Opposed to classical authentication protocols following a computational security paradigm based on secret credentials and cryptographic primitives, physical layer authentication aims at distinguishing users without shared secrets, by leveraging the natural randomness and uniqueness of transmission channels. We consider the special setting of cooperative wireless communications, in which some relay nodes are located between a supplicant and an authenticator, and we assess the performance of physical layer authentication approaches based on both statistical and machine learning techniques. We show that the presence of relay nodes enabling cooperative communications may improve the performance of physical layer authentication
Physical layer security is an attractive security mechanism, which exploits the randomness character...
The broadcast characteristic of a wireless networks which is exploited in cooperative communications...
Strong authentication is crucial as wireless networks become more widespread and relied upon. The r...
Opposed to classical authentication protocols following a computational security paradigm based on s...
The problem of determining the source of a message in a wireless communication link is challenging, ...
The physical layer security of wireless networks is becoming increasingly important because of the r...
Strong authentication in an interconnected wireless environment continues to be an important, but so...
While the open nature of radio propagation enables convenient "anywhere" wireless access, it becomes...
Abstract—Exploiting physical layer characteristics to enhance or complement authentication strength ...
The topic of physical layer authenticated encryption using high rate key generation through shared r...
This paper provides a comprehensive review of the domain of physical layer security in multiuser wir...
This paper provides a comprehensive review of the domain of physical layer security in multiuser wir...
In this dissertation, we propose the use of adversarial machine learning to characterize wireless ra...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...
The 5G and beyond wireless networks are critical to support diverse vertical applications by connect...
Physical layer security is an attractive security mechanism, which exploits the randomness character...
The broadcast characteristic of a wireless networks which is exploited in cooperative communications...
Strong authentication is crucial as wireless networks become more widespread and relied upon. The r...
Opposed to classical authentication protocols following a computational security paradigm based on s...
The problem of determining the source of a message in a wireless communication link is challenging, ...
The physical layer security of wireless networks is becoming increasingly important because of the r...
Strong authentication in an interconnected wireless environment continues to be an important, but so...
While the open nature of radio propagation enables convenient "anywhere" wireless access, it becomes...
Abstract—Exploiting physical layer characteristics to enhance or complement authentication strength ...
The topic of physical layer authenticated encryption using high rate key generation through shared r...
This paper provides a comprehensive review of the domain of physical layer security in multiuser wir...
This paper provides a comprehensive review of the domain of physical layer security in multiuser wir...
In this dissertation, we propose the use of adversarial machine learning to characterize wireless ra...
A fundamental problem in security is authentication: namely, how to verify the identity of another p...
The 5G and beyond wireless networks are critical to support diverse vertical applications by connect...
Physical layer security is an attractive security mechanism, which exploits the randomness character...
The broadcast characteristic of a wireless networks which is exploited in cooperative communications...
Strong authentication is crucial as wireless networks become more widespread and relied upon. The r...