AoA-Based Physical Layer Authentication in Analog Arrays under Impersonation Attacks.
Muralikrishnan SrinivasanLinda SenigagliesiHui ChenArsenia ChortiMarco BaldiHenk WymeerschPublished in: CoRR (2024)
Keyphrases
- physical layer
- authentication protocol
- security mechanisms
- security analysis
- security protocols
- smart card
- wireless communication
- application layer
- network layer
- security requirements
- security issues
- smart grid
- resource utilization
- communication protocol
- ddos attacks
- multipath
- communication systems
- lightweight
- public key
- information security
- mac protocol
- bit error rate
- watermarking scheme
- key management
- resource constrained
- secret key
- rfid tags
- operating system
- wireless sensor networks
- computer simulation
- channel coding
- multi hop
- fading channels
- routing protocol
- load balancing
- access control