PHY-Layer Authentication by Introducing Controlled Inter Symbol Interference

被引:0
|
作者
Kumar, Vireshwar [1 ]
Park, Jung-Min Jerry [1 ]
Clancy, T. Charles [1 ]
Bian, Kaigui [2 ]
机构
[1] Virginia Tech, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
[2] Peking Univ, Sch Elect Engn & Comp Sci, Beijing, Peoples R China
关键词
PHYSICAL-LAYER;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Spectrum security and enforcement is one of the major challenges that need to be addressed before spectrum-agile and opportunistic spectrum access technologies can be deployed. Rogue transmitters are a major threat to opportunistic spectrum access. One approach for deterring rogue transmissions is to enable receivers to authenticate or uniquely identify secondary transmitters. Although cryptographic mechanisms at the higher layers have been widely used to authenticate transmitters, the ability to authenticate transmitters at the physical (PHY) layer has a number of key advantages over higher-layer approaches. In existing schemes, the authentication signal is added to the message signal in such a way that the authentication signal appears as noise to the message signal and vice versa. Hence, existing schemes are constrained by a fundamental tradeoff between the message signal's signal-to-noise ratio (SNR) and the authentication signal's SNR. In this paper, we propose a novel PHY-layer authentication scheme called Precoded Duobinary Signaling for Authentication (P-DSA). P-DSA introduces some controlled amount of inter-symbol interference (ISI) into the data stream. The addition of the controlled ISI introduces redundancy in the message signal which can be utilized to embed the authentication signal. In this way, P-DSA relaxes the constraint on the aforementioned tradeoff. Our results show that P-DSA achieves superior detection performance compared to the prior art without sacrificing message throughput or increasing power.
引用
收藏
页码:10 / 18
页数:9
相关论文
共 50 条
  • [31] Post-Quantum PHY-Layer Authentication for Secure Initial Access in V2X Communications
    Xu, Dongyang
    Ritcey, James A.
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1758 - 1762
  • [32] PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks
    Xiao, Liang
    Li, Yan
    Han, Guoan
    Liu, Guolong
    Zhuang, Weihua
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (12) : 10037 - 10047
  • [33] Physical-layer Network Coding: A High Performance PHY-layer Decoder
    Ullah, Shakeel Salamat
    Liew, Soung Chang
    Lu, Lu
    You, Lizhao
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [34] Cross-Technology Communication via PHY-Layer Emulation
    Jiang, Wenchao
    Li, Zhijun
    Yin, Zhimeng
    Liu, Ruofeng
    Liu, Ling
    He, Tian
    PROCEEDINGS OF THE 15TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS (SENSYS'17), 2017,
  • [35] CodeRepair: PHY-layer Partial Packet Recovery Without the Pain
    Huang, Jun
    Xing, Guoliang
    Niu, Jianwei
    Lin, Shan
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [36] PHY-layer network coding for broadcast channel with side information
    Xue, Feng
    Sandhu, Sumeet
    2007 IEEE INFORMATION THEORY WORKSHOP, VOLS 1 AND 2, 2007, : 108 - 113
  • [37] PHY-layer fairness in amplify and forward cooperative diversity systems
    Michalopoulos, Diomidis S.
    Karagiannidis, George K.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (03) : 1073 - 1083
  • [38] Statistical inference attack against PHY-layer key extraction and countermeasures
    Zhu, Rui
    Shu, Tao
    Fu, Huirong
    WIRELESS NETWORKS, 2021, 27 (07) : 4853 - 4873
  • [39] Symmetric Key Generation from Imperfect Shared PHY-Layer Secrecy
    Shen, Chen
    Feng, Siyuan
    Sahin, Gokhan
    Choi, Hyeong-Ah
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [40] Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks
    Soosahabi, Reza
    Naraghi-Pour, Mort
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (04) : 1118 - 1126