期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Physical Layer Authentication Using Ensemble Learning Technique in Wireless Communications 被引量:1
1
作者 Muhammad Waqas Shehr Bano +3 位作者 Fatima Hassan Shanshan Tu Ghulam Abbas Ziaul Haq Abbas 《Computers, Materials & Continua》 SCIE EI 2022年第12期4489-4499,共11页
Cyber-physical wireless systems have surfaced as an important data communication and networking research area.It is an emerging discipline that allows effective monitoring and efficient real-time communication between... Cyber-physical wireless systems have surfaced as an important data communication and networking research area.It is an emerging discipline that allows effective monitoring and efficient real-time communication between the cyber and physical worlds by embedding computer software and integrating communication and networking technologies.Due to their high reliability,sensitivity and connectivity,their security requirements are more comparable to the Internet as they are prone to various security threats such as eavesdropping,spoofing,botnets,man-in-the-middle attack,denial of service(DoS)and distributed denial of service(DDoS)and impersonation.Existing methods use physical layer authentication(PLA),themost promising solution to detect cyber-attacks.Still,the cyber-physical systems(CPS)have relatively large computational requirements and require more communication resources,thus making it impossible to achieve a low latency target.These methods perform well but only in stationary scenarios.We have extracted the relevant features from the channel matrices using discrete wavelet transformation to improve the computational time required for data processing by considering mobile scenarios.The features are fed to ensemble learning algorithms,such as AdaBoost,LogitBoost and Gentle Boost,to classify data.The authentication of the received signal is considered a binary classification problem.The transmitted data is labeled as legitimate information,and spoofing data is illegitimate information.Therefore,this paper proposes a threshold-free PLA approach that uses machine learning algorithms to protect critical data from spoofing attacks.It detects the malicious data packets in stationary scenarios and detects them with high accuracy when receivers are mobile.The proposed model achieves better performance than the existing approaches in terms of accuracy and computational time by decreasing the processing time. 展开更多
关键词 physical layer authentication machine learning cyber-physical systems SECURITY
下载PDF
Physical layer authentication of MIMO-STBC systems based on constellation dithering
2
作者 Yongli An Haifei Bai +1 位作者 Shikang Zhang Zhanlin Ji 《Intelligent and Converged Networks》 EI 2023年第4期355-365,共11页
Most of the existing physical layer watermarking authentication schemes are based on a single-input single-output system and require pre-issue of shared keys.To address these problems,in this thesis,a physical layer a... Most of the existing physical layer watermarking authentication schemes are based on a single-input single-output system and require pre-issue of shared keys.To address these problems,in this thesis,a physical layer authentication scheme without the distribution keys is proposed based on the constellation dithering physical layer authentication watermarking mechanism with a multiple-input multiple-output(MIMO)system,and space-time block coding(STBC)is used to improve the robustness of transmission.Specifically,the legitimate node obtains channel state information(CSI)through channel probing and couples CSI with the message signal using a hash function to generate an authentication tag,which is then embedded through constellation dithering.The receiver extracts the tag and authenticates it using hypothesis testing.Performance analysis shows that the scheme is resistant to various attacks such as replay,interference,tampering,and forgery.Simulation results show that the use of MIMO multi-antenna diversity with STBC coding technique reduces the bit error rate(BER)of message signals and tag signals and improves the detection rate of legitimate signals. 展开更多
关键词 constellation dithering channel state information(CSI) hash function MIMO-STBC physical layer authentication
原文传递
Physical Layer Authentication in Wireless Communication Networks:A Survey 被引量:2
3
作者 Lin Bai Lina Zhu +2 位作者 Jianwei Liu Jinho Choi Wei Zhang 《Journal of Communications and Information Networks》 CSCD 2020年第3期237-264,共28页
Physical layer security(PLS)in wireless communication systems has attracted extensive research attentions in recent years.Unlike cryptography-based methods applied in upper-layer in network,PLS methods are applied in ... Physical layer security(PLS)in wireless communication systems has attracted extensive research attentions in recent years.Unlike cryptography-based methods applied in upper-layer in network,PLS methods are applied in physical layers and can provide information-theoretic security by utilizing the randomness of signals and wireless channels.In this survey,we provide a comprehensive review in the domain of physical layer authentication(PLA)in wireless communication systems,including the concepts,several key techniques of typical PLA architectures as well as future challenges and research trends in more sophisticated communication systems.The survey begins with an overview of the background and basic concepts of PLA,such as the general model of wireless security communication system,typical frameworks of key-based/less PLA systems,and the common attack models.We then discuss the major concerns and key techniques that are applied in PLA systems,where three types of authentication schemes are considered,i.e.,the authentication based on channel information,radio-frequency and identity watermarks.Basic models and representative research results about key approaches and techniques applied to the authentication systems above are subsequently covered.Finally,the associated challenges and potential research trends of PLA in future communication systems are presented at the end of the survey paper. 展开更多
关键词 physical layer authentication(PLA) radiofrequency identification hypothesis testing wireless communication
原文传递
A Cooperative Jamming Scheme Based on Node Authentication for Underwater Acoustic Sensor Networks
4
作者 Yishan Su Yao Liu +3 位作者 Rong Fan Luyu Li Huili Fan Shu Zhang 《Journal of Marine Science and Application》 CSCD 2022年第2期197-209,共13页
Cooperative jamming(CJ)is one of the important methods to solve security problems of underwater acoustic sensor networks(UASNs).In this paper,we propose a Cooperative Jamming Scheme based on Node Authentication for UA... Cooperative jamming(CJ)is one of the important methods to solve security problems of underwater acoustic sensor networks(UASNs).In this paper,we propose a Cooperative Jamming Scheme based on Node Authentication for UASNs to improve the effect of CJ by selecting suitable jamming source for found illegal nodes.In the node authentication,all nodes will be identified by their trust value(TV).TV is calculated according to three types of evidence:channel-based trust evidence,behavior-based trust evidence and energy-based trust evidence.Besides,to deal with cases where legal nodes may be suspected,the historical TV and trust redemption will be considered when calculating TV.In cooperative jamming,according to the link quality,several nodes are selected to jam illegal nodes.Both simulation and field experiment show that the proposed scheme can accurately find the illegal nodes in the time-vary channel and improve the security of the network. 展开更多
关键词 underwater acoustic sensor networks(UASNs) physical layer security cooperative jamming physical layer authentication trust management mechanism
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部