A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks

Abstract The increasing demand for different types of wireless communication services and the advanced wireless technology has led to the presence of emerging networks. However, wireless communication allows attackers to send useless information into the network through the process of multi-hop transmission, which results in the forwarding of many invalid data and the consumption of energy. To address this, the network needs effective identity authentication. In this paper, we propose a new robust authentication algorithm based on the phase noise fingerprint of the physical-layer (PHY). Furthermore, we propose a security authentication scheme of combined PHY fingerprints to ensure the survivability of the network in the presence of attacks or intrusions. The experimental results show that the identification rate of the simple multiple kernel learning (SimpleMKL) reaches 98.25%, and the scheme is robust against malicious nodes and efficient with low computation and storage.

[1]  Guy Pujolle,et al.  A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.

[2]  Patel Manishkumar Manilal Security Attacks in Wireless Sensor Networks , 2019 .

[3]  Mohamed El-Tanany,et al.  Analytical modeling and simulation of phase noise interference in OFDM-based digital television terrestrial broadcasting systems , 2001, IEEE Trans. Broadcast..

[4]  Lajos Hanzo,et al.  Physical-layer authentication for wireless security enhancement: current challenges and future developments , 2016, IEEE Communications Magazine.

[5]  Oktay Ureten,et al.  Wireless security through RF fingerprinting , 2007, Canadian Journal of Electrical and Computer Engineering.

[6]  Xiaojiang Du,et al.  Adaptive cell relay routing protocol for mobile ad hoc networks , 2006, IEEE Transactions on Vehicular Technology.

[7]  Caidan Zhao,et al.  A PHY-layer Authentication Approach for Transmitter Identification in Cognitive Radio Networks , 2010, 2010 International Conference on Communications and Mobile Computing.

[8]  Xiaojiang Du,et al.  Designing efficient routing protocol for heterogeneous sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[9]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[10]  Xiang Wang,et al.  Specific Emitter Identification Based on Nonlinear Dynamical Characteristics , 2016, Canadian Journal of Electrical and Computer Engineering.

[11]  Jeffrey H. Reed,et al.  Specific Emitter Identification for Cognitive Radio with Application to IEEE 802.11 , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[12]  Sepideh Dolatshahi,et al.  Identification of wireless users via power amplifier imperfections , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.

[13]  Michel Barbeau,et al.  Enhancing intrusion detection in wireless networks using radio frequency fingerprinting , 2004, Communications, Internet, and Information Technology.

[14]  A. Demir,et al.  Phase noise in oscillators: a unifying theory and numerical methods for characterization , 2000 .

[15]  Wei-Chung Teng,et al.  A defense against clock skew replication attacks in wireless sensor networks , 2014, J. Netw. Comput. Appl..

[16]  Mohsen Guizani,et al.  Defending DoS Attacks on Broadcast Authentication in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Communications.

[17]  Yves Grandvalet,et al.  Y.: SimpleMKL , 2008 .

[18]  Xiaojiang Du,et al.  Implementation and performance analysis of SNMP on a TLS/TCP base , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).

[19]  Chun-Shien Lu,et al.  Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.

[20]  Caidan Zhao,et al.  Anti-PUE Attack Base on the Transmitter Fingerprint Identification in Cognitive Radio , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[21]  Manish M. Patel,et al.  Security attacks in wireless sensor networks: A survey , 2013, 2013 International Conference on Intelligent Systems and Signal Processing (ISSP).

[22]  Michael P. Howarth,et al.  A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.

[23]  Hsiao-Hwa Chen,et al.  Secrecy wireless information and power transfer: challenges and opportunities , 2015, IEEE Wireless Communications.

[24]  Kevin W. Sowerby,et al.  Radio-frequency fingerprinting for mitigating primary user emulation attack in low-end cognitive radios , 2014, IET Commun..

[25]  Riccardo Rubino Wireless device identification from a phase noise prospective , 2010 .

[26]  Dennis Goeckel,et al.  Wireless Device Identification Based on RF Oscillator Imperfections , 2015, IEEE Trans. Inf. Forensics Secur..

[27]  Xiaojiang Du,et al.  Permission-combination-based scheme for Android mobile malware detection , 2014, 2014 IEEE International Conference on Communications (ICC).