Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication of Internet-Based Distributed Computing Resources in Chemistry

The evolution of the World Wide Web from a model allowing only the public and open exchange of information on the global Internet via simple HTML-based pages to one involving the additional development of Intranets or Extranets with secure interactive client-server processes is discussed. These client-server processes can be customized on the client browser by the use of embedded applications s...

متن کامل

A Physical-Layer Authentication Assisted Scheme for Enhancing 3GPP Authentication

The broadcast nature of radio propagation makes wireless networks vulnerable to eavesdropping attacks. To enhance authentication strength in wireless networks, various physical layer authentication schemes were proposed by exploiting physical layer characteristics. Recently, we proposed a novel PHYsical layer Phase Challenge-Response Authentication Scheme (PHY-PCRAS), which exploits both the re...

متن کامل

Title of Dissertation : PHYSICAL LAYER AUTHENTICATION

Title of Dissertation: PHYSICAL LAYER AUTHENTICATION Paul Yu, Doctor of Philosophy, 2008 Dissertation directed by: Professor John S. Baras Department of Electrical and Computer Engineering A fundamental problem in security is authentication: namely, how to verify the identity of another party. Without this verification, the ideas of privacy and integrity are moot. Modern authentication techniqu...

متن کامل

Physical layer evolution for GSM/EDGE

EDGE has enabled the GSM network to offer third generation services as part of the UMTS core network. This is due to the introduction of 8PSK modulation and the recent specification of interfaces from the GERAN to the UMTS core network. This paper studies further improvements to the spectral efficiency and capacity of EDGE through the use of more sophisticated adaptive modulation schemes based ...

متن کامل

Reliable Distributed Authentication in Multi-Access Mobile Edge Computing

The fifth generation (5G) mobile telecommunication network is expected to support multi-access mobile edge computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultraresponsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable more decentralized approach for ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sensors

سال: 2019

ISSN: 1424-8220

DOI: 10.3390/s19081926