Analysis of Challenge-Response Authentication With Reconfigurable Intelligent Surfaces

被引:0
|
作者
Tomasin, Stefano [1 ,2 ,3 ]
Elwakeel, Tarek N. M. M. [1 ,4 ]
Guglielmi, Anna Valeria [1 ]
Maes, Robin [5 ]
Noels, Nele [5 ]
Moeneclaey, Marc [5 ]
机构
[1] Univ Padua, Dept Informat Engn, I-35122 Padua, Italy
[2] Univ Padua, Dept Math, I-35122 Padua, Italy
[3] Consorzio Interuniv Telecomunicazioni CNIT, I-43124 Parma, Italy
[4] HPE, I-36050 Bolzano Vicentino, Italy
[5] Univ Ghent, Dept Telecommun & Informat Proc, B-9000 Ghent, Belgium
关键词
Authentication; Security; Reconfigurable intelligent surfaces; Channel estimation; Signal to noise ratio; Transmitting antennas; Telecommunications; Europe; Baseband; Base stations; Challenge-response (CR) authentication; physical-layer authentication (PLA); reconfigurable intelligent surface (RIS); PHYSICAL LAYER AUTHENTICATION; MIMO TRANSMISSION; DESIGN;
D O I
10.1109/TIFS.2024.3471185
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Physical-layer authentication (PLA) mechanisms exploit signals exchanged at the physical layer of communication systems to confirm the sender of a received message. In this paper, we propose a novel challenge-response PLA (CR-PLA) mechanism for a cellular system that leverages the reconfigurability property of a reconfigurable intelligent surface (RIS) (under the control of the verifier) in an authentication mechanism. In CR-PLA, the verifier base station (BS) sets a random RIS configuration, which remains secret to the intruder, and then checks that the resulting estimated channel is modified correspondingly. In fact, for a message sent by an attacker in a different location than the legitimate user equipment (UE), the BS will estimate a different channel and the message will be rejected as fake. Such a solution reduces the communication and computational overhead with respect to higher-layer cryptographic authentication. We derive the maximum a-posteriori attack when the attacker observes a correlated channel and the reconfigurable intelligent surface (RIS) has many elements, and the attacker transmits to Bob either directly or through the RIS. Using a generalized likelihood ratio test to test the authenticity at the base station (BS), we derive approximate expressions of the false alarm and misdetection probabilities when both the BS and the UE have a single antenna each, while the RIS has a large number of elements. We also evaluate the trade-off between security and communication performance, since choosing a random RIS configuration reduces the data rate. Moreover, we investigate the impact of various parameters (e.g., the RIS randomness, the number of RIS elements, and the operating signal-to-noise ratio) on security and communication performance.
引用
收藏
页码:9494 / 9507
页数:14
相关论文
共 50 条
  • [1] Analysis of Challenge-Response Authentication in a Networked Control System
    Rzasa, Wojciech
    Rzonca, Dariusz
    Stec, Andrzej
    Trybus, Bartosz
    COMPUTER NETWORKS, 2012, 291 : 271 - 279
  • [2] LIMITATIONS OF CHALLENGE-RESPONSE ENTITY AUTHENTICATION
    MITCHELL, C
    ELECTRONICS LETTERS, 1989, 25 (17) : 1195 - 1196
  • [3] ENTITY AUTHENTICATION BASED ON CHALLENGE-RESPONSE TECHNIQUES
    Oros, Horea
    Boian, Florian M.
    KEPT 2009: KNOWLEDGE ENGINEERING PRINCIPLES AND TECHNIQUES, 2009, : 373 - +
  • [4] Challenge-Response Authentication Scheme With Chaotic Lasers
    Annovazzi-Lodi, Valerio
    Lombardi, Lorenzo
    Aromataris, Giuseppe
    IEEE JOURNAL OF QUANTUM ELECTRONICS, 2022, 58 (01)
  • [5] Challenge-response based ACK message authentication
    Park, Min-Ho
    ELECTRONICS LETTERS, 2012, 48 (16) : 1021 - 1022
  • [6] 2-clickAuth - Optical Challenge-Response Authentication
    Vapen, Anna
    Byers, David
    Shahmehri, Nahid
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 79 - 86
  • [7] Off-Path Hacking: The Illusion of Challenge-Response Authentication
    Gilad, Yossi
    Herzberg, Amir
    Shulman, Haya
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 68 - 77
  • [8] VELODY: Nonlinear Vibration Challenge-Response for Resilient User Authentication
    Li, Jingjie
    Fawaz, Kassem
    Kim, Younghyun
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1201 - 1213
  • [9] Physical Layer Challenge-Response Authentication in Wireless Networks with Relay
    Du, Xianru
    Shan, Dan
    Zeng, Kai
    Huie, Lauren
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 1276 - 1284
  • [10] A Challenge-Response Authentication for RFID Using Enhanced-Trivium
    Wang, Siye
    Zhang, Shiyong
    Liu, Lifeng
    Chen, Gongliang
    2016 INTERNATIONAL CONFERENCE ON SECURITY OF SMART CITIES, INDUSTRIAL CONTROL SYSTEM AND COMMUNICATIONS (SSIC), 2016,