2020
DOI: 10.1016/j.sigpro.2019.107272
|View full text |Cite
|
Sign up to set email alerts
|

Physical layer authentication under intelligent spoofing in wireless sensor networks

Abstract: Location based access in wireless sensor networks (WSN) are vulnerable to location spoofing attacks. In this paper, we investigate the physical layer (PHYlayer) authentication in the threat of an intelligent location spoofing attack. The intelligent attack can emulate the legitimate channel information and maximize its long-term cumulative reward. First, we analyze the feasibility of this intelligent attack and investigate how it threats to the networks. Specifically, we derive the optimal transmit power alloc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(11 citation statements)
references
References 40 publications
0
11
0
Order By: Relevance
“…Sensors, Networks, Hackers and Future Urban Life and Analysis and Application of Financial Statements. rough the collection and summary of this series of data, literature research provides a favorable theoretical basis for the research ideas and methods [28,29]. Comparative analysis: comparative analysis method refers to the multiparty comparison of two or more research objects to explore the similarities and differences between them.…”
Section: Key Methods and Algorithms Used In The Researchmentioning
confidence: 99%
“…Sensors, Networks, Hackers and Future Urban Life and Analysis and Application of Financial Statements. rough the collection and summary of this series of data, literature research provides a favorable theoretical basis for the research ideas and methods [28,29]. Comparative analysis: comparative analysis method refers to the multiparty comparison of two or more research objects to explore the similarities and differences between them.…”
Section: Key Methods and Algorithms Used In The Researchmentioning
confidence: 99%
“…The message bits B i of device i are encoded as a unit-power codeword, x d i , with block-length L d i = L−2L q . For the fairness and the superposition coding with successive interference cancellation (SIC) in downlink NOMA, we assume that the transmit powers at the BS are sorted as p v p u based on the uplink estimated channel gain 3)…”
Section: Downlink Data Transmission Phasementioning
confidence: 99%
“…Machine-type communication (mMTC) has been considered a representative service category in 5G networks [1][2][3] because of its wide applications of the Internet of Things (IoT) such as smart city, smart health care, factory automation, autonomous driving, etc [1,4]. Notably, the number of IoT devices is growing exponentially and will reach hundreds of billions in 2030 [5].…”
Section: Introductionmentioning
confidence: 99%
“…In this context, the pioneering idea of physical layer authentication (PLA) was introduced in [19]. These results were extended in different topologies, including, vehicular ad hoc networks (VANETs) [20], ultra-reliable low-latency communications (URLLC) [21], and wireless sensor communications [22]. Recently, in [23], the authors design PLA protocols based on machine learning techniques.…”
Section: Referencementioning
confidence: 99%