Zhang et al., 2020 - Google Patents
Physical-layer authentication for Internet of Things via WFRFT-based Gaussian tag embeddingZhang et al., 2020
- Document ID
- 7042415708860400753
- Author
- Zhang N
- Fang X
- Wang Y
- Wu S
- Wu H
- Kar D
- Zhang H
- Publication year
- Publication venue
- IEEE Internet of Things Journal
External Links
Snippet
Internet of Things (IoT) is regarded as the fundamental platform for many emerging services, such as smart city, smart home, and intelligent transportation systems. With ever-increasing penetration of IoT, it becomes of great importance to ensure the IoT security, as the security …
- 238000004458 analytical method 0 abstract description 15
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Physical-layer authentication for Internet of Things via WFRFT-based Gaussian tag embedding | |
Xie et al. | A survey of physical-layer authentication in wireless communications | |
Aman et al. | Two-factor authentication for IoT with location information | |
Shakiba-Herfeh et al. | Physical layer security: Authentication, integrity, and confidentiality | |
Alahmadi et al. | Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard | |
Melki et al. | A survey on OFDM physical layer security | |
Liu et al. | Authenticating users through fine-grained channel information | |
Jin et al. | Specguard: Spectrum misuse detection in dynamic spectrum access systems | |
Mathur et al. | Exploiting the physical layer for enhanced security [security and privacy in emerging wireless networks] | |
Moreira et al. | Cross-layer authentication protocol design for ultra-dense 5G HetNets | |
Xie et al. | Security model of authentication at the physical layer and performance analysis over fading channels | |
Kumar et al. | A strong authentication scheme with user privacy for wireless sensor networks | |
Abanto-Leon et al. | Stay connected, leave no trace: Enhancing security and privacy in wifi via obfuscating radiometric fingerprints | |
Kim | Location-based authentication protocol for first cognitive radio networking standard | |
Hu et al. | A session hijacking attack against a device-assisted physical-layer key agreement | |
Fang et al. | Mimicry attacks against wireless link signature and new defense using time-synched link signature | |
Mantoro et al. | Securing the authentication and message integrity for Smart Home using smart phone | |
Ran et al. | Physical layer authentication scheme with channel based tag padding sequence | |
Zhang et al. | A key agreement scheme for smart homes using the secret mismatch problem | |
Zhang et al. | Tag-based PHY-layer authentication for RIS-assisted communication systems | |
Sabuj et al. | Detection of intelligent malicious user in cognitive radio network by using friend or foe (FoF) detection technique | |
Jin et al. | A reassessment on friendly jamming efficiency | |
Xie et al. | Detection of information hiding at physical layer in wireless communications | |
Yu et al. | AuthCTC: Defending against waveform emulation attack in heterogeneous IoT environments | |
Ma et al. | A LSTM-based channel fingerprinting method for intrusion detection |