Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing

被引:66
|
作者
Jorswieck, Eduard [1 ]
Tomasin, Stefano [2 ,3 ]
Sezgin, Aydin [4 ]
机构
[1] Tech Univ Dresden, Commun Lab, Commun Theory Grp, D-01062 Dresden, Germany
[2] Univ Padua, DEI, I-35131 Padua, Italy
[3] Huawei Technol, France Res Ctr, Math & Algorithm Sci Lab, Issy Les Moulineaux, France
[4] Ruhr Univ Bochum, Inst Digital Commun Syst, D-44801 Bochum, Germany
关键词
Authentication; broadcast channel; channel state information (CSI); channel uncertainty; delayed CSI; multi-carrier transmission; multiple-antenna systems; physical-layer security; secret-key agreement; wireless authentication; wire-tap channel; MIMO WIRETAP CHANNELS; SECRECY CAPACITY; RESOURCE-ALLOCATION; INFORMATION; COMMUNICATION; TRANSMISSION; PERFORMANCE; SECURITY; CODES; NOISE;
D O I
10.1109/JPROC.2015.2469602
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The wireless medium offers many opportunities for broadcast communications. However, it also opens the possibility for attackers to eavesdrop the broadcast data or to pretend to be another node or device. These two attacks define the protection goals, namely, confidentiality and authenticity. Traditionally, both are solved by cryptographic approaches exploiting knowledge available in the surrounding infrastructure. The novel communication paradigms for the Internet of Things or cyber-physical systems do not scale with the standard cryptographic approach. Instead it is possible to exploit properties of the underlying physical channel to provide countermeasures against eavesdropping and impersonation attacks. Thereby, the random fading channel induces uncertainty which is detrimental but at the same time also helpful. In this paper, we review and describe a generalized model for physical-layer-based confidential data transmission and wireless authentication. A key role is played by the channel uncertainty and available design dimensions such as time, frequency, and space. We show that wireless authentication and secret-key generation can work in multicarrier and multiple-antenna systems and explain how even outdated channel state information can help to increase the available secure degrees of freedom. This survey focuses on the system design of wireless physical-layer confidentiality and authenticity under channel uncertainty. The insights could lead to a design of practical systems which are preparing the ground for confidentiality and authenticity already on the physical layer of the communication protocol stack.
引用
收藏
页码:1702 / 1724
页数:23
相关论文
共 50 条
  • [1] Physical-layer authentication
    Yu, Paul L.
    Baras, John S.
    Sadler, Brian M.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) : 38 - 51
  • [2] Hybrid Physical-Layer Authentication
    Xie, Ning
    Zhang, Jiaheng
    Zhang, Qihong
    Tan, Haijun
    Liu, Alex X.
    Niyato, Dusit
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (02) : 1295 - 1311
  • [3] Improving the Covertness in the Physical-Layer Authentication
    Xie, Ning
    Hu, TianXing
    CHINA COMMUNICATIONS, 2021, 18 (03) : 122 - 131
  • [4] Improving the Covertness in the Physical-Layer Authentication
    Ning Xie
    TianXing Hu
    中国通信, 2021, 18 (03) : 122 - 131
  • [5] Physical-Layer Authentication via a Dynamic Scaling
    LI Min
    JIANG Shaoquan
    LIAO Yongjian
    ChineseJournalofElectronics, 2020, 29 (04) : 651 - 659
  • [6] A Survey of Physical-Layer Authentication in Wireless Communications
    Xie, Ning
    Li, Zhuoyuan
    Tan, Haijun
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (01): : 282 - 310
  • [7] An Optimization Framework for Active Physical-Layer Authentication
    Tan, Haijun
    Xie, Ning
    Liu, Alex X.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (01) : 164 - 179
  • [8] Intrinsic Physical-Layer Authentication of Integrated Circuits
    Cobb, William E.
    Laspe, Eric D.
    Baldwin, Rusty O.
    Temple, Michael A.
    Kim, Yong C.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 14 - 24
  • [9] Detection of Jamming Attacks for the Physical-Layer Authentication
    Tan, Haijun
    Li, Zhuoyuan
    Xie, Ning
    Lu, Jian
    Niyato, Dusit
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (12) : 9579 - 9594
  • [10] Physical-Layer Authentication via a Dynamic Scaling
    Li, Min
    Jiang, Shaoquan
    Liao, Yongjian
    CHINESE JOURNAL OF ELECTRONICS, 2020, 29 (04) : 651 - 659