The wireless medium offers many opportunities for broadcast communications. However, it also opens the possibility for attackers to eavesdrop the broadcast data or to pretend to be another node or device. These two attacks define the protection goals, namely, confidentiality and authenticity. Traditionally, both are solved by cryptographic approaches exploiting knowledge available in the surrounding infrastructure. The novel communication paradigms for the Internet of Things or cyber-physical systems do not scale with the standard cryptographic approach. Instead it is possible to exploit properties of the underlying physical channel to provide countermeasures against eavesdropping and impersonation attacks. Thereby, the random fading channel induces uncertainty which is detrimental but at the same time also helpful. In this paper, we review and describe a generalized model for physical-layer-based confidential data transmission and wireless authentication. A key role is played by the channel uncertainty and available design dimensions such as time, frequency, and space. We show that wireless authentication and secret-key generation can work in multicarrier and multiple-antenna systems and explain how even outdated channel state information can help to increase the available secure degrees of freedom. This survey focuses on the system design of wireless physical-layer confidentiality and authenticity under channel uncertainty. The insights could lead to a design of practical systems which are preparing the ground for confidentiality and authenticity already on the physical layer of the communication protocol stack.
机构:
College of Electronics and Information Engineering, Shenzhen University
Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security(Shenzhen University)College of Electronics and Information Engineering, Shenzhen University
Ning Xie
TianXing Hu
论文数: 0引用数: 0
h-index: 0
机构:
College of Electronics and Information Engineering, Shenzhen University
Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security(Shenzhen University)College of Electronics and Information Engineering, Shenzhen University
机构:
Institute of Information Security, Mianyang Normal UniversityInstitute of Information Security, Mianyang Normal University
LI Min
JIANG Shaoquan
论文数: 0引用数: 0
h-index: 0
机构:
Institute of Information Security, Mianyang Normal UniversityInstitute of Information Security, Mianyang Normal University
JIANG Shaoquan
LIAO Yongjian
论文数: 0引用数: 0
h-index: 0
机构:
School of Information and Software Engineering, University of Electronic Science and Technology of ChinaInstitute of Information Security, Mianyang Normal University
机构:
Mianyang Normal Univ, Inst Informat Secur, Mianyang 621006, Sichuan, Peoples R ChinaMianyang Normal Univ, Inst Informat Secur, Mianyang 621006, Sichuan, Peoples R China
Li, Min
Jiang, Shaoquan
论文数: 0引用数: 0
h-index: 0
机构:
Mianyang Normal Univ, Inst Informat Secur, Mianyang 621006, Sichuan, Peoples R ChinaMianyang Normal Univ, Inst Informat Secur, Mianyang 621006, Sichuan, Peoples R China
Jiang, Shaoquan
Liao, Yongjian
论文数: 0引用数: 0
h-index: 0
机构:
Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610054, Peoples R ChinaMianyang Normal Univ, Inst Informat Secur, Mianyang 621006, Sichuan, Peoples R China