Login / Signup
AoA-Based Physical Layer Authentication in Analog Arrays under Impersonation Attacks.
Muralikrishnan Srinivasan
Linda Senigagliesi
Hui Chen
Arsenia Chorti
Marco Baldi
Henk Wymeersch
Published in:
CoRR (2024)
Keyphrases
</>
physical layer
authentication protocol
security mechanisms
security analysis
security protocols
smart card
wireless communication
application layer
network layer
security requirements
security issues
smart grid
resource utilization
communication protocol
ddos attacks
multipath
communication systems
lightweight
public key
information security
mac protocol
bit error rate
watermarking scheme
key management
resource constrained
secret key
rfid tags
operating system
wireless sensor networks
computer simulation
channel coding
multi hop
fading channels
routing protocol
load balancing
access control