4.1 Article

IoT Nodes Authentication and ID Spoofing Detection Based on Joint Use of Physical Layer Security and Machine Learning

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Comparison of Statistical and Machine Learning Techniques for Physical Layer Authentication

Linda Senigagliesi et al.

Summary: In this study, authentication at the physical layer using different methods under various channel conditions was considered. It was found that one-class classification algorithms perform best when there is small spatial correlation between channels, while statistical methods are advantageous in cases with large spatial correlation.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Information Systems

Detection of Eavesdropping Attack in UAV-Aided Wireless Systems: Unsupervised Learning With One-Class SVM and K-Means Clustering

Tiep M. Hoang et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2020)

Article Computer Science, Theory & Methods

Independence-Checking Coding for OFDM Channel Training Authentication: Protocol Design, Security, Stability, and Tradeoff Analysis

Dongyang Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Hardware & Architecture

Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications

Aleksandr Ometov et al.

IEEE NETWORK (2019)

Article Engineering, Electrical & Electronic

Learning-Aided Physical Layer Authentication as an Intelligent Process

He Fang et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2019)

Article Engineering, Electrical & Electronic

Enhanced Authentication Based on Angle of Signal Arrivals

Amr Abdelaziz et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Hardware & Architecture

Machine Learning for Intelligent Authentication in 5G and Beyond Wireless Networks

He Fang et al.

IEEE WIRELESS COMMUNICATIONS (2019)

Review Computer Science, Information Systems

Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities

Ning Wang et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Deep Neural Networks for CSI-Based Authentication

Qian Wang et al.

IEEE ACCESS (2019)

Proceedings Paper Engineering, Electrical & Electronic

Machine Learning-based Physical Layer Authentication using Neighborhood Component Analysis in MIMO Wireless Communications

Jiseok Yoon et al.

2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE (2019)

Article Engineering, Electrical & Electronic

Secret Key Exchange and Authentication via Randomized Spatial Modulation and Phase Shifting

Hasan Taha et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Engineering, Electrical & Electronic

PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead

Liang Xiao et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Article Engineering, Electrical & Electronic

Analysis of Channel-Based User Authentication by Key-Less and Key-Based Approaches

Stefano Tomasin

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Review Computer Science, Information Systems

Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking

Francesco Restuccia et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Engineering, Electrical & Electronic

IoT Security Techniques Based on Machine Learning How do IoT devices use AI to enhance security?

Liang Xiao et al.

IEEE SIGNAL PROCESSING MAGAZINE (2018)

Proceedings Paper Computer Science, Hardware & Architecture

POSTER: WLAN Device Fingerprinting using Channel State Information (CSI)

Florian Adamsky et al.

WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (2018)

Article Telecommunications

Physical-Layer Authentication Based on Extreme Learning Machine

Ning Wang et al.

IEEE COMMUNICATIONS LETTERS (2017)

Article Computer Science, Information Systems

Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges

Yiliang Liu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Engineering, Electrical & Electronic

PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks

Liang Xiao et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Article Engineering, Electrical & Electronic

Physical Layer Authentication Enhancement Using Two-Dimensional Channel Quantization

Jiazi Liu et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)

Article Engineering, Electrical & Electronic

Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission

Xiaofu Wu et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)

Article Engineering, Electrical & Electronic

The Challenges Facing Physical Layer Security

Wade Trappe

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Engineering, Electrical & Electronic

Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints

Amitav Mukherjee

PROCEEDINGS OF THE IEEE (2015)

Article Engineering, Electrical & Electronic

Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets

Weikun Hou et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2014)

Article Engineering, Electrical & Electronic

Wireless User Authentication via Comparison of Power Spectral Densities

Jitendra K. Tugnait

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2013)

Article Computer Science, Theory & Methods

MIMO Authentication via Deliberate Fingerprinting at the Physical Layer

Paul L. Yu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Computer Science, Hardware & Architecture

PHYSICAL LAYER SECURITY IN WIRELESS NETWORKS: A TUTORIAL

Yi-Sheng Shiu et al.

IEEE WIRELESS COMMUNICATIONS (2011)

Article Engineering, Electrical & Electronic

Channel-Based Spoofing Detection in Frequency-Selective Rayleigh Channels

Liang Xiao et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)

Article Engineering, Electrical & Electronic

Using the physical layer for wireless authentication in time-variant channels

Liang Xiao et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2008)

Article Engineering, Electrical & Electronic

A Stochastic MIMO radio channel model with experimental validation

JP Kermoal et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2002)

Article Computer Science, Artificial Intelligence

Random forests

L Breiman

MACHINE LEARNING (2001)