2010
DOI: 10.1109/mwc.2010.5601959
|View full text |Cite
|
Sign up to set email alerts
|

Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
128
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 245 publications
(128 citation statements)
references
References 9 publications
0
128
0
Order By: Relevance
“…In [2], an overview of cross-layer authentication by using lower/physical layer characteristics is provided. Some of the existing cross-layer schemes are implemented through quantization of physicallayer characteristics for upper-layer verification [8].…”
Section: B Integration With the Existing Network Infrastructure And mentioning
confidence: 99%
See 2 more Smart Citations
“…In [2], an overview of cross-layer authentication by using lower/physical layer characteristics is provided. Some of the existing cross-layer schemes are implemented through quantization of physicallayer characteristics for upper-layer verification [8].…”
Section: B Integration With the Existing Network Infrastructure And mentioning
confidence: 99%
“…In contrast to the existing upper-layer security schemes, wireless transmitters can also be validated at the physicallayer by verifying the dynamic characteristics of the associated physical communication links and devices [2]- [6], i.e. through physical-layer authentication.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the various authentication schemes considered in [9], the processing power needed and storage memory are a bit large. But, as authentication is very important and considering the above scenario, the problem with the existing scheme, Fig.3 draws us into two conditions where 1)The attacker is a dumb user and hence sender get responses from both the attacker and the valid user or 2)The attacker is an expert who jam either the request sent to or the response from the valid user and sometimes interrupt both.…”
Section: A-smock: Authenticated Smockmentioning
confidence: 99%
“…These unique features arise from randomness in the manufacturing process such as the presence of analog components in the transmission chain, different hardware and software implementation of the same protocol, transmitter clock stability, etc. For example, in [14,15], methods that use amplitude and phase information of the transmitter turn-on transient are proposed, in [16], authors propose a method for RF fingerprinting using clock skew and, in [17], it is possible to find a general comparison of different RF fingerprinting methods.…”
Section: Introductionmentioning
confidence: 99%