Arifeen MM, Islam AA, Rahman MM, Taher KA, Islam MM, Kaiser MS (2019) ANFIS based trust management model to enhance location privacy in underwater wireless sensor networks. 2019 international conference on electrical, computer and communication engineering (ECCE), Cox’s bazar, bangladesh. Doi:https://doi.org/10.1109/ECACE.2019.8679165
Chen Y (2014) Time-Reversal Wireless Paradigm for Green Internet of Things:An Overview. IEEE Internet of Things Journal, 1(1), 81-98. Doi:https://doi.org/10.1109/JIOT.2014.2308838
Diamant R, Casari P, Tomasin S (2019) Cooperative authentication in underwater acoustic sensor networks. IEEE transactions on wireless communications, 18(2), 954-968. Doi:https://doi.org/10.1109/TWC.2018.2886896
Han G, Jiang J, Shu L, Guizani M (2015) An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network. IEEE Transactions on Mobile Computing, 14(12), 2447-2459. Doi:https://doi.org/10.1109/TMC.2015.2402120
Huang Y, Xiao P, Zhou S, Shi Z (2016) A half-duplex self-protection jamming approach for improving secrecy of block transmissions in underwater acoustic channels. IEEE sensors journal, 16(11), 4100-4109. Doi:https://doi.org/10.1109/JSEN.2015.2446465
Liao RF (2020) Multiuser physical layer authentication in internet of things with data augmentation. IEEE internet of things journal. 73, 2077-2088, Doi:https://doi.org/10.1109/JIOT.2019.2960099
Liu J, Refaey A, Wang X, Tang H (2015) Reliability enhancement for CIR-based physical layer authentication. Secur. Commun. Netw, 8(4), 661-671.
Liu J, Wang X (2016) Physical layer authentication enhancement using two-dimensional channel quantization. IEEE transactions on wireless communications, 15(6), 4171-4182. Doi:https://doi.org/10.1109/TWC.2016.2535442
Paris JF (2014) Statistical Characterization of κ-μShadowed Fading. IEEE Transactions on Vehicular Technology, 63(2), 518-526. Doi:https://doi.org/10.1109/TVT.2013.2281213
Su Y, Ma S, Zhang H, Jin Z, Fu X (2021) A redeemable SVM-DS fusion-based trust management mechanism for underwater acoustic sensor networks. IEEE sensors journal, 21(22), 26161-26174. Doi:https://doi.org/10.1109/JSEN.2021.3117056
Xiao L, Greenstein LJ, Mandayam NB, Trappe W (2008) Using the physical layer for wireless authentication in time-variant channels. IEEE Transactions on Wireless Communications, 7(7), 2571-2579.
Xie N, Chen J, Huang L (2021) Physical-layer authentication using multiple channel-based features. IEEE transactions on information forensics and security, 16, 2356-2366. Doi:https://doi.org/10.1109/TIFS.2021.3054534
Zeng K, Govindan K, Mohapatra P (2010) Non-cryptographic authentication and identification in wireless networks. IEEE Wireless Communications, 17(5), 56-62.
Zhao R, Khalid M, Dobre OA, Wang X (2022) Physical Layer Node Authentication in Underwater Acoustic Sensor Networks Using Time-Reversal. IEEE Sensors Journal, 22(4), 3796-3809. Doi:https://doi.org/10.1109/JSEN.2022.3142160
Zhou H, He D, Wang H (2020) Joint relay and jammer selection for secure cooperative networks with a full-duplex active eavesdropper. IET Communications, 14(6), 1043-1055.