
Physical (PHY) Layer Security
-
Traditional cryptography methods rely on computational complexity.
DNN in PHY-layer Security
-
Proposed a deep-learning-based PHY-layer authentication:
-
Three gradient descent methods are adopted to increase the training speed of deep neural networks (DNN), which allow smaller computation overheads and lower energy consumption, and the authentication success rate indicates the difference performance between authentication algorithms.
-
Focus on multi-user authentication scenario.
-
The interaction between the edge device and mobile cloud computing server is performed after the device and server implement access authentication.
-
Enhanced DNN based multi-user authentication scheme balances the edge devices, malicious ones and attackers, increase the security level of MMC system in IoT in the physical layer.
-
Relay Networks Security
-
Security Issues in relay networks:
-
Relays are untrusted, the data transmitted in the network requires confidentiality.
-
Relays are trusted, no need to encrypt the data.
-
-
Wireless secret key agreement
-
Use a secret variable to indicate the channel state.
-
Allow transmission array optimization to extract keys faster.
-
Expose the extraction coefficients of the multipath selection components.
-
Use one-bit response in the practical network.
-
-
Involving the cooperating relays
-
Dynamic algorithm to generate a key encrypted the transmission between relays.
-
Cooperative algorithm to select the relays between the source and jam relay.
-