Covert Authentication at the Physical Layer

被引:0
作者
Li, Xufei [1 ]
Zeng, Shuiguang [2 ]
Liu, YangYang [1 ]
机构
[1] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
[2] Hebei Normal Univ, Sch Informat Technol, Shijiazhuang 050024, Hebei, Peoples R China
来源
2021 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA | 2021年
基金
中国国家自然科学基金;
关键词
Physical layer authentication; Trellis coded modulation; Radio frequency watermark; CHANNEL; MODULATION; AWGN;
D O I
10.1109/NaNA53684.2021.00015
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The open nature of wireless communication makes it facing variable interferences, the one by malicious attackers can be more harmful since they can choose worthful messages to interfere for benefit maximization. Such targeted messages generally require comprehensive protection by variable security mechanisms, which improve security in some sense as well as the risk of being selective attacked. One is the authentication mechanism that guarantees authenticity but suffers from length detection since the common authentication is conducted by appending digital signature bits to message. Due to this disadvantage, in this paper, we consider embedding the digital signature into the message at the physical layer, which is difficult to be sensed by attackers. Unlike the previous radio frequency (RF) watermark technique that adds low-power authentication tag symbols to base message symbols, while performing obvious constellation characteristics that still can be detected, to make the authentication tag non-perceptible to attackers, we propose to use Trellis coded modulation (TCM) in the embedding process to prevent constellation characteristics based detection. The accuracy of such an authentication scheme and its effect on the based messages are demonstrated by simulations. Simulation results show that the proposed method can greatly provide covert authentication while satisfying good authentication accuracy.
引用
收藏
页码:41 / 46
页数:6
相关论文
共 17 条
[1]  
[Anonymous], 1991, SOFT DECISION DECODI, P765
[2]  
Awny SN, 2020, UEEE INT SYM PERS IN
[3]   Reliable and Secure Constellation Shifting Aided Differential Radio Frequency Watermark Design for NB-IoT Systems [J].
Huang, Hongqing ;
Zhang, Lin .
IEEE COMMUNICATIONS LETTERS, 2019, 23 (12) :2262-2265
[4]   Reinforcement Learning Based Offloading for Realtime Applications in Mobile Edge Computing [J].
Huang, Hui ;
Ye, Qiang ;
Du, Hongwei .
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
[5]   A hierarchical modulation for upgrading digital broadcast systems [J].
Jiang, H ;
Wilford, PA .
IEEE TRANSACTIONS ON BROADCASTING, 2005, 51 (02) :223-229
[6]   Performance comparison of WRAN over AWGN & RICIAN channel using BPSK & QPSK Modulation with convolution coding [J].
Koshti, Rahul ;
Jangalwa, Madhvi .
2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, :124-126
[7]   Error probability bounds for bit-interleaved space-time trellis coding over block-fading channels [J].
Li, Yong ;
Moon, Jaekyun .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (11) :4285-4292
[8]   Interference in IM/DD Optical Wireless Communication Networks [J].
Rahaim, Michael ;
Little, Thomas D. C. .
JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2017, 9 (09) :D51-D63
[9]  
Samee Muhammad Kashif, 2012, 2012 5 INT S COMM CO, P1
[10]   Survey of Turbo, LDPC, and Polar Decoder ASIC Implementations [J].
Shao, Shuai ;
Hailes, Peter ;
Wang, Tsang-Yi ;
Wu, Jwo-Yuh ;
Maunder, Robert G. ;
Al-Hashimi, Bashir M. ;
Hanzo, Lajos .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2309-2333