2020
DOI: 10.1007/s11704-020-0010-4
|View full text |Cite
|
Sign up to set email alerts
|

Physical layer authentication for automotive cyber physical systems based on modified HB protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 47 publications
0
3
0
Order By: Relevance
“…The results show that there exists an optimal quantisation order r across different ranges of SNRs. By adjusting the r value to different SNR conditions, the extraction performance can be optimised for an acceptable P e formulated in (20).…”
Section: Simulation Analysis Of the Key Extraction Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…The results show that there exists an optimal quantisation order r across different ranges of SNRs. By adjusting the r value to different SNR conditions, the extraction performance can be optimised for an acceptable P e formulated in (20).…”
Section: Simulation Analysis Of the Key Extraction Algorithmmentioning
confidence: 99%
“…Therefore, the need for a fast and secure authentication process to support communication continuity is vital, which is incompatible with existing signature-based methods [18]. In response to this challenging scenario, recently, many keyless PHYlayer authentication schemes have contributed to a wide range of wireless applications as an efficient distinguishing technique to address the limitations of conventional cryptographic approaches [19][20][21][22][23]. In one of these techniques, the short-term spatially and temporally correlated channel features between two communicating wireless devices, such as the channel state information (CSI) [19], the received signal strength (RSS) [20], the power delay profile [21], and the power spectral density [22] are used to ensure that the received signals R X (t) and R X (t + t) are transmitted from the same source, for t ≤ coherence time T c .…”
Section: Introductionmentioning
confidence: 99%
“…Other research studies focus on authentication schemes by exploiting the aspects of the physical layer such as cardiac inter-pulse interval (IPI)-based key exchange or the mismatched bits sequence generated by two communicating parties for reconciliation by exchanging information over a public channel. However, these techniques cause computational overheads, storage issues, and energy consumption [ 23 , 82 , 83 , 84 , 85 , 86 ]. Table 1 depicts a summary of centralized mechanisms with proposed authentication schemes while the issues with those schemes have also been discussed.…”
Section: Authentication Schemes Based On Centralized Architectures In...mentioning
confidence: 99%