Chinese Journal on Internet of Things ›› 2020, Vol. 4 ›› Issue (1): 131-138.doi: 10.11959/j.issn.2096-3750.2020.00159
Special Issue: 6G
• Topic:IoT and 6G • Previous Articles
Shida XIA,Jin XU,Xiaofeng TAO()
Revised:
2020-03-08
Online:
2020-03-30
Published:
2020-03-28
Supported by:
CLC Number:
Shida XIA,Jin XU,Xiaofeng TAO. Intelligent terminal identification technology toward 6G[J]. Chinese Journal on Internet of Things, 2020, 4(1): 131-138.
[1] | ZHANG Z , XIAO Y , MA Z ,et al. 6G wireless networks:vision,requirements,architecture,and key technologies[J]. IEEE Vehicular Technology Magazine, 2019,14(3): 28-41. |
[2] | STRINATI E C , BARBAROSSA S , GONZALEZ-JIMENEZ J L ,et al. 6G:the next frontier from holographic messaging to artificial intelligence using sub terahertz and visible light communication[J]. IEEE Vehicular Technology Magazine, 2019,14(3): 42-50. |
[3] | LETAIEF K B , CHEN W , SHI Y ,et al. The roadmap to 6G:AI empowered wireless networks[J]. IEEE Communications Magazine, 2019,57(8): 84-90. |
[4] | YANG P , XIAO Y , XIAO M ,et al. 6G wireless communications:vision and potential techniques[J]. IEEE Network, 2019,33(4): 70-75. |
[5] | ZONG B , FAN C , WANG X ,et al. 6G technologies:key drivers,core requirements,system architectures,and enabling technologies[J]. IEEE Vehicular Technology Magazine, 2019,14(3): 18-27. |
[6] | CHEN C M , XIANG B , LIU Y ,et al. A secure authentication protocol for Internet of vehicles[J]. IEEE Access, 2019,7: 12047-12057. |
[7] | NARMADHA R . Heterogeneous network security management[J]. International Journal of Intelligent Enterprise, 2019,6(1): 32-52. |
[8] | DENNING D E . Is quantum computing a cybersecurity threat?[J]. American Scientist, 2019,107(2): 83-85. |
[9] | CHENG X , ZHANG Z , CHEN F ,et al. Secure identity authentication of community medical Internet of things[J]. IEEE Access, 2019,7: 115966-115977. |
[10] | ZHOU L , LI X , YEH K H ,et al. Lightweight IoT-based authentication scheme in cloud computing circumstance[J]. Future Generation Computer Systems, 2019,91: 244-251. |
[11] | CHEN Y , SHEN Q , SUN P ,et al. Reliable migration module in trusted cloud based on security level-design and implementation[C]// 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PHD Forum. IEEE, 2012: 2230-2236. |
[12] | LI X , HAN Y , GAO J ,et al. Secure hierarchical authentication protocol in VANET[J]. IET Information Security, 2019,14(1): 99-110. |
[13] | 牛静媛 . 移动通信系统安全性分析[D]. 北京:北京邮电大学, 2008. |
NIU J Y . Analysis of the security mechanism in mobile communication system[D]. Beijing:Beijing University of Posts and Telecommunications, 2008. | |
[14] | 张磊 . GSM/UMTS 混合网络安全若干关键技术研究[D]. 北京:北京邮电大学, 2011. |
ZHANG L . Key technology research on GSM/UMTS hybrid network security[D]. Beijing:Beijing University of Posts and Telecommunications, 2011. | |
[15] | CHANG C C , LEE J S , CHANG Y F . Efficient authentication protocols of GSM[J]. Computer Communications, 2005,28(8): 921-928. |
[16] | NTANTOGIAN C , XENAKIS C . One-pass EAP-AKA authentication in 3G-WLAN integrated networks[J]. Wireless personal communications, 2009,48(4): 569-584. |
[17] | MUN H , HAN K , KIM K . 3G-WLAN interworking:security analysis and new authentication and key agreement based on EAP-AKA[C]// 2009 Wireless Telecommunications Symposium. IEEE, 2009: 1-8. |
[18] | 向东南, 毛文俊 . LTE系统EPS-AKA过程安全性研究与改进[J]. 无线电通信技术, 2016,42(5): 60-63. |
XIANG D N , MAO W J . Research and improvement of LTE EPS-AKA procedure security[J]. Radio Communication Technology, 2016,42(5): 60-63. | |
[19] | FERRAG M A , MAGLARAS L , ARGYRIOU A ,et al. Security for 4G and 5G cellular networks:a survey of existing authentication and privacy-preserving schemes[J]. Journal of Network and Computer Applications, 2018,101: 55-82. |
[20] | 胡鑫鑫, 刘彩霞, 刘树新 ,等. 移动通信网鉴权认证综述[J]. 网络与信息安全学报, 2018,4(12): 5-19. |
