Computer Science ›› 2020, Vol. 47 ›› Issue (12): 267-272.doi: 10.11896/jsjkx.190900095
Previous Articles Next Articles
LI Zhao-bin, CUI Zhao, WEI Zhan-zhen, ZHAO Hong, GUO Chao
CLC Number:
[1] WANG X B,HAO P,HANZO L.Physical-layer Authentication for Wireless Security Enhancement:Current Challenges and Future Developments[J].IEEE Communications Magazine,2016,54(6):152-158. [2] PERAZZONE J,YU P L,SADLER B M,et al.Physical Layer Authentication via Fingerprint Embedding:Min-Entropy Analysis:Invited Presentation[C]//2019 53rd Annual Conference on Information Sciences and Systems (CISS).Baltimore,MD,USA,2019:1-6. [3] XIAO L,GREENSTEIN L J,MANDAYAM N B,et al.A Physi-cal-Layer Technique to Enhance Authentication for Mobile Terminals[C]//IEEE International Conference on Communications.Beijing,2008:1520-1524. [4] XIAO L,GREENSTEIN L J,MANDAYAM N B,et al.Fingerprints in the Ether:Using the Physical Layer for Wireless Authentication[C]//Proceedings of IEEE International Conference on Communications.Glasgow,UK,2007:4646-4651. [5] JIANG W,ANTHONY L,MOHAMMAD A F.Physical Layer Key Generation:Securing Wireless Communication in Automotive Cyber-Physical Systems[J].ACM Transactions on Cyber-Physical Systems,2018,3(2):1-26. [6] ZHANG J Q,RAJENDRAN S,SUN Z,et al.Physical Layer Security for the Internet of Things:Authentication and Key Ge-neration[J].IEEE Wireless Communications,2018,26(5):92-98. [7] RAHBARI H,LIU J S,Park J M J.SecureMatch:Scalable Authentication and Key Relegation for IoT Using Physical-Layer Techniques[C]//2018 IEEE Conference on Communications and Network Security (CNS).Beijing,2018:1-9. [8] SONG H W,JIN L,ZHANG S J.Physical Layer Authentication Based on Tag Signal[J].Journal of Electronics &Information Technology ,2008,40(5):1066-1071. [9] YANG J,JI X S,HUANG K Z,et al.Cross-Layer Authentication Scheme Based on Wireless Channel Characteristics[J].Journal of Information Engineering University,2017,18(3):267-272. [10] WANG X,JIN L,HUANG K Z.Cross-Layer Mutual Authentication Scheme Based on Physical Layer Location Information[J].Journal of Information Engineering University,2017,18(3):279-283,304. [11] JI X S,YANG J,HUANG K Z,et al.Physical Layer Authentication Scheme Based on Hash Method[J].Journal of Electro-nics &Information Technology ,2016,38(11):2900-2907. [12] HUSSAIN S,FAROOP S M,USTUN T S.Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security[J].IEEE Access,2019(7):80980-80984. [13] WANG M W,WANG L J,XIE W M.Mutual AuthenticationScheme Based on Session Key in Wireless Sensor Network[J].Application Research of Computers,2014,31(8):2506-2509. [14] YAN S N,XU L,ZENG Y L.Lightweight Physical Layer Auxi-liary Authentication in Cognitive Wireless Network[J].Computer Systems &Applications,2019,28(6):22-28. [15] YANG G,WANG J T,CHENG H B,et al.A Key Establish Scheme for WSN Based on IBE and Diffie-Hellman Algorithms[J].Acta Electronica Sinica,2007(1):180-184. [16] PATZOLD M.Mobile Radio Channels[M].New York:JohnWiley &Sons,2012:55-147. [17] MAURER U.Authentication Theory and Hypothesis Testing[J].IEEE Transactions on Information Theory,2000,46(4):1350-1356. [18] LIU Z G,YANG L C,PU J,et al.The System of Digital Signature Authentication Based on PKI[J].Application Research