Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources
نویسندگان
چکیده
منابع مشابه
Authentication of Internet-Based Distributed Computing Resources in Chemistry
The evolution of the World Wide Web from a model allowing only the public and open exchange of information on the global Internet via simple HTML-based pages to one involving the additional development of Intranets or Extranets with secure interactive client-server processes is discussed. These client-server processes can be customized on the client browser by the use of embedded applications s...
متن کاملA Physical-Layer Authentication Assisted Scheme for Enhancing 3GPP Authentication
The broadcast nature of radio propagation makes wireless networks vulnerable to eavesdropping attacks. To enhance authentication strength in wireless networks, various physical layer authentication schemes were proposed by exploiting physical layer characteristics. Recently, we proposed a novel PHYsical layer Phase Challenge-Response Authentication Scheme (PHY-PCRAS), which exploits both the re...
متن کاملTitle of Dissertation : PHYSICAL LAYER AUTHENTICATION
Title of Dissertation: PHYSICAL LAYER AUTHENTICATION Paul Yu, Doctor of Philosophy, 2008 Dissertation directed by: Professor John S. Baras Department of Electrical and Computer Engineering A fundamental problem in security is authentication: namely, how to verify the identity of another party. Without this verification, the ideas of privacy and integrity are moot. Modern authentication techniqu...
متن کاملPhysical layer evolution for GSM/EDGE
EDGE has enabled the GSM network to offer third generation services as part of the UMTS core network. This is due to the introduction of 8PSK modulation and the recent specification of interfaces from the GERAN to the UMTS core network. This paper studies further improvements to the spectral efficiency and capacity of EDGE through the use of more sophisticated adaptive modulation schemes based ...
متن کاملReliable Distributed Authentication in Multi-Access Mobile Edge Computing
The fifth generation (5G) mobile telecommunication network is expected to support multi-access mobile edge computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultraresponsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable more decentralized approach for ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2019
ISSN: 1424-8220
DOI: 10.3390/s19081926