2010
DOI: 10.1049/iet-ifs.2009.0197
|View full text |Cite
|
Sign up to set email alerts
|

Physical layer assisted authentication for distributed ad hoc wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(16 citation statements)
references
References 7 publications
0
16
0
Order By: Relevance
“…AdaBoost Algorithm. AdaBoost is the abbreviation of adaptive boosting and developed by Yoav Freund [24] and is 4 Wireless Communications and Mobile Computing the most widely used form of boosting algorithm. Boosting is a powerful technique combined with base classifiers [25] to produce a form of committee whose performance can be significantly better than other base classifiers.…”
Section: Physical Authentication With Adaboost Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…AdaBoost Algorithm. AdaBoost is the abbreviation of adaptive boosting and developed by Yoav Freund [24] and is 4 Wireless Communications and Mobile Computing the most widely used form of boosting algorithm. Boosting is a powerful technique combined with base classifiers [25] to produce a form of committee whose performance can be significantly better than other base classifiers.…”
Section: Physical Authentication With Adaboost Algorithmmentioning
confidence: 99%
“…In [21], Peng Hao et al developed a practical authentication scheme by monitoring and analyzing the packet error rate (PER) and received signal strength indicator (RSSI) at the same time to enhance the spoofing attack detection capability. In [22][23][24], the authors analysed the spatial decorrelation property of the channel response and validated the efficacy of the channel-based authentication for spoofing detection in MIMO system by the comparison between channel information "difference" of two or several frames.…”
Section: Introductionmentioning
confidence: 99%
“…Zeng et al in [7] conducted a survey of several non-cryptographic methods that use physical layer information in both static and mobile wireless networks. Wen et al in [8] introduced a message authentication framework which uses physical layer data to perform cryptography.…”
Section: Authenticationmentioning
confidence: 99%
“…Authentication is an effective approach to deal with such identity-based attacks, by which the intended receivers can verify the identities of involved transmitting users and make sure that the received data come from the expected user [ 2 ]. Traditional authentication mechanisms are handled at the upper-layer using key-based cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…Compared with traditional key-based authentication mechanisms, wireless channel characteristics are very hard to mimic. Consequently, physical-layer authentication can achieve fast and efficient message authentication [ 2 ], and therefore has been recently used as a complementary enhancement to existing upper-layer authentication [ 3 ].…”
Section: Introductionmentioning
confidence: 99%