[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Zhang et al., 2020 - Google Patents

Physical-layer authentication for Internet of Things via WFRFT-based Gaussian tag embedding

Zhang et al., 2020

Document ID
7042415708860400753
Author
Zhang N
Fang X
Wang Y
Wu S
Wu H
Kar D
Zhang H
Publication year
Publication venue
IEEE Internet of Things Journal

External Links

Snippet

Internet of Things (IoT) is regarded as the fundamental platform for many emerging services, such as smart city, smart home, and intelligent transportation systems. With ever-increasing penetration of IoT, it becomes of great importance to ensure the IoT security, as the security …
Continue reading at ieeexplore.ieee.org (other versions)

Similar Documents

Publication Publication Date Title
Zhang et al. Physical-layer authentication for Internet of Things via WFRFT-based Gaussian tag embedding
Xie et al. A survey of physical-layer authentication in wireless communications
Aman et al. Two-factor authentication for IoT with location information
Shakiba-Herfeh et al. Physical layer security: Authentication, integrity, and confidentiality
Alahmadi et al. Defense against primary user emulation attacks in cognitive radio networks using advanced encryption standard
Melki et al. A survey on OFDM physical layer security
Liu et al. Authenticating users through fine-grained channel information
Jin et al. Specguard: Spectrum misuse detection in dynamic spectrum access systems
Mathur et al. Exploiting the physical layer for enhanced security [security and privacy in emerging wireless networks]
Moreira et al. Cross-layer authentication protocol design for ultra-dense 5G HetNets
Xie et al. Security model of authentication at the physical layer and performance analysis over fading channels
Kumar et al. A strong authentication scheme with user privacy for wireless sensor networks
Abanto-Leon et al. Stay connected, leave no trace: Enhancing security and privacy in wifi via obfuscating radiometric fingerprints
Kim Location-based authentication protocol for first cognitive radio networking standard
Hu et al. A session hijacking attack against a device-assisted physical-layer key agreement
Fang et al. Mimicry attacks against wireless link signature and new defense using time-synched link signature
Mantoro et al. Securing the authentication and message integrity for Smart Home using smart phone
Ran et al. Physical layer authentication scheme with channel based tag padding sequence
Zhang et al. A key agreement scheme for smart homes using the secret mismatch problem
Zhang et al. Tag-based PHY-layer authentication for RIS-assisted communication systems
Sabuj et al. Detection of intelligent malicious user in cognitive radio network by using friend or foe (FoF) detection technique
Jin et al. A reassessment on friendly jamming efficiency
Xie et al. Detection of information hiding at physical layer in wireless communications
Yu et al. AuthCTC: Defending against waveform emulation attack in heterogeneous IoT environments
Ma et al. A LSTM-based channel fingerprinting method for intrusion detection