Artificial Noise-Aided MIMO Physical Layer Authentication With Imperfect CSI
暂无分享,去创建一个
[1] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[2] Lajos Hanzo,et al. Learning-Aided Physical Layer Authentication as an Intelligent Process , 2018, IEEE Transactions on Communications.
[3] John S. Baras,et al. Fingerprinting by Design: Embedding and Authentication , 2016, Digital Fingerprinting.
[4] Larry J. Greenstein,et al. Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.
[5] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[6] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[7] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[8] Ute Rosenbaum. A lower bound on authentication after having observed a sequence of messages , 2004, Journal of Cryptology.
[9] Jörg Kliewer,et al. Authentication Capacity of Adversarial Channels , 2018, 2018 IEEE Information Theory Workshop (ITW).
[10] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[11] Mohamed-Slim Alouini,et al. On the Secrecy Capacity of the Wiretap Channel With Imperfect Main Channel Estimation , 2014, IEEE Transactions on Communications.
[12] Ben J. M. Smeets. Bounds on the probability of deception in multiple authentication , 1994, IEEE Trans. Inf. Theory.
[13] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[14] A. De Maio,et al. Design Principles of MIMO Radar Detectors , 2007, IEEE Transactions on Aerospace and Electronic Systems.
[15] Cong Ling,et al. Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security , 2015, IEEE Transactions on Information Forensics and Security.
[16] Mohamed-Slim Alouini,et al. An Overview of Physical Layer Security in Wireless Communication Systems With CSIT Uncertainty , 2016, IEEE Access.
[17] Ueli Maurer,et al. Authentication theory and hypothesis testing , 2000, IEEE Trans. Inf. Theory.
[18] Rick S. Blum,et al. Fingerprint Embedding Authentication with Artificial Noise: MISO Regime , 2019, 2019 IEEE Conference on Communications and Network Security (CNS).
[19] Lajos Hanzo,et al. Physical-layer authentication for wireless security enhancement: current challenges and future developments , 2016, IEEE Communications Magazine.
[20] Brian M. Sadler,et al. Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios , 2015, IEEE Access.
[21] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas I: The MISOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[22] Xin Wang,et al. Masked Beamforming for Multiuser MIMO Wiretap Channels with Imperfect CSI , 2012, IEEE Transactions on Wireless Communications.
[23] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[24] Rick S. Blum,et al. Inner Bound for the Capacity Region of Noisy Channels with an Authentication Requirement , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).
[25] H. Vincent Poor,et al. Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.
[26] Ning Wang,et al. Physical-Layer Authentication Based on Extreme Learning Machine , 2017, IEEE Communications Letters.
[27] Can Emre Koksal,et al. On the Basic Limits of RF-Fingerprint-Based Authentication , 2016, IEEE Transactions on Information Theory.
[28] Gustavus J. Simmons,et al. Authentication Theory/Coding Theory , 1985, CRYPTO.
[29] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[30] Steven Kay,et al. Fundamentals Of Statistical Signal Processing , 2001 .
[31] Michael Walker. Information-theoretic bounds for authentication schemes , 2004, Journal of Cryptology.
[32] Andrea J. Goldsmith,et al. Capacity and power allocation for fading MIMO channels with channel estimation error , 2006, IEEE Trans. Inf. Theory.
[33] Nicola Laurenti,et al. Physical Layer Authentication over MIMO Fading Wiretap Channels , 2012, IEEE Transactions on Wireless Communications.
[34] S. S. Wilks. The Large-Sample Distribution of the Likelihood Ratio for Testing Composite Hypotheses , 1938 .
[35] Zhen Yang,et al. Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission , 2016, IEEE Transactions on Wireless Communications.
[36] Oliver Kosut,et al. Authentication Against a Myopic Adversary , 2019, 2019 IEEE Conference on Communications and Network Security (CNS).
[37] Trung Quang Duong,et al. Secure Transmission in MIMO Wiretap Channels Using General-Order Transmit Antenna Selection With Outdated CSI , 2015, IEEE Transactions on Communications.
[38] Emre Telatar,et al. Capacity of Multi-antenna Gaussian Channels , 1999, Eur. Trans. Telecommun..
[39] Chong-Yung Chi,et al. On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise: The Noise Leakage Problem , 2009, IEEE Transactions on Wireless Communications.
[40] Jitendra K. Tugnait. Using Artificial Noise to Improve Detection Performance For Wireless User Authentication in Time-Variant Channels , 2014, IEEE Wireless Communications Letters.
[41] John S. Baras,et al. Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.
[42] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[43] Weihua Zhuang,et al. Game Theoretic Study on Channel-Based Authentication in MIMO Systems , 2017, IEEE Transactions on Vehicular Technology.
[44] Rick S. Blum,et al. Physical Layer Authentication via Fingerprint Embedding: Min-Entropy Analysis : Invited Presentation , 2019, 2019 53rd Annual Conference on Information Sciences and Systems (CISS).
[45] Brian M. Sadler,et al. MIMO Authentication via Deliberate Fingerprinting at the Physical Layer , 2011, IEEE Transactions on Information Forensics and Security.