[go: up one dir, main page]

Paul et al., 2008 - Google Patents

Physical-layer authentication

Paul et al., 2008

View PDF
Document ID
8974473174077186610
Author
Paul L
Baras J
Sadler B
Publication year
Publication venue
IEEE Transactions on Information Forensics and Security

External Links

Snippet

Authentication is the process where claims of identity are verified. Most mechanisms of authentication (eg, digital signatures and certificates) exist above the physical layer, though some (eg, spread-spectrum communications) exist at the physical layer often with an …
Continue reading at drum.lib.umd.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/26Systems using multi-frequency codes
    • H04L27/2601Multicarrier modulation systems
    • H04L27/2602Signal structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/001Modulated-carrier systems using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/0001Arrangements for dividing the transmission path
    • H04L5/0003Two-dimensional division
    • H04L5/0005Time-frequency
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B13/00Transmission systems characterised by the medium used for transmission, not provided for in groups H04B3/00 - H04B11/00
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J13/00Code division multiplex systems

Similar Documents

Publication Publication Date Title
Paul et al. Physical-layer authentication
US9161214B2 (en) Wireless communication method and system for transmission authentication at the physical layer
CN117082502B (en) Data acquisition and signal identification method based on data information encryption method
US20100246825A1 (en) Wireless communication method and system for transmission authentication at the physical layer
Wan et al. Performance comparison of Doppler scale estimation methods for underwater acoustic OFDM
Zhao et al. Physical layer node authentication in underwater acoustic sensor networks using time-reversal
Badawy et al. Unleashing the secure potential of the wireless physical layer: Secret key generation methods
Kumar et al. Blind transmitter authentication for spectrum security and enforcement
Cai et al. Toward chaotic secure communications: An RIS enabled M-ary differential chaos shift keying system with block interleaving
TW200524327A (en) Orthogonal frequency division multiplexing (OFDM) method and apparatus for protecting and authenticating wirelessly transmitted digital information
Kumar et al. PHY-layer authentication using duobinary signaling for spectrum enforcement
Xie et al. Security provided by the physical layer in wireless communications
Ran et al. Physical layer authentication scheme with channel based tag padding sequence
Huang et al. Reliable and secure constellation shifting aided differential radio frequency watermark design for NB-IoT systems
Padmapriya et al. Misconstrued voice on SC-FDMA for secured comprehension-a cooperative influence of DWT and ECC
Chen et al. Audio-based security techniques for secure device-to-device communications
CN108882236A (en) Physical layer signal watermark embedding method based on S-transformation
Fan Enhancing physical layer security via information hiding and chaotic frequency-hopping signal
CN109417469A (en) The safe matching method of mimo system
Yu et al. Fingerprinting by design: Embedding and authentication
Huang et al. Secure and reliable multidimensional orthogonal code aided rf watermark design for nb-iot systems
Eisencraft et al. New trends in chaos-based communications and signal processing
Xu et al. Physical Layer Authentication in Spatial Modulation
Xie et al. A modulation division based physical layer authentication in wireless communication systems
Kumar et al. Exploiting WiMAX for covert transmission of secret data over fading channel