Hybrid Physical-Layer Authentication

被引:0
|
作者
Xie, Ning [1 ]
Zhang, Jiaheng [1 ]
Zhang, Qihong [1 ]
Tan, Haijun [1 ]
Liu, Alex X. [2 ]
Niyato, Dusit [3 ]
机构
[1] Shenzhen Univ, Coll Elect & Informat Engn, Guangdong Key Lab Intelligent Informat Proc, Shenzhen Key Lab Media Secur, Shenzhen 518060, Guangdong, Peoples R China
[2] Midea Grp, Software Engn Inst, Foshan 528311, Guangdong, Peoples R China
[3] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
关键词
Programmable logic arrays; Authentication; Security; Robustness; Transmitters; Fading channels; Wireless communication; Physical-layer authentication; active; passive; hybrid; tradeoff; CHANNEL;
D O I
10.1109/TMC.2023.3235061
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physical-Layer Authentication (PLA) attracts a lot of research interests because of its significant advantages over upper-layer authentication mechanisms: high security and low complexity. The PLA schemes can be categorized into passive and active schemes. In this paper, we extensively leverage the advantages of both the active and passive schemes as a reference scheme, named as the Direct Hybrid (DH) scheme. Although the DH scheme improves the authentication performance of the prior PLA schemes, it has limitations, e.g., high communication overhead. Then, we further propose two hybrid PLA schemes to overcome the limitations of the DH scheme. The first proposed scheme further uses the advantage of the Challenge-Response Authentication Mechanism (CRAM) scheme, named as the CR-based Hybrid (CRH) scheme. Although both DH and CRH schemes significantly improve the authentication performance of the prior PLA schemes, they do not address one significant limitation of the active scheme, i.e., to set the power allocation of a tag empirically. Thus, based on the CRH scheme, we further propose the Adaptive CR-Based Hybrid (ACRH) scheme to adaptively set the parameter instead of the empirical setting. Moreover, we provide the theoretical analysis of the proposed schemes over wireless fading channels and derive their closed-form expressions in terms of the Probability of Detection (PD), Probability of False Alarm (PFA), and optimal threshold, respectively. At last, we discuss the advantages and disadvantages of the proposed schemes and give some useful suggestions for seeking a better tradeoff. Our experimental results show that, in comparison with the active scheme, the DH scheme has better robustness, and the CRH scheme has better both robustness and compatibility but it sacrifices the security. The ARCH scheme achieves a better tradeoff than the remaining schemes.
引用
收藏
页码:1295 / 1311
页数:17
相关论文
共 50 条
  • [1] Physical-layer authentication
    Yu, Paul L.
    Baras, John S.
    Sadler, Brian M.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) : 38 - 51
  • [2] Improving the Covertness in the Physical-Layer Authentication
    Xie, Ning
    Hu, TianXing
    [J]. CHINA COMMUNICATIONS, 2021, 18 (03) : 122 - 131
  • [3] Improving the Covertness in the Physical-Layer Authentication
    Ning Xie
    TianXing Hu
    [J]. China Communications, 2021, 18 (03) : 122 - 131
  • [4] A Novel Hybrid Physical-Layer Authentication Scheme for Multiuser Wireless Communication Systems
    Illi, Elmehdi
    Qaraqe, Marwa
    Bouanani, Faissal El
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (24) : 22591 - 22610
  • [5] Physical-Layer Authentication via a Dynamic Scaling
    LI Min
    JIANG Shaoquan
    LIAO Yongjian
    [J]. Chinese Journal of Electronics, 2020, 29 (04) : 651 - 659
  • [6] A Survey of Physical-Layer Authentication in Wireless Communications
    Xie, Ning
    Li, Zhuoyuan
    Tan, Haijun
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (01): : 282 - 310
  • [7] Detection of Jamming Attacks for the Physical-Layer Authentication
    Tan, Haijun
    Li, Zhuoyuan
    Xie, Ning
    Lu, Jian
    Niyato, Dusit
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (12) : 9579 - 9594
  • [8] An Optimization Framework for Active Physical-Layer Authentication
    Tan, Haijun
    Xie, Ning
    Liu, Alex X.
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (01) : 164 - 179
  • [9] Intrinsic Physical-Layer Authentication of Integrated Circuits
    Cobb, William E.
    Laspe, Eric D.
    Baldwin, Rusty O.
    Temple, Michael A.
    Kim, Yong C.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 14 - 24
  • [10] A Channel Coding Approach for Physical-Layer Authentication
    Wu, Xiaofu
    Ling, Cong
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2016,