2021
DOI: 10.1109/tvt.2021.3055563
|View full text |Cite
|
Sign up to set email alerts
|

Multiple Correlated Attributes Based Physical Layer Authentication in Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(4 citation statements)
references
References 49 publications
0
3
0
Order By: Relevance
“…In this way, the proposed solution can efficiently capture important features of high-dimensional channel impulse responses for better authentication performance. The authors then show that the proposed solution can improve the authentication performance by 17.18% compared to a conventional ML approach in [105]. Due to the ability of generating synthetic data that is similar to real data, GAI can also be used by adversaries to perform different types of physical layer attacks [83], [84], [98], [103].…”
Section: Channel Equalizationmentioning
confidence: 99%
“…In this way, the proposed solution can efficiently capture important features of high-dimensional channel impulse responses for better authentication performance. The authors then show that the proposed solution can improve the authentication performance by 17.18% compared to a conventional ML approach in [105]. Due to the ability of generating synthetic data that is similar to real data, GAI can also be used by adversaries to perform different types of physical layer attacks [83], [84], [98], [103].…”
Section: Channel Equalizationmentioning
confidence: 99%
“…A group of classifiers is used for security authentication between authorized and unauthorized devices in the IPCS network [25,26]. In [27,28], different learning-assisted authentication algorithms based on multiple features were used to offer various levels of authorization. The algorithms in [29] were designed to meet diverse security needs by incorporating a set of appropriate features.…”
Section: Prior Art and Motivationmentioning
confidence: 99%
“…The limited dynamic range of the specific attributes could also be insufficient to provide a guaranteed authentication result, when the number of devices to be authenticated increases [31]. Ultimately, observing and analyzing multiple attributes and devices at the same instance may create a bottleneck, which may further lead to single-point authentication failure and reduced application traffic [32].…”
Section: Intermittent Transmissionmentioning
confidence: 99%