EXPLOITING THE PHYSICAL LAYER FOR ENHANCED SECURITY

被引:55
作者
Mathur, Suhas [1 ]
Reznik, Alex
Ye, Chunxuan
Mukherjee, Rajat
Rahman, Akbar
Shah, Yogendra
Trappe, Wade [1 ,2 ]
Mandayam, Narayan [1 ,2 ]
机构
[1] Rutgers State Univ, Wireless Informat Networking Lab WINLAB, Piscataway, NJ 08855 USA
[2] Rutgers State Univ, Dept Elect & Comp Engn, Piscataway, NJ 08855 USA
关键词
Authentication; Wireless communication; Communication system security; Physical layer; Channel estimation; IEEE; 802; 11; Standards;
D O I
10.1109/MWC.2010.5601960
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, they do not directly leverage the unique properties of the wireless domain to address security threats. The wireless medium is a powerful source of domain-specific information that can complement and enhance traditional security mechanisms. In this article we argue that new security paradigms which exploit physical layer properties of the wireless medium, such as the rapid spatial, spectral, and temporal decorrelation properties of the radio channel, can enhance confidentiality and authentication services. We outline some basic constructions for these services, and then provide a case study for how such strategies can be integrated into a broader security framework for a wireless network.
引用
收藏
页码:63 / 70
页数:8
相关论文
共 10 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[3]  
[Anonymous], 2005, Wireless Communications
[4]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[5]   UNCONVENTIONAL CRYPTOGRAPHIC KEYING VARIABLE MANAGEMENT [J].
HERSHEY, JE ;
HASSAN, AA ;
YARLAGADDA, R .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1995, 43 (01) :3-6
[6]  
MATHUR S, 2008, 14 ACM MOBICOM
[7]  
MAURER UM, 1993, IEEE T INFORM THEORY, V39, P733, DOI 10.1109/18.256484
[8]  
Tang XJ, 2010, SECURING WIRELESS COMMUNICATIONS AT THE PHYSICAL LAYER, P89, DOI 10.1007/978-1-4419-1385-2_5
[9]   Using the physical layer for wireless authentication in time-variant channels [J].
Xiao, Liang ;
Greenstein, Larry J. ;
Mandayam, Narayan B. ;
Trappe, Wade .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (07) :2571-2579
[10]  
Ye CX, 2006, 2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, P2593, DOI 10.1109/isit.2006.262101