2018
DOI: 10.1109/access.2018.2859781
|View full text |Cite
|
Sign up to set email alerts
|

A Collaborative PHY-Aided Technique for End-to-End IoT Device Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 48 publications
(38 citation statements)
references
References 37 publications
0
36
0
Order By: Relevance
“…6 shows the offline MEB quantization boundaries derived by Algorithm 1 with the comparison of the two other methods, which are named uniform and random. To be specific, the widths of all M quantization intervals are the same regardless of the PDF of a in the uniform method [30]. In the random method, all boundaries are randomly picked within [a min , a max ].…”
Section: A Numerical Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…6 shows the offline MEB quantization boundaries derived by Algorithm 1 with the comparison of the two other methods, which are named uniform and random. To be specific, the widths of all M quantization intervals are the same regardless of the PDF of a in the uniform method [30]. In the random method, all boundaries are randomly picked within [a min , a max ].…”
Section: A Numerical Resultsmentioning
confidence: 99%
“…We assume that an ED's imperfect RF front-end can process signals using the in-phase/quadrature-phase (IQ) processing, where the signals suffer from the imbalanced gain and phase-shift between I-channel and Q-channel mainly due to the imperfect local oscillator and mixer [31]. We use θ and α to represent phaseshift mismatch and amplitude mismatch, respectively, where the independent θ and α follow the uniform distributions , θ ∼ U (−θ m , θ m ) and α ∼ U (−α m , α m ), and θ m > 0 and α m > 0 are regulated by the RF manufacturer/market [30], [32], [33]. We consider that all EDs in the MECD's coverage are produced under the same maximum α and θ requirement.…”
Section: Framework Of the System And Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Strategies such as Light-weight security protocols, Elliptic Curve Cryptography (ECC), Identity Based Encryption (IBE), and security protocols for direct Machine Type Communication (MTC) and UE engagement as proposed in [25], could be utilized for forming authentication mechanisms through this channel [26]. Moreover, Physical Unclonable Functions (PUF) are offering possibilities to derive bio-metric resembled unique features for IoT devices, which are enhancing the security of authentication and data transferring mechanisms conducted in UE enrolled communication channels [27].…”
Section: Possible Solutionsmentioning
confidence: 99%
“…Significance of security and trust is discussed by Hudson [17]. Device authentication problem has been discussed by Hao et al [18] where the physical layer has been used while Li et al [19] has used trust factor as a part of the evaluation process.…”
Section: Introductionmentioning
confidence: 99%