2017
DOI: 10.1155/2017/7206187
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Authentication Enhancement Using Maximum SNR Ratio Based Cooperative AF Relaying

Abstract: Physical layer authentication techniques developed in conventional macrocell wireless networks face challenges when applied in the future fifth-generation (5G) wireless communications, due to the deployment of dense small cells in a hierarchical network architecture. In this paper, we propose a novel physical layer authentication scheme by exploiting the advantages of amplify-and-forward (AF) cooperative relaying, which can increase the coverage and convergence of the heterogeneous networks. The essence of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…in ( 7) is a one-to-one mapping operation (each 2-bits for each subcarrier) which means that a sufficient number of matched bits in the extracted key from S2 is required to discriminate between Bob and Eve, avoiding false decision making. In other words, a sufficient mutuality, indicated by R in (24), must be assured to successfully authenticate the communicating vehicle. Fig.…”
Section: A Performance Analysis Of the Phy Challenge-responsementioning
confidence: 99%
“…in ( 7) is a one-to-one mapping operation (each 2-bits for each subcarrier) which means that a sufficient number of matched bits in the extracted key from S2 is required to discriminate between Bob and Eve, avoiding false decision making. In other words, a sufficient mutuality, indicated by R in (24), must be assured to successfully authenticate the communicating vehicle. Fig.…”
Section: A Performance Analysis Of the Phy Challenge-responsementioning
confidence: 99%
“…Similar ideas are proposed in Refs. [21,26,27,33,35,39,[55][56][57][58] in different wireless transmission systems. For example, in Refs.…”
Section: Key-less Plamentioning
confidence: 99%
“…[54] to time-variant wireless channels, and in Refs. [35,56,58], more complicated communication scenarios such as the cellular Internet of things (CIoT) network, the ad hoc networks, and relay networks are considered to achieve channel-based authentication. The works in Refs.…”
Section: Key-less Plamentioning
confidence: 99%