2021
DOI: 10.1109/comst.2020.3042188
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Physical-Layer Authentication in Wireless Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 129 publications
(32 citation statements)
references
References 153 publications
0
32
0
Order By: Relevance
“…In the literature [7], it is proposed that in TDD (Time Division Duplexing) systems, the communicating parties can have relatively consistent reciprocal channel characteristics for the wireless channel, thereby enabling the sharing of relevant sources and the generation of characteristic keys. After that, some key generation schemes have been proposed in the literature [8]. In this literature, the key generation methods were gradually evolved into 4 major steps: (1) channel estimation, (2) quantization, (3) key negotiation, and (4) secrecy enhancement.…”
Section: Related Workmentioning
confidence: 99%
“…In the literature [7], it is proposed that in TDD (Time Division Duplexing) systems, the communicating parties can have relatively consistent reciprocal channel characteristics for the wireless channel, thereby enabling the sharing of relevant sources and the generation of characteristic keys. After that, some key generation schemes have been proposed in the literature [8]. In this literature, the key generation methods were gradually evolved into 4 major steps: (1) channel estimation, (2) quantization, (3) key negotiation, and (4) secrecy enhancement.…”
Section: Related Workmentioning
confidence: 99%
“…For example, the authors of [144] proposed to enhance randomness in physical layer secret key generation by deep reinforcement learning (DRL). The authors of [146], [208] explored to use a CNN/RNN-based channel state estimation to enhance physical layer authentication. Using DRL-based models for anti-jamming is a common approach [209], [210].…”
Section: Artificial Intelligence's Impact On 6g Securitymentioning
confidence: 99%
“…Over the past decades, computation-demanding encryption algorithms have been the prevailing solution of data encryption, which prevent illegitimate users from decrypting data within a short time. However, to combat eavesdropping attacks from adversarial users, the complicated secret keys required by encryption algorithms result in an unavoidable overconsumption of energy and computation resources [4]. Meanwhile, the intricate key management and distribution strategy may lead to performance degradation in terms of delay and outage probability [5].…”
Section: Introductionmentioning
confidence: 99%