Physical Layer Authentication in Wireless Communication Networks: A Survey

87Citations
Citations of this article
43Readers
Mendeley users who have this article in their library.

Abstract

Physical layer security (PLS) in wireless communication systems has attracted extensive research attentions in recent years. Unlike cryptography-based methods applied in upper-layer in network, PLS methods are applied in physical layers and can provide information-theoretic security by utilizing the random-ness of signals and wireless channels. In this survey, we provide a comprehensive review in the domain of physical layer authentication (PLA) in wireless communication systems, including the concepts, several key techniques of typical PLA architectures as well as future challenges and research trends in more sophisticated communication systems. The survey begins with an overview of the background and basic concepts of PLA, such as the general model of wireless security communication system, typical frameworks of key-based/less PLA systems, and the common attack models. We then discuss the major concerns and key techniques that are applied in PLA systems, where three types of authentication schemes are considered, i.e., the authentication based on channel information, radio-frequency and identity watermarks. Basic models and representative research results about key approaches and techniques applied to the authentication systems above are subsequently covered. Finally, the associated challenges and potential research trends of PLA in future communication systems are presented at the end of the survey paper.

Cite

CITATION STYLE

APA

Bai, L., Zhu, L., Liu, J., Choi, J., & Zhang, W. (2020). Physical Layer Authentication in Wireless Communication Networks: A Survey. Journal of Communications and Information Networks. Posts and Telecom Press Co Ltd. https://doi.org/10.23919/JCIN.2020.9200889

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free