We study a multi-user up-link scenario where an attacker tries to impersonate the legitimate transmitters. We present a new framework for deriving a posteriori attack proba- bilities from the channel observations at the access point, which enables fast intrusion detection and authentication at the physical layer and can be exploited to reduce the security overhead by offloading higher-layer authentication schemes. This is highly relevant for delay-sensitive applications that are targeted in 5G where the security overhead may limit the real-time performance. We take a factor-graph approach that can easily be extended to take into account other features, channel models, and radio access schemes. While related works only consider single-link scenarios, the multi-user approach in this paper allows us to exploit the cross-channel correlation of the large-scale fading parameters that is due to the propagation environment for improving the detection performance. As numerical results show, especially for slowly changing channels with high correlation our approach provides significant performance gains.
[1]
Christian Dombrowski,et al.
EchoRing: A Low-Latency, Reliable Token-Passing MAC Protocol for Wireless Industrial Networks
,
2015
.
[2]
Ignacio Santamaría,et al.
Physical layer authentication based on channel response tracking using Gaussian processes
,
2014,
2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[3]
Nicola Laurenti,et al.
Physical Layer Authentication over MIMO Fading Wiretap Channels
,
2012,
IEEE Transactions on Wireless Communications.
[4]
X. Jin.
Factor graphs and the Sum-Product Algorithm
,
2002
.
[5]
Larry J. Greenstein,et al.
Using the physical layer for wireless authentication in time-variant channels
,
2008,
IEEE Transactions on Wireless Communications.
[6]
Prasant Mohapatra,et al.
Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks]
,
2010,
IEEE Wireless Communications.