Citation: | LI Min, JIANG Shaoquan, LIAO Yongjian, “Physical-Layer Authentication via a Dynamic Scaling,” Chinese Journal of Electronics, vol. 29, no. 4, pp. 651-659, 2020, doi: 10.1049/cje.2020.05.009 |
E.N. Gilbert, F.J. MacWilliams and N.J. Sloane, “Codes which detect deception”, Bell System Technical Journal, Vol.53, No.3, pp.405-424, 1974.
|
Y. Shen, Q. Pei and J. Ma, “Cooperative secrecy to resist authentication error in two-hop wireless networks”, Chinese Journal of Electronics, Vol.25, No.4, pp.746-752, 2016.
|
Z. Jia, X. Wei, H. Guo, et al., “A privacy protection strategy for source location in WSN based on angle and dynamical adjustment of node emission radius”, Chinese Journal of Electronics, Vol.26, No.5, pp.1064-1072, 2017.
|
J.G. Proakis and M. Salehi, Digital Communications, the fifth edition, McGraw-Hill Education, New York, USA, 2008.
|
D. Tse and P. Viswanath, Fundamentals of Wireless Communication, Cambridge University Press, New York, USA, 2005.
|
X. Wang, P. Hao and L. Hanzo, “Physical-layer authentication for wireless security enhancement: current challenges and future developments”, IEEE Communications Magazine, Vol.54, No.6, pp.152-158, 2016.
|
Y. Zou, J. Zhu, X. Wang, et al., “A survey on wireless security: technical challenges, recent advances and future trends”, Proceedings of the IEEE, Vol.104, No.9, pp.1727-1265, 2016.
|
W. Trappe, “The challenges facing physical layer security”, IEEE Communications Magazine, Vol.53, No.6, pp.16-20, 2015.
|
D. Cao and W. Kang, “Message authentication with correlated sources”, IEEE Symposium on Information Theory 2015, Hong Kong, China, pp.2934-2938, 2015.
|
K. Kittichokechai and G. Caire, “Secret key-based authentication with a privacy constraint”, IEEE Symposium on Information Theory 2015, Hong Kong, China, pp.1791-1795, 2015.
|
S. Jiang, “Keyless authentication in a noisy model”, IEEE Transactions on Information Forensics and Security, Vol.9, No.6, pp.1024-1033, 2014.
|
L. Xiao, L. Greenstein, N. Mandayam, et al., “Fingerprints in the ether: using the physical layer for wireless authentication”, Proceedings of IEEE International Conference on Communications 2007, Glasgow, Scotland, UK, pp.4646-4651, 2007.
|
L. Xiao, L. Greenstein, N. Mandayam, et al., “Using the physical layer for wireless authentication in time-variant channels”, IEEE Transactions on Wireless Communications, Vol.7, No.7, pp.2571-2579, 2008.
|
P. Baracca, N. Laurenti and S. Tomasin, “Physical layer authentication over MIMO fading wiretap channels”, IEEE Transactions on Wireless Communications, Vol.11, No.7, pp.2564-2573, 2012.
|
H. Wen, Physical Layer Approaches for Securing Wireless Communication Systems, Springer-Verlag, New York, USA, 2013.
|
H. Song, L. Jin and S. Zhang, “Physical layer authentication based on tag signal”, Journal of Electronics & Information Technology, Vol.40, No.5, pp.1066-1071, 2018(in Chinese).
|
N. Wang, T. Jiang, S. Lv, et al., “Physical-layer authentication based on extreme learning machine, IEEE Communications Letters, Vol.21, No.7, pp.1557-1560, 2017.
|
W. Hou, X. Wang and J. Chouinard, “Physical layer authentication in OFDM systems based on hypothesis testing of CFO estimates”, Proceedings of IEEE International Conference on Communications 2012, Ottawa, Ontario, Canada, pp.3559-3563, 2012.
|
M.M. Rahman, Q.H. Abbasi, N. Chopra, et al., “Physical layer authentication in Nano networks at terahertz frequencies for biomedical applications”, IEEE Access, Vol.5, pp.7808-7815, 2017.
|
D. Shan, K. Zeng, W. Xiang, et al., “PHY-CRAM: Physical layer challenge-response authentication mechanism for wireless networks”, IEEE Journal on Selected Areas in Communications, Vol.31, No.9, pp.1817-1827, 2013.
|
J. Liu and X. Wang, “Physical layer authentication enhancement using two-dimensional channel quantization”, IEEE Transactions on Wireless Communications, Vol.15, No.6, pp.4171-4182, 2016.
|
E. Martinian, G.W. Wornell and B. Chen, “Authentication with distortion criteria”, IEEE Transactions on Information Theory, Vol.51, No.7, pp.2523-2542, 2005.
