2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring) 2021
DOI: 10.1109/vtc2021-spring51267.2021.9448652
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Physical-Layer Authentication Using Channel State Information and Conditional Recurrent Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…In this section, we first compare the similarities and differences between cyclic redundancy check and cryptographic message authentication, which is inspiring for our proposed scheme. Then we conduct a linear attack analysis to CRC‐based message authentication proposed in [22].…”
Section: Phylock‐crc‐based Message Authenticationmentioning
confidence: 99%
See 3 more Smart Citations
“…In this section, we first compare the similarities and differences between cyclic redundancy check and cryptographic message authentication, which is inspiring for our proposed scheme. Then we conduct a linear attack analysis to CRC‐based message authentication proposed in [22].…”
Section: Phylock‐crc‐based Message Authenticationmentioning
confidence: 99%
“…We conduct a security analysis of PHYLOCK and prove that PHYLOCK is more secure than the traditional physical layer key generation. • We mathematically conduct a security analysis of the CRCbased message authentication scheme proposed by [22]. The paper points out that the previous scheme is not secure because of the linear operation of CRC and XOR encryption.…”
Section: Our Contributionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Physical Layer AuthenticationContinuous authentication aims to continuously verify the identity of the endpoint during a communication session. AI-based PLA is considered as a potential solution, where AI algorithms can effectively extract device features from the communication channel and continuously verify the identity of users and devices[48]. Xie et al[149] conducted a detailed survey on existing PLA technologies, and they classified IoT device features into detecting device-based and channel-based features.Compared to device-based features, channel-based features are more difficult to copy or imitate, which provides improved security for device authentication.…”
mentioning
confidence: 99%