Power Allocation Tradeoffs in Multicarrier Authentication Systems
MARYLAND UNIV COLLEGE PARK
Pagination or Media Count:
Physical layer authentication techniques exploit signal characteristics to uniquely identify radios. We describe how multicarrier systems may use such techniques to stealthily authenticate while maintaining high levels of security and robustness. We show that with channel state information CSI at the transmitter and receiver, multicarrier authentication systems can further improve performance by carefully allocating the authentication power over each carrier.
- Radiofrequency Wave Propagation
- Radio Communications