Improving Wireless Security With Phase-Tag Physical-Layer Authentication

被引:0
作者
Chang, Zikai [1 ,2 ]
Xiong, Wei [1 ,2 ]
Xie, Ning [1 ,2 ]
Niyato, Dusit [3 ]
机构
[1] Shenzhen Univ, Coll Elect & Informat Engn, State Key Lab Radio Frequency Heterogeneous Integr, Shenzhen 518060, Peoples R China
[2] Shenzhen Univ, Coll Elect & Informat Engn, Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
[3] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
基金
新加坡国家研究基金会;
关键词
Security; Robustness; Authentication; Wireless communication; Receivers; Symbols; Simulation; Phase modulation; Mobile computing; Laboratories; Closed form; high-order modulation; phase tag; physical-layer authentication; adaptive parameter tuning; SCHEME;
D O I
10.1109/TMC.2025.3527220
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is a fundamental requirement and a crucial topic in wireless communications. This paper focuses on improving the security of the prior tag-based Physical-Layer Authentication (PLA) schemes. We propose two phase-tag-based PLA schemes to overcome the limitations of prior tag-based PLA schemes. First, we propose the Phase-Tag-based PLA (PT-PLA) scheme, which superimposes a tag to the phase of the transmitted signal rather than the amplitude. Second, we propose the Adaptive Phase-Tag-based PLA (APT-PLA) scheme, where an appropriate parameter of the PT-PLA scheme is adaptively set for achieving a better trade-off among robustness, security, and compatibility. Rigorous theoretical analyses of the proposed schemes are conducted in high-order modulation systems, such as M-PSK and M-QAM systems, with a focus on evaluating their robustness, security, and compatibility. We also discuss advantages and disadvantages of these schemes and offer helpful recommendations according to different scenarios. Furthermore, we implement the proposed schemes and perform extensive simulations to compare their performance comprehensively. Simulation results demonstrate a perfect match with the theoretical results, verifying the superiority of the proposed schemes over the prior schemes.
引用
收藏
页码:4716 / 4732
页数:17
相关论文
共 25 条
[1]   The NTMAC for authentication of noisy messages [J].
Boncelet, Charles G., Jr. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (01) :35-42
[2]   An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security [J].
Chen, Dajiang ;
Zhang, Ning ;
Lu, Rongxing ;
Fang, Xiaojie ;
Zhang, Kuan ;
Qin, Zhiguang ;
Shen, Xuemin .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) :748-761
[3]   Cyberphysical Security and Dependability Analysis of Digital Control Systems in Nuclear Power Plants [J].
Cho, Chi-Shiang ;
Chung, Wei-Ho ;
Kuo, Sy-Yen .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2016, 46 (03) :356-369
[4]   Learning-Aided Physical Layer Authentication as an Intelligent Process [J].
Fang, He ;
Wang, Xianbin ;
Hanzo, Lajos .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (03) :2260-2273
[5]   Channel Assignment with Power Allocation for Sum Rate Maximization in NOMA Cellular Networks [J].
Gupta, Priya ;
Ghosh, Debashis .
PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
[6]  
Kay S. M, 1998, Fundamentals of Statistical Signal Processing, Volume 2: Detection Theory
[7]  
Menezes A. J., 1996, Handbook of Applied Cryptography
[8]   Smart Grid Neighborhood Area Networks: A Survey [J].
Meng, Weixiao ;
Ma, Ruofei ;
Chen, Hsiao-Hwa .
IEEE NETWORK, 2014, 28 (01) :24-32
[9]   Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding [J].
Perazzone, Jake Bailey ;
Yu, Paul L. ;
Sadler, Brian M. ;
Blum, Rick S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2216-2225
[10]  
Proakis J., 2001, DIGITAL COMMUNICATIO