Physical Layer Authentication in Wireless Communication Networks: A Survey

被引:0
作者
Bai L. [1 ]
Zhu L. [2 ]
Liu J. [1 ]
Choi J. [3 ]
Zhang W. [4 ]
机构
[1] School of Cyber Science and Technology, Bei-hang University, Beijing
[2] School of Electronic and Information Engineering, Beihang Uni-versity, Beijing
[3] School of Information Technology, Deakin University, Burwood, 3125, VIC
[4] School of Electrical Engineering and Telecommunications, The University of New South Wales, Sydney, 2052, NSW
基金
中国国家自然科学基金;
关键词
hypothesis testing; physical layer authentication (PLA); radio-frequency identification; wireless communication;
D O I
10.23919/JCIN.2020.9200889
中图分类号
学科分类号
摘要
Physical layer security (PLS) in wireless communication systems has attracted extensive research attentions in recent years. Unlike cryptography-based methods applied in upper-layer in network, PLS methods are applied in physical layers and can provide information-theoretic security by utilizing the random-ness of signals and wireless channels. In this survey, we provide a comprehensive review in the domain of physical layer authentication (PLA) in wireless communication systems, including the concepts, several key techniques of typical PLA architectures as well as future challenges and research trends in more sophisticated communication systems. The survey begins with an overview of the background and basic concepts of PLA, such as the general model of wireless security communication system, typical frameworks of key-based/less PLA systems, and the common attack models. We then discuss the major concerns and key techniques that are applied in PLA systems, where three types of authentication schemes are considered, i.e., the authentication based on channel information, radio-frequency and identity watermarks. Basic models and representative research results about key approaches and techniques applied to the authentication systems above are subsequently covered. Finally, the associated challenges and potential research trends of PLA in future communication systems are presented at the end of the survey paper. © 2020, Posts and Telecom Press Co Ltd. All rights reserved.
引用
收藏
页码:237 / 264
页数:27
相关论文
共 122 条
[1]  
DANEV B, ZANETTI D, CAPKUN S., On physical-layer identification of wireless devices, ACM Comput. Surv, 45, 1, (2012)
[2]  
BALDINI G, STERI G., A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in com-ponents, IEEE Commun. Surveys Tuts, 19, 3, pp. 1761-1789, (2017)
[3]  
XU Q, ZHENG R, SAAD W, Et al., Device fingerprinting in wireless networks: Challenges and opportunities, IEEE Commun. Surveys Tuts, 18, 1, pp. 94-104, (2015)
[4]  
WANG X, HAO P, HANZO L., Physical-layer authentication for wireless security enhancement: Current challenges and future develop-ments, IEEE Commun. Mag, 54, 6, pp. 152-158, (2016)
[5]  
MUKHERJEE A, FAKOORIAN S A, HUANG J, Et al., Principles of physical layer security in multiuser wireless networks: A survey, IEEE Commun. Surveys Tuts, 16, 3, pp. 1550-1573, (2014)
[6]  
LIU Y, CHEN H H, WANG L., Physical layer security for next gen-eration wireless networks: Theories, technologies, and challenges, IEEE Commun. Surveys Tut, 19, 1, pp. 347-376, (2017)
[7]  
JORSWIECK E, TOMASIN S, SEZGIN A., Broadcasting into the uncertainty: Authentication and confidentiality by physical-layer pro-cessing, Proc. IEEE, 103, 10, pp. 1702-1724, (2015)
[8]  
MASSEY J L., An introduction to contemporary cryptology, Proc. IEEE, 76, 5, pp. 533-549, (1988)
[9]  
BARENGHI A, BREVEGLIERI L, KOREN I, Et al., Fault injection attacks on cryptographic devices: Theory, practice, and countermea-sures, Proc. IEEE, 100, 11, pp. 3056-3076, (2012)
[10]  
SHANNON C E., Communication theory of secrecy systems, Bell Syst. Tech. J, 28, 4, pp. 656-715, (1949)