2016
DOI: 10.1109/tifs.2016.2516904
|View full text |Cite
|
Sign up to set email alerts
|

PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…pair d i1,i2 can be formulated as the following optimization problem i2 |r j1,j2 ) . (14) Direct solving this challenging optimization problem for all the D2D pairs is intractable. Not least, different D2D pairs may have conflict-of-interest of wanting the same relay pair in order to maximize their individual achievable SKGRs.…”
Section: 3) Mixed Social Trust and Social Reciprocity: In This Senamentioning
confidence: 99%
See 2 more Smart Citations
“…pair d i1,i2 can be formulated as the following optimization problem i2 |r j1,j2 ) . (14) Direct solving this challenging optimization problem for all the D2D pairs is intractable. Not least, different D2D pairs may have conflict-of-interest of wanting the same relay pair in order to maximize their individual achievable SKGRs.…”
Section: 3) Mixed Social Trust and Social Reciprocity: In This Senamentioning
confidence: 99%
“…This preference order based switching operation enables every D2D pair to find a preferred relay pair and to form a new preferable coalition. After repeating switch operations based on preference order, the coalition formation game will converge to a stable and optimal coalition partition, which allows all the D2D pairs collaboratively find their optimal relay pairs, namely, cooperatively solve the optimization problem (14).…”
Section: B Coalition Formation Algorithm For Selecting Optimal Relaymentioning
confidence: 99%
See 1 more Smart Citation
“…1 (a). One example is the primary user emulation (PUE) attack [6]- [9] that launches the denial of service (DoS) attack, where the illegitimate user emulates the characteristics of the primary user's signal when the sensors conduct spectrum sensing in order to prevent the secondary users from accessing the idle spectrum [10]- [13]. Another example is the fake or rogue access point (AP) that disguises as an authorized AP by spoofing the authorized AP's medium access control (MAC) address in order to lure users to connect to them [14] [15].…”
Section: A Background and Motivationmentioning
confidence: 99%
“…The authentication can also be achieved through secret keys by exploiting PLS techniques according to [12]. For instance, the problem of impersonation attack can also be solved by adding the authentic signal to the message signal.…”
Section: Introductionmentioning
confidence: 99%