A Survey of Physical-Layer Authentication in Wireless Communications

被引:150
|
作者
Xie, Ning [1 ,2 ]
Li, Zhuoyuan [1 ,2 ]
Tan, Haijun [1 ,2 ]
机构
[1] Shenzhen Univ, Coll Elect & Informat Engn, Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
[2] Shenzhen Univ, Coll Elect & Informat Engn, Shenzhen Key Lab Media Secur, Shenzhen 518060, Peoples R China
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2021年 / 23卷 / 01期
关键词
Programmable logic arrays; Authentication; Receivers; Wireless communication; Cryptography; Signal to noise ratio; Interference; Physical-layer authentication; passive; active; robustness; covertness; security; USER AUTHENTICATION; SPOOFING DETECTION; PHASE NOISE; IDENTIFICATION; SECURITY; CHANNEL; SYSTEMS; DESIGN; TECHNOLOGIES; NETWORKS;
D O I
10.1109/COMST.2020.3042188
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is an important issue in wireless communications because the open nature of the wireless medium provides more security vulnerabilities. Recently, Physical-Layer Authentication (PLA) attracts many research interests because it provides information-theory security and low complexity. Although many researchers focus on the PLA and exploit its potential in enhancing wireless security, the literature is surprisingly sparse with no comprehensive overview of the state-of-the-art PLA and the key fundamentals involved. Thus, this article provides a detailed survey of features and techniques that can be used in the PLA. We categorize the existing PLA schemes into two categories: passive and active schemes. In the passive schemes, a receiver authenticates the transmitter based on the physical-layer features of the received signals. We further divide the passive schemes into two sub-categories: device-based features and channel-based features. In the active schemes, a transmitter generates a tag based on a secret key and embeds it into a source message. Then, a receiver authenticates the transmitter based on the tag whether it exists in the received signal. We further divide active schemes into two sub-categories: non-covert schemes and covert schemes. Moreover, we also provide some future research directions.
引用
收藏
页码:282 / 310
页数:29
相关论文
共 50 条
  • [1] Hybrid Physical-Layer Authentication
    Xie, Ning
    Zhang, Jiaheng
    Zhang, Qihong
    Tan, Haijun
    Liu, Alex X.
    Niyato, Dusit
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (02) : 1295 - 1311
  • [2] A survey of Machine Learning-based Physical-Layer Authentication in wireless communications
    Meng, Rui
    Xu, Bingxuan
    Xu, Xiaodong
    Sun, Mengying
    Wang, Bizhu
    Han, Shujun
    Lv, Suyu
    Zhang, Ping
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 235
  • [3] Blind Physical-Layer Authentication Based on Composite Radio Sample Characteristics
    Li, Dongming
    Yang, Xuan
    Zhou, Fuhui
    Wang, Dawei
    Al-Dhahir, Naofal
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (10) : 6790 - 6803
  • [4] Blind Tag-Based Physical-Layer Authentication
    Wang, Chen
    Sha, Mingrui
    Xiong, Wei
    Xie, Ning
    Mao, Rui
    Zhang, Peichang
    Huang, Lei
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, : 4735 - 4748
  • [5] Multiple Phase Noises Physical-Layer Authentication
    Xie, Ning
    Xiong, Wei
    Chen, Junjie
    Zhang, Peichang
    Huang, Lei
    Su, Jian
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (09) : 6196 - 6211
  • [6] Physical-Layer Authentication in Non-Orthogonal Multiple Access Systems
    Xie, Ning
    Zhang, Shengli
    Liu, Alex X.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2020, 28 (03) : 1144 - 1157
  • [7] Privacy-Preserving Physical-Layer Authentication for Non-Orthogonal Multiple Access Systems
    Xie, Ning
    Zhang, Qihong
    Chen, Junjie
    Tan, Haijun
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2022, 40 (04) : 1371 - 1385
  • [8] An Optimization Framework for Active Physical-Layer Authentication
    Tan, Haijun
    Xie, Ning
    Liu, Alex X.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (01) : 164 - 179
  • [9] Precoder Design for Physical-Layer Security and Authentication in Massive MIMO UAV Communications
    Maeng, Sung Joon
    Yapici, Yavuz
    Guvenc, Ismail
    Bhuyan, Arupjyoti
    Dai, Huaiyu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (03) : 2949 - 2964
  • [10] Physical-Layer Authentication in Wirelessly Powered Communication Networks
    Xie, Ning
    Tan, Haijun
    Huang, Lei
    Liu, Alex X.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 29 (04) : 1827 - 1840