Toward Proper Guard Zones for Link Signature.
IEEE Transactions on Wireless Communications(2016)
摘要
Motivated by information-theoretic security, link signature (LS)-based security mechanisms exploit the ample channel characteristics between wireless devices for security establishment. Nevertheless, LS is originated from wireless environments and hence may exhibit potential vulnerabilities that can be exploited by adversary in the vicinity. As to this, it is widely believed in existing literature...
更多查看译文
关键词
Correlation,Receivers,Security,Wireless communication,Communication system security,Azimuth,Transmitters
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络