HU X X , LIU C X , LIU S X ,et al. Overview of mobile communication network authentication[J]. Chinese Journal of Network and Information Security, 2018,4(12): 5-19. | |
[21] | PRASAD A R , ARUMUGAM S , SHEEBA B ,et al. 3GPP 5G security[J]. Journal of ICT Standardization, 2018,6(1): 137-158. |
[22] | BASIN D , DREIER J , HIRSCHI L ,et al. A formal analysis of 5G authentication[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2018: 1383-1396. |
[23] | 黄开枝, 金梁, 钟州 . 5G物理层安全技术——以通信促安全[J]. 中兴通讯技术, 2019,25(4): 43-49. |
HUANG K Z , JIN L , ZHONG Z . 5G physical layer security technology:enhancing security by communication[J]. ZTE Technology Journal, 2019,25(4): 43-49. | |
[24] | PAUL L Y , BARAS J S , SADLER B M . Physical-layer authentication[J]. IEEE Transactions on Information Forensics and Security, 2008,3(1): 38-51. |
[25] | WANG X , HAO P , HANZO L . Physical-layer authentication for wireless security enhancement:current challenges and future developments[J]. IEEE Communications Magazine, 2016,54(6): 152-158. |
[26] | 杨惠杰, 周天祺, 桂梓原 . 区块链技术在物联网中的身份认证研究[J]. 中兴通讯技术, 2018,24(6): 39-44. |
YANG H J , ZHOU T Q , GUI Z Y . Blockchain technology for identityauthentication in Internet of things[J]. ZTE Technology Journal, 2018,24(6): 39-44. | |
[27] | HAMMI M T , HAMMI B , BELLOT P ,et al. Bubbles of trust:a decentralized blockchain-based authentication system for IoT[J]. Computers & Security, 2018,78: 126-142. |
[28] | LIN C , HE D , HUANG X ,et al. BSeIn:a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0[J]. Journal of Network and Computer Applications, 2018,116: 42-52. |
[29] | ZENG K . Physical layer key generation in wireless networks:challenges and opportunities[J]. IEEE Communications Magazine, 2015,53(6): 33-39. |
[30] | ZHANG J , RAJENDRAN S , SUN Z ,et al. Physical layer security for the Internet of things:authentication and key generation[J]. IEEE Wireless Communications, 2019,26(5): 92-98. |
[31] | ZENG K , GOVINDAN K , MOHAPATRA P . Non-cryptographic authentication and identification in wireless networks[security and privacy in emerging wireless networks][J]. IEEE Wireless Communications, 2010,17(5): 56-62. |
[32] | GAO N , NI Q , FENG D ,et al. Physical layer authentication under intelligent spoofing in wireless sensor networks[J]. Signal Processing, 2020,166:107272. |
[33] | ZHAO C , HUANG M , HUANG L ,et al. A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks[J]. Computer networks, 2017,128: 164-171. |
[34] | WANG N , JIANG T , LYU S ,et al. Physical-layer authentication based on extreme learning machine[J]. IEEE Communications Letters, 2017,21(7): 1557-1560. |
[35] | LIAO R F , WEN H , WU J ,et al. Deep-learning-based physical layer authentication for industrial wireless sensor networks[J]. Sensors, 2019,19(11):2440. |
[36] | BALDINI G , GIULIANI R , DIMC F . Physical layer authentication of Internet of things wireless devices using convolutional neural networks and recurrence plots[J]. Internet Technology Letters, 2019,2(2):e81. |
[37] | XIAO L , LI Y , HAN G ,et al. PHY-layer spoofing detection with reinforcement learning in wireless networks[J]. IEEE Transactions on Vehicular Technology, 2016,65(12): 10037-10047. |
[38] | XIAO L , WAN X , HAN Z . PHY-layer authentication with multiple landmarks with reduced overhead[J]. IEEE Transactions on Wireless Communications, 2017,17(3): 1676-1687. |
[39] | QIU X , JIANG T , WU S ,et al. Physical layer authentication enhancement using a Gaussian mixture model[J]. IEEE Access, 2018,6: 53583-53592. |
[40] | FANG H , WANG X , HANZO L . Learning-aided physical layer authentication as an intelligent process[J]. IEEE Transactions on Communications, 2018,67(3): 2260-2273. |
[41] | YANG J , CHEN Y , TRAPPE W ,et al. Detection and localization of multiple spoofing attackers in wireless networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,24(1): 44-58. |
