A Tag-Based PHY-Layer Authentication Scheme Without Key Distribution

被引:8
作者
An, Yongli [1 ]
Zhang, Shikang [1 ]
Ji, Zhanlin [1 ]
机构
[1] North China Univ Sci & Technol, Coll Informat Engn, Tangshan 063210, Peoples R China
来源
IEEE ACCESS | 2021年 / 9卷
关键词
Authentication; Watermarking; Security; Communication system security; Hash functions; Fault tolerant systems; Fault tolerance; wireless network; tag-based; hash algorithm; channel probing; MESSAGE AUTHENTICATION; GENERATION; PROTOCOL; INTERNET; THINGS; ATTACK;
D O I
10.1109/ACCESS.2021.3087508
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is the process of confirming the legal identity of communicating entities, and it is the first line of defense for security communication. Most of the existing tag-based physical layer security authentication (PLSA) requires distributing the shared keys in advance. In the large scale internet of things scenario, nodes frequently join and leave the wireless networks that cause the distribution and management of keys particularly difficult. This paper proposes a tag-based PLSA scheme, which utilizes channel characteristics instead of distributing keys to generate authentication tags. Specifically, based on watermarking mechanism, we design a fault-tolerant hash algorithm to couple the secret sequence and the message signal for authentication tags generation. The shared secret sequence is generated by legitimate nodes through channel probing. And the theories of information theory and composite hypothesis testing is employed to analyze the performance of system. The simulation results show that the agreement ratio of the generating shared secret sequence is as high as 96% in the case of high signal-to-noise ratio and low power tag embedding. In addition, performance analysis demonstrates the scheme can resist against multiple attacks, such as replay, jamming, tampering, and impersonation attack.
引用
收藏
页码:85947 / 85955
页数:9
相关论文
共 35 条
  • [1] Physical Layer based Message Authentication with Secure Channel Codes
    Chen, Dajiang
    Zhang, Ning
    Cheng, Nan
    Zhang, Kuan
    Qin, Zhiguang
    Shen, Xuemin
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (05) : 1079 - 1093
  • [2] An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security
    Chen, Dajiang
    Zhang, Ning
    Lu, Rongxing
    Fang, Xiaojie
    Zhang, Kuan
    Qin, Zhiguang
    Shen, Xuemin
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) : 748 - 761
  • [3] Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    Cho, Jung-Sik
    Yeo, Sang-Soo
    Kim, Sung Kwon
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 391 - 397
  • [5] A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
    Hassija, Vikas
    Chamola, Vinay
    Saxena, Vikas
    Jain, Divyansh
    Goyal, Pranav
    Sikdar, Biplab
    [J]. IEEE ACCESS, 2019, 7 : 82721 - 82743
  • [6] UNCONVENTIONAL CRYPTOGRAPHIC KEYING VARIABLE MANAGEMENT
    HERSHEY, JE
    HASSAN, AA
    YARLAGADDA, R
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1995, 43 (01) : 3 - 6
  • [7] Jakes W., 1974, Microwave Mobile Communications
  • [8] Ji X., 2016, J ELECT INF TECHNOL, V38, P11
  • [9] On the Optimality of Keyless Authentication in a Noisy Model
    Jiang, Shaoquan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1250 - 1261
  • [10] Jiang ZP, 2013, IEEE INFOCOM SER, P2544