LI Min, JIANG Shaoquan, LIAO Yongjian, “Physical-Layer Authentication via a Dynamic Scaling,” Chinese Journal of Electronics, vol. 29, no. 4, pp. 651-659, 2020, doi: 10.1049/cje.2020.05.009
Citation: LI Min, JIANG Shaoquan, LIAO Yongjian, “Physical-Layer Authentication via a Dynamic Scaling,” Chinese Journal of Electronics, vol. 29, no. 4, pp. 651-659, 2020, doi: 10.1049/cje.2020.05.009

Physical-Layer Authentication via a Dynamic Scaling

doi: 10.1049/cje.2020.05.009
Funds:  This work was supported by Sichuan Provincial Education Department Foundation (No.14ZA0257) and Mianyang Normal University Foundation (No.QD2012A02, No.QD2017A006).
  • Received Date: 2016-11-28
  • Rev Recd Date: 2019-01-24
  • Publish Date: 2020-07-10
  • Message authentication is a process that allows sender Alice to transmit a source state to receiver Bob such that the latter is assured of the authenticity. We study this problem in the physical-layer where the channel is degraded by a Rayleigh fading and a Gaussian noise. We propose an efficient construction for our problem. Our idea is to amplify a basic codeword of the source state with a small but dynamic scaling factor. This scaling factor is asymptotically 1. It thus essentially incurs no power expansion. Our authentication is achieved through a statistical test. Our scheme is provably secure and performs better than the related existing schemes. Further, our error analysis allows it to be realized with very practical parameters.
  • loading
  • E.N. Gilbert, F.J. MacWilliams and N.J. Sloane, “Codes which detect deception”, Bell System Technical Journal, Vol.53, No.3, pp.405-424, 1974.
    Y. Shen, Q. Pei and J. Ma, “Cooperative secrecy to resist authentication error in two-hop wireless networks”, Chinese Journal of Electronics, Vol.25, No.4, pp.746-752, 2016.
    Z. Jia, X. Wei, H. Guo, et al., “A privacy protection strategy for source location in WSN based on angle and dynamical adjustment of node emission radius”, Chinese Journal of Electronics, Vol.26, No.5, pp.1064-1072, 2017.
    J.G. Proakis and M. Salehi, Digital Communications, the fifth edition, McGraw-Hill Education, New York, USA, 2008.
    D. Tse and P. Viswanath, Fundamentals of Wireless Communication, Cambridge University Press, New York, USA, 2005.
    X. Wang, P. Hao and L. Hanzo, “Physical-layer authentication for wireless security enhancement: current challenges and future developments”, IEEE Communications Magazine, Vol.54, No.6, pp.152-158, 2016.
    Y. Zou, J. Zhu, X. Wang, et al., “A survey on wireless security: technical challenges, recent advances and future trends”, Proceedings of the IEEE, Vol.104, No.9, pp.1727-1265, 2016.
    W. Trappe, “The challenges facing physical layer security”, IEEE Communications Magazine, Vol.53, No.6, pp.16-20, 2015.
    D. Cao and W. Kang, “Message authentication with correlated sources”, IEEE Symposium on Information Theory 2015, Hong Kong, China, pp.2934-2938, 2015.
    K. Kittichokechai and G. Caire, “Secret key-based authentication with a privacy constraint”, IEEE Symposium on Information Theory 2015, Hong Kong, China, pp.1791-1795, 2015.
    S. Jiang, “Keyless authentication in a noisy model”, IEEE Transactions on Information Forensics and Security, Vol.9, No.6, pp.1024-1033, 2014.
    L. Xiao, L. Greenstein, N. Mandayam, et al., “Fingerprints in the ether: using the physical layer for wireless authentication”, Proceedings of IEEE International Conference on Communications 2007, Glasgow, Scotland, UK, pp.4646-4651, 2007.
    L. Xiao, L. Greenstein, N. Mandayam, et al., “Using the physical layer for wireless authentication in time-variant channels”, IEEE Transactions on Wireless Communications, Vol.7, No.7, pp.2571-2579, 2008.
    P. Baracca, N. Laurenti and S. Tomasin, “Physical layer authentication over MIMO fading wiretap channels”, IEEE Transactions on Wireless Communications, Vol.11, No.7, pp.2564-2573, 2012.
    H. Wen, Physical Layer Approaches for Securing Wireless Communication Systems, Springer-Verlag, New York, USA, 2013.
    H. Song, L. Jin and S. Zhang, “Physical layer authentication based on tag signal”, Journal of Electronics & Information Technology, Vol.40, No.5, pp.1066-1071, 2018(in Chinese).
    N. Wang, T. Jiang, S. Lv, et al., “Physical-layer authentication based on extreme learning machine, IEEE Communications Letters, Vol.21, No.7, pp.1557-1560, 2017.
    W. Hou, X. Wang and J. Chouinard, “Physical layer authentication in OFDM systems based on hypothesis testing of CFO estimates”, Proceedings of IEEE International Conference on Communications 2012, Ottawa, Ontario, Canada, pp.3559-3563, 2012.
    M.M. Rahman, Q.H. Abbasi, N. Chopra, et al., “Physical layer authentication in Nano networks at terahertz frequencies for biomedical applications”, IEEE Access, Vol.5, pp.7808-7815, 2017.
