A Survey of Physical-Layer Authentication in Wireless Communications

被引:150
|
作者
Xie, Ning [1 ,2 ]
Li, Zhuoyuan [1 ,2 ]
Tan, Haijun [1 ,2 ]
机构
[1] Shenzhen Univ, Coll Elect & Informat Engn, Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
[2] Shenzhen Univ, Coll Elect & Informat Engn, Shenzhen Key Lab Media Secur, Shenzhen 518060, Peoples R China
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2021年 / 23卷 / 01期
关键词
Programmable logic arrays; Authentication; Receivers; Wireless communication; Cryptography; Signal to noise ratio; Interference; Physical-layer authentication; passive; active; robustness; covertness; security; USER AUTHENTICATION; SPOOFING DETECTION; PHASE NOISE; IDENTIFICATION; SECURITY; CHANNEL; SYSTEMS; DESIGN; TECHNOLOGIES; NETWORKS;
D O I
10.1109/COMST.2020.3042188
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is an important issue in wireless communications because the open nature of the wireless medium provides more security vulnerabilities. Recently, Physical-Layer Authentication (PLA) attracts many research interests because it provides information-theory security and low complexity. Although many researchers focus on the PLA and exploit its potential in enhancing wireless security, the literature is surprisingly sparse with no comprehensive overview of the state-of-the-art PLA and the key fundamentals involved. Thus, this article provides a detailed survey of features and techniques that can be used in the PLA. We categorize the existing PLA schemes into two categories: passive and active schemes. In the passive schemes, a receiver authenticates the transmitter based on the physical-layer features of the received signals. We further divide the passive schemes into two sub-categories: device-based features and channel-based features. In the active schemes, a transmitter generates a tag based on a secret key and embeds it into a source message. Then, a receiver authenticates the transmitter based on the tag whether it exists in the received signal. We further divide active schemes into two sub-categories: non-covert schemes and covert schemes. Moreover, we also provide some future research directions.
引用
收藏
页码:282 / 310
页数:29
相关论文
共 50 条
  • [31] Game Theoretic Physical Layer Authentication for Spoofing Detection in UAV Communications
    Zhou, Yi
    Yeoh, Phee Lep
    Kim, Kyeong Jin
    Ma, Zheng
    Li, Yonghui
    Vucetic, Branka
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (06) : 6750 - 6755
  • [32] Physical-Layer Security in Space Information Networks: A Survey
    Li, Bin
    Fei, Zesong
    Zhou, Caiqiu
    Zhang, Yan
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (01) : 33 - 52
  • [33] Physical-layer Authentication with Watermarked Preamble for Internet of Things
    Leng, Yuqi
    Zhang, Ruiqi
    Wen, Wenkun
    Wu, Peiran
    Xia, Minghua
    2023 19TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, WIMOB, 2023, : 212 - 217
  • [34] Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing
    Jorswieck, Eduard
    Tomasin, Stefano
    Sezgin, Aydin
    PROCEEDINGS OF THE IEEE, 2015, 103 (10) : 1702 - 1724
  • [35] How to Leverage Double-Structured Sparsity of RIS Channels to Boost Physical-Layer Authentication
    Bendaimi, Amira
    Abdallah, Asmaa
    Celik, Abdulkadir
    Eltawil, Ahmed M.
    Arslan, Huseyin
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2024, 13 (08) : 2260 - 2264
  • [36] Access-Based Lightweight Physical-Layer Authentication for the Internet of Things Devices
    Khan, Saud
    Thapa, Chandra
    Durrani, Salman
    Camtepe, Seyit
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 11312 - 11326
  • [37] Physical-Layer Network Coding: An Efficient Technique for Wireless Communications
    Chen, Pingping
    Xie, Zhaopeng
    Fang, Yi
    Chen, Zhifeng
    Mumtaz, Shahid
    Rodrigues, Joel J. P. C.
    IEEE NETWORK, 2020, 34 (02): : 270 - 276
  • [38] Physical Layer Authentication and Identification of Wireless Devices Using the Synchrosqueezing Transform
    Baldini, Gianmarco
    Giuliani, Raimondo
    Steri, Gary
    APPLIED SCIENCES-BASEL, 2018, 8 (11):
  • [39] Physical Layer Authentication for Non-Coherent Massive SIMO-Enabled Industrial IoT Communications
    Gu, Zhifang
    Chen, He
    Xu, Pingping
    Li, Yonghui
    Vucetic, Branka
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (15) : 3722 - 3733
  • [40] Physical Layer Authentication With High Compatibility Using an Encoding Approach
    Xie, Ning
    Xiong, Wei
    Sha, Mingrui
    Hu, Tianxing
    Zhang, Peichang
    Huang, Lei
    Niyato, Dusit
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2022, 70 (12) : 8270 - 8285