A Physical-Layer Message Encryption and Authentication Scheme

Most of physical-layer authentication schemes cannot prevent passive eavesdropping. In this paper, we propose a message encryption and authentication scheme based on physical-layer characteristics of wireless channel. By extracting the channel characteristics, the physical-layer key is generated. Then a key stream generator generates the key stream to protect the privacy of the transmitted data through the seed generated by a physical-layer key and an identity key. Finally, receiver authenticated the authenticity and integrity of the received message through a CRC check. Simulation results show that this scheme has a better performance in preventing both passive eavesdropping and active attack, thus the randomness of key stream is greatly improved and the rate of authentication missed detection rate is reduced by half.

[1]  Xianbin Wang,et al.  Physical Layer Authentication Enhancement Using Two-Dimensional Channel Quantization , 2016, IEEE Transactions on Wireless Communications.

[2]  Yu Liu,et al.  The CRC–NTMAC for Noisy Message Authentication , 2005, IEEE Transactions on Information Forensics and Security.

[3]  Nguyen Dinh Thuc,et al.  A Privacy Preserving Message Authentication Code , 2015, 2015 5th International Conference on IT Convergence and Security (ICITCS).

[4]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[5]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[6]  Aydin Sezgin,et al.  Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing , 2015, Proceedings of the IEEE.

[7]  Jin Cao,et al.  A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.

[8]  Vandana Mohindru,et al.  Performance analysis of message authentication algorithms in wireless sensor networks , 2017, 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC).

[9]  H. Vincent Poor,et al.  Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.

[10]  Jing Yang,et al.  A physical-layer authentication scheme based on hash method , 2015, 2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC).

[11]  Cong Ling,et al.  Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security , 2015, IEEE Transactions on Information Forensics and Security.