2020 14th International Conference on Signal Processing and Communication Systems (ICSPCS) 2020
DOI: 10.1109/icspcs50536.2020.9310070
|View full text |Cite
|
Sign up to set email alerts
|

Physical-Layer Authentication Using Channel State Information and Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…where h nm represents the channel from the mth transmit antenna to the nth receive antenna. H can be estimated from Y corresponding to the known reference signals (Schindler and Mellein, 2011;Germain et al, 2020). Y is used to obtain the data for SCC-SVM training and testing.…”
Section: System Modelmentioning
confidence: 99%
“…where h nm represents the channel from the mth transmit antenna to the nth receive antenna. H can be estimated from Y corresponding to the known reference signals (Schindler and Mellein, 2011;Germain et al, 2020). Y is used to obtain the data for SCC-SVM training and testing.…”
Section: System Modelmentioning
confidence: 99%
“…In addition, physical environment between Alice and Bob remains stable, although there are location differences between Bob and Eve. Therefore, the presence of multiple antennas and multipath fading results in Bob's physical layer features containing specific information that exhibits independence [29,30], which can serve as authentication evidence.…”
Section: Eve4 Eve4 Eve5 Eve5mentioning
confidence: 99%
“…AI techniques can perform dimensionality reduction, denoising, and feature extraction on CSI data [145]. Therefore, the identity of wireless devices can be verified by using AI to classify CSI in ZTA [141,156,47,99].…”
Section: Automated User Authenticationmentioning
confidence: 99%