Wireless physical layer authentication via fingerprint embedding
نویسندگان
چکیده
منابع مشابه
Authentication via wireless networks
Personal authentication is an important process we encounter almost every day; when we are logging on a computer, entering a company where we work, or a restricted area, when we are using our plastic credit cards to pay for a service or to complete some other financial transaction, etc. In each of these processes of personal authentication some kind of magnetic or optical token is required. But...
متن کاملWireless Physical Layer Security
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical...
متن کاملA Physical-Layer Authentication Assisted Scheme for Enhancing 3GPP Authentication
The broadcast nature of radio propagation makes wireless networks vulnerable to eavesdropping attacks. To enhance authentication strength in wireless networks, various physical layer authentication schemes were proposed by exploiting physical layer characteristics. Recently, we proposed a novel PHYsical layer Phase Challenge-Response Authentication Scheme (PHY-PCRAS), which exploits both the re...
متن کاملTitle of Dissertation : PHYSICAL LAYER AUTHENTICATION
Title of Dissertation: PHYSICAL LAYER AUTHENTICATION Paul Yu, Doctor of Philosophy, 2008 Dissertation directed by: Professor John S. Baras Department of Electrical and Computer Engineering A fundamental problem in security is authentication: namely, how to verify the identity of another party. Without this verification, the ideas of privacy and integrity are moot. Modern authentication techniqu...
متن کاملEnabling Fingerprint Authentication in Embedded Systems for Wireless Applications
In this paper, we study different methodologies for implementing fingerprint authentication in embedded systems, namely the DSP and System-on-Chip approaches, for Wireless Applications. Experiments were conducted for evaluation of these approaches. Results show that the SoC system with fixed-point arithmetic support is probably the most ideal candidate.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Communications Magazine
سال: 2015
ISSN: 0163-6804
DOI: 10.1109/mcom.2015.7120016