Analysis of Channel-Based User Authentication by Key-Less and Key-Based Approaches

被引:23
|
作者
Tomasin, Stefano [1 ,2 ]
机构
[1] Univ Padua, Dept Informat Engn, I-35122 Padua, Italy
[2] Consorzio Nazl Interuniv Telecomunicaz, Padova Res Unit, I-43124 Padua, Italy
关键词
Physical layer authentication; physical layer security; Rayleigh fading; user authentication; PHYSICAL-LAYER; INFORMATION-THEORY; PRIVACY;
D O I
10.1109/TWC.2018.2848937
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
User authentication (UA) supports the receiver in deciding whether a message comes from either the claimed transmitter or an impersonating attacker. Information-theoretically secure authentication can be implemented by using either a secret (symmetric key) shared between both the legitimate users or the transmission medium over which the message is transmitted [physical-layer authentication (PLA)]. We analyze these solutions when the physical-layer channel is the unique randomness source for either generating the key or performing PLA. For the symmetric-key-based UA approach, we resort to a secret key agreement. Moreover, we also consider an asymmetric-key-based UA based on the public-key (proven to be semantically secure), where the channel is used as an entropy source at one device only. We define the secure authentication rate at which the probability that the UA attack succeeds goes to zero as the number of independent and identically distributed variables describing how the channel goes to infinity. Both passive and active attacks are considered, and by numerical results, we compare the various UA schemes.
引用
收藏
页码:5700 / 5712
页数:13
相关论文
共 50 条
  • [1] Secret key-based Authentication with a Privacy Constraint
    Kittichokechai, Kittipong
    Caire, Giuseppe
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 1791 - 1795
  • [2] Secret Key-Based Identification and Authentication With a Privacy Constraint
    Kittichokechai, Kittipong
    Caire, Giuseppe
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (11) : 6189 - 6203
  • [3] On The Performance Bound of Structured Key-Based RFID Authentication
    Sakai, Kazuya
    Sun, Min-Te
    Ku, Wei-Shinn
    Lai, Ten H.
    2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2019,
  • [4] Analysis and extension of S/Key-based authentication schemes for digital home networks
    You, Ilsun
    INTELLIGENT CONTROL AND AUTOMATION, 2006, 344 : 1022 - 1033
  • [5] Symmetric Key-Based Lightweight Authentication Protocols for RFID Security
    Rajaguru, K.
    Hansdah, R. C.
    2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 488 - 495
  • [6] Intelligent home network authentication: S/key-based home device authentication
    Lee, Deok-Gyu
    You, Ilsun
    Kim, Sang-Choon
    Lee, Yun-Kyung
    Han, Jong-Wook
    Chung, Kyo-Il
    FRONTIERS OF HIGH PERFORMANCE COMPUTING AND NETWORKING - ISPA 2007 WORKSHOPS, 2007, 4743 : 214 - +
  • [7] Vector Quantization and Clustered Key Mapping for Channel-Based Secret Key Generation
    Hong, Y. -W. Peter
    Huang, Lin-Ming
    Li, Hou-Tung
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (05) : 1170 - 1181
  • [8] Impact of Propagation on the Vulnerability of Channel-Based Key Establishment
    Mahmood, Attiya
    Jensen, Michael A.
    IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2016, 64 (04) : 1578 - 1583
  • [9] KL-RAP: An Efficient Key-Less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System
    Meher, Bimal Kumar
    Amin, Ruhul
    Das, Ashok Kumar
    Khan, Muhammad Khurram
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (05): : 3411 - 3420
  • [10] Maximization of the Channel-Based Key Establishment Rate in MIMO Systems
    Quist, Britton T.
    Jensen, Michael A.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (10) : 5565 - 5573