2020
DOI: 10.1109/tdsc.2017.2751600
|View full text |Cite
|
Sign up to set email alerts
|

Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 29 publications
0
13
0
Order By: Relevance
“…Note, that we do not address other type of adversary goals such as authentication. This security property can be achieved in conjunction with key generation using a number of additional out-of-band or in-band methods [6,18,21].…”
Section: Adversary Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Note, that we do not address other type of adversary goals such as authentication. This security property can be achieved in conjunction with key generation using a number of additional out-of-band or in-band methods [6,18,21].…”
Section: Adversary Modelmentioning
confidence: 99%
“…For RAKG, Alice was equipped with an RA of 3Ă—3 square shaped metallic pixels that are connected by 12 p-i-n diode switches with fast reconfigurability. The radiation patterns of some typical modes can be found in [21], and we switched antenna modes among 4096 available antenna modes. However, we only have the data of the antenna patterns for 253 modes, which prevent us from obtaining đť‘ť 0 and đť‘ť 1 among all antenna modes.…”
Section: Performance Evaluation 51 Experiments Setupmentioning
confidence: 99%
“…PHY-layer message authentication can be traced back to Simmons' work in [16], where an authentication model over noiseless channels was proposed. Recently, authentication over noise channel models drawn increasing attentions [21]- [25]. The authentication over noise source model with a (noiseless) public discussion channel was studied by Korzhik et al [21].…”
Section: B Phy-layer Message Authenticationmentioning
confidence: 99%
“…After that, Jiang considered the keyless authentication problem in a noise channel model in [23], [24]. More recently, the security of physical layer message integrity protection scheme was studied by Pan et al in [25], in which, a signal cancellation attack framework is established to model the attacker's behavior, and a physical layer message integrity protection approach with reconfigurable antenna is proposed based on the framework. The other related works also includes [33]- [35].…”
Section: B Phy-layer Message Authenticationmentioning
confidence: 99%
“…Reconfigurable antennas (RAs) capable of dynamically changing their properties, e.g., radiation pattern, operational frequency and polarization have received a great deal of attention [1]- [12]. In particular, the RAs with radiation pattern reconfigurability help improve the system performance [13], communication security and energy efficiency by directing signals towards intended directions while reducing interference in unintended directions [14]. The gains with RA systems are typically achieved at the cost of increased structural (or hardware) and algorithmic (or software) complexities as compared to a legacy singlefunction antenna system.…”
mentioning
confidence: 99%