2021
DOI: 10.1109/access.2021.3059648
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security: Detection of Active Eavesdropping Attacks by Support Vector Machines

Abstract: Security at the physical layer (PHY) is a salient research topic in wireless systems, and machine learning (ML) is emerging as a powerful tool for providing new data-driven security solutions. Therefore, the application of ML techniques to the PHY security is of crucial importance in the landscape of more and more data-driven wireless services. In this context, we first summarize the family of bespoke ML algorithms that are eminently suitable for wireless security. Then, we review the recent progress in ML-aid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
16
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(22 citation statements)
references
References 211 publications
0
16
0
Order By: Relevance
“…The SVM is a classification model that takes an input into a high-dimensional feature space, and depending on the data type, it uses kernel functions to separate it into two or three dimensions. The data points in the margin limits are the support vectors and help to calculate the optimized hyperplane; this process is shown in Figure 3 [32]. In Figure 3, H is the separating hyperplane.…”
Section: Support Vector Machinementioning
confidence: 99%
See 1 more Smart Citation
“…The SVM is a classification model that takes an input into a high-dimensional feature space, and depending on the data type, it uses kernel functions to separate it into two or three dimensions. The data points in the margin limits are the support vectors and help to calculate the optimized hyperplane; this process is shown in Figure 3 [32]. In Figure 3, H is the separating hyperplane.…”
Section: Support Vector Machinementioning
confidence: 99%
“…The first objective is to separate the two parts of the data in this case linearly [33]. The second is to find the margin as in (6) [32], where x is the argument, w is the weight of the margin, and b is a constant. In Figure 3, H is the separating hyperplane.…”
Section: Support Vector Machinementioning
confidence: 99%
“…SVM [45] is a supervised learning model used in machine learning, and it is used for regression and classification analysis. A labeled dataset is passed to the SVM model, and it is able to categorize further data.…”
Section: Support Vector Machine (Svm)mentioning
confidence: 99%
“…TTN is based on Long Range Wide Area Network (LoRaWAN) [2], a Low Power Wide Area Network (LPWAN) technology that operates on top of the proprietary LoRa protocol stack (originally developed to connect battery and low-power devices wirelessly to the internet) [2]. It constitutes a STAR network topology that uses gateway devices for receiving data from nodes and forwarding it onto LoRaWAN servers [3]. LoRaWAN allows geographically spread devices connectivity, securing bidirectional communication, mobility, and localisation services, and provides open-source software for hardware gateways and backend services [4].…”
Section: Introductionmentioning
confidence: 99%
“…overview of LoRa specifications in Europe. Ten channels are defined in total, with eight having multi data-rate of 250bps-5.5Kbps, a single channel with high data rate (11Kbps), and a single Frequency Shift Keying (FSK) channel at 50kbps [3].…”
Section: Introductionmentioning
confidence: 99%