|
G.D. Crescenzo, R.F. Graveman, R. Ge, et al., “Approximate message authentication and biometric entity authentication”, Proc. Int. Conf. Financial Cryptography 2005, Roseau, Dominica, pp.240-254, 2005.
|
P.L. Yu, J.S. Baras and B.M. Sadler, “Physical-layer authentication”, IEEE Transactions on Information Forensics and Security, Vol.3, No.1, pp.38-51, 2008.
|
D. Xu, P. Ren, J. A. Ritcey, et al., “Code-frequency block group coding for anti-spoofing pilot authentication in multi-antenna OFDM systems”, IEEE Transactions on Information Forensics and Security, Vol.13, No.7, pp.1778-1793, 2018.
|
A. Swaminathan, Y. Mao and M. Wu, “Robust and secure image hashing”, IEEE Transactions on Information Forensics and Security, Vol.1, No.2, pp.215-230, 2006.
|
G. Verma, P. Yu and B.M. Sadler, “Physical layer authentication via fingerprint embedding using softwaredefined radios”, IEEE Access, Vol.3, pp.81-88, 2015.
|
P.L. Yu, G. Verma and B. Sadler, “Wireless physical layer authentication via fingerprint embedding”, IEEE Communications Magazine, Vol.53, No.6, pp.48-53, 2015.
|
P.L. Yu and B. Sadler, “MIMO authentication via deliberate fingerprinting at the physical layer”, IEEE Transactions on information forensics and security, Vol.6, No.3, pp.606-615, Sep. 2011.
|
P.L. Yu, J.B. Perazzone, B.M. Sadler, et al., “Authenticated side channel via physical layer fingerprinting”, Proc. IEEE Conf. Commun. Netw. Secur. 2016(CNS), Philadelphia, PA, USA, pp.631-635, 2016.
|
J.B. Perazzone, P.L. Yu, B.M. Sadler, et al., “Cryptographic side-channel signaling and authentication via fingerprint embedding”, IEEE Transactions on Information Forensics and Security, Vol.13, No.9, pp.2216-2225, 2018.
|
J. Liu, X. Wang and H. Tang, “Physical layer authentication enhancement using maximum SNR ratio based cooperative AF relaying”, Wireless Communications and Mobile Computing, Vol.2017, Article ID 7206187, 16 pages, 2017.
|
Q. Wang, “A novel physical layer assisted authentication scheme for mobile wireless sensor networks”, Sensors, Vol.17, No.2, Article ID 289, 16 pages, 2017.
|
O. Goldreich, S. Goldwasser amd S. Micali, “How to construct random functions”, Journal of the ACM, Vol.33, No.4, pp.792-807, 1986.
|
J.E. Hershey, A.A. Hassan and R. Yarlagadda, “Unconventional cryptographic keying variable management”, IEEE Transactions on Communications, Vol.43, No.1, pp.3-6, Jan. 1995.
|
S. Gollakota and D. Katabi, “Physical layer wireless security made fast and channel independent”, Proc. 30th Annu. IEEE Int. Conf. Comput. Commun., Shanghai, China, pp.1125-1133, 2011.
|
Y. Shehadeh, O. Alfandi, K. Tout, et al., “Intelligent mechanisms for key generation from multipath wireless channels”, Proc. Wireless Telecommun. Symp., New York, NY, USA, pp.1-6, 2011.
|
K. Zeng, D. Wu, A. Chan, et al., “Exploiting multipleantenna diversity for shared secret key generation in wireless networks”, Proc. 29th Annu. IEEE Int. Conf. Comput. Commun., San Diego, CA, USA, pp.1837-1845, 2010.
|
G. Casella and R.L. Berger, Statistical Inference, the second edition, Duxbury Press, 2001.
|
M. Biguesh and A. Gershman, “Training-based MIMO channel estimation, a study of estimator tradeoffs and optimal training signals”, IEEE Transactions on Signal Processing, Vol.54, No.3, pp.884-893, 2006.
|
E. Björnson and B. Ottersten, “A framework for trainingbased estimation in arbitrarily correlated Rician MIMO channels with Rician disturbance”, IEEE Transactions on Signal Processing, Vol.58, No.3, pp.1807-1820, 2010.
|
P. Stănică, “Good lower and upper bounds on binomial coefficients”, Journal of Inequalities in Pure and Applied Mathematics, Vol.2, No.3, article 30, 2001.
|
U. Maurer, “Authentication theory and hypothesis testing”, IEEE Transactions on Information Theory, Vol.46, No.4, pp.1350-1356, 2000.
|