2010 - Milcom 2010 Military Communications Conference 2010
DOI: 10.1109/milcom.2010.5680394
|View full text |Cite
|
Sign up to set email alerts
|

REAM: RAKE receiver enhanced authentication method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Various channel features have been considered in this context. For example, in wireless radio systems, the power level was considered in [9]- [11], the impulse response of a wideband channel in [12]- [16], the frequency response of an orthogonal frequency division multiplexing (OFDM) transmission in [17], the power spectral densities in [18], and the time series of the received signal strength in a data/acknowledgment packet exchange in [19].…”
Section: Related Workmentioning
confidence: 99%
“…Various channel features have been considered in this context. For example, in wireless radio systems, the power level was considered in [9]- [11], the impulse response of a wideband channel in [12]- [16], the frequency response of an orthogonal frequency division multiplexing (OFDM) transmission in [17], the power spectral densities in [18], and the time series of the received signal strength in a data/acknowledgment packet exchange in [19].…”
Section: Related Workmentioning
confidence: 99%
“…Then, it was extended to time varying channels [19], mobile scenarios [21], and frequency-selective Rayleigh channels [22]. In order to improve the authentication performance, the amplitude and phase of CFR were used to make an authentication in [11], [13] [2], [28] × × × × × CIR (channel gain, multipath delay) [14], [15] × × × × × CFR (amplitude) [18]- [22] [27] × × × × × CFR (amplitude, phase) [23], [24] × × × × × CFR (phase differences) [ the OFDM [23] and CDMA systems [24]. Moreover, phase differences between the two CFRs were used for authentication in a multi-carrier transmission systems [12].…”
Section: Introductionmentioning
confidence: 99%
“…Maurer [2] ſrstly proved that even when legitimate users have a worse channel than an eavesdropper, it is possible for them to generate a secret key through public communication over an unsecure yet authenticated channel. He et al [3], [4] exploited inherent features of wireless channels to achieve user authentication in OFDM and CDMA networks. Kamakaris [5] examined the feasibility of utilizing characteristics of a wireless channel between a transmitter/receiver pair to generate dynamic keys through existing encryption mechanisms.…”
Section: Introductionmentioning
confidence: 99%