A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution

被引:8
|
作者
An, Yongli [1 ]
Zhang, Shikang [1 ]
Ji, Zhanlin [1 ]
机构
[1] North China Univ Sci & Technol, Coll Informat Engn, Tangshan 063210, Peoples R China
来源
IEEE ACCESS | 2021年 / 9卷
关键词
Authentication; Watermarking; Security; Communication system security; Hash functions; Fault tolerant systems; Fault tolerance; wireless network; tag-based; hash algorithm; channel probing; MESSAGE AUTHENTICATION; GENERATION; PROTOCOL; INTERNET; THINGS; ATTACK;
D O I
10.1109/ACCESS.2021.3087508
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is the process of confirming the legal identity of communicating entities, and it is the first line of defense for security communication. Most of the existing tag-based physical layer security authentication (PLSA) requires distributing the shared keys in advance. In the large scale internet of things scenario, nodes frequently join and leave the wireless networks that cause the distribution and management of keys particularly difficult. This paper proposes a tag-based PLSA scheme, which utilizes channel characteristics instead of distributing keys to generate authentication tags. Specifically, based on watermarking mechanism, we design a fault-tolerant hash algorithm to couple the secret sequence and the message signal for authentication tags generation. The shared secret sequence is generated by legitimate nodes through channel probing. And the theories of information theory and composite hypothesis testing is employed to analyze the performance of system. The simulation results show that the agreement ratio of the generating shared secret sequence is as high as 96% in the case of high signal-to-noise ratio and low power tag embedding. In addition, performance analysis demonstrates the scheme can resist against multiple attacks, such as replay, jamming, tampering, and impersonation attack.
引用
收藏
页码:85947 / 85955
页数:9
相关论文
共 50 条
  • [1] Tag-Based PHY-Layer Authentication for RIS-Assisted Communication Systems
    Zhang, Pinchang
    Teng, Yulin
    Shen, Yulong
    Jiang, Xiaohong
    Xiao, Fu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4778 - 4792
  • [2] Lightweight Tag-Based PHY-Layer Authentication for IoT Devices in Smart Cities
    Zhang, Pinchang
    Liu, Jun
    Shen, Yulong
    Li, Hewu
    Jiang, Xiaohong
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05): : 3977 - 3990
  • [3] PHY-Layer Key Exchange for Wireless Communication
    Roogi, Shashikala B.
    Kounte, Manjunath R.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 293 - 299
  • [4] Learning-Based PHY-Layer Authentication for Underwater Sensor Networks
    Xiao, Liang
    Sheng, Geyi
    Wan, Xiaoyue
    Su, Wei
    Cheng, Peng
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (01) : 60 - 63
  • [5] PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead
    Xiao, Liang
    Wan, Xiaoyue
    Han, Zhu
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (03) : 1676 - 1687
  • [6] Blind Tag-Based Physical-Layer Authentication
    Wang, Chen
    Sha, Mingrui
    Xiong, Wei
    Xie, Ning
    Mao, Rui
    Zhang, Peichang
    Huang, Lei
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, : 4735 - 4748
  • [7] Neural Network Based PHY-Layer Key Exchange for Wireless Communications
    Karas, Dimitrios S.
    Karagiannidis, George K.
    Schober, Robert
    2011 IEEE 22ND INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2011, : 1233 - 1238
  • [8] PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement
    Kumar, Vireshwar
    Park, Jung-Min
    Bian, Kaigui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) : 1027 - 1038
  • [9] PHY-Layer Authentication Using Hierarchical Modulation and Duobinary Signaling
    Kumar, Vireshwar
    Park, Jung-Min Jerry
    Clancy, T. Charles
    Bian, Kaigui
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2014, : 782 - 786
  • [10] PHY-Layer Authentication by Introducing Controlled Inter Symbol Interference
    Kumar, Vireshwar
    Park, Jung-Min Jerry
    Clancy, T. Charles
    Bian, Kaigui
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 10 - 18