Blind Tag-Based Physical-Layer Authentication

被引:0
|
作者
Wang, Chen [1 ]
Sha, Mingrui [1 ]
Xiong, Wei [1 ]
Xie, Ning [1 ]
Mao, Rui [2 ]
Zhang, Peichang [1 ]
Huang, Lei [1 ,3 ]
机构
[1] Shenzhen Univ, Coll Elect & Informat Engn, State Key Lab Radio Frequency Heterogeneous Integr, Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
[2] Shenzhen Univ, Coll Comp Sci & Software Engn, Guangdong Prov Key Lab Popular High Performance Co, Shenzhen 518060, Peoples R China
[3] Shenzhen Univ, Guangdong Key Lab Intelligent Informat Proc, Coll Elect & Informat Engn, Shenzhen, Peoples R China
基金
中国国家自然科学基金;
关键词
Programmable logic arrays; Security; Authentication; Robustness; Receivers; Transmitters; Communication system security; Physical layer authentication; blind; adaptive; closed form; trade-offs; SCHEME;
D O I
10.1109/TNET.2024.3430980
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In comparison with upper-layer authentication mechanisms, the tag-based Physical-Layer Authentication (PLA) attracts many research interests because of high security and low complexity. This paper mainly concerns two problems in prior tag-based PLA schemes, where the first one is extra overhead and vulnerability due to the reason that the parameter is broadcasted and the other one is the problem of setting the parameter empirically. Therefore, two new tag-based PLA schemes are proposed to address the above limitations. Specifically, a blind tag-based PLA scheme (BTP) is presented to achieve accurate authentication without knowing the tag parameter of the legitimate transmitter, which not only saves the communication overhead but also improves security. Then, an adaptive blind tag-based PLA scheme (ABTP) is further proposed, which adaptively sets the tag parameter according to the wireless channel state to achieve a better balance among robustness, security, and compatibility. Rigorous theoretical analyses are provided for the two proposed schemes and the prior schemes' performance comparisons are given. The accuracy of the theoretical analyses is verified through simulation results. At last, the advantages and disadvantages of the two proposed schemes are discussed, and suggestions are given according to different scenarios.
引用
收藏
页码:4735 / 4748
页数:14
相关论文
共 50 条
  • [1] Generalized Tag-Based Physical-Layer Authentication Under Frequency Selective Fading Channels
    Tan, Haijun
    Xie, Ning
    Lu, Jian
    Niyato, Dusit
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2023, 71 (05) : 2876 - 2890
  • [2] Multiple Cooperative Attackers for Tag-Based Physical Layer Authentication
    Cai, Yufeng
    Wang, Wenya
    Chen, Yicong
    Tan, Haijun
    Xie, Ning
    Wang, Jiangzhou
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (07) : 165 - 171
  • [3] Blind Physical-Layer Authentication Based on Composite Radio Sample Characteristics
    Li, Dongming
    Yang, Xuan
    Zhou, Fuhui
    Wang, Dawei
    Al-Dhahir, Naofal
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (10) : 6790 - 6803
  • [4] Tag Generation Using Chaotic Sequences for Physical-Layer Authentication
    Evangelista, Joao V. C.
    Moreno, Davi
    Chaves, Daniel P. B.
    Pimentel, Cecilio
    [J]. IEEE ACCESS, 2023, 11 : 73080 - 73087
  • [5] Physical-layer authentication
    Yu, Paul L.
    Baras, John S.
    Sadler, Brian M.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) : 38 - 51
  • [6] Physical-Layer Authentication for Internet of Things via WFRFT-Based Gaussian Tag Embedding
    Zhang, Ning
    Fang, Xiaojie
    Wang, Ye
    Wu, Shaohua
    Wu, Huici
    Kar, Dulal
    Zhang, Hongli
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09): : 9001 - 9010
  • [7] Hybrid Physical-Layer Authentication
    Xie, Ning
    Zhang, Jiaheng
    Zhang, Qihong
    Tan, Haijun
    Liu, Alex X.
    Niyato, Dusit
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (02) : 1295 - 1311
  • [8] Physical Layer Authentication Based on Tag Signal
    Song Huawei
    Jin Liang
    Zhang Shengjun
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (05) : 1066 - 1071
  • [9] Physical-Layer Authentication Based on Extreme Learning Machine
    Wang, Ning
    Jiang, Ting
    Lv, Shichao
    Xiao, Liang
    [J]. IEEE COMMUNICATIONS LETTERS, 2017, 21 (07) : 1557 - 1560
  • [10] A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution
    An, Yongli
    Zhang, Shikang
    Ji, Zhanlin
    [J]. IEEE ACCESS, 2021, 9 : 85947 - 85955