Physical-Layer Authentication for Internet of Things via WFRFT-Based Gaussian Tag Embedding
暂无分享,去创建一个
Ye Wang | Dulal C. Kar | Huici Wu | Ning Zhang | Shaohua Wu | Xiaojie Fang | Hongli Zhang | Dulal Kar | Ning Zhang | Xiaojie Fang | Ye Wang | Shaohua Wu | Huici Wu | Hongli Zhang
[1] John S. Baras,et al. Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.
[2] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[3] Brian M. Sadler,et al. MIMO Authentication via Deliberate Fingerprinting at the Physical Layer , 2011, IEEE Transactions on Information Forensics and Security.
[4] Mike Ryan,et al. Bluetooth: With Low Energy Comes Low Security , 2013, WOOT.
[5] Yan Dong,et al. PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[6] Qinyu Zhang,et al. WFRFT Precoding for Narrowband Interference Suppression in DFT-Based Block Transmission Systems , 2013, IEEE Communications Letters.
[7] Xiang-Yang Li,et al. Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information , 2012, 2013 Proceedings IEEE INFOCOM.
[8] Xuemin Shen,et al. Cooperative Spectrum Access Towards Secure Information Transfer for CRNs , 2013, IEEE Journal on Selected Areas in Communications.
[9] Hannes Tschofenig,et al. Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.
[10] Xuejun Sha,et al. Low Complexity Equalization of HCM Systems with DPFFT Demodulation over Doubly-Selective Channels , 2014, IEEE Signal Processing Letters.
[11] Li Yong,et al. Secret Communication Using Parallel Combinatory Spreading WFRFT , 2015, IEEE Communications Letters.
[12] Wade Trappe,et al. Low-Energy Security: Limits and Opportunities in the Internet of Things , 2015, IEEE Security & Privacy.
[13] Fredrik Rusek,et al. Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.
[14] Zhenduo Wang,et al. BER analysis of hybrid carrier system based on WFRFT with carrier frequency offset , 2015 .
[15] Xuejun Sha,et al. Secret Communication Using Parallel Combinatory Spreading WFRFT , 2015, IEEE Commun. Lett..
[16] Kai Zeng,et al. Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.
[17] Wade Trappe,et al. The challenges facing physical layer security , 2015, IEEE Communications Magazine.
[18] Brian M. Sadler,et al. Wireless physical layer authentication via fingerprint embedding , 2015, IEEE Communications Magazine.
[19] Lajos Hanzo,et al. A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.
[20] Vinton G. Cerf,et al. Taking the Internet to the Next Physical Level , 2016, Computer.
[21] Xuejun Sha,et al. On Physical Layer Security: Weighted Fractional Fourier Transform Based User Cooperation , 2017, IEEE Transactions on Wireless Communications.
[22] Elena Simona Lohan,et al. Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey , 2017, IEEE Access.
[23] Mubashir Husain Rehmani,et al. Cognitive-Radio-Based Internet of Things: Applications, Architectures, Spectrum Related Functionalities, and Future Research Directions , 2017, IEEE Wireless Communications.
[24] Lixiang Li,et al. General Theory of Security and a Study Case in Internet of Things , 2017, IEEE Internet of Things Journal.
[25] Kwok-Yan Lam,et al. Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things , 2018, Proceedings of the IEEE.
[26] Victor C. M. Leung,et al. BER Analysis of WFRFT Precoded OFDM and GFDM Waveforms With an Integer Time Offset , 2018, IEEE Transactions on Vehicular Technology.
[27] Giancarlo Fortino,et al. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.
[28] Rick S. Blum,et al. Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding , 2018, IEEE Transactions on Information Forensics and Security.
[29] Wei Ni,et al. Anatomy of Threats to the Internet of Things , 2019, IEEE Communications Surveys & Tutorials.
[30] Tarik Taleb,et al. A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems , 2019, IEEE Communications Surveys & Tutorials.
[31] Ning Zhang,et al. RAV: Relay Aided Vectorized Secure Transmission in Physical Layer Security for Internet of Things Under Active Attacks , 2019, IEEE Internet of Things Journal.
[32] Junqing Zhang,et al. Experimental Investigation on Wireless Key Generation for Low-Power Wide-Area Networks , 2020, IEEE Internet of Things Journal.