{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T03:25:40Z","timestamp":1762917940806,"version":"build-2065373602"},"reference-count":26,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,10,2]],"date-time":"2018-10-02T00:00:00Z","timestamp":1538438400000},"content-version":"vor","delay-in-days":274,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572114"],"award-info":[{"award-number":["61572114"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002848","name":"Comisi\u00f3n Nacional de Investigaci\u00f3n Cient\u00edfica y Tecnol\u00f3gica","doi-asserted-by":"publisher","award":["1181809"],"award-info":[{"award-number":["1181809"]}],"id":[{"id":"10.13039\/501100002848","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>By utilizing the radio channel information to detect spoofing attacks, channel based physical layer (PHY\u2010layer) enhanced authentication can be exploited in light\u2010weight securing 5G wireless communications. One major obstacle in the application of the PHY\u2010layer authentication is its detection rate. In this paper, a novel authentication method is developed to detect spoofing attacks without a special test threshold while a trained model is used to determine whether the user is legal or illegal. Unlike the threshold test PHY\u2010layer authentication method, the proposed AdaBoost based PHY\u2010layer authentication algorithm increases the authentication rate with one\u2010dimensional test statistic feature. In addition, a two\u2010dimensional test statistic features authentication model is presented for further improvement of detection rate. To evaluate the feasibility of our algorithm, we implement the PHY\u2010layer spoofing detectors in multiple\u2010input multiple\u2010output (MIMO) system over universal software radio peripherals (USRP). Extensive experiences show that the proposed methods yield the high performance without compromising the computing complexity.<\/jats:p>","DOI":"10.1155\/2018\/6039878","type":"journal-article","created":{"date-parts":[[2018,10,2]],"date-time":"2018-10-02T19:31:25Z","timestamp":1538508685000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Physical\u2010Layer Channel Authentication for 5G via Machine Learning Algorithm"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2504-5630","authenticated-orcid":false,"given":"Songlin","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1776-6013","authenticated-orcid":false,"given":"Hong","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Jinsong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wenjie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Chen","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,10,2]]},"reference":[{"key":"e_1_2_9_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"e_1_2_9_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736744"},{"key":"e_1_2_9_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2015.2389854"},{"key":"e_1_2_9_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2012.196"},{"key":"e_1_2_9_5_2","first-page":"168","article-title":"An Efficient and secure RFID batch authentication protocol with group tags ownership Transfer","author":"Zhang R.","year":"2015","journal-title":"IEEE Collaboration and Internet Computing"},{"key":"e_1_2_9_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2778185"},{"key":"e_1_2_9_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2744660"},{"key":"e_1_2_9_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6510-2"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2605918"},{"key":"e_1_2_9_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2633425"},{"key":"e_1_2_9_11_2","doi-asserted-by":"crossref","unstructured":"FariaD. B.andCheritonD. R. Detecting identity-based attacks in wireless networks using signalprints Proceedings of the ACM Workshop on Wireless Security 2006 Los Angeles Calif USA 43\u201352.","DOI":"10.1145\/1161289.1161298"},{"key":"e_1_2_9_12_2","doi-asserted-by":"crossref","unstructured":"DemirbasM.andSongY. An RSSI-based scheme for sybil attack detection in wireless sensor networks Proceedings of the WoWMoM 2006: 2006 International Symposium on a World of Wireless Mobile and Multimedia Networks June 2006 564\u2013568 https:\/\/doi.org\/10.1109\/WOWMOM.2006.27 2-s2.0-33845926634.","DOI":"10.1109\/WOWMOM.2006.27"},{"key":"e_1_2_9_13_2","doi-asserted-by":"crossref","unstructured":"ChenY. TrappeW. andMartinR. P. Detecting and localizing wireless spoofing attacks Proceedings of the 2007 4th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks SECON June 2007 San Diego Calif USA 193\u2013202 https:\/\/doi.org\/10.1109\/SAHCN.2007.4292831 2-s2.0-48049094399.","DOI":"10.1109\/SAHCN.2007.4292831"},{"key":"e_1_2_9_14_2","doi-asserted-by":"crossref","unstructured":"PatwariN.andKaseraS. K. Robust location distinction using temporal link signatures Proceedings of the ACM International Conference on Mobile Computing and NETWORKING 2007 111\u2013122 2-s2.0-37749047975.","DOI":"10.1145\/1287853.1287867"},{"key":"e_1_2_9_15_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2012.0300"},{"key":"e_1_2_9_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130912"},{"key":"e_1_2_9_17_2","doi-asserted-by":"crossref","unstructured":"JiangZ. ZhaoJ. LiX. HanJ. andXiW. Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information Proceedings of the IEEE INFOCOM 2013 - IEEE Conference on Computer Communications April 2013 Turin Italy 2544\u20132552 https:\/\/doi.org\/10.1109\/INFCOM.2013.6567061.","DOI":"10.1109\/INFCOM.2013.6567061"},{"key":"e_1_2_9_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2375191"},{"key":"e_1_2_9_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2524258"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2524258"},{"key":"e_1_2_9_21_2","doi-asserted-by":"crossref","unstructured":"HaoP. WangX. andRefaeyA. An enhanced cross-layer authentication mechanism for wireless communications based on PER and RSSI Proceedings of the 2013 13th Canadian Workshop on Information Theory CWIT 2013 June 2013 Canada 44\u201348 2-s2.0-84888879741.","DOI":"10.1109\/CWIT.2013.6621590"},{"key":"e_1_2_9_22_2","article-title":"Machine-to-Machine communications in ultra-dense networks\u2014A survey","volume":"1","author":"Chen S.","year":"2017","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_2_9_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2026454"},{"key":"e_1_2_9_24_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2009.0197"},{"key":"e_1_2_9_25_2","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1013203451"},{"key":"e_1_2_9_26_2","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1016218223"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/6039878.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/6039878.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/6039878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T01:36:16Z","timestamp":1761096976000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/6039878"}},"subtitle":[],"editor":[{"given":"Vicente","family":"Casares-Giner","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/6039878"],"URL":"https:\/\/doi.org\/10.1155\/2018\/6039878","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-01-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-19","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-10-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6039878"}}