2019 IEEE Wireless Communications and Networking Conference (WCNC) 2019
DOI: 10.1109/wcnc.2019.8886054
|View full text |Cite
|
Sign up to set email alerts
|

An Area Description Framework for Physical Layer Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…The other strategy is that the spoofer jams the transmission of the victim user and compels the destination to accept the spoofing message as legitimate. In our previous work [30], we have studied the former case. In this paper, we consider both situations with an emphasis on the latter one.…”
Section: The System Modelmentioning
confidence: 99%
See 4 more Smart Citations
“…The other strategy is that the spoofer jams the transmission of the victim user and compels the destination to accept the spoofing message as legitimate. In our previous work [30], we have studied the former case. In this paper, we consider both situations with an emphasis on the latter one.…”
Section: The System Modelmentioning
confidence: 99%
“…where Y |h A | 2 follows a distribution with the probability density function (PDF) f Y (y). If Rayleigh fading 3) is assumed, the channels are independent complex Gaussian variables, i.e., Y ∼ χ 2 2 , where χ 2 2 denotes the chi-square distribution with the degree of two, and the corresponding PDF and cumulative density function (CDF) are e −y and 1 − e −y , respectively, and then p 1 can be calculated as [30]…”
Section: The Spoofer Forges a Silent Usermentioning
confidence: 99%
See 3 more Smart Citations