A Survey of Physical-Layer Authentication in Wireless Communications

被引:150
|
作者
Xie, Ning [1 ,2 ]
Li, Zhuoyuan [1 ,2 ]
Tan, Haijun [1 ,2 ]
机构
[1] Shenzhen Univ, Coll Elect & Informat Engn, Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
[2] Shenzhen Univ, Coll Elect & Informat Engn, Shenzhen Key Lab Media Secur, Shenzhen 518060, Peoples R China
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2021年 / 23卷 / 01期
关键词
Programmable logic arrays; Authentication; Receivers; Wireless communication; Cryptography; Signal to noise ratio; Interference; Physical-layer authentication; passive; active; robustness; covertness; security; USER AUTHENTICATION; SPOOFING DETECTION; PHASE NOISE; IDENTIFICATION; SECURITY; CHANNEL; SYSTEMS; DESIGN; TECHNOLOGIES; NETWORKS;
D O I
10.1109/COMST.2020.3042188
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is an important issue in wireless communications because the open nature of the wireless medium provides more security vulnerabilities. Recently, Physical-Layer Authentication (PLA) attracts many research interests because it provides information-theory security and low complexity. Although many researchers focus on the PLA and exploit its potential in enhancing wireless security, the literature is surprisingly sparse with no comprehensive overview of the state-of-the-art PLA and the key fundamentals involved. Thus, this article provides a detailed survey of features and techniques that can be used in the PLA. We categorize the existing PLA schemes into two categories: passive and active schemes. In the passive schemes, a receiver authenticates the transmitter based on the physical-layer features of the received signals. We further divide the passive schemes into two sub-categories: device-based features and channel-based features. In the active schemes, a transmitter generates a tag based on a secret key and embeds it into a source message. Then, a receiver authenticates the transmitter based on the tag whether it exists in the received signal. We further divide active schemes into two sub-categories: non-covert schemes and covert schemes. Moreover, we also provide some future research directions.
引用
收藏
页码:282 / 310
页数:29
相关论文
共 50 条
  • [21] Physical Layer Authentication with Cooperative Wireless Communications and Machine Learning
    Senigagliesi, Linda
    Baldi, Marco
    Gambi, Ennio
    2021 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS (LATINCOM 2021), 2021,
  • [22] Polarization Fingerprint: A Novel Physical-Layer Authentication in Wireless IoT
    Xu, Jinlong
    Wei, Dong
    Huang, Weiqing
    2022 IEEE 23RD INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM 2022), 2022, : 434 - 443
  • [23] Weighted Voting in Physical Layer Authentication for Industrial Wireless Edge Networks
    Xie, Feiyi
    Pang, Zhibo
    Wen, Hong
    Lei, Wenxin
    Xu, Xinchen
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (04) : 2796 - 2806
  • [24] Master Synchronization in Physical-Layer Communications of Wireless Sensor Networks
    Zheng, Lin
    Ge, Wei
    Qiu, Hongbing
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2010,
  • [25] Physical-Layer Authentication Based on Hierarchical Variational Autoencoder for Industrial Internet of Things
    Meng, Rui
    Xu, Xiaodong
    Wang, Bizhu
    Sun, Hao
    Xia, Shida
    Han, Shujun
    Zhang, Ping
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (03) : 2528 - 2544
  • [26] Pilot-Based Physical-Layer Authentication with High Covertness
    Xie, Ning
    Chen, Yicong
    IEEE WIRELESS COMMUNICATIONS, 2021, 28 (01) : 97 - 103
  • [27] Physical-layer authentication
    Yu, Paul L.
    Baras, John S.
    Sadler, Brian M.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) : 38 - 51
  • [28] Antenna Additively Manufactured Engineered Fingerprinting for Physical-Layer Security Enhancement for Wireless Communications
    MIGUELEZ-GOMEZ, N. O. E. M. I.
    ROJAS-NASTRUCCI, E. D. U. A. R. D. O. A.
    IEEE OPEN JOURNAL OF ANTENNAS AND PROPAGATION, 2022, 3 : 637 - 651
  • [29] A Survey of Physical Layer Techniques for Secure Wireless Communications in Industry
    Angueira, Pablo
    Val, Inaki
    Montalban, Jon
    Seijo, Oscar
    Iradier, Eneko
    Fontaneda, Pablo Sanz
    Fanari, Lorenzo
    Arriola, Aitor
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (02): : 810 - 838
  • [30] A Novel Method for Physical-Layer Authentication via Channel State Information
    Lord, Scott
    Roth, John
    McEachen, John
    Tummala, Murali
    2018 12TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2018,