[42] | XIA S , LI N , TAO X F ,et al. Multiple attributes based spoofing detection using an improved clustering algorithm in mobile edge network[C]// 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN). IEEE, 2018: 242-243. |
[43] | CHEN Y , WEN H , WU J ,et al. Clustering based physical-layer authentication in edge computing systems with asymmetric resources[J]. Sensors, 2019,19(8):1926. |
[44] | LIU J , WANG X . Physical layer authentication enhancement using two-dimensional channel quantization[J]. IEEE Transactions on Wireless Communications, 2016,15(6): 4171-4182. |
[45] | FANG H , WANG X , HANZO L . Adaptive trust management for soft authentication and progressive authorization relying on physical layer attributes[J]. IEEE Transactions on Communications, 2020 |
[46] | XIAO L , YAN Q , LOU W ,et al. Proximity-based security techniques for mobile users in wireless networks[J]. IEEE Transactions on Information Forensics and Security, 2013,8(12): 2089-2100. |
[1] | Guanglei GENG, Bo GAO, Ke XIONG, Pingyi FAN, Yang LU, Yuwei WANG. A survey of federated learning for 6G networks [J]. Chinese Journal on Internet of Things, 2023, 7(2): 50-66. |
[2] | Qingyang LI, Xueting LI, Xiaorong ZHU. A joint optimization method of multi backhaul link selection and power allocation in 6G [J]. Chinese Journal on Internet of Things, 2023, 7(2): 67-75. |
[3] | Xueqiang YAN, Guanjie CHENG, Shuiguang DENG, Jianjun WU, Lu LU, Mingyu ZHAO, Yan XI, Chao LIU, Weiyuan LI, Lei FENG, Tong ZHANG. Data services and data plane for 6G mobile communication network [J]. Chinese Journal on Internet of Things, 2023, 7(1): 60-72. |
[4] | Ning LUAN, Ke XIONG, Yu ZHANG, Ruisi HE, Gang QU, Bo AI. 6G: typical applications, key technologies and challenges [J]. Chinese Journal on Internet of Things, 2022, 6(1): 29-43. |
[5] | Zhongcheng WEI, Xinqiu ZHANG, Bin LIAN, Wei WANG, Jijun ZHAO. A survey on Wi-Fi signal based identification technology [J]. Chinese Journal on Internet of Things, 2021, 5(4): 107-119. |
[6] | Yinghai XIE, Yu ZHANG. Electricity meter area identification technology based on channel coding theory [J]. Chinese Journal on Internet of Things, 2021, 5(4): 137-144. |
[7] | Quan YU, Dandan LIANG, Wei ZHANG. Cloud native network for intelligent Internet of everything [J]. Chinese Journal on Internet of Things, 2021, 5(2): 1-6. |
[8] | Lei ZHANG,Yue ZHANG,Mingxue LI,Xinguo SHI,Bo ZHAI,Weilong WANG. CSI-based underground personnel behavior identification method [J]. Chinese Journal on Internet of Things, 2020, 4(4): 26-31. |
[9] | Ying GUO,Gongpu WANG,Zonghui LI,Ruisi HE,Zhangdui ZHONG. Smart tags based on the batteryless backscatter technology:applications and challenges [J]. Chinese Journal on Internet of Things, 2020, 4(3): 20-29. |
[10] | Zhaorui WANG,Liang LIU,Hang LI,Shuguang CUI. Intelligent reflecting surface design for 6G-assited Internet of things [J]. Chinese Journal on Internet of Things, 2020, 4(2): 84-95. |
[11] | Xiaohu YOU, Hao YIN, Hequan WU. On 6G and wide-area IoT [J]. Chinese Journal on Internet of Things, 2020, 4(1): 3-11. |
[12] | Dong LIU,Qihui WU,Quek Tony Q.S.. Spectrum cognitive intelligent management and control for aviation 6G [J]. Chinese Journal on Internet of Things, 2020, 4(1): 12-18. |
[13] | Chengxiang WANG, Jie HUANG, Haiming WANG, Xiqi GAO, Xiaohu YOU, Yang HAO. 6G oriented wireless communication channel characteristics analysis and modeling [J]. Chinese Journal on Internet of Things, 2020, 4(1): 19-32. |
[14] | Mingjiang WU,Xianfu LEI,Li LI,Xiaohu TANG. Key technologies of symbiotic transmission for 6G Internet of things [J]. Chinese Journal on Internet of Things, 2020, 4(1): 45-51. |
[15] | Yangcheng ZHOU,Shi YAN,Mugen PENG. Intent-driven 6G radio access network [J]. Chinese Journal on Internet of Things, 2020, 4(1): 72-79. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|