Type:
Conference Paper›Invited and refereed articles in conference proceedings
Authored by:
Yu, Paul L., Baras, John S., Sadler, Brian M.
Conference date:
June 23-27, 2008
Conference:
IEEE Workshop on Security and Privacy in Wireless Networks (IEEE SPAWN 2008), pp. 1-6
Full Text Paper:
Abstract:
Authentication is the process where claims of identity are verified. Though authentication mechanisms typically exist above the physical layer, physical layer methods have recently been introduced that do not require extra bandwidth. In this paper, we propose a multi-carrier extension to the work and consider the stealth and robustness tradeoffs. We conclude by discussing the power-reliability tradeoff and the applicability to cross-layer security.