ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 0907.4919
  4. Cited By
Using the Physical Layer for Wireless Authentication in Time-Variant
  Channels

Using the Physical Layer for Wireless Authentication in Time-Variant Channels

28 July 2009
Liang Xiao
L. Greenstein
N. Mandayam
W. Trappe
ArXiv (abs)PDFHTML

Papers citing "Using the Physical Layer for Wireless Authentication in Time-Variant Channels"

19 / 19 papers shown
Title
Integrating Communication, Sensing, and Security: Progress and Prospects of PLS in ISAC Systems
Integrating Communication, Sensing, and Security: Progress and Prospects of PLS in ISAC Systems
Waqas Aman
El-Mehdi Illi
Marwa Qaraqe
Saif M. Al-Kuwari
115
0
0
08 May 2025
Security and privacy for 6G: A survey on prospective technologies and
  challenges
Security and privacy for 6G: A survey on prospective technologies and challenges
V. Nguyen
Po-Ching Lin
Bo-Chao Cheng
Ren-Hung Hwang
Ying-Dar Lin
AILaw
66
295
0
26 Aug 2021
Arraymetrics: Authentication Through Chaotic Antenna Array Geometries
Arraymetrics: Authentication Through Chaotic Antenna Array Geometries
Murat Karabacak
Berker Peköz
G. Mumcu
H. Arslan
25
4
0
04 Mar 2021
Cooperative Location Privacy in Vehicular Networks: Why Simple Mix-zones
  are not Enough
Cooperative Location Privacy in Vehicular Networks: Why Simple Mix-zones are not Enough
M. Khodaei
Panos Papadimitratos
67
26
0
11 Dec 2020
Preventing Identity Attacks in RFID Backscatter Communication Systems: A
  Physical-Layer Approach
Preventing Identity Attacks in RFID Backscatter Communication Systems: A Physical-Layer Approach
Ahsan Mehmood
Waqas Aman
Muhammad Mahboob Ur Rahman
Muhammad Ali Imran
Q. Abbasi
28
12
0
01 Sep 2020
Securing the Insecure: A First-Line-of-Defense for Nanoscale
  Communication Systems Operating in THz Band
Securing the Insecure: A First-Line-of-Defense for Nanoscale Communication Systems Operating in THz Band
Waqas Aman
M. M. U. Rahman
Hassan Abbas
Muhammad Arslan Khalid
Muhammad Ali Imran
A. Alomainy
Q. Abbasi
23
5
0
14 Jul 2020
Physical-Layer Authentication Using Channel State Information and
  Machine Learning
Physical-Layer Authentication Using Channel State Information and Machine Learning
Ken St. Germain
F. Kragh
33
17
0
05 Jun 2020
On the Effective Capacity of an Underwater Acoustic Channel under
  Impersonation Attack
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Waqas Aman
Zeeshan Haider
Syed Waqas Haider Shah
Muhammad Mahboob Ur Rahman
O. Dobre
12
11
0
12 Feb 2020
Comparison of Statistical and Machine Learning Techniques for Physical
  Layer Authentication
Comparison of Statistical and Machine Learning Techniques for Physical Layer Authentication
Linda Senigagliesi
Marco Baldi
E. Gambi
AAML
147
3
0
17 Jan 2020
Statistical and Machine Learning-based Decision Techniques for Physical
  Layer Authentication
Statistical and Machine Learning-based Decision Techniques for Physical Layer Authentication
Linda Senigagliesi
Marco Baldi
E. Gambi
59
16
0
16 Sep 2019
Supervised Learning for Physical Layer based Message Authentication in
  URLLC scenarios
Supervised Learning for Physical Layer based Message Authentication in URLLC scenarios
A. Weinand
R. Sattiraju
Michael Karrenbauer
Hans D. Schotten
30
11
0
13 Sep 2019
Transmitter Classification With Supervised Deep Learning
Transmitter Classification With Supervised Deep Learning
Cyrille Morin
L. Cardoso
J. Hoydis
J. Gorce
Thibaud Vial
54
41
0
20 May 2019
Supervised and Semi-Supervised Deep Neural Networks for CSI-Based
  Authentication
Supervised and Semi-Supervised Deep Neural Networks for CSI-Based Authentication
Qian Wang
Hang Li
Zhi Chen
Dou Zhao
Shuang Ye
Jiansheng Cai
13
15
0
25 Jul 2018
Physical Layer Authentication in Mission-Critical MTC Networks: A
  Security and Delay Performance Analysis
Physical Layer Authentication in Mission-Critical MTC Networks: A Security and Delay Performance Analysis
Henrik Forssell
Ragnar Thobaben
H. Al-Zubaidy
J. Gross
34
28
0
27 Jun 2018
A Survey on Wireless Security: Technical Challenges, Recent Advances and
  Future Trends
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
Yulong Zou
Jia Zhu
Xianbin Wang
L. Hanzo
79
1,160
0
29 May 2015
Efficient and Secure Key Extraction using CSI without Chasing down
  Errors
Efficient and Secure Key Extraction using CSI without Chasing down Errors
Jizhong Zhao
Wei Xi
Jinsong Han
Shaojie Tang
Xiangyang Li
Yunhao Liu
Yihong Gong
Zehua Zhou
57
7
0
03 Aug 2012
Exploiting Channel Diversity in Secret Key Generation from Multipath
  Fading Randomness
Exploiting Channel Diversity in Secret Key Generation from Multipath Fading Randomness
Yanpei Liu
S. Draper
A. Sayeed
65
174
0
18 Jul 2011
Information-theoretically Secret Key Generation for Fading Wireless
  Channels
Information-theoretically Secret Key Generation for Fading Wireless Channels
Chunxuan Ye
Suhas Mathur
A. Reznik
Yogendra Shah
W. Trappe
N. Mandayam
98
433
0
27 Oct 2009
Fingerprints in the Ether: Using the Physical Layer for Wireless
  Authentication
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
Liang Xiao
L. Greenstein
N. Mandayam
W. Trappe
117
261
0
28 Jul 2009
1