2021
DOI: 10.1109/twc.2021.3049160
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Beam Features for Spoofing Attack Detection in mmWave 60-GHz IEEE 802.11ad Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 30 publications
0
8
0
Order By: Relevance
“…Therefore, the complexity order of Algorithm 1 can be approximated as scriptOfalse(N2false)$\mathcal {O}(N^2)$. Based on the analysis above, in comparison to the machine leaning based schemes [21, 22], the complexity of Algorithm 1 is rather low.…”
Section: Authentication By Using Channel Sparsitymentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the complexity order of Algorithm 1 can be approximated as scriptOfalse(N2false)$\mathcal {O}(N^2)$. Based on the analysis above, in comparison to the machine leaning based schemes [21, 22], the complexity of Algorithm 1 is rather low.…”
Section: Authentication By Using Channel Sparsitymentioning
confidence: 99%
“…For instance, it is still not clear that how does the sparse properties of mmWave channel can benefit the PLA detections and how to design the lightweight but effective detection criteria to achieve the desirable performance. Recently, works [21,22] utilized machine learning algorithms to "learn" the variations of sparsity of the mmWave channel, which can further improve the detection performance. However, utilizing such learning algorithms usually requires an additional training phase, which increases the overall delay and complexity.…”
Section: Motivations and Contributionsmentioning
confidence: 99%
“…In fact, channel-based authentication verifies the location of the current transmitter rather than transmitter physics identity, and hence is referred to as location verification. There exists some research works on physical layer authentication for mmWave systems [ 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 ]. In [ 6 ], the authors propose a physical layer authentication scheme by using sparse mmWave channel.…”
Section: Introductionmentioning
confidence: 99%
“…Following this line, the authors in [ 13 ] present a new physical layer countermeasure using channel virtual representation to defend against pilot contamination attack. In [ 14 ], unique beam pattern features are utilized to achieve physical layer spoofing attack detection and the detection problem is cast as a machine learning classification through the sector level sweep (SLS) process. The authors in [ 15 ] develop a physical layer authentication scheme by using signal-to-noise ratio (SNR) trace features to detect spoofing attacks in mmWave systems.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation