Hybrid Physical-Layer Authentication

被引:4
作者
Xie, Ning [1 ]
Zhang, Jiaheng [1 ]
Zhang, Qihong [1 ]
Tan, Haijun [1 ]
Liu, Alex X. [2 ]
Niyato, Dusit [3 ]
机构
[1] Shenzhen Univ, Coll Elect & Informat Engn, Guangdong Key Lab Intelligent Informat Proc, Shenzhen Key Lab Media Secur, Shenzhen 518060, Guangdong, Peoples R China
[2] Midea Grp, Software Engn Inst, Foshan 528311, Guangdong, Peoples R China
[3] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
关键词
Programmable logic arrays; Authentication; Security; Robustness; Transmitters; Fading channels; Wireless communication; Physical-layer authentication; active; passive; hybrid; tradeoff; CHANNEL;
D O I
10.1109/TMC.2023.3235061
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Physical-Layer Authentication (PLA) attracts a lot of research interests because of its significant advantages over upper-layer authentication mechanisms: high security and low complexity. The PLA schemes can be categorized into passive and active schemes. In this paper, we extensively leverage the advantages of both the active and passive schemes as a reference scheme, named as the Direct Hybrid (DH) scheme. Although the DH scheme improves the authentication performance of the prior PLA schemes, it has limitations, e.g., high communication overhead. Then, we further propose two hybrid PLA schemes to overcome the limitations of the DH scheme. The first proposed scheme further uses the advantage of the Challenge-Response Authentication Mechanism (CRAM) scheme, named as the CR-based Hybrid (CRH) scheme. Although both DH and CRH schemes significantly improve the authentication performance of the prior PLA schemes, they do not address one significant limitation of the active scheme, i.e., to set the power allocation of a tag empirically. Thus, based on the CRH scheme, we further propose the Adaptive CR-Based Hybrid (ACRH) scheme to adaptively set the parameter instead of the empirical setting. Moreover, we provide the theoretical analysis of the proposed schemes over wireless fading channels and derive their closed-form expressions in terms of the Probability of Detection (PD), Probability of False Alarm (PFA), and optimal threshold, respectively. At last, we discuss the advantages and disadvantages of the proposed schemes and give some useful suggestions for seeking a better tradeoff. Our experimental results show that, in comparison with the active scheme, the DH scheme has better robustness, and the CRH scheme has better both robustness and compatibility but it sacrifices the security. The ARCH scheme achieves a better tradeoff than the remaining schemes.
引用
收藏
页码:1295 / 1311
页数:17
相关论文
共 25 条
[1]  
Cover T. M., 1999, Elements of information theory
[2]   A Lightweight Message Authentication Scheme for Smart Grid Communications [J].
Fouda, Mostafa M. ;
Fadlullah, Zubair Md ;
Kato, Nei ;
Lu, Rongxing ;
Shen, Xuemin .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (04) :675-685
[3]  
Guey JC, 2004, VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7, P4265
[4]  
IEEE, 2018, IEEE Std 802.16-2017 (Revision of IEEE Std 802.16-2012), DOI [10.1109/IEEESTD.2018.8303870, DOI 10.1109/IEEESTD.2018.8303870]
[5]  
Kaltenberger F., 2010, P FUT NETW MOB SUMM, P1
[6]  
Kay S., 1998, F u n d a m e n t a l s o f S t a t i s t i c a l S i g n a l P r o c e s s i n g : D e t e c t i o n T h e o r y
[7]   Physical Layer Authentication Enhancement Using Two-Dimensional Channel Quantization [J].
Liu, Jiazi ;
Wang, Xianbin .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (06) :4171-4182
[8]   Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding [J].
Perazzone, Jake Bailey ;
Yu, Paul L. ;
Sadler, Brian M. ;
Blum, Rick S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2216-2225
[9]   PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks [J].
Shan, Dan ;
Zeng, Kai ;
Xiang, Weidong ;
Richardson, Paul ;
Dong, Yan .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1817-1827
[10]   A MATHEMATICAL THEORY OF COMMUNICATION [J].
SHANNON, CE .
BELL SYSTEM TECHNICAL JOURNAL, 1948, 27 (03) :379-423