Physical-Layer Authentication for Internet of Things via WFRFT-Based Gaussian Tag Embedding

Internet of Things (IoT) is regarded as the fundamental platform for many emerging services, such as smart city, smart home, and intelligent transportation systems. With ever-increasing penetration of IoT, it becomes of great importance to ensure the IoT security, as the security threats are extended from the cyber world to the physical world. In this article, we investigate physical-layer authentication to help verify the identity of IoT entities for preventing unauthorized access to information or service. Specifically, we propose a Gaussian-tag-embedded physical-layer authentication (GTEA) scheme by using a weighted fractional Fourier transform (WFRFT). Through the superimposition of a low-power Gaussian WFRFT tag onto the message signal, the legitimate receiver can verify the authenticity of the received signal at the physical layer, without being detected by adversaries. Moreover, security analysis shows that with the deliberately designed Gaussian tag, the GTEA scheme is robust against spoofing and replaying attacks. In addition, tradeoff analysis and simulation results are provided to demonstrate the capability of the GTEA scheme in achieving reliability of the message delivery, stealth of the embedded tag signal, and balancing the tradeoff among the robustness of user authentication. Moreover, a prototype is further developed using FPGA and experiments are conducted to demonstrate the effectiveness and performance improvement of the proposed GTEA scheme.

[1]  John S. Baras,et al.  Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.

[2]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[3]  Brian M. Sadler,et al.  MIMO Authentication via Deliberate Fingerprinting at the Physical Layer , 2011, IEEE Transactions on Information Forensics and Security.

[4]  Mike Ryan,et al.  Bluetooth: With Low Energy Comes Low Security , 2013, WOOT.

[5]  Yan Dong,et al.  PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.

[6]  Qinyu Zhang,et al.  WFRFT Precoding for Narrowband Interference Suppression in DFT-Based Block Transmission Systems , 2013, IEEE Communications Letters.

[7]  Xiang-Yang Li,et al.  Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information , 2012, 2013 Proceedings IEEE INFOCOM.

[8]  Xuemin Shen,et al.  Cooperative Spectrum Access Towards Secure Information Transfer for CRNs , 2013, IEEE Journal on Selected Areas in Communications.

[9]  Hannes Tschofenig,et al.  Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.

[10]  Xuejun Sha,et al.  Low Complexity Equalization of HCM Systems with DPFFT Demodulation over Doubly-Selective Channels , 2014, IEEE Signal Processing Letters.

[11]  Li Yong,et al.  Secret Communication Using Parallel Combinatory Spreading WFRFT , 2015, IEEE Communications Letters.

[12]  Wade Trappe,et al.  Low-Energy Security: Limits and Opportunities in the Internet of Things , 2015, IEEE Security & Privacy.

[13]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[14]  Zhenduo Wang,et al.  BER analysis of hybrid carrier system based on WFRFT with carrier frequency offset , 2015 .

[15]  Xuejun Sha,et al.  Secret Communication Using Parallel Combinatory Spreading WFRFT , 2015, IEEE Commun. Lett..

[16]  Kai Zeng,et al.  Physical layer key generation in wireless networks: challenges and opportunities , 2015, IEEE Communications Magazine.

[17]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[18]  Brian M. Sadler,et al.  Wireless physical layer authentication via fingerprint embedding , 2015, IEEE Communications Magazine.

[19]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[20]  Vinton G. Cerf,et al.  Taking the Internet to the Next Physical Level , 2016, Computer.

[21]  Xuejun Sha,et al.  On Physical Layer Security: Weighted Fractional Fourier Transform Based User Cooperation , 2017, IEEE Transactions on Wireless Communications.

[22]  Elena Simona Lohan,et al.  Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey , 2017, IEEE Access.

[23]  Mubashir Husain Rehmani,et al.  Cognitive-Radio-Based Internet of Things: Applications, Architectures, Spectrum Related Functionalities, and Future Research Directions , 2017, IEEE Wireless Communications.

[24]  Lixiang Li,et al.  General Theory of Security and a Study Case in Internet of Things , 2017, IEEE Internet of Things Journal.

[25]  Kwok-Yan Lam,et al.  Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things , 2018, Proceedings of the IEEE.

[26]  Victor C. M. Leung,et al.  BER Analysis of WFRFT Precoded OFDM and GFDM Waveforms With an Integer Time Offset , 2018, IEEE Transactions on Vehicular Technology.

[27]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[28]  Rick S. Blum,et al.  Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding , 2018, IEEE Transactions on Information Forensics and Security.

[29]  Wei Ni,et al.  Anatomy of Threats to the Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[30]  Tarik Taleb,et al.  A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems , 2019, IEEE Communications Surveys & Tutorials.

[31]  Ning Zhang,et al.  RAV: Relay Aided Vectorized Secure Transmission in Physical Layer Security for Internet of Things Under Active Attacks , 2019, IEEE Internet of Things Journal.

[32]  Junqing Zhang,et al.  Experimental Investigation on Wireless Key Generation for Low-Power Wide-Area Networks , 2020, IEEE Internet of Things Journal.