Due to the open nature of radio propagation, information security in wireless communications has been facing more challenges compared to its counterpart in wired networks. Authentication, defined as an important aspect of information security, is the process of verifying the identity of transmitters to prevent against spoofing attacks. Traditionally, secure wireless communications is achieved by relying solely upon higher layer cryptographic mechanisms. However, cryptographic approaches based on complex mathematical calculations are inefficient and vulnerable to various types of attacks. Recently, researchers have shown that the unique properties of wireless channels can be exploited for authentication enhancement by providing additional se...
The security of wireless networks and systems is becoming increasingly important as wireless devices...
Physical-layer authentication can address physical layer vulnerabilities and security threats in wir...
In this dissertation, we propose the use of adversarial machine learning to characterize wireless ra...
While the open nature of radio propagation enables convenient "anywhere" wireless access, it becomes...
Due to the open nature of the radio signal propagation medium, wireless communication is inherently ...
Without any doubt, wireless infrastructures and services have fundamental impacts on every aspect of...
Physical-layer authentication techniques exploit the unique properties of the wireless medium to enh...
Abstract—Exploiting physical layer characteristics to enhance or complement authentication strength ...
This is an editorialInternational audienceThe ongoing paradigm shift from classical centralized wire...
As an alternative and appealing approach to providing information security in wireless communication...
Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the con...
Abstract The open nature of radio propagation enables ubiquitous wireless communication. This allow...
Abstract — We propose an enhanced physical-layer authenti-cation scheme for multi-carrier wireless s...
Precise channel estimation at the physical layer allows to authenticate the source of a message in a...
Abstract — Exploiting the unique properties of the physical layer to enhance or complement authentic...
The security of wireless networks and systems is becoming increasingly important as wireless devices...
Physical-layer authentication can address physical layer vulnerabilities and security threats in wir...
In this dissertation, we propose the use of adversarial machine learning to characterize wireless ra...
While the open nature of radio propagation enables convenient "anywhere" wireless access, it becomes...
Due to the open nature of the radio signal propagation medium, wireless communication is inherently ...
Without any doubt, wireless infrastructures and services have fundamental impacts on every aspect of...
Physical-layer authentication techniques exploit the unique properties of the wireless medium to enh...
Abstract—Exploiting physical layer characteristics to enhance or complement authentication strength ...
This is an editorialInternational audienceThe ongoing paradigm shift from classical centralized wire...
As an alternative and appealing approach to providing information security in wireless communication...
Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the con...
Abstract The open nature of radio propagation enables ubiquitous wireless communication. This allow...
Abstract — We propose an enhanced physical-layer authenti-cation scheme for multi-carrier wireless s...
Precise channel estimation at the physical layer allows to authenticate the source of a message in a...
Abstract — Exploiting the unique properties of the physical layer to enhance or complement authentic...
The security of wireless networks and systems is becoming increasingly important as wireless devices...
Physical-layer authentication can address physical layer vulnerabilities and security threats in wir...
In this dissertation, we propose the use of adversarial machine learning to characterize wireless ra...