{"title":"多载波认证系统中的功率分配权衡","authors":"Paul L. Yu, J. Baras, Brian M. Sadler","doi":"10.1109/SARNOF.2009.4850382","DOIUrl":null,"url":null,"abstract":"Physical layer authentication techniques exploit signal characteristics to identify radios. We describe how multicarrier systems may use such techniques to stealthily authenticate while maintaining high levels of security and robustness. We show that with channel state information (CSI) at the transmitter and receiver, multicarrier authentication systems can further improve performance by carefully allocating the authentication power on each carrier","PeriodicalId":230233,"journal":{"name":"2009 IEEE Sarnoff Symposium","volume":"216 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Power allocation tradeoffs in multicarrier authentication systems\",\"authors\":\"Paul L. Yu, J. Baras, Brian M. Sadler\",\"doi\":\"10.1109/SARNOF.2009.4850382\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Physical layer authentication techniques exploit signal characteristics to identify radios. We describe how multicarrier systems may use such techniques to stealthily authenticate while maintaining high levels of security and robustness. We show that with channel state information (CSI) at the transmitter and receiver, multicarrier authentication systems can further improve performance by carefully allocating the authentication power on each carrier\",\"PeriodicalId\":230233,\"journal\":{\"name\":\"2009 IEEE Sarnoff Symposium\",\"volume\":\"216 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-03-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE Sarnoff Symposium\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SARNOF.2009.4850382\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE Sarnoff Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SARNOF.2009.4850382","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Power allocation tradeoffs in multicarrier authentication systems
Physical layer authentication techniques exploit signal characteristics to identify radios. We describe how multicarrier systems may use such techniques to stealthily authenticate while maintaining high levels of security and robustness. We show that with channel state information (CSI) at the transmitter and receiver, multicarrier authentication systems can further improve performance by carefully allocating the authentication power on each carrier