Citation: | SONG Huawei, JIN Liang, ZHANG Shengjun. Physical Layer Authentication Based on Tag Signal[J]. Journal of Electronics & Information Technology, 2018, 40(5): 1066-1071. doi: 10.11999/JEIT170672 |
李中献, 詹榜华, 杨义先. 认证理论与技术的发展[J]. 电子学报, 1999, 27(1): 98-102.
|
LI Zhongxian, ZHAN Banghua, and YANG Yixian. A survey of identification and authentication[J]. Acta Electronica Sinica, 1999, 27(1): 98-102.
|
SIMMONS G J. Authentication theory/coding theory[C]. Proceedings of CRYPTO 84 on Advances in Cryptology, New York, USA, 1985: 411-431.
|
MAURER U. Authentication theory and hypothesis testing [J]. IEEE Transactions on Information Theory, 2000, 46(4): 1350-1356. doi: 10.1109/18.850674.
|
WANG Xianbin, HAO Peng, and HANZO Lajos. Physical- layer authentication for wireless security enhancement: current challenges and future developments[J]. IEEE Communications Magazine, 2016, 54(6): 152-158. doi: 10.1109/MCOM.2016.7498103.
|
PAUL L Y, BARAS J S, and SADLER B M. Physical-layer authentication[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(1): 38-51. doi: 10.1109/ TIFS.2007.916273.
|
PAUL L Y, BARAS J S, and SADLER B M. Multicarrier authentication at the physical layer[C]. Proceedings of the 2008 International Symposium on a World of Wireless Mobile and Multimedia Networks, Newport Beach, CA, USA, 2008: 1-6. doi: 10.1109/WOWMOM.2008.4594926.
|
LIU Jiazi and WANG Xianbin. Physical layer authentication enhancement using two-dimensional channel quantization[J]. IEEE Transactions on Wireless Communications, 2016, 15(6): 4171-4182. doi: 10.1109/TWC.2016.2535442.
|
WANG Ning, JIANG Ting, L Shichao, et al. Physical- layer authentication based on extreme learning machine [J]. IEEE Communications Letters, 2017, 21(7): 1557-1560. doi: 10.1109/LCOMM.2017.2690437.
|
DAI Chuping, YANG Jianxi, QIN Yongning, et al. Physical layer authentication algorithm based on SVM[C]. Proceedings of 2016 2nd IEEE International Conference on Computer and Communications (ICCC), 2016: 1597-1601.
|
RAHMAN M M U, ABBASI Q H, CHOPRA N, et al. Physical layer authentication in nano networks at terahertz frequencies for biomedical applications[J]. IEEE Access, 2017, 5: 7808-7815. doi: 10.1109/ACCESS.2017.2700330.
|
ZENG K, GOVINDAN K, and MOHAPATRA P. Non-cryptographic authentication and identification in wireless networks[J]. IEEE Wireless Communications, 2010, 17(5): 56-62.
|
BARACCA P, LAURENTI N, and TOMASIN S. Physical layer authentication over MIMO fading wiretap channels[J]. IEEE Transactions on Wireless Communications, 2012, 11(7): 2564-2573. doi: 10.1109/TWC.2012.051512.111481.
|
KUMAR V, PARK J M, CLANCY T C, et al. PHY-layer authentication by introducing controlled inter symbol interference[C]. Proceedings of IEEE Conference on Communications and Network Security (CNS), National Harbor, USA, 2013: 10-18. doi: 10.1109/CNS.2013. 6682687.
|
XIAO Liang, GREENSTEIN L J, MANDAYAM N B, et al. A physical-layer technique to enhance authentication for mobile terminals[C]. Proceedings of IEEE International Conference on Communications, Beijing, 2008: 1520-1524. doi: 10.1109/ICC.2008.294.
|
XIAO Liang, GREENSTEIN L, MANDAYAM N, et al. Fingerprints in the ether: Using the physical layer for wireless authentication[C]. Proceedings of IEEE International Conference on Communications, Glasgow, UK, 2007: 4646-4651. doi: 10.1109/ICC.2007.767.
|
TUGNAIT J K and KIM H. A channel-based hypothesis testing approach to enhance user authentication in wireless networks[C]. Proceedings of Second International Conference on Communication Systems and Networks, Bangalore, India, 2010: 1-9. doi: 10.1109/COMSNETS. 2010.5432018.
|
SHAN Dan, ZENG Kai, XIANG Weidong, et al. PHY- CRAM: Physical layer challenge-response authentication mechanism for wireless networks[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1817-1827. doi: 10.1109/JSAC.2013.130914.
|
DU Xianru, SHAN Dan, ZENG Kai, et al. Physical layer challenge-response authentication in wireless networks with relay[C]. IEEE INFOCOM, Toronto, Canada, 2014: 1276-1284. doi: 10.1109/INFOCOM.2014.6848060.
|
MOLIRE R, DELAVEAU F, NGASSA C L K, et al. Tag signals for early authentication and secret key generation in wireless public networks[C]. European Conference on Networks and Communications, Paris, 2015: 108-112. doi: 10.1109/EuCNC.2015.7194050.
|
张余, 许金勇, 柳永祥, 等. 基于相关标识符的频谱水印嵌入与提取方法[J]. 电波科学学报, 2016, 31(1): 185-192. doi: 10.13443/j.cjors.2015031701.
|
ZHANG Yu, XU Jinyong, LIU Yongxiang, et al. Spectrum watermark embedding and extracting methodbased on correlation identifier[J]. Chinese Journal of Radio Science, 2016, 31(1): 185-192. doi: 10.13443/j.cjors.2015031701.
|
ZHANG Jinling, WEN Hong, SONG Huanhuan, et al. Using basis expansion model for physical layer authentication in time-variant system[C]. IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, USA, 2016: 348-349. doi: 10.1109/CNS.2016.7860505.
|
曾璐, 谢晓尧. 基于MATLAB扩谱通信系统误码率的研究[J]. 通信技术, 2011, 44(11): 25-26.
|
ZENG Lu and XIE Xiaoyao. Study on bit error rate of spread spectrum communication system based on MATLAB [J]. Communications Technology, 2011, 44(11): 25-26.
|
JAKES W C and COX D C. Microwave Mobile Communications[M]. Wiley-IEEE Press, 1994, Ch 1.
|