Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources

被引:15
作者
Chen, Yi [1 ]
Wen, Hong [2 ]
Wu, Jinsong [3 ]
Song, Huanhuan [2 ]
Xu, Aidong [4 ]
Jiang, Yixin [4 ]
Zhang, Tengyue [2 ]
Wang, Zhen [2 ]
机构
[1] Univ Elect Sci & Technol China, Natl Key Lab Sci & Technol Commun, Chengdu 611731, Sichuan, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Aeronaut & Astronaut, Chengdu 611731, Sichuan, Peoples R China
[3] Univ Chile, Dept Elect Engn, Santiago 8330072, Chile
[4] China Southern Power Grid Co Ltd, EPRI, Guangzhou 510080, Guangdong, Peoples R China
来源
SENSORS | 2019年 / 19卷 / 08期
关键词
edge computing; clustering; physical-layer authentication; lightweight cipher; channel state information; lightweight authentication; CHANNEL ESTIMATION; SECURITY; ALGORITHMS;
D O I
10.3390/s19081926
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcome the drawback of traditional cipher-based authentication schemes that suffer from heavy costs and are limited by energy-constrained intelligent devices. CPAS is a novel cross-layer secure authentication approach for edge computing system with asymmetric resources. The CPAS scheme combines clustering and lightweight symmetric cipher with physical-layer channel state information to provide two-way authentication between terminals and edge devices. By taking advantage of temporal and spatial uniqueness in physical layer channel responses, the non-cryptographic physical layer authentication techniques can achieve fast authentication. The lightweight symmetric cipher initiates user authentication at the start of a session to establish the trust connection. Based on theoretical analysis, the CPAS scheme is secure and simple, but there is no trusted party, while it can also resist small integer attacks, replay attacks, and spoofing attacks. Besides, experimental results show that the proposed scheme can boost the total success rate of access authentication and decrease the data frame loss rate, without notable increase in authentication latencies.
引用
收藏
页数:20
相关论文
共 37 条
  • [1] Survey of Stochastic Computing
    Alaghi, Armin
    Hayes, John P.
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2013, 12
  • [2] A Hardware and Secure Pseudorandom Generator for Constrained Devices
    Bakiri, Mohammed
    Guyeux, Christophe
    Couchot, Jean-Francois
    Marangio, Luigi
    Galatolo, Stefano
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) : 3754 - 3765
  • [3] Bhardwaj I, 2017, IEEE INT CONF SIG PR, P504
  • [4] Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation
    Borle, Kapil M.
    Chen, Biao
    Du, Wenliang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (10) : 2225 - 2235
  • [5] Cazorla M, 2013, PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), P543
  • [6] Lightweight one-time password authentication scheme based on radio-frequency fingerprinting
    Chen, Yi
    Wen, Hong
    Song, Huanhuan
    Chen, Songlin
    Xie, Feiyi
    Yang, Qing
    Hu, Lin
    [J]. IET COMMUNICATIONS, 2018, 12 (12) : 1477 - 1484
  • [7] A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis
    Fahad, Adil
    Alshatri, Najlaa
    Tari, Zahir
    Alamri, Abdullah
    Khalil, Ibrahim
    Zomaya, Albert Y.
    Foufou, Sebti
    Bouras, Abdelaziz
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2014, 2 (03) : 267 - 279
  • [8] A Stochastic Computational Approach for Accurate and Efficient Reliability Evaluation
    Han, Jie
    Chen, Hao
    Liang, Jinghang
    Zhu, Peican
    Yang, Zhixi
    Lombardi, Fabrizio
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (06) : 1336 - 1350
  • [10] He FM, 2009, IEEE ICC, P824