Securing IoT Monitoring Device using PUF and Physical Layer Authentication.
Yue ZhengSumedh Somnath DhabuChip-Hong ChangPublished in: ISCAS (2018)
Keyphrases
- physical layer
- electronic devices
- application layer
- wireless communication
- monitoring system
- management system
- resource utilization
- real time
- communication systems
- mac protocol
- communication protocol
- data acquisition
- location information
- smart grid
- information security
- multipath
- smart phones
- bit error rate
- computer simulation
- cloud computing