4.6 Review

Physical Layer Authentication in Wireless Networks-Based Machine Learning Approaches

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Multiuser physical layer security mechanism in the wireless communication system of the IIOT

Ruizhong Du et al.

Summary: This paper proposes a new multiuser physical layer authentication scheme to improve the accuracy of authentication in dynamic industrial scenarios using machine learning algorithms and autonomous parameter optimization.

COMPUTERS & SECURITY (2022)

Article Computer Science, Information Systems

A Survey of Physical Layer Techniques for Secure Wireless Communications in Industry

Pablo Angueira et al.

Summary: The industrial environment imposes strict requirements on the infrastructure of communication systems. Wireless systems are a solution, but they have weaknesses in reliability and security. This paper analyzes the security challenges of radio-frequency wireless systems in industrial applications and proposes a methodology for designing protection techniques.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2022)

Article Automation & Control Systems

Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks

Songlin Chen et al.

Summary: The article proposes a scheme using channel-based machine learning to detect clone and Sybil attacks, by exploring channel responses between sensor peers for unique fingerprints, providing accurate authentication rates, and achieving success in industrial environments without manual labeling.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

Radio Identity Verification-Based IoT Security Using RF-DNA Fingerprints and SVM

Donald Reising et al.

Summary: The rapid growth in the number of IoT devices has brought about a significant security concern. This work introduces a physical layer IoT authentication approach using RF-DNA fingerprints and SVM to address this issue effectively.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Telecommunications

A physical layer authentication mechanism for IoT devices

Xinglu Li et al.

China Communications (2021)

Article Engineering, Electrical & Electronic

Radio Frequency Fingerprint Identification for LoRa Using Deep Learning

Guanxiong Shen et al.

Summary: The paper presents a deep learning-based RFFI scheme for LoRa systems, investigating signal representations and CFO compensation to improve system stability and accuracy. Experimental results suggest that the spectrogram-CNN model is optimal for classifying LoRa devices.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)

Article Computer Science, Information Systems

Machine learning-based physical layer security: techniques, open challenges, and applications

Anil Kumar Kamboj et al.

Summary: Wireless physical layer security is a powerful technology for current and emerging mobile networks, with machine learning emerging as a promising tool to alleviate the increasing complexity of wireless networks. Intelligent WPLS focuses on physical layer authentication, antenna selection, and relay node selection, aiming to address security issues in wireless networks and achieve different applications in various areas such as the internet of things, device-to-device communication, and cognitive radio.

WIRELESS NETWORKS (2021)

Proceedings Paper Computer Science, Cybernetics

Physical Layer Authentication with Cooperative Wireless Communications and Machine Learning

Linda Senigagliesi et al.

Summary: Physical layer authentication distinguishes users without shared secrets by leveraging the natural randomness and uniqueness of transmission channels. In cooperative wireless communications, the presence of relay nodes may improve the performance of physical layer authentication.

2021 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM 2021) (2021)

Proceedings Paper Engineering, Electrical & Electronic

Wi-SUN Device Authentication using Physical Layer Fingerprint

Mi-Kyung Oh et al.

Summary: This paper utilizes physical layer features to identify Wi-SUN devices by extracting features from received signals and training a classifier for accurate identification. Experimental results show that the method can distinguish devices on Wi-SUN certified chips with 100% accuracy and without additional computational complexity.

12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION (2021)

Proceedings Paper Telecommunications

Penetrating RF Fingerprinting-based Authentication with a Generative Adversarial Attack

Samurdhi Karunaratne et al.

Summary: The study demonstrates that in wireless communications, unauthorized transmitters can successfully attack a deep learning-based authenticator by distorting signals, potentially undermining the security provided by the authenticator.

IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021) (2021)

Proceedings Paper Computer Science, Hardware & Architecture

Radio Frequency Fingerprint Identification for LoRa Using Spectrogram and CNN

Guanxiong Shen et al.

Summary: The text discusses a Radio frequency fingerprint identification (RFFI) scheme based on spectrogram and convolutional neural network (CNN) for Long Range (LoRa) systems. The authors demonstrated the drifting of instantaneous carrier frequency offset (CFO) can lead to misclassification, and proposed CFO compensation as an effective mitigation method. They also designed a hybrid classifier to adjust CNN outputs based on estimated CFO, achieving a classification accuracy of 97.61% for 20 LoRa devices.

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021) (2021)

Article Engineering, Electrical & Electronic

Physical-Layer Security in 6G Networks

Lorenzo Mucchi et al.

