메뉴 건너뛰기




Volumn 10, Issue 5, 2015, Pages 941-952

On the error region for channel estimation-based physical layer authentication over rayleigh fading

Author keywords

Authentication; Hypothesis testing; Physical layer security; Rayleigh fading channels

Indexed keywords

ALGORITHMS; AUTHENTICATION; CONSTRAINED OPTIMIZATION; COVARIANCE MATRIX; ERROR STATISTICS; FADING CHANNELS; ITERATIVE METHODS; NETWORK LAYERS; OPTIMIZATION;

EID: 84927145316     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2015.2392565     Document Type: Article
Times cited : (42)

References (20)
  • 2
    • 84863913546 scopus 로고    scopus 로고
    • Physical-layer secrecy for OFDM transmissions over fading channels
    • Aug.
    • F. Renna, N. Laurenti, and H. V. Poor, "Physical-layer secrecy for OFDM transmissions over fading channels," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1354-1367, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.4 , pp. 1354-1367
    • Renna, F.1    Laurenti, N.2    Poor, H.V.3
  • 3
    • 84902977530 scopus 로고    scopus 로고
    • Resource allocation for secret transmissions over MIMOME fading channels
    • Atlanta, GA, USA Dec.
    • S. Tomasin, "Resource allocation for secret transmissions over MIMOME fading channels," in Proc. IEEE Global Conf. Commun. (GLOBECOM), Atlanta, GA, USA, Dec. 2013, pp. 1264-1269.
    • (2013) Proc. IEEE Global Conf. Commun. (GLOBECOM) , pp. 1264-1269
    • Tomasin, S.1
  • 4
    • 0034228863 scopus 로고    scopus 로고
    • Authentication theory and hypothesis testing
    • Jul.
    • U. M. Maurer, "Authentication theory and hypothesis testing," IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1350-1356, Jul. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.4 , pp. 1350-1356
    • Maurer, U.M.1
  • 5
    • 61349140043 scopus 로고    scopus 로고
    • Authentication over noisy channels
    • Feb.
    • L. Lai, H. El Gamal, and H. V. Poor, "Authentication over noisy channels," IEEE Trans. Inf. Theory, vol. 55, no. 2, pp. 906-916, Feb. 2009.
    • (2009) IEEE Trans. Inf. Theory , vol.55 , Issue.2 , pp. 906-916
    • Lai, L.1    El Gamal, H.2    Poor, H.V.3
  • 6
    • 33847300575 scopus 로고    scopus 로고
    • Short paper: A signal fingerprinting paradigm for general physical layer and sensor network security and assurance
    • Athens, Greece Sep.
    • T. Daniels, M. Mina, and S. F. Russell, "Short paper: A signal fingerprinting paradigm for general physical layer and sensor network security and assurance," in Proc. IEEE 1st Int. Conf. SecureComm, Athens, Greece, Sep. 2005, pp. 219-221.
    • (2005) Proc. IEEE 1st Int. Conf. SecureComm , pp. 219-221
    • Daniels, T.1    Mina, M.2    Russell, S.F.3
  • 7
    • 34247324807 scopus 로고    scopus 로고
    • Detecting identity-based attacks in wireless networks using signalprints
    • Los Angeles, CA, USA Sep.
    • D. B. Faria and D. R. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints," in Proc. 5th ACM WiSe, Los Angeles, CA, USA, Sep. 2006, pp. 43-52.
    • (2006) Proc. 5th ACM WiSe , pp. 43-52
    • Faria, D.B.1    Cheriton, D.R.2
  • 8
    • 73049092718 scopus 로고    scopus 로고
    • Channel-based spoofing detection in frequency-selective Rayleigh channels
    • Dec.
    • L. Xiao, L. J. Greenstein, L. Fellow, N. B. Mandayam, and W. Trappe, "Channel-based spoofing detection in frequency-selective Rayleigh channels," IEEE Trans. Wireless Commun., vol. 8, no. 12, pp. 5948-5956, Dec. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.12 , pp. 5948-5956
    • Xiao, L.1    Greenstein, L.J.2    Fellow, L.3    Mandayam, N.B.4    Trappe, W.5
  • 9
