Multi-User Physical-Layer Authentication and Classification

被引:8
作者
Xie, Ning [1 ]
Sha, Mingrui [1 ]
Hu, Tianxing [1 ]
Tan, Haijun [1 ]
机构
[1] Shenzhen Univ, Coll Elect & Informat Engn, Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
关键词
Physical-layer authentication; multi-user classification; authentication accuracy; classification accuracy; signal design; RATE-EXPONENT REGION; WIRELESS; COMMUNICATION; INTERNET; CHANNEL; THINGS;
D O I
10.1109/TWC.2023.3240021
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper concerns the problem of authenticating different transmitters at the physical layer in a multi-user scenario. In this paper, we propose two tag-based Physical-Layer Authentication (PLA) schemes in a multi-user scenario. We name the first scheme as the Multi-User Physical Layer Authentication and Classification (MU-PLAC) scheme, which not only detects an impersonation attack but also achieves multi-user classification. For further improving the performance of the MU-PLAC scheme for a two-user scenario, we propose an enhanced version of the MU-PLAC scheme by elaborately designing the tags of two legitimate users. We name the second scheme as the Enhanced Multi-User Physical Layer Authentication and Classification (EMU-PLAC) scheme. We provide the theoretical analysis of the proposed schemes over wireless fading channels and derive their closed-form expressions. We implement the proposed schemes and conduct extensive performance comparisons. Our simulation results show that, for a two-user scenario, the EMU-PLAC scheme provides better classification accuracy and authentication accuracy as compared with the MU-PLAC scheme.
引用
收藏
页码:6171 / 6184
页数:14
相关论文
共 32 条
  • [1] Security for 5G and Beyond
    Ahmad, Ijaz
    Shahabuddin, Shahriar
    Kumar, Tanesh
    Okwuibe, Jude
    Gurtov, Andrei
    Ylianttila, Mika
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) : 3682 - 3722
  • [2] Strongly Secure Multiuser Communication and Authentication With Anonymity Constraints
    Chou, Remi A.
    Yener, Aylin
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (01) : 572 - 586
  • [3] Hong S, 2010, CONSUM COMM NETWORK, P128
  • [4] BLIND ADAPTIVE MULTIUSER DETECTION
    HONIG, M
    MADHOW, U
    VERDU, S
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (04) : 944 - 960
  • [5] Kassam S. A., 1988, SIGNAL DETECTION NON
  • [6] Kay S. M., 1998, Fundamentals of Statistical Signal Processing:Detection Theory
  • [7] Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation
    Liao, Run-Fa
    Wen, Hong
    Chen, Songlin
    Xie, Feiyi
    Pan, Fei
    Tang, Jie
    Song, Huanhuan
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (03): : 2077 - 2088
  • [8] Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication
    Liao, Run-Fa
    Wen, Hong
    Wu, Jinsong
    Pan, Fei
    Xu, Aidong
    Song, Huanhuan
    Xie, Feiyi
    Jiang, Yixin
    Cao, Minggui
    [J]. IEEE ACCESS, 2019, 7 : 116390 - 116401
  • [9] Noncooperative Cellular Wireless with Unlimited Numbers of Base Station Antennas
    Marzetta, Thomas L.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (11) : 3590 - 3600
  • [10] McNicol D., 2004, PRIMER SIGNAL DETECT, DOI DOI 10.4324/9781410611949