2020
DOI: 10.1109/twc.2019.2955128
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Authentication for Massive MIMO Systems With Hardware Impairments

Abstract: We study transmitter authentication in massive multiple-input multiple-output (MIMO) systems with non-ideal hardware for the fifth generation (5G) and beyond networks. A new channel-based authentication scheme is proposed by taking hardware impairments into account. Based on signal processing theory, we first formulate channel estimation under hardware impairments and determine error covariance matrix to assess the quantity caused by hardware impairments on authentication performance. With the help of hypothes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 38 publications
(13 citation statements)
references
References 38 publications
0
10
0
Order By: Relevance
“…Instead, we take into account the additive distortions at both the transmitter and the receiver being Gaussian distributed with average powers proportional to the average transmit and received signals, respectively [23]. We would like to mention that although Gaussian modeling for the HWIs can be assumed rudimentary, it is used widely because its tractability allows extracting primary conclusions, e.g., see the recent works [39], [40]. The Gaussianity results by means of the aggregate contribution of many impairments.…”
Section: ) T-hwismentioning
confidence: 99%
“…Instead, we take into account the additive distortions at both the transmitter and the receiver being Gaussian distributed with average powers proportional to the average transmit and received signals, respectively [23]. We would like to mention that although Gaussian modeling for the HWIs can be assumed rudimentary, it is used widely because its tractability allows extracting primary conclusions, e.g., see the recent works [39], [40]. The Gaussianity results by means of the aggregate contribution of many impairments.…”
Section: ) T-hwismentioning
confidence: 99%
“…The accessing frequencies of legitimate devices always need to be identical to their unique pseudo-random binary number (PBN). The PBN of a device-Edge pair is generated by using the unique characteristics and attributes of the physical layer [28], [29], extracted through p-KNN [30] as shown in Fig. 3.…”
Section: A Lightweight Authentication Approachmentioning
confidence: 99%
“…Inspired by these works, a lot of researchers have devoted their efforts to exploring the security issues in large-scale wireless networks. For instance, the secure routing protocols were investigated in [14][15][16], the design of effective physical layer authentication schemes was analysed in [17][18][19], the security performances in terms of secrecy throughput capacity and eavesdropper-tolerance capability were explored in [20][21][22].…”
Section: Introductionmentioning
confidence: 99%