In this dissertation, we propose the use of adversarial machine learning to characterize wireless radio transmitters for the purpose of physical-layer authentication. Wireless communication systems are quickly evolving to take advantage of autonomous networking for applications such as 5th generation mobile networks, Internet of Things, and vehicular-to-everything technologies. Robust and efficient network security mechanisms are necessary to protect the authenticity of the data and safeguard the integrity of the greater interconnected network. To this end, we leverage unique channel-dependent differences in received transmissions, known as channel state information (CSI), to make authentication decisions with machine learning algorithms. M...
Cyber-physical wireless systems have surfaced as an important data communication and networking rese...
Physical-layer authentication techniques exploit the unique properties of the wireless medium to enh...
Machine Learning (ML) is becoming a cornerstone enabling technology for the next generation of wirel...
17 USC 105 interim-entered record; under temporary embargo.Strong authentication is crucial as wirel...
Strong authentication in an interconnected wireless environment continues to be an important, but so...
The physical layer security of wireless networks is becoming increasingly important because of the r...
17 USC 105 interim-entered record; under temporary embargo.IEEE 93rd Vehicular Technology Conference...
The problem of determining the source of a message in a wireless communication link is challenging, ...
The 5G and beyond wireless networks are critical to support diverse vertical applications by connect...
The advances in wireless technologies have led to autonomous deployments of various wireless network...
An essential part of most wireless communications systems is the identification of a transmitter by ...
Due to the open nature of radio propagation, information security in wireless communications has bee...
Opposed to classical authentication protocols following a computational security paradigm based on s...
Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the con...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
Cyber-physical wireless systems have surfaced as an important data communication and networking rese...
Physical-layer authentication techniques exploit the unique properties of the wireless medium to enh...
Machine Learning (ML) is becoming a cornerstone enabling technology for the next generation of wirel...
17 USC 105 interim-entered record; under temporary embargo.Strong authentication is crucial as wirel...
Strong authentication in an interconnected wireless environment continues to be an important, but so...
The physical layer security of wireless networks is becoming increasingly important because of the r...
17 USC 105 interim-entered record; under temporary embargo.IEEE 93rd Vehicular Technology Conference...
The problem of determining the source of a message in a wireless communication link is challenging, ...
The 5G and beyond wireless networks are critical to support diverse vertical applications by connect...
The advances in wireless technologies have led to autonomous deployments of various wireless network...
An essential part of most wireless communications systems is the identification of a transmitter by ...
Due to the open nature of radio propagation, information security in wireless communications has bee...
Opposed to classical authentication protocols following a computational security paradigm based on s...
Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the con...
In today’s connected world, almost everyone has at least one internet-connected device. With the num...
Cyber-physical wireless systems have surfaced as an important data communication and networking rese...
Physical-layer authentication techniques exploit the unique properties of the wireless medium to enh...
Machine Learning (ML) is becoming a cornerstone enabling technology for the next generation of wirel...