2020
DOI: 10.1109/jiot.2019.2960099
|View full text |Cite
|
Sign up to set email alerts
|

Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 66 publications
(30 citation statements)
references
References 34 publications
0
30
0
Order By: Relevance
“…Data augmentation techniques are mainly based on generating artificial data from the existing dataset. The limited data problem of PHY security DL networks has been considered by Liao et al in [267]. Liao et al previously worked on DL-assisted PHY authentication in [263].…”
Section: A Anti-spoofing Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Data augmentation techniques are mainly based on generating artificial data from the existing dataset. The limited data problem of PHY security DL networks has been considered by Liao et al in [267]. Liao et al previously worked on DL-assisted PHY authentication in [263].…”
Section: A Anti-spoofing Solutionsmentioning
confidence: 99%
“…Liao et al previously worked on DL-assisted PHY authentication in [263]. In [267], the authors argue that wireless networks are especially vulnerable to limited data as a result of channel coherence time. Hence, the authors propose three data augmentation methods to improve the training speed and authentication accuracy.…”
Section: A Anti-spoofing Solutionsmentioning
confidence: 99%
“…2) DL-enabled applications: Numerous IoT and IIoT applications are employing the DL concept ranging from data mining of surveillance videos [34] to user authentication in the physical network layer [35], [36]. The excellent features of DL are the enormous capacity of recognizing patterns, which leads to many applications in smart cities.…”
Section: B Applicationsmentioning
confidence: 99%
“…Another example demonstrated in [36] uses authentication in the physical layer by comparing channel impulse response, such as channel state information, channel phase response, and received signal strength as the comparison is performed using a threshold, hence making it harder to authenticate where there are multiple nodes at the same time. The solution is to use Deep Neural Network (DNN) for faster and scalable authentication, which allowed for impressive results.…”
Section: B Authentication Systemsmentioning
confidence: 99%
See 1 more Smart Citation