2019
DOI: 10.1109/mwc.001.1900054
|View full text |Cite
|
Sign up to set email alerts
|

Machine Learning for Intelligent Authentication in 5G and Beyond Wireless Networks

Abstract: The fifth generation (5G) and beyond wireless networks are critical to support diverse vertical applications by connecting heterogeneous devices and machines, which directly increase vulnerability for various spoofing attacks. Conventional cryptographic and physical layer authentication techniques are facing some challenges in complex dynamic wireless environments, including significant security overhead, low reliability, as well as difficulties in pre-designing a precise authentication model, providing contin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
58
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 123 publications
(59 citation statements)
references
References 15 publications
0
58
0
1
Order By: Relevance
“…Parametric methods have limitations such as "considering a default distribution PLOS ONE for the dependent variable", "linearity of the proposed relationship", "uniform variance of errors", and "independency of the variables" [107]. However, nonparametric methods do not have these limitations [108]. It should be noted that the analysis of complex ecological data requires robust and flexible analytical methods that control nonlinear relationships, interactions, and missing data.…”
Section: Importance Of Influential Variables In the Modelingmentioning
confidence: 99%
“…Parametric methods have limitations such as "considering a default distribution PLOS ONE for the dependent variable", "linearity of the proposed relationship", "uniform variance of errors", and "independency of the variables" [107]. However, nonparametric methods do not have these limitations [108]. It should be noted that the analysis of complex ecological data requires robust and flexible analytical methods that control nonlinear relationships, interactions, and missing data.…”
Section: Importance Of Influential Variables In the Modelingmentioning
confidence: 99%
“…According to the derived R ind [1] and S ind [1] in (25) and (26), respectively, the the individual risk and individual satisfaction of our scheme at time instant t = 2, 3, 4, ... are given as (27) and (28), respectively, under condition ν 1 ≥ /2.…”
Section: Appendix F the Proof Of Corollarymentioning
confidence: 99%
“…I NNOVATIONS in wireless communications and Internet technologies during last few decades have brought about not only radically new applications, but also significantly increased security challenges imposed on the legitimate users owing to the rapidly improving capability of adversaries. To be specific, due to the broadcast nature of radio signal propagation, owing to the intermittent nature of communications as well as the complex dynamic network environments encountered, wireless communications are vulnerable to spoofing H. Fang attacks [1]- [3]. A spoofer may intercept the transmissions between legitimate devices and imitate them to obtain illegal benefits from networks/systems, while counterfeiting authorized identities for fraud or other malicious purposes.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations