PHY-Layer Cover-Free Coding for Wireless Pilot Authentication in IoV Communications: Protocol Design and Ultra-Security Proof.
Dongyang XuPinyi RenJames A. RitceyPublished in: IEEE Internet Things J. (2019)
Keyphrases
- authentication protocol
- wireless local area network
- security analysis
- key agreement protocol
- wireless communication
- mutual authentication
- security protocols
- security model
- security services
- virtual private network
- authentication mechanism
- application layer
- protocol stack
- network access
- trusted third party
- authentication scheme
- access control
- security requirements
- security policies
- communication systems
- information security
- wireless networks