[1] |
ALHILAL A Y , FINLEY B , BRAUD T ,et al. Street smart in 5G:vehicular applications,communication,and computing[J]. IEEE Access, 2022(10): 105631-105656.
|
[2] |
WANG D , BAI B , ZHAO W B ,et al. A survey of optimization approaches for wireless physical layer security[J]. IEEE Communications Surveys & Tutorials, 2019,21(2): 1878-1911.
|
[3] |
SHAWKY M A , BOTTARELLI M , EPIPHANIOU G ,et al. An efficient cross-layer authentication scheme for secure communication in vehicular ad-hoc networks[J]. IEEE Transactions on Vehicular Technology, 2023,72(7): 8738-8754.
|
[4] |
XIE N , ZHANG J H , ZHANG Q H . Security provided by the physical layer in wireless communications[J]. IEEE Network, 2022(99): 1-7.
|
[5] |
XIAO L , GREENSTEIN L J , MANDAYAM N B ,et al. Using the physical layer for wireless authentication in time-variant channels[J]. IEEE Transactions on Wireless Communications, 2008,7(7): 2571-2579.
|
[6] |
BRIK V , BANERJEE S , GRUTESER M ,et al. Wireless device identification with radiometric signatures[C]// Proceedings of the 14th ACM international conference on Mobile computing and networking. New York:ACM Press, 2008: 116-127.
|
[7] |
AL-SHAWABKA A , RESTUCCIA F , D’ORO S ,et al. Exposing the fingerprint:dissecting the impact of the wireless channel on radio fingerprinting[C]// Proceedings of IEEE INFOCOM 2020 IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2020: 646-655.
|
[8] |
AZIMI-SADJADI B , KIAYIAS A , MERCADO A ,et al. Robust key generation from signal envelopes in wireless networks[C]// Proceedings of the 14th ACM conference on Computer and communications security. New York:ACM Press, 2007: 401-410.
|
[9] |
JAVALI C , REVADIGAR G , PLETEA D ,et al. Demo abstract:location fingerprint evidence and authorisation using WiFi channel characteristics[C]// Proceedings of 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops). Piscataway:IEEE Press, 2016: 1-3.
|
[10] |
QIU X Y , DAI J M , HAYES M . A learning approach for physical layer authentication using adaptive neural network[J]. IEEE Access, 2020(8): 26139-26149.
|
[11] |
SHENG Y , TAN K , CHEN G ,et al. Detecting 802.11 MAC layer spoofing using received signal strength[C]// Proceedings of IEEE INFOCOM 2008 - The 27th Conference on Computer Communications. Piscataway:IEEE Press, 2008: 1768-1776.
|
[12] |
LIU F J , WANG X B , TANG H . Robust physical layer authentication using inherent properties of channel impulse response[C]// Proceedings of 2011 - MILCOM 2011 Military Communications Conference. Piscataway:IEEE Press, 2012: 538-542.
|
[13] |
TUGNAIT J K , KIM H . A channel-based hypothesis testing approach to enhance user authentication in wireless networks[C]// Proceedings of 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010). Piscataway:IEEE Press, 2010: 1-9.
|
[14] |
YU Y L , LIU F X , MAO S . Fingerprint extraction and classification of wireless channels based on deep convolutional neural networks[J]. Neural Processing Letters, 2018,48(3): 1767-1775.
|
[15] |
LIAO R F , WEN H , PAN F ,et al. A novel physical layer authentication method with convolutional neural network[C]// Proceedings of 2019 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA). Piscataway:IEEE Press, 2019: 231-235.
|
[16] |
LIAO R F , WEN H , WU J S ,et al. Security enhancement for mobile edge computing through physical layer authentication[J]. IEEE Access, 2019(7): 116390-116401.
|
[17] |
RAPPAPORT T S . 无线通信原理与应用(第二版)[M]. 周文安,付秀花,王志辉,等,译. 北京: 电子工业出版社, 2018.
|
|
RAPPAPORT T S . Wireless communications:principles and practice (second edition)[M]. Translated by ZHOU W A,FU X H,WANG Z H,et al. Beijing: Publishing House of Electronics Industry, 2018.
|
[18] |
王瑞星, 刘斌, 杜健鹏 ,等. 基于两种算法的无线信道“指纹”特征识别[J]. 通信技术, 2016,49(10): 1271-1279.
|
|
WANG R X , LIU B , DU J P ,et al. Recognition of wireless channel “fingerprint” feature based on two algorithms[J]. Communications Technology, 2016,49(10): 1271-1279.
|