kth.sePublications KTH
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Authentication based on channel state information for industrial wireless communications
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering.ORCID iD: 0000-0003-4158-9424
Show others and affiliations
2018 (English)In: Proceedings: IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society, Institute of Electrical and Electronics Engineers Inc. , 2018, p. 4125-4130Conference paper, Published paper (Refereed)
Abstract [en]

Physical layer authentication based on channel state information is an effective solution to preventing spoofing attacks in wireless communications by comparing the channel impulse responses. Existing theoretical analyses and experiments have proved the feasibility and efficiency in labs or offices. However, the environment of industrial wireless communication is significantly different. This paper applies physical layer authentication based on channel state information to measurements from four different industrial wireless communication scenarios, including indoor, outdoor, moving, and stationary scenarios. The analysis of the results allows to derive meaningful insights on the applicability of such a method to industrial wireless communications. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc. , 2018. p. 4125-4130
Keywords [en]
Channel impulse response, Channel state information, Industrial wireless communication, Physical layer authentication, Authentication, Impulse response, Industrial electronics, Mobile radio systems, Network layers, Effective solution, Industrial wireless, Physical layers, Spoofing attacks, Wireless communications
National Category
Communication Systems Telecommunications
Identifiers
URN: urn:nbn:se:kth:diva-277093DOI: 10.1109/IECON.2018.8592783ISI: 000505811104011Scopus ID: 2-s2.0-85061535692ISBN: 9781509066841 (print)OAI: oai:DiVA.org:kth-277093DiVA, id: diva2:1446727
Conference
44th Annual Conference of the IEEE Industrial Electronics Society, IECON 2018, 20 October 2018 through 23 October 2018
Note

QC 20200624

Available from: 2020-06-24 Created: 2020-06-24 Last updated: 2022-06-26Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Jiang, XiaolinXiao, Ming

Search in DiVA

By author/editor
Jiang, XiaolinXiao, Ming
By organisation
Network and Systems EngineeringInformation Science and Engineering
Communication SystemsTelecommunications

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 71 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf