Physical layer authentication algorithm based on SVM

The diversity of physical layer resources in wireless communication system provides a broad space for the research of physical layer information security technology. For the single judgment mechanism of cell reselection\cell handover, this paper makes full use of wireless physical layer channel char...

Full description

Saved in:
Bibliographic Details
Published in2016 2nd IEEE International Conference on Computer and Communications (ICCC) pp. 1597 - 1601
Main Authors Chuping Dai, Jianxi Yang, Yongning Qin, Jing Liu
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.10.2016
Subjects
Online AccessGet full text
DOI10.1109/CompComm.2016.7924970

Cover

Loading…
Abstract The diversity of physical layer resources in wireless communication system provides a broad space for the research of physical layer information security technology. For the single judgment mechanism of cell reselection\cell handover, this paper makes full use of wireless physical layer channel characteristics, combined with SVM algorithm, a new physical layer channel authentication algorithm is proposed. The specific scheme is that according to the essential characteristics of 4G wireless channel and cell reselection\cell handover, combined with the hypothesis testing, using SVM to dig the channel index, so as to enhance the security of cell reselection\cell handover.
AbstractList The diversity of physical layer resources in wireless communication system provides a broad space for the research of physical layer information security technology. For the single judgment mechanism of cell reselection\cell handover, this paper makes full use of wireless physical layer channel characteristics, combined with SVM algorithm, a new physical layer channel authentication algorithm is proposed. The specific scheme is that according to the essential characteristics of 4G wireless channel and cell reselection\cell handover, combined with the hypothesis testing, using SVM to dig the channel index, so as to enhance the security of cell reselection\cell handover.
Author Yongning Qin
Jianxi Yang
Jing Liu
Chuping Dai
Author_xml – sequence: 1
  surname: Chuping Dai
  fullname: Chuping Dai
  email: Chuping_dai@163.com
  organization: Coll. of Commun. Eng., Xi'an Electron. & Sci. Univ., Xi'an, China
– sequence: 2
  surname: Jianxi Yang
  fullname: Jianxi Yang
  email: navicom@foxmail.com
  organization: Coll. of Commun. Eng., Beijing Electron. Sci. & Technol. Inst., Beijing, China
– sequence: 3
  surname: Yongning Qin
  fullname: Yongning Qin
  email: 842193031@gq.com
  organization: Coll. of Commun. Eng., Beijing Electron. Sci. & Technol. Inst., Beijing, China
– sequence: 4
  surname: Jing Liu
  fullname: Jing Liu
  email: 1229956356@gq.com
  organization: Coll. of Commun. Eng., Beijing Electron. Sci. & Technol. Inst., Beijing, China
BookMark eNotj8lKxEAURUvQhbb9BSLkBxJfzVVLCQ4NLQo2bptn5ZUpyNAk5SJ_b8BeHC6cxYVzwy6HcSDG7jlUnIN_qMf-tNJXAriprBfKW7hgW28dV8ZKD8KIa6Y-2mVOAbuiw4WmAn9zS0NeTU7jUGD3M04pt33xjTM1xao-v95u2VXEbqbteTfs8Px0qF_L_fvLrn7cl8lDLhuM2pAyEKVoApI2UoFzOgRPInqJWhJXMrggNSfuIjiwEQmsiU4qJTfs7v82EdHxNKUep-V4TpF_tqVDxA
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CompComm.2016.7924970
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781467390262
1467390267
9781467390255
1467390259
EndPage 1601
ExternalDocumentID 7924970
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-daf56e460f32dcae56340885cc9e2f93a53e143c8c351e18f0807fae076f83443
IEDL.DBID RIE
IngestDate Thu Jun 29 18:37:51 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-daf56e460f32dcae56340885cc9e2f93a53e143c8c351e18f0807fae076f83443
PageCount 5
ParticipantIDs ieee_primary_7924970
PublicationCentury 2000
PublicationDate 2016-Oct.
PublicationDateYYYYMMDD 2016-10-01
PublicationDate_xml – month: 10
  year: 2016
  text: 2016-Oct.
PublicationDecade 2010
PublicationTitle 2016 2nd IEEE International Conference on Computer and Communications (ICCC)
PublicationTitleAbbrev CompComm
PublicationYear 2016
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.655157
Snippet The diversity of physical layer resources in wireless communication system provides a broad space for the research of physical layer information security...
SourceID ieee
SourceType Publisher
StartPage 1597
SubjectTerms 4G-LTE
Authentication
cell reselection\cell handover
Communication system security
hypothesis testing
Mobile communication
Physical layer
physical layer authentication
Support vector machines
SVM
Wireless communication
Title Physical layer authentication algorithm based on SVM
URI https://ieeexplore.ieee.org/document/7924970
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH_MnTypbOI3OXi0Xdt8NWdxDGEycMpuI0lfdDg7Gd1lf71JWyeKB2_hEdImafM-8vu9B3CtnNLGhPouWmLkvxAdGZGmEUrlT2TrDew6O__4QYye2P2Mzzpws-PCIGINPsM4NOu7_GJlNyFUNpDBWZDeQd_zjlvD1WpJOWmiBuEHCqyKgNcScdv3R9GUWmcMD2D89bQGKvIWbyoT2-2vRIz_fZ1D6H-z88hkp3eOoINlD9ikXXCy1N6KJjog18uqjcgRvXxZrRfV6zsJaqsgXvT4PO7DdHg3vR1FbUWEaKGSKiq04wKZSBzNCquRC8r8KcGtVZg5RTWn6O0fm1vKU0xz581B6TQmUrhQT4MeQ7dclXgChNHEj2IEosyY5VleUFbIjJsgzgWeQi9MeP7R5LyYt3M9-1t8Dvth0RuQ2wV0q_UGL72yrsxVvUuf28OWqA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELaqMsAEqEW88cBI0iR-xTOiKtBUlSioW2U7Z6goKarShV-PnYQiEAObdbKSOH58Z_v77hC6lFYqrX1-FyUgcCNEBZrHcQBCuhXZOAe7is6fjfjgkd5N2bSFrjZaGACoyGcQ-mJ1l58vzdoflfWE3ywIt0HfcrhPZa3WamQ5cSR7fgp5XYVnbPGwqf0jbUqFGv1dlH29ryaLvIbrUofm41coxv9-0B7qfuvz8HiDPPuoBUUH0XHzy_FCOT8aK89dL8rmTA6rxfNyNS9f3rAHrhw708NT1kWT_s3kehA0ORGCuYzKIFeWcaA8siTJjQLGCXXrBDNGQmIlUYyA84BMagiLIU6tcwiFVRAJbn1GDXKA2sWygEOEKYncUzQHEAk1LElzQnORMO3NKYcj1PENnr3XUS9mTVuP_zZfoO3BJBvOhrej-xO04zugprydona5WsOZg-5Sn1c99gn2z5n4
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2016+2nd+IEEE+International+Conference+on+Computer+and+Communications+%28ICCC%29&rft.atitle=Physical+layer+authentication+algorithm+based+on+SVM&rft.au=Chuping+Dai&rft.au=Jianxi+Yang&rft.au=Yongning+Qin&rft.au=Jing+Liu&rft.date=2016-10-01&rft.pub=IEEE&rft.spage=1597&rft.epage=1601&rft_id=info:doi/10.1109%2FCompComm.2016.7924970&rft.externalDocID=7924970