Abstract

Authentication is the process of confirming the legal identity of communicating entities, and it is the first line of defense for security communication. Most of the existing tag-based physical layer security authentication (PLSA) requires distributing the shared keys in advance. In the large scale internet of things scenario, nodes frequently join and leave the wireless networks that cause the distribution and management of keys particularly difficult. This paper proposes a tag-based PLSA scheme, which utilizes channel characteristics instead of distributing keys to generate authentication tags. Specifically, based on watermarking mechanism, we design a fault-tolerant hash algorithm to couple the secret sequence and the message signal for authentication tags generation. The shared secret sequence is generated by legitimate nodes through channel probing. And the theories of information theory and composite hypothesis testing is employed to analyze the performance of system. The simulation results show that the agreement ratio of the generating shared secret sequence is as high as 96% in the case of high signal-to-noise ratio and low power tag embedding. In addition, performance analysis demonstrates the scheme can resist against multiple attacks, such as replay, jamming, tampering, and impersonation attack.

Highlights

  • With the vigorous development of the fifth generation (5G) communication technology, the data traffic of wireless networks has experienced unprecedented growth [1], [2], and the security authentication problems of wireless communication has become increasingly severe

  • According to different authentication methods, Physical layer security authentication (PLSA) can be divided into two categories, one is to utilize the wireless channel fingerprints, e.g. channel state information (CSI), and radio frequency fingerprints directly for authentication; the other is through the use of hash function and signal processing technology to realize the joint processing and utilization of shared private keys and signal endogenous features, thereby improving the accuracy of legal device information authentication [6]-[9]

  • To address the aforementioned problems, this paper proposes a tag-based PLSA scheme based on the channel key generation theories, which utilizes the channel characteristics between legitimate nodes to generate a shared secret sequence

Read more

Summary

INTRODUCTION

With the vigorous development of the fifth generation (5G) communication technology, the data traffic of wireless networks has experienced unprecedented growth [1], [2], and the security authentication problems of wireless communication has become increasingly severe. According to different authentication methods, PLSA can be divided into two categories, one is to utilize the wireless channel fingerprints, e.g. channel state information (CSI), and radio frequency fingerprints directly for authentication; the other is through the use of hash function and signal processing technology to realize the joint processing and utilization of shared private keys and signal endogenous features, thereby improving the accuracy of legal device information authentication [6]-[9] Among them, this type of schemes that realizes authentication through the joint design of keys and information transmission methods has better security performance and more extensive applications. The inability to obtain a consistent shared secret key is intolerable to the authentication mechanisms, which utilize the hash functions to generate authentication codes

CSI-BASED AND WATERMARKING BASED AUTHENTICATION
RELATED WORKS
SYSTEM MODEL
SIGNAL MODEL
CHANNEL MODEL
AUTHENTICATION FRAMEWORK
CHANNEL ESTIMATION
TAG GENERATION AND EMBEDDING OF TRANSMITTER
TAG GENERATION AND EXTRACTION OF RECEIVER
AUTHENTICATION
ROBUSTNESS
AUTHENTICATION PERFORMANCE
SECURITY PERFORMANCE
CHALLENGES AND FUTURE RESEARCH DIRECTIONS
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.