2022
DOI: 10.1007/s11432-021-3284-y
|View full text |Cite
|
Sign up to set email alerts
|

Reliable resource allocation with RF fingerprinting authentication in secure IoT networks

Abstract: The unprecedented growth of the Internet of Things (IoT) has led to a huge amount of wireless resource consumption in a network. Due to limited wireless resources, a network can only guarantee the quality of service (QoS) of authenticated users rather than that of all users. By acknowledging this limitation, we realise that user authentication would be a big issue in IoT networks. Although traditional authentication methods can enhance network security to a certain extent, their vulnerability to malicious atta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Passive and active strategies are commonly employed in vulnerability scanning technology to detect vulnerabilities. Passive strategy is based on the host, and active strategy is based on the network, with the help of the network remote target host to establish a connection, send a timely request, analyze the return information, and then accurately determine the existence of vulnerabilities in the target host with or without vulnerabilities to determine where the vulnerabilities are located [4][5][6].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Passive and active strategies are commonly employed in vulnerability scanning technology to detect vulnerabilities. Passive strategy is based on the host, and active strategy is based on the network, with the help of the network remote target host to establish a connection, send a timely request, analyze the return information, and then accurately determine the existence of vulnerabilities in the target host with or without vulnerabilities to determine where the vulnerabilities are located [4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…Peng Peng. Applied Mathematics and Nonlinear Sciences, 9(1) (2024)[1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17] …”
mentioning
confidence: 99%