4.5 Article

Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

On Physical-Layer Authentication via Online Transfer Learning

Yi Chen et al.

Summary: This article introduces a novel physical-layer authentication scheme called TL-PHA, which incorporates a novel convolutional neural network architecture and data augmentation methods to achieve superior performance in authentication accuracy, detection rate, and training complexity compared to all considered counterparts.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Channel-Prediction-Based One-Class Mobile IoT Device Authentication

Hui-Ming Wang et al.

Summary: Physical layer authentication is a promising complement to cryptographic-based authentication schemes, particularly in IoT scenarios. We propose a PLA scheme based on Gaussian process channel prediction to track and predict channel characteristics. We also introduce a one-class authentication scheme that does not require attacker's channel information and verify the performance through simulation tests.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Engineering, Civil

A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X

Ruhui Ma et al.

Summary: In this paper, we propose a group-based multicast service model and a corresponding authentication and data transmission scheme for vehicles in 5G-V2X network. This scheme allows large vehicles to securely access multicast services and provides features such as authentication, protection, key distribution, and protocol attack resistance.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Computer Science, Information Systems

CSI-Based Physical Layer Authentication via Deep Learning

Shaoyu Wang et al.

Summary: CSI-Based physical layer authentication is a promising method for achieving fast and lightweight authentication in wireless communication. This letter proposes a new deep-CSI-based authentication scheme that maps CSI to a device's location and authenticated identity via deep learning. The scheme achieves initial authentication without the need for cryptography-based authentication and uses a confidence score branch to determine device legitimacy in the absence of illegitimate CSI samples.

IEEE WIRELESS COMMUNICATIONS LETTERS (2022)

Article Computer Science, Information Systems

Survey on Issues and Recent Advances in Vehicular Public-Key Infrastructure (VPKI)

Salabat Khan et al.

Summary: Public-key infrastructure (PKI) provides the foundation for public-key cryptography, and Vehicular PKI (VPKI) ensures the security and privacy requirements of Cooperative Intelligent Transportation Systems (C-ITS). This survey evaluates and compares VPKI schemes for secure and private management, and presents suggestions for future research.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2022)

Article Computer Science, Theory & Methods

BCAuth: Physical Layer Enhanced Authentication and Attack Tracing for Backscatter Communications

Pu Wang et al.

Summary: This paper proposes a multi-stage authentication and attack tracing scheme based on backscatter communication, which enhances authentication security for both static and mobile devices by utilizing physical spatial information. BCAuth is capable of determining the number of attackers and localizing their positions, and also introduces a reciprocal channel-based re-authentication method for mobile devices.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)

Article Computer Science, Hardware & Architecture

Single-message-based cooperative authentication scheme for intelligent transportation systems

Ming Yang et al.

Summary: The paper proposes a single-message cooperative authentication scheme for vehicular ad-hoc networks based on certificateless signatures, where a small number of vehicles verify the signature of a new message and construct evidence for rapid and secure message verification. The scheme achieves a balance between authentication delay and total computational cost.

COMPUTERS & ELECTRICAL ENGINEERING (2021)

Article Engineering, Civil

Internet of Vehicles: Key Technologies, Network Model, Solutions and Challenges With Future Aspects

Kashif Naseer Qureshi et al.

Summary: This paper discusses the impact of new integrated technologies on various fields and provides a comprehensive evaluation of vehicular networks. It introduces new integrated models and key technologies related to network maintenance, architecture, network model, big data analytical model, and security model, while also outlining existing challenges and future design directions.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2021)

Article Engineering, Civil

Blockchain-Based Lightweight and Secured V2V Communication in the Internet of Vehicles

Mohsin Kamal et al.

Summary: This paper explores V2V communication utilizing channel characteristics of wireless networks and implementing data authentication through blockchain technology. The proposed algorithms address time complexity and delay issues in the IoV, providing real-time adversary detection within the network.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2021)

Article Engineering, Multidisciplinary

Online Learning Aided Adaptive Multiple Attribute-Based Physical Layer Authentication in Dynamic Environments

Xinyu Yin et al.

