2021
DOI: 10.32604/cmc.2021.016553
|View full text |Cite
|
Sign up to set email alerts
|

Power Allocation Strategy for Secret Key Generation Method in Wireless Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…IDS systems are classified into two categories depending on their signature-matching capabilities: signature-based intrusion detection systems (SIDS) and anomaly-based intrusion detection systems (AIDS) [11]. The term "signature-based intrusion detection" is often referred to as misuse detection or rule-based detection [12].…”
Section: Related Workmentioning
confidence: 99%
“…IDS systems are classified into two categories depending on their signature-matching capabilities: signature-based intrusion detection systems (SIDS) and anomaly-based intrusion detection systems (AIDS) [11]. The term "signature-based intrusion detection" is often referred to as misuse detection or rule-based detection [12].…”
Section: Related Workmentioning
confidence: 99%
“…The communication between Physical Wireless components and Cyber components of industrial CPWC systems is vulnerable to many threats, like MITM, eavesdropping, spoofing, etc. Physical-Layer Authentication is used to handle such attacks [27], which works better in stationary scenarios, but its performance degrades when the wireless components are mobile. Supervised ML classification algorithms predict whether the received signal is legitimate or illegitimate.…”
Section: Problem Formulationmentioning
confidence: 99%
“…The proposed method in [26] detects spoofer in the Fog network using State Action Reward State Action (SARSA) and Qlearning techniques. Some previously proposed approaches include extracting channel difference using difference equations [27] and then identifying an optimal threshold value using the hit and trial method. This model achieved the best accuracy of 49.7% when the receiver and transmitter were stationary.…”
Section: Introductionmentioning
confidence: 99%