A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution

被引:8
|
作者
An, Yongli [1 ]
Zhang, Shikang [1 ]
Ji, Zhanlin [1 ]
机构
[1] North China Univ Sci & Technol, Coll Informat Engn, Tangshan 063210, Peoples R China
来源
IEEE ACCESS | 2021年 / 9卷
关键词
Authentication; Watermarking; Security; Communication system security; Hash functions; Fault tolerant systems; Fault tolerance; wireless network; tag-based; hash algorithm; channel probing; MESSAGE AUTHENTICATION; GENERATION; PROTOCOL; INTERNET; THINGS; ATTACK;
D O I
10.1109/ACCESS.2021.3087508
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is the process of confirming the legal identity of communicating entities, and it is the first line of defense for security communication. Most of the existing tag-based physical layer security authentication (PLSA) requires distributing the shared keys in advance. In the large scale internet of things scenario, nodes frequently join and leave the wireless networks that cause the distribution and management of keys particularly difficult. This paper proposes a tag-based PLSA scheme, which utilizes channel characteristics instead of distributing keys to generate authentication tags. Specifically, based on watermarking mechanism, we design a fault-tolerant hash algorithm to couple the secret sequence and the message signal for authentication tags generation. The shared secret sequence is generated by legitimate nodes through channel probing. And the theories of information theory and composite hypothesis testing is employed to analyze the performance of system. The simulation results show that the agreement ratio of the generating shared secret sequence is as high as 96% in the case of high signal-to-noise ratio and low power tag embedding. In addition, performance analysis demonstrates the scheme can resist against multiple attacks, such as replay, jamming, tampering, and impersonation attack.
引用
收藏
页码:85947 / 85955
页数:9
相关论文
共 50 条
  • [31] RFID tag-based mutual authentication protocol with improved security for TMIS
    Chander, Bhanu
    Gopalakrishnan, Kumaravelan
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (3-4) : 383 - 405
  • [32] Post-Quantum PHY-Layer Authentication for Secure Initial Access in V2X Communications
    Xu, Dongyang
    Ritcey, James A.
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1758 - 1762
  • [33] Physical Layer Authentication Based on Tag Signal
    Song Huawei
    Jin Liang
    Zhang Shengjun
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (05) : 1066 - 1071
  • [34] AI-Based Abnormality Detection at the PHY-Layer of Cognitive Radio by Learning Generative Models
    Toma, Andrea
    Krayani, Ali
    Farrukh, Muhammad
    Qi, Haoran
    Marcenaro, Lucio
    Gao, Yue
    Regazzoni, Carlo S.
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2020, 6 (01) : 21 - 34
  • [35] Corridor-based Routing: Opening Doors to PHY-Layer Advances for Wireless Multihop Networks
    Loch, Adrian
    Hollick, Matthias
    Kuehne, Alexander
    Klein, Anja
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2014,
  • [36] Native Security Scheme Based on Physical Layer Chain Key for Encryption and Authentication
    Jin, Liang
    Hu, Xiaoyan
    Sun, Xiaoli
    Lou, Yangming
    Huang, Kaizhi
    Zhong, Zhou
    Xu, Xiaoming
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOPS (WCNCW), 2021,
  • [37] A multi-layer framework for personalized social tag-based applications
    Carminati, Barbara
    Ferrari, Elena
    Perego, Andrea
    DATA & KNOWLEDGE ENGINEERING, 2012, 79-80 : 62 - 86
  • [38] PHY-Layer Cover-Free Coding for Wireless Pilot Authentication in IoV Communications: Protocol Design and Ultra-Security Proof
    Xu, Dongyang
    Ren, Pinyi
    Ritcey, James A.
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 171 - 187
  • [39] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Sharma, Geeta
    Kalra, Sheetal
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (02) : 220 - 234
  • [40] A DWT-Based PHY Key Generation Scheme for the Cross-Layer Security in IoT Networks
    Liu, Fangfang
    Liu, Yueyi
    An, Wei
    Li, Xiaona
    IEEE COMMUNICATIONS LETTERS, 2024, 28 (06) : 1258 - 1262