2019
DOI: 10.3390/s19081926
|View full text |Cite
|
Sign up to set email alerts
|

Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources

Abstract: In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcome the drawback of traditional cipher-based authentication schemes that suffer from heavy costs and are limited by energy-constrained intelligent devices. CPAS is a novel cross-layer secure authentication approach for edge computing system with asymmetric resources. The CPAS scheme combines clustering and lightweight symmetric cipher with physical-layer channel state information to provide two-way authentication b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 35 publications
0
13
0
Order By: Relevance
“…where = [ (1) , (2) , … ( ) ] is the transform matrix and is a diagonal matrix with sorted eigenvalues ( 1 ≥ 2 … ≥ ≥ ). Our main goal is to obtain the optimal unitary matrix * through maximizing the MI which can be obtained using:…”
Section: The Proposed Svd-based Pre-coding Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…where = [ (1) , (2) , … ( ) ] is the transform matrix and is a diagonal matrix with sorted eigenvalues ( 1 ≥ 2 … ≥ ≥ ). Our main goal is to obtain the optimal unitary matrix * through maximizing the MI which can be obtained using:…”
Section: The Proposed Svd-based Pre-coding Methodsmentioning
confidence: 99%
“…According to the PCA approach, the covariance matrix of the ideal channel can be decomposed as = H , where = [ (1) , (2) , … ( ) ] is the transform matrix and is a diagonal matrix with some sorted eigenvalues. After transformation, matrix is transformed into = [ (0) , (1) , … ( −1) ] by expanding the CSI estimates with their projections on = .…”
Section: Example 2: Evaluation Of the Performance Ofmentioning
confidence: 99%
See 1 more Smart Citation
“…Gebhardt et al [ 73 ] also employed unsupervised anomaly detection for document authentication. Chen et al [ 74 ] used clustering in physical layer data from edge computing systems for authentication IoT devices that can be very effective to detect intruder IoMT devices in telehealth.…”
Section: Machine Learning Models In Authentication Schemes Of Telehealthmentioning
confidence: 99%
“…To eliminate drawbacks of authentication based on cipher approaches that are impacted by the large expenditures and energy constraints of smart devices, authors in [139] proposed a clustering-based physical-layer authentication scheme (CPAS) for systems with asymmetric resources in the mobile edge computing (MEC) environment. To ensure two-way authentication among edge devices and terminals, CPAS as cross-layer secure authentication merge symmetric cipher and clustering with information related to the wireless channel.…”
Section: A Review Of Articles For Special Issue On Green Energy-ementioning
confidence: 99%