Summary: This paper proposes an adaptive PHY-layer authentication framework that enhances reliability and efficiency of authenticity verification through dimension extension, AI-assisted search algorithms, and learning algorithms. Extensive experiments using USRPs further validate the effectiveness of the proposed scheme.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Article Computer Science, Information Systems

A Survey of Physical-Layer Authentication in Wireless Communications

Ning Xie et al.

Summary: This article provides a detailed survey of features and techniques that can be used in Physical-Layer Authentication (PLA), categorizing existing PLA schemes into passive and active categories. Different verification methods in passive and active schemes are discussed, along with future research directions.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Computer Science, Theory & Methods

SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks

Jing Zhang et al.

Summary: The article introduces a many-to-many authentication and key agreement scheme that can achieve secure authentication between vehicles and cloud service providers in vehicular network environments. The proposed scheme prevents unauthorized access, improves service efficiency, and reduces computation and communication overhead.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Hardware & Architecture

Security issues and challenges in V2X: A Survey

Amrita Ghosal et al.

COMPUTER NETWORKS (2020)

Article Engineering, Electrical & Electronic

Enhancing Misbehavior Detection in 5G Vehicle-to-Vehicle Communications

Van-Linh Nguyen et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Engineering, Electrical & Electronic

Localizing Spoofing Attacks on Vehicular GPS Using Vehicle-to-Vehicle Communications

Christian Sanders et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Engineering, Electrical & Electronic

Learning-Aided Physical Layer Authentication as an Intelligent Process

He Fang et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2019)

Article Computer Science, Information Systems

PHY-Layer Cover-Free Coding for Wireless Pilot Authentication in IoV Communications: Protocol Design and Ultra-Security Proof

Dongyang Xu et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

Enhanced Authentication Based on Angle of Signal Arrivals

Amr Abdelaziz et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Telecommunications

Multi-Array Relative Positioning for Verifying the Truthfulness of V2X Messages

Van-Linh Nguyen et al.

IEEE COMMUNICATIONS LETTERS (2019)

Article Engineering, Electrical & Electronic

Physical-Layer Security and Privacy for Vehicle-to-Everything

Basem M. ElHalawany et al.

IEEE COMMUNICATIONS MAGAZINE (2019)

Article Computer Science, Information Systems

AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment

Mohammad Wazid et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Automation & Control Systems

Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS

Fei Pan et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Physical signal-driven fusion for V2X misbehavior detection

Van-Linh Nguyen et al.

2019 IEEE VEHICULAR NETWORKING CONFERENCE (VNC) (2019)

Proceedings Paper Computer Science, Interdisciplinary Applications

Blockchain for 5G: Opportunities and Challenges

Abdulla Chaer et al.

2019 IEEE GLOBECOM WORKSHOPS (GC WKSHPS) (2019)

Article Engineering, Electrical & Electronic

Blind Authentication at the Physical Layer Under Time-Varying Fading Channels

Ning Xie et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2018)

Article Computer Science, Information Systems

NOTSA: Novel OBU With Three-Level Security Architecture for Internet of Vehicles

Liangmin Wang et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

A Secure and Efficient Certificateless Authentication Scheme With Unsupervised Anomaly Detection in VANETs

Haowen Tan et al.

IEEE ACCESS (2018)

Article Engineering, Electrical & Electronic

Physical-layer authentication for wireless security enhancement: current challenges and future developments

Xianbin Wang et al.

IEEE COMMUNICATIONS MAGAZINE (2016)

Article Computer Science, Information Systems

Device Fingerprinting in Wireless Networks: Challenges and Opportunities

Qiang Xu et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Theory & Methods

Wireless Physical-Layer Identification: Modeling and Validation

Wenhao Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Engineering, Electrical & Electronic

Wireless Physical Layer Authentication via Fingerprint Embedding

Paul L. Yu et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Engineering, Electrical & Electronic

QuaDRiGa: A 3-D Multi-Cell Channel Model With Time Evolution for Enabling Virtual Field Trials

Stephan Jaeckel et al.

IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION (2014)

Article Engineering, Electrical & Electronic

Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets

Weikun Hou et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2014)