Multiuser Physical Layer Security Mechanism in the Wireless Communication System of the IIOT

[1]  Sherali Zeadally,et al.  Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures , 2019, IEEE Transactions on Industrial Informatics.

[2]  Hong Wen,et al.  Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS , 2019, IEEE Transactions on Industrial Informatics.

[3]  R. Vijayanand,et al.  Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection , 2018, Comput. Secur..

[4]  Hong Wen,et al.  Lightweight one-time password authentication scheme based on radio-frequency fingerprinting , 2018, IET Commun..

[5]  Songlin Chen,et al.  Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation , 2020, IEEE Internet of Things Journal.

[6]  Richard Candell Radio Frequency Measurements for Selected Manufacturing and Industrial Environments , 2016 .

[7]  Farid García,et al.  A comprehensive survey on support vector machine classification: Applications, challenges and trends , 2020, Neurocomputing.

[8]  Zhixin Sun,et al.  An Improved Intrusion Detection Algorithm Based on GA and SVM , 2018, IEEE Access.

[9]  Zhi Chen,et al.  A Parallel Genetic Algorithm Based Feature Selection and Parameter Optimization for Support Vector Machine , 2016, Sci. Program..

[10]  Yushan Li,et al.  Optimized Coherent Integration-Based Radio Frequency Fingerprinting in Internet of Things , 2018, IEEE Internet of Things Journal.

[11]  Huichun Hua,et al.  Parameter optimization of support vector machine based on improved grid algorithm , 2020, Journal of Physics: Conference Series.

[12]  Hatem A. Fayed,et al.  Speed up grid-search for parameter selection of support vector machines , 2019, Appl. Soft Comput..

[13]  Zhibo Pang,et al.  Automated Labeling and Learning for Physical Layer Authentication Against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks , 2021, IEEE Transactions on Industrial Informatics.

[14]  Eduard A. Jorswieck,et al.  To avoid or not to avoid CSI leakage in physical layer secret communication systems , 2015, IEEE Communications Magazine.

[15]  Ying Li,et al.  Improved particle swarm optimization algorithm for fuzzy multi-class SVM , 2010 .

[16]  Ning Wang,et al.  Physical-Layer Authentication Based on Extreme Learning Machine , 2017, IEEE Communications Letters.

[17]  L. A. Demidova,et al.  The SVM Classifier Based on the Modified Particle Swarm Optimization , 2016, ArXiv.

[18]  Stephan Berger,et al.  Attacks on the Industrial Internet of Things - Development of a multi-layer Taxonomy , 2020, Comput. Secur..

[19]  Xiaojun Jing,et al.  Physical layer authentication under intelligent spoofing in wireless sensor networks , 2020, Signal Process..

[20]  Lei Yang,et al.  Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information , 2018, Sensors.

[21]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[22]  Ming Xiao,et al.  Physical-Layer Security for Industrial Wireless Control Systems: Basics and Future Directions , 2018, IEEE Industrial Electronics Magazine.

[23]  Shih-Wei Lin,et al.  Particle swarm optimization for parameter determination and feature selection of support vector machines , 2008, Expert Syst. Appl..

[24]  Jie Zhang,et al.  Find me a safe zone: A countermeasure for channel state information based attacks , 2019, Comput. Secur..

[25]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[26]  Chih-Jen Lin,et al.  LIBSVM: A library for support vector machines , 2011, TIST.

[27]  Hong Wen,et al.  Physical-Layer Channel Authentication for 5G via Machine Learning Algorithm , 2018, Wirel. Commun. Mob. Comput..

[28]  Feng Zhao,et al.  Optimization Approaches for Parameters of SVM , 2020 .

[29]  Ding-Xuan Zhou,et al.  Theory of deep convolutional neural networks: Downsampling , 2020, Neural Networks.

[30]  Mehdi Asadi,et al.  Detecting botnet by using particle swarm optimization algorithm based on voting system , 2020, Future Gener. Comput. Syst..

[31]  Jitendra K. Tugnait,et al.  Wireless User Authentication via Comparison of Power Spectral Densities , 2013, IEEE Journal on Selected Areas in Communications.