2019
DOI: 10.1007/s11277-019-06612-7
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Impacts of Spatial Correlation for Multi-user Environment with Robust Concatenation of Advanced FEC Schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…The physical layer authentication method based on compressed sensing channel information through multiple antenna arrays can meet the demand for lightweight authentication in time-varying wireless environments for future resource-constrained networks such as 5G networks, IoT, and sensor networks. The inherent drawback of physical layer authentication techniques is that initial authentication is not possible, so physical layer authentication needs to be combined with traditional authentication mechanisms and rely on traditional upper layer authentication techniques for the initialization of authentication [23]. In this paper, the combination of physical layer authentication methods based on compressed channel information of multiantenna array and upper-layer authentication can constitute a cross-layer authentication scheme, whose flowchart is shown in Figure 3.…”
Section: Secure Physical Layer Transmission Andmentioning
confidence: 99%
“…The physical layer authentication method based on compressed sensing channel information through multiple antenna arrays can meet the demand for lightweight authentication in time-varying wireless environments for future resource-constrained networks such as 5G networks, IoT, and sensor networks. The inherent drawback of physical layer authentication techniques is that initial authentication is not possible, so physical layer authentication needs to be combined with traditional authentication mechanisms and rely on traditional upper layer authentication techniques for the initialization of authentication [23]. In this paper, the combination of physical layer authentication methods based on compressed channel information of multiantenna array and upper-layer authentication can constitute a cross-layer authentication scheme, whose flowchart is shown in Figure 3.…”
Section: Secure Physical Layer Transmission Andmentioning
confidence: 99%