    D. Shan, K. Zeng, W. Xiang, et al., “PHY-CRAM: Physical layer challenge-response authentication mechanism for wireless networks”, IEEE Journal on Selected Areas in Communications, Vol.31, No.9, pp.1817-1827, 2013.
    J. Liu and X. Wang, “Physical layer authentication enhancement using two-dimensional channel quantization”, IEEE Transactions on Wireless Communications, Vol.15, No.6, pp.4171-4182, 2016.
    E. Martinian, G.W. Wornell and B. Chen, “Authentication with distortion criteria”, IEEE Transactions on Information Theory, Vol.51, No.7, pp.2523-2542, 2005.
    G.D. Crescenzo, R.F. Graveman, R. Ge, et al., “Approximate message authentication and biometric entity authentication”, Proc. Int. Conf. Financial Cryptography 2005, Roseau, Dominica, pp.240-254, 2005.
    P.L. Yu, J.S. Baras and B.M. Sadler, “Physical-layer authentication”, IEEE Transactions on Information Forensics and Security, Vol.3, No.1, pp.38-51, 2008.
    D. Xu, P. Ren, J. A. Ritcey, et al., “Code-frequency block group coding for anti-spoofing pilot authentication in multi-antenna OFDM systems”, IEEE Transactions on Information Forensics and Security, Vol.13, No.7, pp.1778-1793, 2018.
    A. Swaminathan, Y. Mao and M. Wu, “Robust and secure image hashing”, IEEE Transactions on Information Forensics and Security, Vol.1, No.2, pp.215-230, 2006.
    G. Verma, P. Yu and B.M. Sadler, “Physical layer authentication via fingerprint embedding using softwaredefined radios”, IEEE Access, Vol.3, pp.81-88, 2015.
    P.L. Yu, G. Verma and B. Sadler, “Wireless physical layer authentication via fingerprint embedding”, IEEE Communications Magazine, Vol.53, No.6, pp.48-53, 2015.
    P.L. Yu and B. Sadler, “MIMO authentication via deliberate fingerprinting at the physical layer”, IEEE Transactions on information forensics and security, Vol.6, No.3, pp.606-615, Sep. 2011.
    P.L. Yu, J.B. Perazzone, B.M. Sadler, et al., “Authenticated side channel via physical layer fingerprinting”, Proc. IEEE Conf. Commun. Netw. Secur. 2016(CNS), Philadelphia, PA, USA, pp.631-635, 2016.
    J.B. Perazzone, P.L. Yu, B.M. Sadler, et al., “Cryptographic side-channel signaling and authentication via fingerprint embedding”, IEEE Transactions on Information Forensics and Security, Vol.13, No.9, pp.2216-2225, 2018.
    J. Liu, X. Wang and H. Tang, “Physical layer authentication enhancement using maximum SNR ratio based cooperative AF relaying”, Wireless Communications and Mobile Computing, Vol.2017, Article ID 7206187, 16 pages, 2017.
    Q. Wang, “A novel physical layer assisted authentication scheme for mobile wireless sensor networks”, Sensors, Vol.17, No.2, Article ID 289, 16 pages, 2017.
    O. Goldreich, S. Goldwasser amd S. Micali, “How to construct random functions”, Journal of the ACM, Vol.33, No.4, pp.792-807, 1986.
    J.E. Hershey, A.A. Hassan and R. Yarlagadda, “Unconventional cryptographic keying variable management”, IEEE Transactions on Communications, Vol.43, No.1, pp.3-6, Jan. 1995.
    S. Gollakota and D. Katabi, “Physical layer wireless security made fast and channel independent”, Proc. 30th Annu. IEEE Int. Conf. Comput. Commun., Shanghai, China, pp.1125-1133, 2011.
    Y. Shehadeh, O. Alfandi, K. Tout, et al., “Intelligent mechanisms for key generation from multipath wireless channels”, Proc. Wireless Telecommun. Symp., New York, NY, USA, pp.1-6, 2011.
    K. Zeng, D. Wu, A. Chan, et al., “Exploiting multipleantenna diversity for shared secret key generation in wireless networks”, Proc. 29th Annu. IEEE Int. Conf. Comput. Commun., San Diego, CA, USA, pp.1837-1845, 2010.
    G. Casella and R.L. Berger, Statistical Inference, the second edition, Duxbury Press, 2001.
    M. Biguesh and A. Gershman, “Training-based MIMO channel estimation, a study of estimator tradeoffs and optimal training signals”, IEEE Transactions on Signal Processing, Vol.54, No.3, pp.884-893, 2006.
    E. Björnson and B. Ottersten, “A framework for trainingbased estimation in arbitrarily correlated Rician MIMO channels with Rician disturbance”, IEEE Transactions on Signal Processing, Vol.58, No.3, pp.1807-1820, 2010.
    P. Stănică, “Good lower and upper bounds on binomial coefficients”, Journal of Inequalities in Pure and Applied Mathematics, Vol.2, No.3, article 30, 2001.
    U. Maurer, “Authentication theory and hypothesis testing”, IEEE Transactions on Information Theory, Vol.46, No.4, pp.1350-1356, 2000.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (399) PDF downloads(142) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return