REAM: RAKE receiver enhanced authentication method

The broadcast nature of the wireless medium poses a serious challenge to the security of wireless communications and networks. Traditional computational security strategies always fail to prevent the eavesdropper from overhearing the communications. Recently, the unique characteristics of wireless channel fingerprints, e.g. randomness and reciprocity, have been successfully used to enhance the security of the wireless network. We expand our previous work on exploring particular physical parameters of fingerprints, and focus on a new scheme in which we use the RAKE receiver to differentiate users under low transmission power. RAKE receiver may capture and estimate fingerprints through poor autocorrelation of the spreading coding. As the fingerprint is incomputable and unpredictable, and may only be detected by the pair of transmitter and receiver, it may be fully utilized to design an efficient authentication method. Simulation results strongly verify the efficiency of our proposed method, especially in the case of low SNR.

[1]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[2]  H. Howard Fan,et al.  Direct blind multiuser detection for CDMA in multipath without channel estimation , 2001, IEEE Trans. Signal Process..

[3]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[4]  David Tse,et al.  Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .

[5]  Larry J. Greenstein,et al.  Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.

[6]  Jesse Walker,et al.  Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .

[7]  Ueli Maurer,et al.  Authentication theory and hypothesis testing , 2000, IEEE Trans. Inf. Theory.

[8]  Santhanakrishnan Anand,et al.  On the Secrecy Capacity of Fading Cognitive Wireless Networks , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).

[9]  David A. Wagner,et al.  Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.

[10]  Larry J. Greenstein,et al.  MIMO-assisted channel-based authentication in wireless networks , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[11]  Xiaohua Li,et al.  Cooperative Communications for Wireless Information Assurance , 2005 .

[12]  H. Vincent Poor,et al.  Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.

[13]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[14]  Didem Kivanc-Tureli,et al.  EPSON: Enhanced Physical Security in OFDM Networks , 2009, 2009 IEEE International Conference on Communications.

[15]  William A. Arbaugh,et al.  Your 80211 wireless network has no clothes , 2002, IEEE Wirel. Commun..