Summary: The sixth generation of mobile network will be a comprehensive connectivity fabric composed of heterogeneous nodes from macro-devices to nano-devices; security is a mandatory feature by design due to the sensitive nature of the tons of information managed by the ultra dense network; physical-layer security acts as the first line of defense, providing security even to low-resourced nodes in different environments.

IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY (2021)

Proceedings Paper Computer Science, Information Systems

A LSTM-Based Channel Fingerprinting Method for Intrusion Detection

Ting Ma et al.

Summary: This paper proposes a lightweight intrusion detection mechanism based on physical layer attributes, using LSTM as an intelligent classifier to distinguish different transmitters and developing a 5G NR channel detection model under dynamic channel conditions to identify malicious attacks by intelligently analyzing CSI. The simulation results demonstrate that the proposed solution improves detection accuracy.

2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP) (2021)

Article Engineering, Electrical & Electronic

Deep-Learning-Aided RF Fingerprinting for NFC Security

Woongsup Lee et al.

Summary: This article discusses the feasibility of using deep learning for RF fingerprinting to identify NFC tags, with experiments showing high accuracy in distinguishing 50 NFC tags. The authors also address some key technical challenges involved in using deep-learning-based RF fingerprinting for NFC.

IEEE COMMUNICATIONS MAGAZINE (2021)

Article Computer Science, Information Systems

A Survey of Physical-Layer Authentication in Wireless Communications

Ning Xie et al.

Summary: This article provides a detailed survey of features and techniques that can be used in Physical-Layer Authentication (PLA), categorizing existing PLA schemes into passive and active categories. Different verification methods in passive and active schemes are discussed, along with future research directions.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Review Computer Science, Theory & Methods

Review of deep learning: concepts, CNN architectures, challenges, applications, future directions

Laith Alzubaidi et al.

Summary: Deep learning has become the gold standard in the machine learning community, widely used in various domains and capable of learning massive data. Through a comprehensive survey, a better understanding of the most important aspects of deep learning is provided.

JOURNAL OF BIG DATA (2021)

Article Computer Science, Information Systems

Physical Layer Security: Detection of Active Eavesdropping Attacks by Support Vector Machines

Tiep M. Hoang et al.

Summary: This article presents a framework for converting wireless signals into structured datasets for detecting active eavesdropping attacks at the physical layer using machine learning algorithms.

IEEE ACCESS (2021)

Article Computer Science, Theory & Methods

Injecting Reliable Radio Frequency Fingerprints Using Metasurface for the Internet of Things

Sekhar Rajendran et al.

Summary: In the Internet of Things, traditional authentication schemes based on digital signatures have overhead costs, while utilizing radio frequency fingerprint injection can increase security with minimal overhead. The proposed MeRFFI system enhances security for IoT devices and is easily integrated into existing authentication schemes.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Engineering, Electrical & Electronic

Deep Learning-Based Cooperative Automatic Modulation Classification Method for MIMO Systems

Yu Wang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation

Run-Fa Liao et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Telecommunications

RFAL: Adversarial Learning for RF Transmitter Identification and Classification

Debashri Roy et al.

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING (2020)

Article Computer Science, Hardware & Architecture

Research on Fingerprint Identification of Wireless Devices Based on Information Fusion

Qiao Tian et al.

MOBILE NETWORKS & APPLICATIONS (2020)

Proceedings Paper Computer Science, Theory & Methods

Automated Radar Signal Analysis Based on Deep Learning

Ruchi Bagwe et al.

2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC) (2020)

Article Computer Science, Hardware & Architecture

Physical Layer Authentication for 5G Communications: Opportunities and Road Ahead

Ning Wang et al.

IEEE NETWORK (2020)

Article Computer Science, Information Systems

An area based physical layer authentication framework to detect spoofing attacks

Na Li et al.

SCIENCE CHINA-INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

Dive Into Deep Learning Based Automatic Modulation Classification: A Disentangled Approach

Xiaolei Shang et al.

IEEE ACCESS (2020)

Article Engineering, Electrical & Electronic

Adversarial Transfer Learning for Deep Learning Based Automatic Modulation Classification

Ke Bu et al.

