1–6.
[144]
Caidan Zhao, Minmin Huang, Lianfen Huang, Xiaojiang Du, and Mohsen Guizani. 2017. A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks. Computer Networks 128(2017), 164–171.

Index Terms

  1. A Comprehensive Survey on Physical Layer Authentication Techniques: Categorization and Analysis of Model-Driven and Data-Driven Approaches

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image ACM Computing Surveys
          ACM Computing Surveys Just Accepted
          EISSN:1557-7341
          Table of Contents
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Online AM: 16 December 2024
          Accepted: 11 November 2024
          Revised: 03 November 2024
          Received: 29 April 2024

          Check for updates

          Author Tags

          1. Physical-layer authentication
          2. model-based
          3. machine learning-based
          4. signal processing
          5. security

          Qualifiers

          • Survey

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • 0
            Total Citations
          • 140
            Total Downloads
          • Downloads (Last 12 months)140
          • Downloads (Last 6 weeks)140
          Reflects downloads up to 04 Jan 2025

          Other Metrics

          Citations

          View Options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Login options

          Full Access

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media