Paul et al., 2008 - Google Patents
Physical-layer authenticationPaul et al., 2008
View PDF- Document ID
- 8974473174077186610
- Author
- Paul L
- Baras J
- Sadler B
- Publication year
- Publication venue
- IEEE Transactions on Information Forensics and Security
External Links
Snippet
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (eg, digital signatures and certificates) exist above the physical layer, though some (eg, spread-spectrum communications) exist at the physical layer often with an …
- 238000005562 fading 0 abstract description 22
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/26—Systems using multi-frequency codes
- H04L27/2601—Multicarrier modulation systems
- H04L27/2602—Signal structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/0001—Arrangements for dividing the transmission path
- H04L5/0003—Two-dimensional division
- H04L5/0005—Time-frequency
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B13/00—Transmission systems characterised by the medium used for transmission, not provided for in groups H04B3/00 - H04B11/00
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J13/00—Code division multiplex systems
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Paul et al. | Physical-layer authentication | |
| US9161214B2 (en) | Wireless communication method and system for transmission authentication at the physical layer | |
| CN117082502B (en) | Data acquisition and signal identification method based on data information encryption method | |
| US20100246825A1 (en) | Wireless communication method and system for transmission authentication at the physical layer | |
| Wan et al. | Performance comparison of Doppler scale estimation methods for underwater acoustic OFDM | |
| Zhao et al. | Physical layer node authentication in underwater acoustic sensor networks using time-reversal | |
| Badawy et al. | Unleashing the secure potential of the wireless physical layer: Secret key generation methods | |
| Kumar et al. | Blind transmitter authentication for spectrum security and enforcement | |
| Cai et al. | Toward chaotic secure communications: An RIS enabled M-ary differential chaos shift keying system with block interleaving | |
| TW200524327A (en) | Orthogonal frequency division multiplexing (OFDM) method and apparatus for protecting and authenticating wirelessly transmitted digital information | |
| Kumar et al. | PHY-layer authentication using duobinary signaling for spectrum enforcement | |
| Xie et al. | Security provided by the physical layer in wireless communications | |
| Ran et al. | Physical layer authentication scheme with channel based tag padding sequence | |
| Huang et al. | Reliable and secure constellation shifting aided differential radio frequency watermark design for NB-IoT systems | |
| Padmapriya et al. | Misconstrued voice on SC-FDMA for secured comprehension-a cooperative influence of DWT and ECC | |
| Chen et al. | Audio-based security techniques for secure device-to-device communications | |
| CN108882236A (en) | Physical layer signal watermark embedding method based on S-transformation | |
| Fan | Enhancing physical layer security via information hiding and chaotic frequency-hopping signal | |
| CN109417469A (en) | The safe matching method of mimo system | |
| Yu et al. | Fingerprinting by design: Embedding and authentication | |
| Huang et al. | Secure and reliable multidimensional orthogonal code aided rf watermark design for nb-iot systems | |
| Eisencraft et al. | New trends in chaos-based communications and signal processing | |
| Xu et al. | Physical Layer Authentication in Spatial Modulation | |
| Xie et al. | A modulation division based physical layer authentication in wireless communication systems | |
| Kumar et al. | Exploiting WiMAX for covert transmission of secret data over fading channel |