[1] Kavianpour A, Anderson M.An overview of wireless network security [C] //Proc of the 4th IEEE  Int Conf on Cyber Security and Cloud Computing (CSCloud).Piscataway, NJ: IEEE, 2017: 306-309 
[2] Moualeu J, Hamouda W, Takawira F.Intercept probability analysis of wireless networks in the presence of eavesdropping attack with co-channel interference [J].IEEE Access, 2018, 6(1): 41490-41503 
[3] Wang Xiaohui, Li Na, Li Meng, et al.A physical layer spoofing attack in spatial modulation [C] //Proc of the 2019 IEEE Globecom Workshops.Piscataway, NJ: IEEE, 2019: 1-5 
[4] Aldaghri N, Mahdavifar H. Physical layer secret key generation in static environments [J].IEEE Trans on Information Forensics and Security, 2020, 15(1): 2692-2705 
[5] 宋宇波,胡爱群,姚冰心.802.11i认证协议可验安全性形式化分析 [J] .中国工程科学,2010,12(1):67-73 
[6] Chatterjee U, Sadhukhan R, Mukhopadhyay D, et al.Stupify: A hardware countermeasure of kracks in WPA2 using physically unclonable functions [C] //Proc of the Web Conf 2020 (WWW’20).New York: ACM, 2020: 217–221 
[7] Song Yubo, Gao Shang, Hu Aiqun, et al.Novel attacks in OSPF networks to poison routing table [C] //Proc of the 2017 IEEE Int Conf on Communications (ICC).Piscataway, NJ: IEEE, 2017: 1-6 
[8] 郑瑞环,潘亚雄,胡勇.基于无线设备指纹的伪AP检测技术研究[J].信息安全研究,2020,6(5):441-447 
[9] 冯鑫,胡勇.在智能家居环境下基于CSI的伪AP检测研究[J] .信息安全研究,2018,4(02):163-169  
[10] Wan Xiaoyue, Xiao Liang, Li Qiangda, et al.FHY-layer authentication with multiple landmarks with reduced communication overhead [C] //Proc of the 2017 IEEE Int Conf on Communications (ICC).Piscataway, NJ: IEEE, 2017: 1-6 
[11] Mahmood A, Aman W, Iqbal M, et al.Channel impulse response-based distributed physical layer authentication [C] //Proc of the 85th IEEE  Vehicular Technology Conf (VTC).Piscataway, NJ: IEEE, 2017: 1-5 
[12] Yi C, Wen H, Song H, et al.Lightweight one-time password authentication scheme based on radio-frequency fingerprinting [J].IET Communications, 2018, 12(12): 1477-1484 
[13] Rahman M, Yasmeen A, Gross J.PHY layer authentication via drifting oscillators [C] //Proc of the IEEE Global Communications Conf (GLOBECOM).Piscataway, NJ: IEEE, 2014: 716-721 
[14] Liao Runfa, Wen Hong, Pan Fei, et al.A novel physical layer authentication method with convolutional neural network [C] //Proc of the IEEE Int Conf on Artificial Intelligence and Computer Applications (ICAICA).Piscataway, NJ: IEEE, 2019: 231–235 
[15] Shi Cong, Liu Jian, Liu Hongbo, et al.Smart user authentication through actuation of daily activities leveraging WiFi-enabled IoT [C] //Proc of the 18th ACM Int Symp on Mobile Ad Hoc Networking and Computing (Mobihoc’17).New York: ACM, 2017: 1–10 
	 
  |