2017 IEEE 85th Vehicular Technology Conference (VTC Spring) 2017
DOI: 10.1109/vtcspring.2017.8108527
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Authentication for Mission Critical Machine Type Communication Using Gaussian Mixture Model Based Clustering

Abstract: Abstract-The application of Mission Critical Machine Type Communication (MC-MTC) in wireless systems is currently a hot research topic. Wireless systems are considered to provide numerous advantages over wired systems in e.g. industrial applications such as closed loop control. However, due to the broadcast nature of the wireless channel, such systems are prone to a wide range of cyber attacks. These range from passive eavesdropping attacks to active attacks like data manipulation or masquerade attacks. Theref… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 27 publications
(33 citation statements)
references
References 14 publications
0
29
0
Order By: Relevance
“…First, at the physical layer, AI and machine learning techniques have been shown to improve channel coding [28], ranging and obstacle detection [29], and physical layer security [30]. Research in each of these domains is still in a preliminary stage and requires further investigations.…”
Section: Artificial Intelligence (Ai)mentioning
confidence: 99%
“…First, at the physical layer, AI and machine learning techniques have been shown to improve channel coding [28], ranging and obstacle detection [29], and physical layer security [30]. Research in each of these domains is still in a preliminary stage and requires further investigations.…”
Section: Artificial Intelligence (Ai)mentioning
confidence: 99%
“…If strong security is needed, the tabled PC could automatically scan his iris to get a second factor. Furthermore, physical attributes of devices or wireless channels can be used for strong, automated authentication and encryption (Lipps et al 2018;Weinand et al 2017). Furthermore, integrating context into an aggregation model can aid in intrusion detection, especially for heterogeneous networks (Duque Anton et al 2017c).…”
Section: Future Rese Arch Directionsmentioning
confidence: 99%
“…Physical layer authentication (PLA), which safeguards communications by using the intrinsic characteristics of wireless channels, is a promising lightweight security method [6]. In previous studies, a number of approaches based on artificial intelligence algorithms, including Support Vector Machine (SVM) [7], Gaussian Mixture Model (GMM) [8], [9], Genetic Algorithms [10], Random Forest [11] and others [12]- [14], have been widely used in PLA technologies. For example, an SVM-based learning method was designed to improve the detection accuracy of the authentication scheme [15].…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, machine learning-assisted PLA solutions are facing both new challenges and opportunities when we consider the time-varying nature of wireless networks. For example, the channel-based PLA scheme, which applies twodimensional static features, has severely degraded performance in a time-varying communication environment [9]. In addition, the independent design of static features extraction and clustering will increase the complexity of security authentication.…”
Section: Introductionmentioning
confidence: 99%