Abstract

As the request for network access and a variety of services, the Internet of Things (IoT) has evolved from special networks with simple functions to global information infrastructure, challenging the current authentication mechanism. Due to the dense population in the massive IoT scenario, the increasing connectivity requirements may aggravate the load of the authentication entity and increase the corresponding processing delay, which may further jeopardize the service and affect the quality of the experience. To solve this problem, especially for the case in which the authentication infrastructure is unavailable, a physical layer authentication method is proposed in this paper, which is based on modified physical authentication flow, a modified PDA algorithm based on soft information, and authentication key randomization based on hash mapping. Through Monte Carlo simulations, it is observed that the proposed physical layer authentication mechanism shows a favorable gain compared with that of the existing methods.

Highlights

  • In the era of the Internet of Things (IoT), all devices that can benefit from Internet connections will be connected, as depicted in figure 1, which may cause explosive growth of the IoT size

  • OF THE PHYSICAL LAYER AUTHENTICATION MECHANISM Physical layer security authentication is an effective supplement to the application layer and transport layer authentication mechanism

  • Compared with the traditional security authentication mechanism, the physical layer authentication mechanism mainly encrypts data at the ‘‘information level’’ to prevent information from being divulged and tampered with, which utilizes the randomness, reciprocity and time-varying property of the wireless channel to improve the security of wireless networks

Read more

Summary

A Reliable Physical Layer Authentication Algorithm for Massive IoT Systems

This work was supported in part by the Natural Science Foundation of Liaoning Province China under Grant 2019-ZD-0220, in part by the Aeronautical Science Foundation of China under Grant 201926054002, in part by the National Research Foundation of Korea (NRF) Funded by the Korea Government (Ministry of Science and ICT) under Grant 2017R1E1A1A01077913, and in part by the Global Infrastructure Program through the National Research Foundation of Korea (NRF) Funded by the Ministry of Science and ICT under Grant NRF-2018K1A3A1A20026485.

INTRODUCTION
3: After receiving
MODIFIED AUTHENTICATION FLOW
MODIFIED PDA ALGORITHM
SHARED KEY IDENTIFICATION
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call