Exploiting Lack of Hardware Reciprocity for Sender-Node Authentication at the PHY Layer.
Muhammad Mahboob Ur RahmanAneela YasmeenPublished in: CoRR (2016)
Keyphrases
- low cost
- hardware and software
- real time
- abstraction layer
- hidden nodes
- computing power
- computing systems
- multi layer
- application layer
- user authentication
- massively parallel
- hardware implementation
- directed graph
- tree structure
- computer systems
- greater degree
- graph structure
- security analysis
- authentication protocol
- hardware design
- data acquisition
- hardware architecture
- biometric authentication
- integrity verification
- wide variety
- fragile watermarking