2010 IEEE Vehicular Networking Conference 2010
DOI: 10.1109/vnc.2010.5698262
|View full text |Cite
|
Sign up to set email alerts
|

Physical layer assisted security for mobile OFDM networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…This case corresponds to the deep fading and these measurements should be discarded before quantization. A similar AR model is used to establish the relation between adjacent probing, and the hypothesis testing is implemented to perform the authentication of the access node in a fixed position [16] . The proposed scheme here could be embedded into such communication networks which employ this mechanism to be a complement to its security, without increasing the computational complexity significantly.…”
Section: Discussionmentioning
confidence: 99%
“…This case corresponds to the deep fading and these measurements should be discarded before quantization. A similar AR model is used to establish the relation between adjacent probing, and the hypothesis testing is implemented to perform the authentication of the access node in a fixed position [16] . The proposed scheme here could be embedded into such communication networks which employ this mechanism to be a complement to its security, without increasing the computational complexity significantly.…”
Section: Discussionmentioning
confidence: 99%
“…On the other hand, MIMO precoding‐based work had shown an acceptable key error rate (KER) with its modification in [24]. Moreover, orthogonal frequency division multiplexing (OFDM) secrecy enhancement in which authentication and key channel‐based applications were studied in [25–29].…”
Section: Introductionmentioning
confidence: 99%
“…Based on the randomness and privacy features of channel, Faria et.al firstly proposed a scheme in [9] to detect identity-based attacks by using the signal strength information, namely, the instantaneous signal-to-noise ratio (SNR). Xiao et al proposed the authentication methods using the CSI information in [10]- [12], and then extended the PHY authentication methods to multiple-input multiple-output (MIMO) systems [13] [14] and orthogonal frequency-division multiplexing (OFDM) systems [15].…”
Section: Introductionmentioning
confidence: 99%