Physical layer authentication algorithm based on SVM
The diversity of physical layer resources in wireless communication system provides a broad space for the research of physical layer information security technology. For the single judgment mechanism of cell reselection\cell handover, this paper makes full use of wireless physical layer channel char...
Saved in:
Published in | 2016 2nd IEEE International Conference on Computer and Communications (ICCC) pp. 1597 - 1601 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.10.2016
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/CompComm.2016.7924970 |
Cover
Loading…
Abstract | The diversity of physical layer resources in wireless communication system provides a broad space for the research of physical layer information security technology. For the single judgment mechanism of cell reselection\cell handover, this paper makes full use of wireless physical layer channel characteristics, combined with SVM algorithm, a new physical layer channel authentication algorithm is proposed. The specific scheme is that according to the essential characteristics of 4G wireless channel and cell reselection\cell handover, combined with the hypothesis testing, using SVM to dig the channel index, so as to enhance the security of cell reselection\cell handover. |
---|---|
AbstractList | The diversity of physical layer resources in wireless communication system provides a broad space for the research of physical layer information security technology. For the single judgment mechanism of cell reselection\cell handover, this paper makes full use of wireless physical layer channel characteristics, combined with SVM algorithm, a new physical layer channel authentication algorithm is proposed. The specific scheme is that according to the essential characteristics of 4G wireless channel and cell reselection\cell handover, combined with the hypothesis testing, using SVM to dig the channel index, so as to enhance the security of cell reselection\cell handover. |
Author | Yongning Qin Jianxi Yang Jing Liu Chuping Dai |
Author_xml | – sequence: 1 surname: Chuping Dai fullname: Chuping Dai email: Chuping_dai@163.com organization: Coll. of Commun. Eng., Xi'an Electron. & Sci. Univ., Xi'an, China – sequence: 2 surname: Jianxi Yang fullname: Jianxi Yang email: navicom@foxmail.com organization: Coll. of Commun. Eng., Beijing Electron. Sci. & Technol. Inst., Beijing, China – sequence: 3 surname: Yongning Qin fullname: Yongning Qin email: 842193031@gq.com organization: Coll. of Commun. Eng., Beijing Electron. Sci. & Technol. Inst., Beijing, China – sequence: 4 surname: Jing Liu fullname: Jing Liu email: 1229956356@gq.com organization: Coll. of Commun. Eng., Beijing Electron. Sci. & Technol. Inst., Beijing, China |
BookMark | eNotj8lKxEAURUvQhbb9BSLkBxJfzVVLCQ4NLQo2bptn5ZUpyNAk5SJ_b8BeHC6cxYVzwy6HcSDG7jlUnIN_qMf-tNJXAriprBfKW7hgW28dV8ZKD8KIa6Y-2mVOAbuiw4WmAn9zS0NeTU7jUGD3M04pt33xjTM1xao-v95u2VXEbqbteTfs8Px0qF_L_fvLrn7cl8lDLhuM2pAyEKVoApI2UoFzOgRPInqJWhJXMrggNSfuIjiwEQmsiU4qJTfs7v82EdHxNKUep-V4TpF_tqVDxA |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/CompComm.2016.7924970 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781467390262 1467390267 9781467390255 1467390259 |
EndPage | 1601 |
ExternalDocumentID | 7924970 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-i90t-daf56e460f32dcae56340885cc9e2f93a53e143c8c351e18f0807fae076f83443 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:37:51 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-daf56e460f32dcae56340885cc9e2f93a53e143c8c351e18f0807fae076f83443 |
PageCount | 5 |
ParticipantIDs | ieee_primary_7924970 |
PublicationCentury | 2000 |
PublicationDate | 2016-Oct. |
PublicationDateYYYYMMDD | 2016-10-01 |
PublicationDate_xml | – month: 10 year: 2016 text: 2016-Oct. |
PublicationDecade | 2010 |
PublicationTitle | 2016 2nd IEEE International Conference on Computer and Communications (ICCC) |
PublicationTitleAbbrev | CompComm |
PublicationYear | 2016 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.655157 |
Snippet | The diversity of physical layer resources in wireless communication system provides a broad space for the research of physical layer information security... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1597 |
SubjectTerms | 4G-LTE Authentication cell reselection\cell handover Communication system security hypothesis testing Mobile communication Physical layer physical layer authentication Support vector machines SVM Wireless communication |
Title | Physical layer authentication algorithm based on SVM |
URI | https://ieeexplore.ieee.org/document/7924970 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH_MnTypbOI3OXi0Xdt8NWdxDGEycMpuI0lfdDg7Gd1lf71JWyeKB2_hEdImafM-8vu9B3CtnNLGhPouWmLkvxAdGZGmEUrlT2TrDew6O__4QYye2P2Mzzpws-PCIGINPsM4NOu7_GJlNyFUNpDBWZDeQd_zjlvD1WpJOWmiBuEHCqyKgNcScdv3R9GUWmcMD2D89bQGKvIWbyoT2-2vRIz_fZ1D6H-z88hkp3eOoINlD9ikXXCy1N6KJjog18uqjcgRvXxZrRfV6zsJaqsgXvT4PO7DdHg3vR1FbUWEaKGSKiq04wKZSBzNCquRC8r8KcGtVZg5RTWn6O0fm1vKU0xz581B6TQmUrhQT4MeQ7dclXgChNHEj2IEosyY5VleUFbIjJsgzgWeQi9MeP7R5LyYt3M9-1t8Dvth0RuQ2wV0q_UGL72yrsxVvUuf28OWqA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELaqMsAEqEW88cBI0iR-xTOiKtBUlSioW2U7Z6goKarShV-PnYQiEAObdbKSOH58Z_v77hC6lFYqrX1-FyUgcCNEBZrHcQBCuhXZOAe7is6fjfjgkd5N2bSFrjZaGACoyGcQ-mJ1l58vzdoflfWE3ywIt0HfcrhPZa3WamQ5cSR7fgp5XYVnbPGwqf0jbUqFGv1dlH29ryaLvIbrUofm41coxv9-0B7qfuvz8HiDPPuoBUUH0XHzy_FCOT8aK89dL8rmTA6rxfNyNS9f3rAHrhw708NT1kWT_s3kehA0ORGCuYzKIFeWcaA8siTJjQLGCXXrBDNGQmIlUYyA84BMagiLIU6tcwiFVRAJbn1GDXKA2sWygEOEKYncUzQHEAk1LElzQnORMO3NKYcj1PENnr3XUS9mTVuP_zZfoO3BJBvOhrej-xO04zugprydona5WsOZg-5Sn1c99gn2z5n4 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+2nd+IEEE+International+Conference+on+Computer+and+Communications+%28ICCC%29&rft.atitle=Physical+layer+authentication+algorithm+based+on+SVM&rft.au=Chuping+Dai&rft.au=Jianxi+Yang&rft.au=Yongning+Qin&rft.au=Jing+Liu&rft.date=2016-10-01&rft.pub=IEEE&rft.spage=1597&rft.epage=1601&rft_id=info:doi/10.1109%2FCompComm.2016.7924970&rft.externalDocID=7924970 |