| Citation: | JI Xinsheng, YANG Jing, HUANG Kaizhi, YI Ming. Physical Layer Authentication Scheme Based on Hash Method[J]. Journal of Electronics & Information Technology, 2016, 38(11): 2900-2907. doi: 10.11999/JEIT160007 | 
 
	                | JIN Cao, MA Maode, LI Hui, et al. A survey on security aspects for LTE and LTE-A networks[J]. IEEE Communications Surveys  Tutorials, 2014, 16(1): 283-302. doi: 10.1109/SURV.2013.041513.00174. | 
| PATWARI N and KASERA S K. Temporal link signature measurements for location distinction[J]. IEEE Transactions on Mobile Computing, 2011, 10(3): 449-462. doi: 10.1109/ TMC.2010.189. | 
| JORSWIECK E, TOMASIN S, and SEZGIN A. Broadcasting into the uncertainty: authentication and confidentiality by physical-layer processing[J]. Proceedings of the IEEE, 2015, 103(10): 1702-1724. doi: 10.1109/JPROC. 2015.2469602. | 
| ZENG K, GOVINDAN K, and MOHAPATRA P. Non-cryptographic authentication and identification in wireless networks[J]. IEEE Wireless Communications, 2010, 17(5): 56-62. doi:  10.1109/MWC.2010.5601959. | 
| DEMIRBAS M and SONG Y. An RSSI-based scheme for Sybil attack detection in wireless sensor networks[C]. Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, New York, 2006: 564-570. doi:  10.1109/WOWMOM.2006.27. | 
| XIAO Liang, GREENSTEIN L J, MANDAYAM N B, et al. Using the physical layer for wireless authentication in time- variant channels[J]. IEEE Transactions on Wireless Communications, 2008, 7(7): 2571-2579. doi: 10.1109/TWC. 2008.070194. | 
| LIU Jiazi and WANG Xianbin. Physical layer authentication enhancement using two-dimensional channel quantization[J]. IEEE Transactions on Wireless Communications, 2016, 15(6): 4171-4182. doi:  10.1109/TWC.2016.2535442. | 
| SHAN Dan, ZENG Kai, XIANG Weidong, et al. PHY-CRAM: physical layer challenge-response authentication mechanism for wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1817-1827. doi: 10.1109/JSAC. 2013.130914. | 
| 张继明. 无线网络中物理层身份认证研究[D]. [硕士论文]. 华中科技大学, 2013. | 
| ZHANG Jiming. Research on physical-layer identity authentication in wireless networks[D]. [Master dissertation], Huazhong University of Science and Technology, 2013. | 
| DU Xianru, SHAN Dan, ZENG Kai, et al. Physical layer challenge-response authentication in wireless networks with relay[C]. IEEE International Conference on Computer Communications, Orlando, 2014: 1276-1284. doi: 10.1109/ INFOCOM. 2014.6848060. | 
| WU Xiaofu and ZHEN Yan. Physical-layer authentication for multi-carrier transmission[J]. IEEE Communications Letters, 2015, 19(1): 74-77. doi:  10.1109/LCOMM.2014.2375191. | 
| JAKES W C and COX D C. Microwave Mobile Communications[M]. New Jersey, Wiley-IEEE Press, 1994: 13-39. | 
| TRAPPE W. The challenges facing physical layer security[J]. IEEE Communications Magazine, 2015, 53(6): 16-20. doi:  10.1109/MCOM.2015.7120011 | 
| 吕科, 耿国华, 周明全. 基于哈希方法的空间曲线匹配[J]. 电子学报, 2003, 31(2): 294-296. doi: 10.3321/j.issn:0372-2112. 2003.02.037. | 
| L Ke, GENG Guohua, and ZHOU Mingquan. Matching of 3D curve based on the hash method[J]. Acta Electronica Sinica, 2003, 31(2): 294-296. doi: 10.3321/j.issn:0372-2112. 2003.02. 037. | 
| PATZOLD M. Mobile Radio Channels[M]. New York, John Wiley  Sons, 2012: 55-147. | 
| SWAMINATHAN A, MAO Yinian, and WU Min. Robust and secure image hashing[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(2): 215-230. doi:  10.1109/TIFS.2006.873601. | 
| GOERGEN N, CLANCY T C, and NEWMAN T R. Physical layer authentication watermarks through synthetic channel emulation[C]. 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum, Singapore, 2010: 1-7. doi: 10.1109/ DYSPAN.2010.5457897. | 
| GOERGEN N, LIN W S, LIU K J, et al. Authenticating MIMO transmissions using channel-like fingerprinting[C]. Global Telecommunications Conference, Miami, 2010: 1-6. doi:  10.1109/GLOCOM.2010.5684218. | 
| FONTAN F P and ESPIEIRA P M. Modeling the Wireless Propagation Channel: A Simulation Approach with Matlab[M]. New Jersey, John Wiley  Sons, 2008: 105-111. | 