    • 84864117726 scopus 로고    scopus 로고
    • Physical layer authentication over MIMO fading wiretap channels
    • Jul.
    • P. Baracca, N. Laurenti, and S. Tomasin, "Physical layer authentication over MIMO fading wiretap channels," IEEE Trans. Wireless Commun., vol. 11, no. 7, pp. 2564-2573, Jul. 2012.
    • (2012) IEEE Trans. Wireless Commun. , vol.11 , Issue.7 , pp. 2564-2573
    • Baracca, P.1    Laurenti, N.2    Tomasin, S.3
  • 10
    • 84906698210 scopus 로고    scopus 로고
    • Principles of physical layer security in multiuser wireless networks: A survey
    • Jan.
    • A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, "Principles of physical layer security in multiuser wireless networks: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, Jan. 2014.
    • (2014) IEEE Commun. Surveys Tuts. , vol.16 , Issue.3 , pp. 1550-1573
    • Mukherjee, A.1    Fakoorian, S.A.A.2    Huang, J.3    Swindlehurst, A.L.4
  • 11
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Portland, OR, USA Apr.
    • C. Cachin, "An information-theoretic model for steganography," in Proc. 2nd Int. Workshop Inf. Hiding (IH), vol. LNCS-1525. Portland, OR, USA, Apr. 1998, pp. 306-318.
    • (1998) Proc. 2nd Int. Workshop Inf. Hiding (IH) , vol.LNCS-1525 , pp. 306-318
    • Cachin, C.1
  • 12
    • 84873669138 scopus 로고    scopus 로고
    • The source identification game: An informationtheoretic perspective
    • Mar.
    • M. Barni and B. Tondi, "The source identification game: An informationtheoretic perspective," IEEE Trans. Inf. Forensics Security, vol. 8, no. 3, pp. 450-463, Mar. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.3 , pp. 450-463
    • Barni, M.1    Tondi, B.2
  • 15
    • 0001568882 scopus 로고
    • Gaussian Markov distributions over finite graphs
    • Mar.
    • T. P. Speed and H. T. Kiiveri, "Gaussian Markov distributions over finite graphs," Ann. Statist., vol. 14, no. 1, pp. 138-150, Mar. 1986.
    • (1986) Ann. Statist. , vol.14 , Issue.1 , pp. 138-150
    • Speed, T.P.1    Kiiveri, H.T.2
  • 16
    • 0001038826 scopus 로고
    • Covariance selection
    • A. P. Dempster, "Covariance selection," Biometrics, vol. 28, no. 1, pp. 157-175, 1972.
    • (1972) Biometrics , vol.28 , Issue.1 , pp. 157-175
    • Dempster, A.P.1
  • 17
    • 79957652216 scopus 로고    scopus 로고
    • Matrix completion à la Dempster by the principle of parsimony
    • Jun.
    • A. Ferrante and M. Pavon, "Matrix completion ? la Dempster by the principle of parsimony," IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3925-3931, Jun. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.6 , pp. 3925-3931
    • Ferrante, A.1    Pavon, M.2
  • 18
    • 84856487307 scopus 로고    scopus 로고
    • A maximum entropy solution of the covariance extension problem for reciprocal processes
    • Sep.
    • F. P. Carli, A. Ferrante, M. Pavon, and G. Picci, "A maximum entropy solution of the covariance extension problem for reciprocal processes," IEEE Trans. Autom. Control, vol. 56, no. 9, pp. 1999-2012, Sep. 2011.
    • (2011) IEEE Trans. Autom. Control , vol.56 , Issue.9 , pp. 1999-2012
    • Carli, F.P.1    Ferrante, A.2    Pavon, M.3    Picci, G.4
  • 19
    • 0027634633 scopus 로고
    • Proper complex random processes with applications to information theory
    • Jul.
    • F. D. Neeser and J. L. Massey, "Proper complex random processes with applications to information theory," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1293-1302, Jul. 1993.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , Issue.4 , pp. 1293-1302
    • Neeser, F.D.1    Massey, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.