Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission
暂无分享,去创建一个
[1] Zhen Yang,et al. Physical-Layer Authentication for Multi-Carrier Transmission , 2015, IEEE Communications Letters.
[2] Nicola Laurenti,et al. On the Error Region for Channel Estimation-Based Physical Layer Authentication Over Rayleigh Fading , 2015, IEEE Transactions on Information Forensics and Security.
[3] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[4] Brian M. Sadler,et al. Wireless physical layer authentication via fingerprint embedding , 2015, IEEE Communications Magazine.
[5] Yan Dong,et al. PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[6] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[7] Brian M. Sadler,et al. Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios , 2015, IEEE Access.
[8] Jitendra K. Tugnait,et al. Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.
[9] Per Ola Börjesson,et al. OFDM channel estimation by singular value decomposition , 1996, Proceedings of Vehicular Technology Conference - VTC.
[10] Hai Su,et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[11] S. R. Jammalamadaka,et al. Topics in Circular Statistics , 2001 .
[12] B MandayamNarayan,et al. Information-theoretically secret key generation for fading wireless channels , 2010 .
[13] Wei-Pang Yang,et al. Enhanced privacy and authentication for the global system for mobile communications , 1999, Wirel. Networks.
[14] C. B. Sankaran,et al. Network access security in next- generation 3GPP systems: A tutorial , 2009, IEEE Communications Magazine.
[15] Xianbin Wang,et al. Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.
[16] T. T. Soong,et al. The joint estimation of signal and noise from the sum envelope , 1967, IEEE Trans. Inf. Theory.
[17] Heinrich Meyr,et al. Optimum receiver design for wireless broad-band systems using OFDM. I , 1999, IEEE Trans. Commun..
[18] John S. Baras,et al. Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.
[19] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[20] Nicola Laurenti,et al. Physical Layer Authentication over MIMO Fading Wiretap Channels , 2012, IEEE Transactions on Wireless Communications.
[21] Ueli Maurer,et al. Authentication theory and hypothesis testing , 2000, IEEE Trans. Inf. Theory.
[22] William A. Arbaugh,et al. Wireless Network Security and Interworking , 2006, Proceedings of the IEEE.
[23] Wade Trappe,et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.
[24] Mohamed-Slim Alouini,et al. Noncoherent Capacity of Secret-Key Agreement With Public Discussion , 2011, IEEE Transactions on Information Forensics and Security.
[25] Wade Trappe,et al. Information-Theoretically Secret Key Generation for Fading Wireless Channels , 2009, IEEE Transactions on Information Forensics and Security.
[26] Michael A. Jensen,et al. Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients , 2011, IEEE Transactions on Mobile Computing.
[27] Sandeep Chennakeshu,et al. Secure information transmission for mobile radio , 2000, IEEE Communications Letters.
[28] Taejoon Park,et al. A Survey of Security Threats on 4G Networks , 2007, 2007 IEEE Globecom Workshops.
[29] Shlomo Shamai,et al. On the capacity of the blockwise incoherent MPSK channel , 1998, IEEE Trans. Commun..
[30] Jin Cao,et al. A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.
[31] Hsuan-Jung Su,et al. On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels , 2012, IEEE Journal on Selected Areas in Communications.