IEEE SIGNAL PROCESSING LETTERS (2020)

Article Computer Science, Information Systems

A Learning Approach for Physical Layer Authentication Using Adaptive Neural Network

Xiaoying Qiu et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

y Specific Emitter Identification Techniques for the Internet of Things

Kejin Sa et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning

Baibhab Chatterjee et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Design of a Hybrid RF Fingerprint Extraction and Device Classification Scheme

Linning Peng et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Review Computer Science, Information Systems

A Survey on Deep Learning Techniques in Wireless Signal Recognition

Xiaofan Li et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2019)

Article Computer Science, Theory & Methods

WiFi Sensing with Channel State Information: A Survey

Yongsen Ma et al.

ACM COMPUTING SURVEYS (2019)

Article Engineering, Electrical & Electronic

Identification and authentication for wireless transmission security based on RF-DNA fingerprint

Xueli Wang et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2019)

Article Computer Science, Hardware & Architecture

Physical Layer Security for the Internet of Things: Authentication and Key Generation

Junqing Zhang et al.

IEEE WIRELESS COMMUNICATIONS (2019)

Article Computer Science, Information Systems

New Security Mechanisms of High-Reliability IoT Communication Based on Radio Frequency Fingerprint

Qiao Tian et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Review Computer Science, Information Systems

Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities

Ning Wang et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Automation & Control Systems

Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS

Fei Pan et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Proceedings Paper Computer Science, Theory & Methods

Radar Specific Emitter Recognition Based on DBN Feature Extraction

Xiaoxuan Dong et al.

2018 INTERNATIONAL SEMINAR ON COMPUTER SCIENCE AND ENGINEERING TECHNOLOGY (SCSET 2018) (2019)

Proceedings Paper Computer Science, Software Engineering

Improving Wireless Network Security Based On Radio Fingerprinting

Yun Lin et al.

2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019) (2019)

Article Computer Science, Information Systems

A Survey of Optimization Approaches for Wireless Physical Layer Security

Dong Wang et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Deep Neural Networks for CSI-Based Authentication

Qian Wang et al.

IEEE ACCESS (2019)

Proceedings Paper Engineering, Electrical & Electronic

Machine Learning-based Physical Layer Authentication using Neighborhood Component Analysis in MIMO Wireless Communications

Jiseok Yoon et al.

2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE (2019)

Article Computer Science, Artificial Intelligence

An Unknown Radar Emitter Identification Method Based on Semi-Supervised and Transfer Learning

Yuntian Feng et al.

ALGORITHMS (2019)

Article Computer Science, Information Systems

Specific Emitter Identification Using Convolutional Neural Network-Based IQ Imbalance Estimators

Lauren J. Wong et al.

IEEE ACCESS (2019)

Article Engineering, Electrical & Electronic

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

Yongpeng Wu et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)

Article Computer Science, Information Systems

Authenticating Users Through Fine-Grained Channel Information

Hongbo Liu et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2018)

Article Computer Science, Information Systems

Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm

Songlin Chen et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)

Article Computer Science, Information Systems

Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges

Yiliang Liu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Proceedings Paper Computer Science, Information Systems

Radio Frequency Fingerprint Extraction of Radio Emitter Based on I/Q Imbalance

Fei Zhuo et al.

ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY (2017)

Article Telecommunications

Deep Learning for Wireless Physical Layer: Opportunities and Challenges

Tianqi Wang et al.

CHINA COMMUNICATIONS (2017)

Article Engineering, Electrical & Electronic

Physical-layer authentication for wireless security enhancement: current challenges and future developments

Xianbin Wang et al.

IEEE COMMUNICATIONS MAGAZINE (2016)

Article Engineering, Electrical & Electronic

PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks

Liang Xiao et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Article Engineering, Electrical & Electronic

A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends

Yulong Zou et al.

PROCEEDINGS OF THE IEEE (2016)

Article Engineering, Electrical & Electronic

Physical Layer Security in Wireless Cooperative Relay Networks: State of the Art and Beyond

Leonardo Jimenez Rodriguez et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Engineering, Electrical & Electronic

Safeguarding 5G Wireless Communication Networks Using Physical Layer Security

Nan Yang et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Review Multidisciplinary Sciences

Deep learning

Yann LeCun et al.

NATURE (2015)

Article Engineering, Electrical & Electronic

Wireless Physical-Layer Security: Lessons Learned From Information Theory

Aylin Yener et al.

PROCEEDINGS OF THE IEEE (2015)

Article Computer Science, Hardware & Architecture

On Physical Layer Security for Cognitive Radio Networks

Zhihui Shu et al.

IEEE NETWORK (2013)