of Computers,2004(9):158-160. [19] WANG X,YU H.How to Break MD5 and Other Hash Functions[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.Springer,Berlin,Heidelberg,2005. [20] SUI L,GUO W B,JIANG W B,et al.Generation and Extraction of Secret Keys Based on Properties of Wireless Channels[J].Computer Science,2015,42(2):137-141. [21] SONG H W.Research on Physical Layer Security Authentication Technology in Mobile Communication[D].Zhengzhou:PLA Strategic Support Force Information Engineering Univer-sity,2018. [22] HUANG X J,BI H J,YU S Y.Subspace-based Blind Channel Estimation for Orthogonal Frequency Division Multiplexing (OFDM) Systems[J].Journal of Shanghai Jiaotong University,2004(S1):6-9. |
[1] | HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332. |
[2] | CHEN Kun-feng, PAN Zhi-song, WANG Jia-bao, SHI Lei, ZHANG Jin. Moderate Clothes-Changing Person Re-identification Based on Bionics of Binocular Summation [J]. Computer Science, 2022, 49(8): 165-171. |
[3] | MENG Yue-bo, MU Si-rong, LIU Guang-hui, XU Sheng-jun, HAN Jiu-qiang. Person Re-identification Method Based on GoogLeNet-GMP Based on Vector Attention Mechanism [J]. Computer Science, 2022, 49(7): 142-147. |
[4] | SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235. |
[5] | XU Jia-nan, ZHANG Tian-rui, ZHAO Wei-bo, JIA Ze-xuan. Study on Improved BP Wavelet Neural Network for Supply Chain Risk Assessment [J]. Computer Science, 2022, 49(6A): 654-660. |
[6] | SHAN Xiao-ying, REN Ying-chun. Fishing Type Identification of Marine Fishing Vessels Based on Support Vector Machine Optimized by Improved Sparrow Search Algorithm [J]. Computer Science, 2022, 49(6A): 211-216. |
[7] | YU Shu-hao, ZHOU Hui, YE Chun-yang, WANG Tai-zheng. SDFA:Study on Ship Trajectory Clustering Method Based on Multi-feature Fusion [J]. Computer Science, 2022, 49(6A): 256-260. |
[8] | DONG Zhen-heng, REN Wei-ping, YOU Xin-dong, LYU Xue-qiang. Machine Translation Method Integrating New Energy Terminology Knowledge [J]. Computer Science, 2022, 49(6): 305-312. |
[9] | WANG Xue-guang, ZHU Jun-wen, ZHANG Ai-xin. Identification Method of Voiceprint Identity Based on ARIMA Prediction of MFCC Features [J]. Computer Science, 2022, 49(5): 92-97. |
[10] | LI Guo-quan, YAO Kai, PANG Yu. Automatic Identification Algorithm of Blood Cell Image Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(4): 247-253. |
[11] | YANG Xiao-yu, YIN Kang-ning, HOU Shao-qi, DU Wen-yi, YIN Guang-qiang. Person Re-identification Based on Feature Location and Fusion [J]. Computer Science, 2022, 49(3): 170-178. |
[12] | LI Hao, CAO Shu-yu, CHEN Ya-qing, ZHANG Min. User Trajectory Identification Model via Attention Mechanism [J]. Computer Science, 2022, 49(3): 308-312. |
[13] | ZHANG Xin-feng, SONG Bo. A Person Re-identification Method Based on Improved Triple Loss and Feature Fusion [J]. Computer Science, 2021, 48(9): 146-152. |
[14] | LI Shuang-qiu, YU Zhi-bin, YANG Ling, ZHANG Yi-fang, LIU Li-ping. Extraction Method of Wireless Frame Interval Feature [J]. Computer Science, 2021, 48(9): 286-291. |
[15] | LI Shao-hui, ZHANG Guo-min, SONG Li-hua, WANG Xiu-lei. Incomplete Information Game Theoretic Analysis to Defend Fingerprinting [J]. Computer Science, 2021, 48(8): 291-299. |
|