2019
DOI: 10.1109/tcomm.2018.2881117
|View full text |Cite
|
Sign up to set email alerts
|

Learning-Aided Physical Layer Authentication as an Intelligent Process

Abstract: Performance of the existing physical layer authentication schemes could be severely affected by the imperfect estimates and variations of the communication link attributes used. The commonly adopted static hypothesis testing for physical layer authentication faces significant challenges in time-varying communication channels due to the changing propagation and interference conditions, which are typically unknown at the design stage. To circumvent this impediment, we propose an adaptive physical layer authentic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
94
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 135 publications
(108 citation statements)
references
References 47 publications
0
94
0
Order By: Relevance
“…In [17], k-NN algorithms are used to identify electronic devices through their radio-frequency emissions, and the presence of an attacker is not explicitly considered. Authors of [18] propose the application of an adaptive algorithm for PLA in a dynamically changing wireless environment, considering a single channel model and a series of physical layer attributes which may include CSI. In [19], instead, machine-learningaided intelligent authentication techniques are proposed for 5G communications.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [17], k-NN algorithms are used to identify electronic devices through their radio-frequency emissions, and the presence of an attacker is not explicitly considered. Authors of [18] propose the application of an adaptive algorithm for PLA in a dynamically changing wireless environment, considering a single channel model and a series of physical layer attributes which may include CSI. In [19], instead, machine-learningaided intelligent authentication techniques are proposed for 5G communications.…”
Section: A Related Workmentioning
confidence: 99%
“…This models a more realistic training phase with respect to [18]. Moreover, differently from [18], we also consider the use of non-supervised techniques to discriminate authentic from forged messages during the training phase, letting a clustering algorithm to decide about the nature of the received packets. We show that even in such an unfavorable condition it is possible to achieve good security performance using machine learning algorithms, especially when the attacker's channel has a low spatial correlation with the main one.…”
Section: B Contributionmentioning
confidence: 99%
“…The 5G-and-beyond wireless networks have received tremendous attentions in both academia and industries alike, which will enable a wide variety of vertical applications by connecting significant communication overhead. Furthermore, due to the disregard of inherent features of communicating devices, detecting compromised security keys cannot be readily achieved by the conventional digital credentials-based techniques [2].…”
Section: Introductionmentioning
confidence: 99%
“…1: Alice-Bob-Eve model in the complex time-varying environment. Bob identifies Alice from Spoofer based on the multi-dimensional received information, which may be related to communication links, physical environment, and communication process, just to name a few.Although cryptographic techniques have been widely studied for authentication, they may fall short of the desired performance in many emerging scenarios of 5G-and-beyond wireless networks [2]. The fundamental weaknesses of conventional cryptography techniques are the increasing latencies, communication and computation overheads for achieving better security performance, which are extremely undesirable for the delay-sensitive communications and resource-constraint devices.…”
mentioning
confidence: 99%
See 1 more Smart Citation