A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution

被引:8
|
作者
An, Yongli [1 ]
Zhang, Shikang [1 ]
Ji, Zhanlin [1 ]
机构
[1] North China Univ Sci & Technol, Coll Informat Engn, Tangshan 063210, Peoples R China
来源
IEEE ACCESS | 2021年 / 9卷
关键词
Authentication; Watermarking; Security; Communication system security; Hash functions; Fault tolerant systems; Fault tolerance; wireless network; tag-based; hash algorithm; channel probing; MESSAGE AUTHENTICATION; GENERATION; PROTOCOL; INTERNET; THINGS; ATTACK;
D O I
10.1109/ACCESS.2021.3087508
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is the process of confirming the legal identity of communicating entities, and it is the first line of defense for security communication. Most of the existing tag-based physical layer security authentication (PLSA) requires distributing the shared keys in advance. In the large scale internet of things scenario, nodes frequently join and leave the wireless networks that cause the distribution and management of keys particularly difficult. This paper proposes a tag-based PLSA scheme, which utilizes channel characteristics instead of distributing keys to generate authentication tags. Specifically, based on watermarking mechanism, we design a fault-tolerant hash algorithm to couple the secret sequence and the message signal for authentication tags generation. The shared secret sequence is generated by legitimate nodes through channel probing. And the theories of information theory and composite hypothesis testing is employed to analyze the performance of system. The simulation results show that the agreement ratio of the generating shared secret sequence is as high as 96% in the case of high signal-to-noise ratio and low power tag embedding. In addition, performance analysis demonstrates the scheme can resist against multiple attacks, such as replay, jamming, tampering, and impersonation attack.
引用
收藏
页码:85947 / 85955
页数:9
相关论文
共 50 条
  • [21] Exploiting Channel Gain and Phase Noise for PHY-Layer Authentication in Massive MIMO Systems
    Zhang, Pinchang
    Liu, Jun
    Shen, Yulong
    Jiang, Xiaohong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4265 - 4279
  • [22] A New Fuzzy Key Generation Method Based on PHY-Layer Fingerprints in Mobile Cognitive Radio Networks
    Gao, Ning
    Jing, Xiaojun
    Sun, Songlin
    Mu, Junsheng
    Lu, Xiang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3414 - 3434
  • [23] Enhancing PHY-Layer Authentication in RIS-Assisted IoT Systems With Cascaded Channel Features
    He, Ji
    Niu, Mu
    Zhang, Pinchang
    Qin, Changjian
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (14): : 24984 - 24997
  • [24] Empirical Statistical Inference Attack Against PHY-layer Key Extraction in Real Environments
    Zhu, Rui
    Shu, Tao
    Fu, Huirong
    MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 46 - 51
  • [25] Generalized Tag-Based Physical-Layer Authentication Under Frequency Selective Fading Channels
    Tan, Haijun
    Xie, Ning
    Lu, Jian
    Niyato, Dusit
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2023, 71 (05) : 2876 - 2890
  • [26] PHY-Layer Authentication Exploiting Channel Sparsity in MmWave MIMO UAV-Ground Systems
    Teng, Yulin
    Zhang, Pinchang
    Chen, Xiao
    Jiang, Xiaohong
    Xiao, Fu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4642 - 4657
  • [27] Physical layer authentication scheme with channel based tag padding sequence
    Ran, Yachao
    Al-Shwaily, Harith
    Tang, Chaoqing
    Tian, Gui Yun
    Johnston, Martin
    IET COMMUNICATIONS, 2019, 13 (12) : 1776 - 1780
  • [28] Exploiting Fine-Grained Channel/Hardware Features for PHY-Layer Authentication in MmWave MIMO Systems
    Liu, Yangyang
    Zhang, Pinchang
    Liu, Jun
    Shen, Yulong
    Jiang, Xiaohong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4059 - 4074
  • [29] Exploiting Cascaded Channel Signature for PHY-Layer Authentication in RIS-Enabled UAV Communication Systems
    Qin, Changjian
    Niu, Mu
    Zhang, Pinchang
    He, Ji
    DRONES, 2024, 8 (08)
  • [30] A key distribution scheme with authentication for ZigBee
    Yu, Bin
    Yang, Tong-Hao
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2012, 34 (09): : 2277 - 2281