A Survey of Physical-Layer Authentication in Wireless Communications

被引:150
|
作者
Xie, Ning [1 ,2 ]
Li, Zhuoyuan [1 ,2 ]
Tan, Haijun [1 ,2 ]
机构
[1] Shenzhen Univ, Coll Elect & Informat Engn, Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
[2] Shenzhen Univ, Coll Elect & Informat Engn, Shenzhen Key Lab Media Secur, Shenzhen 518060, Peoples R China
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2021年 / 23卷 / 01期
关键词
Programmable logic arrays; Authentication; Receivers; Wireless communication; Cryptography; Signal to noise ratio; Interference; Physical-layer authentication; passive; active; robustness; covertness; security; USER AUTHENTICATION; SPOOFING DETECTION; PHASE NOISE; IDENTIFICATION; SECURITY; CHANNEL; SYSTEMS; DESIGN; TECHNOLOGIES; NETWORKS;
D O I
10.1109/COMST.2020.3042188
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication is an important issue in wireless communications because the open nature of the wireless medium provides more security vulnerabilities. Recently, Physical-Layer Authentication (PLA) attracts many research interests because it provides information-theory security and low complexity. Although many researchers focus on the PLA and exploit its potential in enhancing wireless security, the literature is surprisingly sparse with no comprehensive overview of the state-of-the-art PLA and the key fundamentals involved. Thus, this article provides a detailed survey of features and techniques that can be used in the PLA. We categorize the existing PLA schemes into two categories: passive and active schemes. In the passive schemes, a receiver authenticates the transmitter based on the physical-layer features of the received signals. We further divide the passive schemes into two sub-categories: device-based features and channel-based features. In the active schemes, a transmitter generates a tag based on a secret key and embeds it into a source message. Then, a receiver authenticates the transmitter based on the tag whether it exists in the received signal. We further divide active schemes into two sub-categories: non-covert schemes and covert schemes. Moreover, we also provide some future research directions.
引用
收藏
页码:282 / 310
页数:29
相关论文
共 50 条
  • [41] Knowledge-Enhanced Physical Layer Authentication for Mobile Devices
    Wang, Qi
    Liang, Wei
    Zhang, Jialin
    Wang, Ke
    Jiang, Xiaolin
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (04) : 7436 - 7448
  • [42] Detection of Jamming Attacks for the Physical-Layer Authentication
    Tan, Haijun
    Li, Zhuoyuan
    Xie, Ning
    Lu, Jian
    Niyato, Dusit
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (12) : 9579 - 9594
  • [43] Physical Layer Authentication in Wireless Networks-Based Machine Learning Approaches
    Alhoraibi, Lamia
    Alghazzawi, Daniyal
    Alhebshi, Reemah
    Rabie, Osama Bassam J.
    SENSORS, 2023, 23 (04)
  • [44] Multiple Cooperative Attackers for Tag-Based Physical Layer Authentication
    Cai, Yufeng
    Wang, Wenya
    Chen, Yicong
    Tan, Haijun
    Xie, Ning
    Wang, Jiangzhou
    IEEE COMMUNICATIONS MAGAZINE, 2023, 61 (07) : 165 - 171
  • [45] BatchAuth: A Physical Layer Batch Authentication Scheme for Multiple Backscatter Devices
    Yang, Yishan
    Li, Jiajun
    Luo, Niya
    Yan, Zheng
    Zhang, Yifan
    Zeng, Kai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9452 - 9466
  • [46] UAV-Involved Wireless Physical-Layer Secure Communications: Overview and Research Directions
    Wang, Hui-Ming
    Zhang, Xu
    Jiang, Jia-Cheng
    IEEE WIRELESS COMMUNICATIONS, 2019, 26 (05) : 32 - 39
  • [47] Physical-layer network coding: Tutorial, survey, and beyond
    Liew, Soung Chang
    Zhang, Shengli
    Lu, Lu
    PHYSICAL COMMUNICATION, 2013, 6 : 4 - 42
  • [48] Physical-Layer Authentication Based on Extreme Learning Machine
    Wang, Ning
    Jiang, Ting
    Lv, Shichao
    Xiao, Liang
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (07) : 1557 - 1560
  • [50] Enhancing Physical-Layer Security in LEO Satellite-Enabled IoT Network Communications
    Talgat, Anna
    Wang, Ruibo
    Kishk, Mustafa A.
    Alouini, Mohamed-Slim
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 33967 - 33979