Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding

Authentication via fingerprint embedding at the physical layer utilizes noise in the wireless channel to attain a certain degree of information theoretic security that traditional HMAC methods cannot provide. Fingerprint embedding refers to a key-aided process of superimposing a low-power tag to the primary message waveform for the purpose of authenticating the transmission. The tag is uniquely created from the message and key and successful authentication is achieved when the correct tag is detected by the receiver. This paper generalizes a framework for embedding physical layer fingerprints to create an authenticated side-channel for minimal cost. Side-channel information is conveyed to the receiver through the transmitter’s choice of tag from a secret codebook generated by the primary message and a shared secret key. In addition, a new linear coding scheme is introduced which enhances the ability to trade off the performance goals of authentication, side-channel rate, secrecy, and privacy.

[1]  Dennis Goeckel,et al.  Identifying Wireless Users via Transmitter Imperfections , 2011, IEEE Journal on Selected Areas in Communications.

[2]  John S. Baras,et al.  Fingerprinting by Design: Embedding and Authentication , 2016, Digital Fingerprinting.

[3]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[4]  John S. Baras,et al.  Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.

[5]  Jill Slay,et al.  Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.

[6]  Rick S. Blum,et al.  Authenticated side channel via physical layer fingerprinting , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[7]  Alexander Barg,et al.  Random codes: Minimum distances and error exponents , 2002, IEEE Trans. Inf. Theory.

[8]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[9]  Imre Csiszár,et al.  Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .

[10]  Lajos Hanzo,et al.  Physical-layer authentication for wireless security enhancement: current challenges and future developments , 2016, IEEE Communications Magazine.

[11]  Brian M. Sadler,et al.  Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios , 2015, IEEE Access.

[12]  H. Vincent Poor,et al.  Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.

[13]  Anant Sahai,et al.  SNR Walls for Signal Detection , 2008, IEEE Journal of Selected Topics in Signal Processing.

[14]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[15]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[16]  Brian M. Sadler,et al.  Wireless physical layer authentication via fingerprint embedding , 2015, IEEE Communications Magazine.

[17]  T. Tao,et al.  On the singularity probability of random Bernoulli matrices , 2005, math/0501313.

[18]  Larry J. Greenstein,et al.  Using the physical layer for wireless authentication in time-variant channels , 2008, IEEE Transactions on Wireless Communications.

[19]  Walid Saad,et al.  Device Fingerprinting in Wireless Networks: Challenges and Opportunities , 2015, IEEE Communications Surveys & Tutorials.

[20]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[21]  W. Marsden I and J , 2012 .

[22]  Mary Ann Weitnauer,et al.  Achieving Undetectable Communication , 2015, IEEE Journal of Selected Topics in Signal Processing.