Physical Layer Authentication Algorithm Based on SVM

被引:0
作者
Dai, Chuping [1 ]
Yang, Jianxi [2 ]
Qin, Yongning [2 ]
Liu, Jing [2 ]
机构
[1] Xian Elect & Sci Univ, Coll Commun Engn, Xian, Shaanxi, Peoples R China
[2] Beijing Elect Sci & Technol Inst, Coll Commun Engn, Beijing, Peoples R China
来源
2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC) | 2016年
关键词
4G-LTE; cell reselectionlcell handover; physical layer authentication; SVM; hypothesis testing;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The diversity of physical layer resources in wireless communication system provides a broad space for the research of physical layer information security technology. For the single judgment mechanism of cell reselection\cell handover, this paper makes full use of wireless physical layer channel characteristics, combined with SVM algorithm, a new physical layer channel authentication algorithm is proposed. The specific scheme is that according to the essential characteristics of 4G wireless channel and cell reselection\cell handover, combined with the hypothesis testing, using SVM to dig the channel index, so as to enhance the security of cell reselection\cell handover.
引用
收藏
页码:1597 / 1601
页数:5
相关论文
共 19 条
[1]  
Bai Peng, 2008, SVM THEORY ENG APPL
[2]  
Chan H., 2003, P IEEE S SEC PRIV
[3]   Cryptographic key agreement for mobile radio [J].
Hassan, AA ;
Stark, WE ;
Hershey, JE ;
Chennakeshu, S .
DIGITAL SIGNAL PROCESSING, 1996, 6 (04) :207-212
[4]   Secured Communication over Frequency-Selective Fading Channels: A Practical Vandermonde Precoding [J].
Kobayashi, Mari ;
Debbah, Merouane ;
Shamai, Shlomo .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2009,
[5]  
Liang Xiao, 2007, FINGERPRINTS ETHER U
[6]  
Liang Xun, 2012, SVM ALGORITHM ITS AP
[7]  
Liu R, 2008, P IEEE PIMRC 2008 CA
[8]  
Mouli C, 2011, SPRINGER SERIES COMM, P291
[9]  
Pei Chengcheng, 2014, WIR COMM S GLOB
[10]   Applications of LDPC codes to the wiretap channel [J].
Thangaraj, Andrew ;
Dihidar, Souvik ;
Calderbank, A. R. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (08) :2933-2945